From d88c5244eb55473d380fe165083c2d6eff4f8cca Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 16 Jan 2025 21:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-01-16T21:00:20.238048+00:00 --- CVE-2001/CVE-2001-15xx/CVE-2001-1533.json | 24 +- CVE-2001/CVE-2001-15xx/CVE-2001-1546.json | 32 +- CVE-2002/CVE-2002-17xx/CVE-2002-1796.json | 32 +- CVE-2002/CVE-2002-18xx/CVE-2002-1816.json | 32 +- CVE-2002/CVE-2002-19xx/CVE-2002-1975.json | 32 +- CVE-2004/CVE-2004-22xx/CVE-2004-2257.json | 34 +- CVE-2004/CVE-2004-23xx/CVE-2004-2339.json | 24 +- CVE-2005/CVE-2005-16xx/CVE-2005-1674.json | 32 +- CVE-2005/CVE-2005-16xx/CVE-2005-1688.json | 34 +- CVE-2005/CVE-2005-18xx/CVE-2005-1831.json | 24 +- CVE-2005/CVE-2005-18xx/CVE-2005-1876.json | 34 +- CVE-2005/CVE-2005-21xx/CVE-2005-2103.json | 32 +- CVE-2005/CVE-2005-31xx/CVE-2005-3106.json | 32 +- CVE-2005/CVE-2005-33xx/CVE-2005-3302.json | 34 +- CVE-2005/CVE-2005-42xx/CVE-2005-4206.json | 32 +- CVE-2005/CVE-2005-43xx/CVE-2005-4349.json | 34 +- CVE-2005/CVE-2005-46xx/CVE-2005-4650.json | 34 +- CVE-2005/CVE-2005-47xx/CVE-2005-4780.json | 24 +- CVE-2006/CVE-2006-00xx/CVE-2006-0054.json | 34 +- CVE-2006/CVE-2006-07xx/CVE-2006-0755.json | 24 +- CVE-2006/CVE-2006-10xx/CVE-2006-1078.json | 24 +- CVE-2006/CVE-2006-23xx/CVE-2006-2362.json | 34 +- CVE-2023/CVE-2023-262xx/CVE-2023-26215.json | 12 +- CVE-2023/CVE-2023-275xx/CVE-2023-27514.json | 32 +- CVE-2023/CVE-2023-513xx/CVE-2023-51388.json | 74 +++- CVE-2023/CVE-2023-513xx/CVE-2023-51389.json | 74 +++- CVE-2023/CVE-2023-516xx/CVE-2023-51653.json | 74 +++- CVE-2023/CVE-2023-517xx/CVE-2023-51770.json | 94 ++++- CVE-2024/CVE-2024-13xx/CVE-2024-1323.json | 94 ++++- CVE-2024/CVE-2024-19xx/CVE-2024-1978.json | 64 +++- CVE-2024/CVE-2024-19xx/CVE-2024-1981.json | 86 ++++- CVE-2024/CVE-2024-229xx/CVE-2024-22936.json | 73 +++- CVE-2024/CVE-2024-245xx/CVE-2024-24564.json | 59 ++- CVE-2024/CVE-2024-250xx/CVE-2024-25094.json | 52 ++- CVE-2024/CVE-2024-250xx/CVE-2024-25098.json | 52 ++- CVE-2024/CVE-2024-261xx/CVE-2024-26135.json | 76 +++- CVE-2024/CVE-2024-261xx/CVE-2024-26149.json | 66 +++- CVE-2024/CVE-2024-281xx/CVE-2024-28190.json | 100 ++++- CVE-2024/CVE-2024-299xx/CVE-2024-29994.json | 90 ++++- CVE-2024/CVE-2024-299xx/CVE-2024-29996.json | 140 ++++++- CVE-2024/CVE-2024-300xx/CVE-2024-30006.json | 140 ++++++- CVE-2024/CVE-2024-300xx/CVE-2024-30007.json | 62 ++- CVE-2024/CVE-2024-300xx/CVE-2024-30008.json | 120 +++++- CVE-2024/CVE-2024-300xx/CVE-2024-30009.json | 140 ++++++- CVE-2024/CVE-2024-300xx/CVE-2024-30038.json | 130 ++++++- CVE-2024/CVE-2024-300xx/CVE-2024-30039.json | 140 ++++++- CVE-2024/CVE-2024-34xx/CVE-2024-3466.json | 90 ++++- CVE-2024/CVE-2024-364xx/CVE-2024-36402.json | 60 +++ CVE-2024/CVE-2024-364xx/CVE-2024-36403.json | 60 +++ CVE-2024/CVE-2024-488xx/CVE-2024-48806.json | 39 +- CVE-2024/CVE-2024-525xx/CVE-2024-52594.json | 60 +++ CVE-2024/CVE-2024-526xx/CVE-2024-52602.json | 72 ++++ CVE-2024/CVE-2024-527xx/CVE-2024-52791.json | 60 +++ CVE-2024/CVE-2024-545xx/CVE-2024-54535.json | 96 ++++- CVE-2024/CVE-2024-555xx/CVE-2024-55553.json | 4 +- CVE-2024/CVE-2024-559xx/CVE-2024-55954.json | 76 ++++ CVE-2024/CVE-2024-561xx/CVE-2024-56114.json | 39 +- CVE-2024/CVE-2024-561xx/CVE-2024-56136.json | 82 ++++ CVE-2024/CVE-2024-565xx/CVE-2024-56515.json | 60 +++ CVE-2024/CVE-2024-576xx/CVE-2024-57676.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57677.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57678.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57679.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57680.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57681.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57682.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57683.json | 25 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57684.json | 60 +++ CVE-2025/CVE-2025-04xx/CVE-2025-0437.json | 57 ++- CVE-2025/CVE-2025-206xx/CVE-2025-20621.json | 56 +++ CVE-2025/CVE-2025-206xx/CVE-2025-20630.json | 56 +++ CVE-2025/CVE-2025-211xx/CVE-2025-21134.json | 31 +- CVE-2025/CVE-2025-214xx/CVE-2025-21409.json | 160 +++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21411.json | 160 +++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21413.json | 160 +++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21417.json | 160 +++++++- CVE-2025/CVE-2025-230xx/CVE-2025-23013.json | 8 +- CVE-2025/CVE-2025-234xx/CVE-2025-23423.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23424.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23426.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23429.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23430.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23432.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23434.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23435.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23436.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23438.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23442.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23444.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23445.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23452.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23453.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23455.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23456.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23463.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23467.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23470.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23471.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23476.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23483.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23497.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23499.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23501.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23508.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23510.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23511.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23513.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23514.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23528.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23530.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23532.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23533.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23537.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23547.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23557.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23558.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23559.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23560.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23566.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23567.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23569.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23572.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23573.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23577.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23617.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23618.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23620.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23623.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23627.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23639.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23640.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23641.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23642.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23644.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23649.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23654.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23659.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23660.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23661.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23662.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23664.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23665.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23673.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23675.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23677.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23689.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23690.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23691.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23692.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23693.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23694.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23698.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23699.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23702.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23703.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23708.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23710.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23712.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23713.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23715.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23717.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23720.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23743.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23745.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23749.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23767.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23783.json | 56 +++ README.md | 100 ++--- _state.csv | 403 +++++++++++++------- 169 files changed, 9775 insertions(+), 390 deletions(-) create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36402.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36403.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52594.json create mode 100644 CVE-2024/CVE-2024-526xx/CVE-2024-52602.json create mode 100644 CVE-2024/CVE-2024-527xx/CVE-2024-52791.json create mode 100644 CVE-2024/CVE-2024-559xx/CVE-2024-55954.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56136.json create mode 100644 CVE-2024/CVE-2024-565xx/CVE-2024-56515.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57676.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57677.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57678.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57679.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57680.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57681.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57682.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57683.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57684.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20621.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20630.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23423.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23424.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23426.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23429.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23430.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23432.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23434.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23435.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23436.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23438.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23442.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23444.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23445.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23452.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23453.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23455.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23456.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23463.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23467.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23470.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23471.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23476.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23483.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23497.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23499.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23501.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23508.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23510.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23511.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23513.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23514.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23528.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23530.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23532.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23533.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23537.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23547.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23557.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23558.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23559.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23560.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23566.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23567.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23569.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23572.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23573.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23577.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23617.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23618.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23620.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23623.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23627.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23639.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23640.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23641.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23642.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23644.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23649.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23654.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23659.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23660.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23661.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23662.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23664.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23665.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23673.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23675.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23677.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23689.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23690.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23691.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23692.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23693.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23694.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23698.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23699.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23702.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23703.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23708.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23710.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23712.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23713.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23715.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23717.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23720.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23743.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23745.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23749.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23767.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23783.json diff --git a/CVE-2001/CVE-2001-15xx/CVE-2001-1533.json b/CVE-2001/CVE-2001-15xx/CVE-2001-1533.json index bbed333065b..c1d5629bd67 100644 --- a/CVE-2001/CVE-2001-15xx/CVE-2001-1533.json +++ b/CVE-2001/CVE-2001-15xx/CVE-2001-1533.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1533", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:37:54.800", + "lastModified": "2025-01-16T20:15:26.520", "vulnStatus": "Modified", "cveTags": [ { @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json b/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json index 86abaef2fc5..06edbf6f50c 100644 --- a/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json +++ b/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1546", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:37:56.707", + "lastModified": "2025-01-16T20:15:26.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-326" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], "configurations": [ diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json index 297fa68469b..3c91fa0a708 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1796", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:42:08.823", + "lastModified": "2025-01-16T20:15:26.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json b/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json index afcfb877845..d5674bfd2b3 100644 --- a/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json +++ b/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1816", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:42:11.680", + "lastModified": "2025-01-16T20:15:27.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-193" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] } ], "configurations": [ diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json index 76a0f59ac42..ecc560693fb 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1975", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:42:33.970", + "lastModified": "2025-01-16T20:15:27.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-326" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], "configurations": [ diff --git a/CVE-2004/CVE-2004-22xx/CVE-2004-2257.json b/CVE-2004/CVE-2004-22xx/CVE-2004-2257.json index 638f7c1f9e4..3a28bb81f96 100644 --- a/CVE-2004/CVE-2004-22xx/CVE-2004-2257.json +++ b/CVE-2004/CVE-2004-22xx/CVE-2004-2257.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2257", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:52:53.573", + "lastModified": "2025-01-16T20:15:27.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-425" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] } ], "configurations": [ diff --git a/CVE-2004/CVE-2004-23xx/CVE-2004-2339.json b/CVE-2004/CVE-2004-23xx/CVE-2004-2339.json index dafafadd4d8..3af1778908a 100644 --- a/CVE-2004/CVE-2004-23xx/CVE-2004-2339.json +++ b/CVE-2004/CVE-2004-23xx/CVE-2004-2339.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2339", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2024-11-20T23:53:06.157", + "lastModified": "2025-01-16T20:15:27.997", "vulnStatus": "Modified", "cveTags": [ { @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json index a85c4f06df6..9575b9753db 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1674", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-19T04:00:00.000", - "lastModified": "2024-11-20T23:57:52.360", + "lastModified": "2025-01-16T19:15:26.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1688.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1688.json index 0ce6063df29..3c9b54570aa 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1688.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1688.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1688", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-20T04:00:00.000", - "lastModified": "2024-11-20T23:57:54.213", + "lastModified": "2025-01-16T19:15:27.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-425" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-18xx/CVE-2005-1831.json b/CVE-2005/CVE-2005-18xx/CVE-2005-1831.json index b6c2fecb8b0..1c0811a7c4b 100644 --- a/CVE-2005/CVE-2005-18xx/CVE-2005-1831.json +++ b/CVE-2005/CVE-2005-18xx/CVE-2005-1831.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1831", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-31T04:00:00.000", - "lastModified": "2024-11-20T23:58:14.150", + "lastModified": "2025-01-16T20:15:28.213", "vulnStatus": "Modified", "cveTags": [ { @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2005/CVE-2005-18xx/CVE-2005-1876.json b/CVE-2005/CVE-2005-18xx/CVE-2005-1876.json index fdf2c2084ec..1f2d1b0084b 100644 --- a/CVE-2005/CVE-2005-18xx/CVE-2005-1876.json +++ b/CVE-2005/CVE-2005-18xx/CVE-2005-1876.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1876", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-09T04:00:00.000", - "lastModified": "2024-11-20T23:58:19.513", + "lastModified": "2025-01-16T20:15:28.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2103.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2103.json index 143d68962e3..ae36fc16ed8 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2103.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2103.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2103", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-16T04:00:00.000", - "lastModified": "2024-11-20T23:58:48.413", + "lastModified": "2025-01-16T20:15:28.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-131" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-31xx/CVE-2005-3106.json b/CVE-2005/CVE-2005-31xx/CVE-2005-3106.json index 5fe0689b46c..7dc004da599 100644 --- a/CVE-2005/CVE-2005-31xx/CVE-2005-3106.json +++ b/CVE-2005/CVE-2005-31xx/CVE-2005-3106.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3106", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-30T10:05:00.000", - "lastModified": "2024-11-21T00:01:08.543", + "lastModified": "2025-01-16T20:15:28.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-667" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json b/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json index 48edcc4a253..5d6eb145cba 100644 --- a/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json +++ b/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3302", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-24T10:02:00.000", - "lastModified": "2024-11-21T00:01:34.333", + "lastModified": "2025-01-16T20:15:29.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json index 293698753be..84e141142e2 100644 --- a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json +++ b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4206", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-13T11:03:00.000", - "lastModified": "2024-11-21T00:03:41.170", + "lastModified": "2025-01-16T20:15:29.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -70,6 +90,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-43xx/CVE-2005-4349.json b/CVE-2005/CVE-2005-43xx/CVE-2005-4349.json index b2367d38157..317e25b2731 100644 --- a/CVE-2005/CVE-2005-43xx/CVE-2005-4349.json +++ b/CVE-2005/CVE-2005-43xx/CVE-2005-4349.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4349", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-19T11:03:00.000", - "lastModified": "2024-11-21T00:04:02.880", + "lastModified": "2025-01-16T20:15:29.580", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -59,6 +81,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json b/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json index cf6e0145b1b..9fbd641fe48 100644 --- a/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json +++ b/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4650", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2024-11-21T00:04:50.390", + "lastModified": "2025-01-16T20:15:29.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json b/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json index 28fd5a5c489..62664d80441 100644 --- a/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json +++ b/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4780", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2024-11-21T00:05:09.827", + "lastModified": "2025-01-16T20:15:30.023", "vulnStatus": "Modified", "cveTags": [ { @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2006/CVE-2006-00xx/CVE-2006-0054.json b/CVE-2006/CVE-2006-00xx/CVE-2006-0054.json index 73750ad0fc5..e02120e073e 100644 --- a/CVE-2006/CVE-2006-00xx/CVE-2006-0054.json +++ b/CVE-2006/CVE-2006-00xx/CVE-2006-0054.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0054", "sourceIdentifier": "secteam@freebsd.org", "published": "2006-01-11T21:03:00.000", - "lastModified": "2024-11-21T00:05:32.830", + "lastModified": "2025-01-16T20:15:30.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-824" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] } ], "configurations": [ diff --git a/CVE-2006/CVE-2006-07xx/CVE-2006-0755.json b/CVE-2006/CVE-2006-07xx/CVE-2006-0755.json index 219b9475715..507bf19aa0b 100644 --- a/CVE-2006/CVE-2006-07xx/CVE-2006-0755.json +++ b/CVE-2006/CVE-2006-07xx/CVE-2006-0755.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0755", "sourceIdentifier": "cve@mitre.org", "published": "2006-02-18T02:02:00.000", - "lastModified": "2024-11-21T00:07:15.837", + "lastModified": "2025-01-16T20:15:30.433", "vulnStatus": "Modified", "cveTags": [ { @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2006/CVE-2006-10xx/CVE-2006-1078.json b/CVE-2006/CVE-2006-10xx/CVE-2006-1078.json index eacd02e0f40..e29df8c9d59 100644 --- a/CVE-2006/CVE-2006-10xx/CVE-2006-1078.json +++ b/CVE-2006/CVE-2006-10xx/CVE-2006-1078.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1078", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-09T00:02:00.000", - "lastModified": "2024-11-21T00:08:01.660", + "lastModified": "2025-01-16T20:15:30.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2006/CVE-2006-23xx/CVE-2006-2362.json b/CVE-2006/CVE-2006-23xx/CVE-2006-2362.json index 0d4579a2573..bd34cbe57ae 100644 --- a/CVE-2006/CVE-2006-23xx/CVE-2006-2362.json +++ b/CVE-2006/CVE-2006-23xx/CVE-2006-2362.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2362", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-15T16:06:00.000", - "lastModified": "2024-11-21T00:11:09.297", + "lastModified": "2025-01-16T20:15:30.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26215.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26215.json index 4de7275cb19..58bcde40fef 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26215.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26215.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26215", "sourceIdentifier": "security@tibco.com", "published": "2023-05-25T19:15:14.067", - "lastModified": "2024-11-21T07:50:55.940", + "lastModified": "2025-01-16T19:15:27.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json index e464e1d2862..07d718f2301 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27514", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.700", - "lastModified": "2024-11-21T07:53:04.273", + "lastModified": "2025-01-16T20:15:31.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json index 9a63b50e234..f04956675b7 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51388.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51388", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.413", - "lastModified": "2024-11-21T08:38:00.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:11:41.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-74" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "0B4E8400-424B-4FCB-81C8-5D559B146130" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-mcqg-gqxr-hqgj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-mcqg-gqxr-hqgj", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json index 53f924b29c5..445a74702a3 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51389.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51389", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.623", - "lastModified": "2024-11-21T08:38:00.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:08:36.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "0B4E8400-424B-4FCB-81C8-5D559B146130" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json index 596df6da554..eeb9a948ec7 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51653", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T16:15:53.800", - "lastModified": "2024-11-21T08:38:32.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:04:56.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-74" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "0B4E8400-424B-4FCB-81C8-5D559B146130" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dromara/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-gcmp-vf6v-59gg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/dromara/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-gcmp-vf6v-59gg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json index 2c7ca0c3736..add2f057c07 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51770.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51770", "sourceIdentifier": "security@apache.org", "published": "2024-02-20T10:15:08.243", - "lastModified": "2024-11-21T08:38:45.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:48:57.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de lectura de archivos arbitrarios en Apache Dolphinscheduler. Este problema afecta a Apache DolphinScheduler: versiones anteriores a 3.2.1. Recomendamos a los usuarios que actualicen Apache DolphinScheduler a la versi\u00f3n 3.2.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndExcluding": "3.2.1", + "matchCriteriaId": "0E02B1F7-DA39-44B8-B3C6-0A2056461C0A" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/20/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/apache/dolphinscheduler/pull/15433", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/20/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/apache/dolphinscheduler/pull/15433", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1323.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1323.json index b04c4e3f565..47e799c415e 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1323.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1323.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1323", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-27T05:15:08.193", - "lastModified": "2024-11-21T08:50:20.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:29:54.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.10.31", + "matchCriteriaId": "98554FEB-F35E-46DB-9429-E8841DF824A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3040304/themeisle-companion/tags/2.10.32/vendor/codeinwp/elementor-extra-widgets/class-elementor-extra-widgets.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038451%40themeisle-companion&new=3038451%40themeisle-companion&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040304%40themeisle-companion&new=3040304%40themeisle-companion&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0241a9fc-ce42-4a97-9f33-f07cf53c0f52?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3040304/themeisle-companion/tags/2.10.32/vendor/codeinwp/elementor-extra-widgets/class-elementor-extra-widgets.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038451%40themeisle-companion&new=3038451%40themeisle-companion&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040304%40themeisle-companion&new=3040304%40themeisle-companion&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0241a9fc-ce42-4a97-9f33-f07cf53c0f52?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1978.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1978.json index 7655392543d..02785c0bd3c 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1978.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1978", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T07:15:06.603", - "lastModified": "2024-11-21T08:51:43.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:01:27.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alex.kirk:friends:*:*:*:*:wordpress:*:*:*", + "versionEndExcluding": "2.8.6", + "matchCriteriaId": "9D114F07-1C77-4ED2-BFA6-DC088E57BFF2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/akirk/friends/pull/290", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3036987%40friends&new=3036987%40friends&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72e1fbce-86ae-4518-a613-7c322193acf4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/akirk/friends/pull/290", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3036987%40friends&new=3036987%40friends&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72e1fbce-86ae-4518-a613-7c322193acf4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1981.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1981.json index 94fb7a28d4f..f9065c1ab14 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1981.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1981", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T07:15:06.930", - "lastModified": "2024-11-21T08:51:43.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:00:16.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,103 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.9.68", + "matchCriteriaId": "4DC7C14F-88C8-41DF-9A7E-31CD921158B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fwpvivid-backuprestore%2Ftrunk&old=2667839&new_path=%2Fwpvivid-backuprestore%2Ftrunk&new=2667839", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8bfb38-4f20-4f9f-bb30-a88f3be2d2d3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fwpvivid-backuprestore%2Ftrunk&old=2667839&new_path=%2Fwpvivid-backuprestore%2Ftrunk&new=2667839", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8bfb38-4f20-4f9f-bb30-a88f3be2d2d3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22936.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22936.json index 59fb0d9cdfe..28214fe3a97 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22936.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22936", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:07.653", - "lastModified": "2024-11-21T08:56:49.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:10:39.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:manuelaldape:parents_\\&_student_portal:3053:*:*:*:*:*:*:*", + "matchCriteriaId": "214DC025-60B8-4637-B071-E8E0A0EF5C27" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SnoopJesus420/CVEs/blob/main/CVE-2023-", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/SnoopJesus420/CVEs/blob/main/CVEs-2024/CVE-2024-22936.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/SnoopJesus420/CVEs/blob/main/CVE-2023-", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/SnoopJesus420/CVEs/blob/main/CVEs-2024/CVE-2024-22936.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24564.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24564.json index 60e2dbc0a13..e520bf8ae4b 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24564.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24564", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-26T20:19:05.627", - "lastModified": "2024-11-21T08:59:25.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:34:13.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,18 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", + "versionEndExcluding": "0.4.0", + "matchCriteriaId": "CEC5BCE2-DB5C-49EB-A302-F11E4E02F9BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vyperlang/vyper/commit/3d9c537142fb99b2672f21e2057f5f202cde194f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25094.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25094.json index ca65085eea7..ace94ef7dca 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25094.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25094", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T06:15:47.653", - "lastModified": "2024-11-21T09:00:14.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:09:37.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:primitiv:pj_news_ticker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.9.5", + "matchCriteriaId": "972F37D7-6158-41A2-AB97-5C5959011BDE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pj-news-ticker/wordpress-pj-news-ticker-plugin-1-9-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/pj-news-ticker/wordpress-pj-news-ticker-plugin-1-9-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25098.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25098.json index 8956bde1ef9..2d4895456ba 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25098.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25098", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T06:15:47.827", - "lastModified": "2024-11-21T09:00:15.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:05:08.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bajorat-media:pb_oembed_html5_audio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6", + "matchCriteriaId": "FF0850CF-179D-401E-AF1C-C7160E537B46" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pb-oembed-html5-audio-with-cache-support/wordpress-pb-oembed-html5-audio-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/pb-oembed-html5-audio-with-cache-support/wordpress-pb-oembed-html5-audio-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json index 06c495144b9..16a198289ea 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26135", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-20T20:15:08.560", - "lastModified": "2024-11-21T09:02:00.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:24:58.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,68 @@ "value": "CWE-346" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meshcentral:meshcentral:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.21", + "matchCriteriaId": "F8A0B177-615A-43D0-BEAF-4C178D0C33EB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26149.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26149.json index e0bfdba1beb..217c284e4cb 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26149.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26149", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-26T20:19:05.853", - "lastModified": "2024-11-21T09:02:02.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:31:59.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", + "versionEndIncluding": "0.3.10", + "matchCriteriaId": "832C489D-4288-46B4-A29E-0E7168748042" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json index edafc855afb..5c8c17f68cb 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28190", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-09T14:15:08.503", - "lastModified": "2024-11-21T09:05:59.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:54:16.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,40 +69,100 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.13.40", + "matchCriteriaId": "302B7F92-FC7F-4E43-BEE2-7D493B03CB0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.3.4", + "matchCriteriaId": "556D1F95-B80C-4819-BFC2-CF3EF735BBE6" + } + ] + } + ] } ], "references": [ { "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29994.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29994.json index b30734572de..1d467635b91 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29994.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29994", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:17.070", - "lastModified": "2024-11-21T09:08:46.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:10:54.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,98 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29996.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29996.json index 558df163520..fd69bae522b 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29996.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29996", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:19.117", - "lastModified": "2024-11-21T09:08:46.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:11:55.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,148 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30006.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30006.json index 75dbe92eb6d..5ff0508324c 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30006.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30006", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:35.757", - "lastModified": "2024-11-21T09:11:02.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:11:30.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,148 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30007.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30007.json index e553902e4a4..ae15dcfa1ba 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30007.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30007", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:37.130", - "lastModified": "2024-11-21T09:11:02.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:12:10.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30008.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30008.json index 4c17232c48f..a1f1c354f65 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30008.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30008", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:38.260", - "lastModified": "2024-11-21T09:11:02.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:12:19.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,128 @@ "value": "CWE-191" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30009.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30009.json index c0aeacc2359..c8da35e4333 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30009.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30009", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:16:39.597", - "lastModified": "2024-11-21T09:11:02.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:12:54.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,148 @@ "value": "CWE-197" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30038.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30038.json index 7c5e99c6f95..802ab3ef449 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30038.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30038", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:10.303", - "lastModified": "2024-11-21T09:11:07.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:13:10.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,138 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30039.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30039.json index ec9a109f93f..828bf975e7b 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30039.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30039.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30039", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:11.293", - "lastModified": "2024-11-21T09:11:07.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-16T19:13:43.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,148 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json index 6a52184b1e3..1895def14aa 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3466", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T21:15:10.587", - "lastModified": "2024-11-21T09:29:39.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-16T19:57:57.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,88 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:laundry_shop_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "77F8478B-4E78-42A1-8B3A-94E6C764FCCE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fubxx/CVE/blob/main/LaundryManagementSystemSQL4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259747", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259747", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312314", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/fubxx/CVE/blob/main/LaundryManagementSystemSQL4.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259747", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259747", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312314", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json new file mode 100644 index 00000000000..bd604b058f9 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36402", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:32.047", + "lastModified": "2025-01-16T20:15:32.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. MMR 1.3.5 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector. Though extremely limited, server operators can use more strict rate limits based on IP address as a partial workaround." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/t2bot/matrix-media-repo/security/advisories/GHSA-8vmr-h7h5-cqhg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json new file mode 100644 index 00000000000..cb5f399e3ca --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36403", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:32.197", + "lastModified": "2025-01-16T20:15:32.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 is vulnerable to unbounded disk consumption, where an unauthenticated adversary can induce it to download and cache large amounts of remote media files. MMR's typical operating environment uses S3-like storage as a backend, with file-backed store as an alternative option. Instances using a file-backed store or those which self-host an S3 storage system are therefore vulnerable to a disk fill attack. Once the disk is full, authenticated users will be unable to upload new media, resulting in denial of service. For instances configured to use a cloud-based S3 storage option, this could result in high service fees instead of a denial of service. MMR 1.3.5 introduces a new default-on \"leaky bucket\" rate limit to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user's ability to request large amounts of data. Operators should note that the leaky bucket implementation introduced in MMR 1.3.5 requires the IP address associated with the request to be forwarded, to avoid mistakenly applying the rate limit to the reverse proxy instead. To avoid this issue, the reverse proxy should populate the X-Forwarded-For header when sending the request to MMR. Operators who cannot update may wish to lower the maximum file size they allow and implement harsh rate limits, though this can still lead to a large amount of data to be downloaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://en.wikipedia.org/wiki/Leaky_bucket#As_a_meter", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/t2bot/matrix-media-repo/security/advisories/GHSA-vc2m-hw89-qjxf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json index e60b2d434cd..eb4cefc4df6 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48806", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T21:15:29.190", - "lastModified": "2025-01-09T21:15:29.190", + "lastModified": "2025-01-16T19:15:28.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Neat Board NFC v.1.20240620.0015 permite a atacantes f\u00edsicamente pr\u00f3ximos escalar privilegios a trav\u00e9s de un payload manipulado para el campo de contrase\u00f1a" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://support.neat.no/article/devices-running-microsoft-teams-allow-for-buffer-overflow-vulnerability/", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json new file mode 100644 index 00000000000..0b1e25e0414 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52594", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T19:15:28.480", + "lastModified": "2025-01-16T19:15:28.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Gomatrixserverlib is a Go library for matrix federation. Gomatrixserverlib is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. The commit `c4f1e01` fixes this issue. Users are advised to upgrade. Users unable to upgrade should use a local firewall to limit the network segments and hosts the service using gomatrixserverlib can access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/gomatrixserverlib/commit/c4f1e01eab0dd435709ad15463ed38a079ad6128", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/gomatrixserverlib/security/advisories/GHSA-4ff6-858j-r822", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json new file mode 100644 index 00000000000..f5db0cee711 --- /dev/null +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-52602", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:32.503", + "lastModified": "2025-01-16T20:15:32.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. Matrix Media Repo (MMR) is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. This is fixed in MMR v1.3.8. Users are advised to upgrade. Restricting which hosts MMR is allowed to contact via (local) firewall rules or a transparent proxy and may provide a workaround for users unable to upgrade." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/t2bot/matrix-media-repo/releases/tag/v1.3.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/t2bot/matrix-media-repo/security/advisories/GHSA-r6jg-jfv6-2fjv", + "source": "security-advisories@github.com" + }, + { + "url": "https://learn.snyk.io/lesson/ssrf-server-side-request-forgery", + "source": "security-advisories@github.com" + }, + { + "url": "https://owasp.org/www-community/attacks/Server_Side_Request_Forgery", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.agwa.name/blog/post/preventing_server_side_request_forgery_in_golang", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json new file mode 100644 index 00000000000..2166f872867 --- /dev/null +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52791", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:32.667", + "lastModified": "2025-01-16T20:15:32.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/t2bot/matrix-media-repo/releases/tag/v1.3.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/t2bot/matrix-media-repo/security/advisories/GHSA-gp86-q8hg-fpxj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json index 13a553cb26c..96cc72a8973 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json @@ -2,28 +2,112 @@ "id": "CVE-2024-54535", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.610", - "lastModified": "2025-01-15T20:15:28.610", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:36:12.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path handling issue was addressed with improved logic. This issue is fixed in watchOS 11.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1. An attacker with access to calendar data could also read reminders." + }, + { + "lang": "es", + "value": " Se solucion\u00f3 un problema de manejo de rutas con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en watchOS 11.1, visionOS 2.1, iOS 18.1 y iPadOS 18.1. Un atacante con acceso a los datos del calendario tambi\u00e9n podr\u00eda leer los recordatorios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json index 4c11c7de914..714c7037a6a 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55553.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55553", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T23:15:07.637", - "lastModified": "2025-01-09T22:15:29.350", + "lastModified": "2025-01-16T19:15:28.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In FRRouting (FRR) before 10.3 from 6.0 onward, all routes are re-validated if the total size of an update received via RTR exceeds the internal socket's buffer size, default 4K on most OSes. An attacker can use this to trigger re-parsing of the RIB for FRR routers using RTR by causing more than this number of updates during an update interval (usually 30 minutes). Additionally, this effect regularly occurs organically. Furthermore, an attacker can use this to trigger route validation continuously. Given that routers with large full tables may need more than 30 minutes to fully re-validate the table, continuous issuance/withdrawal of large numbers of ROA may be used to impact the route handling performance of all FRR instances using RPKI globally. Additionally, the re-validation will cause heightened BMP traffic to ingestors. Affected Versions: FRRouting <6.0. Fixed Versions: 10.0.3, 10.1.2, 10.2.1, >= 10.3." + "value": "In FRRouting (FRR) before 10.3 from 6.0 onward, all routes are re-validated if the total size of an update received via RTR exceeds the internal socket's buffer size, default 4K on most OSes. An attacker can use this to trigger re-parsing of the RIB for FRR routers using RTR by causing more than this number of updates during an update interval (usually 30 minutes). Additionally, this effect regularly occurs organically. Furthermore, an attacker can use this to trigger route validation continuously. Given that routers with large full tables may need more than 30 minutes to fully re-validate the table, continuous issuance/withdrawal of large numbers of ROA may be used to impact the route handling performance of all FRR instances using RPKI globally. Additionally, the re-validation will cause heightened BMP traffic to ingestors. Fixed Versions: 10.0.3, 10.1.2, 10.2.1, >= 10.3." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json new file mode 100644 index 00000000000..a34419d52fa --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-55954", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:32.890", + "lastModified": "2025-01-16T20:15:32.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenObserve is a cloud-native observability platform. A vulnerability in the user management endpoint `/api/{org_id}/users/{email_id}` allows an \"Admin\" role user to remove a \"Root\" user from the organization. This violates the intended privilege hierarchy, enabling a non-root user to remove the highest-privileged account. Due to insufficient role checks, the `remove_user_from_org` function does not prevent an \"Admin\" user from removing a \"Root\" user. As a result, an attacker with an \"Admin\" role can remove critical \"Root\" users, potentially gaining effective full control by eliminating the highest-privileged accounts. The `DELETE /api/{org_id}/users/{email_id}` endpoint is affected. This issue has been addressed in release version `0.14.1` and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-272" + }, + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-285" + }, + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaby/openobserve/blob/main/src/service/users.rs#L631", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openobserve/openobserve/security/advisories/GHSA-m8gj-6r85-3r6m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json index 19380da29fe..31b74a065c0 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56114", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.730", - "lastModified": "2025-01-09T20:15:39.730", + "lastModified": "2025-01-16T19:15:28.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Canlineapp Online 1.1 es vulnerable a controles de acceso err\u00f3neos y permite que los usuarios con el rol de auditor creen una plantilla de auditor\u00eda como resultado de verificaciones de autorizaci\u00f3n incorrectas. Esta funci\u00f3n est\u00e1 dise\u00f1ada para el rol de supervisor, pero los auditores han podido crear plantillas de auditor\u00eda con \u00e9xito desde su cuenta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-56114", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json new file mode 100644 index 00000000000..85dd417cd2b --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-56136", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:33.047", + "lastModified": "2025-01-16T20:15:33.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zulip/zulip/commit/c6334a765b1e6d71760e4a3b32ae5b8367f2ed4d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zulip/zulip/security/advisories/GHSA-5xg8-xhfj-4hm6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json new file mode 100644 index 00000000000..68cf367c339 --- /dev/null +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-56515", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-16T20:15:33.197", + "lastModified": "2025-01-16T20:15:33.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. If SVG or JPEGXL thumbnailers are enabled (they are disabled by default), a user may upload a file which claims to be either of these types and request a thumbnail to invoke a different decoder in ImageMagick. In some ImageMagick installations, this includes the capability to run Ghostscript to decode the image/file. If MP4 thumbnailers are enabled (also disabled by default), the same issue as above may occur with the ffmpeg installation instead. MMR uses a number of other decoders for all other file types when preparing thumbnails. Theoretical issues are possible with these decoders, however in testing they were not possible to exploit. This is fixed in MMR v1.3.8. MMR now inspects the mimetype of media prior to thumbnailing, and picks a thumbnailer based on those results instead of relying on user-supplied values. This may lead to fewer thumbnails when obscure file shapes are used. This also helps narrow scope of theoretical issues with all decoders MMR uses for thumbnails. Users are advised to upgrade. Users unable to upgrade may disable the SVG, JPEGXL, and MP4 thumbnail types in the MMR config which prevents the decoders from being invoked. Further disabling uncommon file types on the server is recommended to limit risk surface. Containers and other similar technologies may also be used to limit the impact of vulnerabilities in external decoders, like ImageMagick and ffmpeg. Some installations of ImageMagick may disable \"unsafe\" file types, like PDFs, already. This option can be replicated to other environments as needed. ffmpeg may be compiled with limited decoders/codecs. The Docker image for MMR disables PDFs and similar formats by default." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/t2bot/matrix-media-repo/releases/tag/v1.3.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/t2bot/matrix-media-repo/security/advisories/GHSA-rcxc-wjgw-579r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json new file mode 100644 index 00000000000..c3151ba8ddd --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57676", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:28.937", + "lastModified": "2025-01-16T19:15:28.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2WlanBasicSetup.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json new file mode 100644 index 00000000000..28f470fdc06 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57677", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.033", + "lastModified": "2025-01-16T19:15:29.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2Wan.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json new file mode 100644 index 00000000000..c0df37106eb --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57678", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.130", + "lastModified": "2025-01-16T19:15:29.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2WlAc.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json new file mode 100644 index 00000000000..81fb51fe8db --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57679", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.220", + "lastModified": "2025-01-16T19:15:29.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2RepeaterSetup.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json new file mode 100644 index 00000000000..9baf630d6c4 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57680", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.323", + "lastModified": "2025-01-16T19:15:29.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2PortriggerRule.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json new file mode 100644 index 00000000000..ffad683cf34 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57681", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.413", + "lastModified": "2025-01-16T19:15:29.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2alg.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json new file mode 100644 index 00000000000..9687cf25cbb --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57682", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.513", + "lastModified": "2025-01-16T19:15:29.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/d_status.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json new file mode 100644 index 00000000000..008fa41be82 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57683", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.603", + "lastModified": "2025-01-16T19:15:29.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/websURLFilterAddDel.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json new file mode 100644 index 00000000000..a08a786c86e --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-57684", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-16T19:15:29.700", + "lastModified": "2025-01-16T20:15:33.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/formDMZ.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0437.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0437.json index 2898c58bc3e..7691b932a64 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0437.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0437.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0437", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.800", - "lastModified": "2025-01-15T11:15:09.800", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:35:01.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": " La lectura fuera de l\u00edmites en M\u00e9tricas en Google Chrome anterior a la versi\u00f3n 132.0.6834.83 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -28,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "132.0.6834.83", + "matchCriteriaId": "1FC28099-9736-4AB4-96EB-207A2FC64ACD" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/378623799", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json new file mode 100644 index 00000000000..4813e01a18f --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20621", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2025-01-16T19:15:29.960", + "lastModified": "2025-01-16T19:15:29.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the webapp to crash via creating and sending such a post to a channel." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json new file mode 100644 index 00000000000..ad2c4c15d8e --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20630", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2025-01-16T19:15:30.110", + "lastModified": "2025-01-16T19:15:30.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Mobile versions <=2.22.0 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the mobile to crash via creating and sending such a post to a channel." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21134.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21134.json index 07b442a0538..9c72a798e8f 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21134.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21134.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21134", "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T19:15:34.337", - "lastModified": "2025-01-14T19:15:34.337", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:43:02.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.7 y anteriores de Illustrator para iPad se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:ipad_os:*:*", + "versionEndExcluding": "3.0.8", + "matchCriteriaId": "9796BCAE-DDDE-47C2-B0FE-744F8A2364B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-04.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json index 511599917fb..9a693555f07 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21409", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.673", - "lastModified": "2025-01-14T18:16:04.673", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:33:29.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { @@ -38,19 +42,167 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "79F031F0-7E96-4361-9E73-1617F5C51A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "BB980EBB-388D-4D0B-8154-C15EC4E77757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json index 044d454ebb4..1ad620df62b 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21411", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.860", - "lastModified": "2025-01-14T18:16:04.860", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:33:43.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { @@ -38,19 +42,167 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "79F031F0-7E96-4361-9E73-1617F5C51A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "BB980EBB-388D-4D0B-8154-C15EC4E77757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json index 2f260c0485d..d6d0fa55765 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21413", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:05.103", - "lastModified": "2025-01-14T18:16:05.103", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:33:54.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { @@ -38,19 +42,167 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "79F031F0-7E96-4361-9E73-1617F5C51A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "BB980EBB-388D-4D0B-8154-C15EC4E77757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json index a40c4775f61..23fe7064780 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21417", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:05.307", - "lastModified": "2025-01-14T18:16:05.307", - "vulnStatus": "Received", + "lastModified": "2025-01-16T20:34:03.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { @@ -38,19 +42,167 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "79F031F0-7E96-4361-9E73-1617F5C51A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "BB980EBB-388D-4D0B-8154-C15EC4E77757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23013.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23013.json index 007d1f9500f..bc1fdeed2f4 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23013.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23013.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23013", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T04:15:20.037", - "lastModified": "2025-01-16T13:15:07.723", - "vulnStatus": "Received", + "lastModified": "2025-01-16T19:15:30.263", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -89,6 +89,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/01/16/3", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/01/16/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json new file mode 100644 index 00000000000..a19078948ec --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23423", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:33.573", + "lastModified": "2025-01-16T20:15:33.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Smackcoders SendGrid for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SendGrid for WordPress: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-sendgrid-mailer/vulnerability/wordpress-sendgrid-for-wordpress-plugin-1-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json new file mode 100644 index 00000000000..378c8ec3ae2 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23424", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:33.723", + "lastModified": "2025-01-16T20:15:33.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Brian Novotny \u2013 Creative Software Design Solutions Marquee Style RSS News Ticker allows Cross Site Request Forgery.This issue affects Marquee Style RSS News Ticker: from n/a through 3.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/marquee-style-rss-news-ticker/vulnerability/wordpress-marquee-style-rss-news-ticker-plugin-3-2-0-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json new file mode 100644 index 00000000000..cf1a78641eb --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23426", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:33.877", + "lastModified": "2025-01-16T20:15:33.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wizcrew Technologies go Social allows Stored XSS.This issue affects go Social: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/go-social/vulnerability/wordpress-go-social-plugin-1-0-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json new file mode 100644 index 00000000000..9e9dda13777 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23429", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.057", + "lastModified": "2025-01-16T20:15:34.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in altimawebsystems.com Altima Lookbook Free for WooCommerce allows Reflected XSS.This issue affects Altima Lookbook Free for WooCommerce: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/altima-lookbook-free-for-woocommerce/vulnerability/wordpress-altima-lookbook-free-for-woocommerce-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json new file mode 100644 index 00000000000..7a3186c0b45 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23430", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.287", + "lastModified": "2025-01-16T20:15:34.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oren Yomtov Mass Custom Fields Manager allows Reflected XSS.This issue affects Mass Custom Fields Manager: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mass-custom-fields-manager/vulnerability/wordpress-mass-custom-fields-manager-plugin-1-5-csrf-to-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json new file mode 100644 index 00000000000..9091e7ca218 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23432", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.467", + "lastModified": "2025-01-16T20:15:34.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlTi5 AlT Report allows Reflected XSS.This issue affects AlT Report: from n/a through 1.12.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/alt-report/vulnerability/wordpress-alt-report-plugin-1-12-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json new file mode 100644 index 00000000000..ba5cf46197b --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23434", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.607", + "lastModified": "2025-01-16T20:15:34.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Albertolabs.com Easy EU Cookie law allows Stored XSS.This issue affects Easy EU Cookie law: from n/a through 1.3.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-eu-cookie-law/vulnerability/wordpress-easy-eu-cookie-law-plugin-1-3-3-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json new file mode 100644 index 00000000000..c6ab8d101b9 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23435", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.770", + "lastModified": "2025-01-16T20:15:34.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in David Marcucci Password Protect Plugin for WordPress allows Stored XSS.This issue affects Password Protect Plugin for WordPress: from n/a through 0.8.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/password-protect-plugin-for-wordpress/vulnerability/wordpress-password-protect-plugin-for-wordpress-plugin-0-8-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json new file mode 100644 index 00000000000..123e9987c3d --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23436", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:34.920", + "lastModified": "2025-01-16T20:15:34.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Capa Wp-Scribd-List allows Stored XSS.This issue affects Wp-Scribd-List: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-scribd-list/vulnerability/wordpress-wp-scribd-list-plugin-1-2-csrf-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json new file mode 100644 index 00000000000..07c7e0d2664 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23438", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.067", + "lastModified": "2025-01-16T20:15:35.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarvinLabs WP PT-Viewer allows Reflected XSS.This issue affects WP PT-Viewer: from n/a through 2.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-ptviewer/vulnerability/wordpress-wp-pt-viewer-plugin-2-0-2-reflected-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json new file mode 100644 index 00000000000..b923afc54ab --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23442", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.210", + "lastModified": "2025-01-16T20:15:35.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in matias s Shockingly Big IE6 Warning allows Stored XSS.This issue affects Shockingly Big IE6 Warning: from n/a through 1.6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shockingly-big-ie6-warning/vulnerability/wordpress-shockingly-big-ie6-warning-plugin-1-6-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json new file mode 100644 index 00000000000..de49272cf7a --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23444", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.360", + "lastModified": "2025-01-16T20:15:35.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nasir Scroll Top Advanced allows Stored XSS.This issue affects Scroll Top Advanced: from n/a through 2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/scroll-top-advanced/vulnerability/wordpress-scroll-top-advanced-plugin-2-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json new file mode 100644 index 00000000000..e495853965c --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23445", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.513", + "lastModified": "2025-01-16T20:15:35.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Scott Swezey Easy Tynt allows Cross Site Request Forgery.This issue affects Easy Tynt: from n/a through 0.2.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-tynt/vulnerability/wordpress-easy-tynt-plugin-0-2-5-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json new file mode 100644 index 00000000000..ba387ce7b71 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23452", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.730", + "lastModified": "2025-01-16T20:15:35.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EditionGuard Dev Team EditionGuard for WooCommerce \u2013 eBook Sales with DRM allows Reflected XSS.This issue affects EditionGuard for WooCommerce \u2013 eBook Sales with DRM: from n/a through 3.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/editionguard-for-woocommerce-ebook-sales-with-drm/vulnerability/wordpress-editionguard-for-woocommerce-plugin-3-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json new file mode 100644 index 00000000000..c2868c71452 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23453", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:35.883", + "lastModified": "2025-01-16T20:15:35.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Myriad Solutionz Stars SMTP Mailer allows Reflected XSS.This issue affects Stars SMTP Mailer: from n/a through 1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stars-smtp-mailer/vulnerability/wordpress-stars-smtp-mailer-plugin-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json new file mode 100644 index 00000000000..7ed8a6ee795 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23455", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.033", + "lastModified": "2025-01-16T20:15:36.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in mastersoftwaresolutions WP VTiger Synchronization allows Stored XSS.This issue affects WP VTiger Synchronization: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/msstiger/vulnerability/wordpress-wp-vtiger-synchronization-plugin-1-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json new file mode 100644 index 00000000000..7b8061696d2 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23456", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.247", + "lastModified": "2025-01-16T20:15:36.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Somethinkodd.com Development Team EmailShroud allows Reflected XSS.This issue affects EmailShroud: from n/a through 2.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/emailshroud/vulnerability/wordpress-emailshroud-plugin-2-2-1-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json new file mode 100644 index 00000000000..8a429d72922 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23463", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.397", + "lastModified": "2025-01-16T20:15:36.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mukesh Dak MD Custom content after or before of post allows Stored XSS.This issue affects MD Custom content after or before of post: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/md-custom-content/vulnerability/wordpress-md-custom-content-after-or-before-of-post-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json new file mode 100644 index 00000000000..79ecee01edd --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23467", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.547", + "lastModified": "2025-01-16T20:15:36.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vimal Ghorecha RSS News Scroller allows Stored XSS.This issue affects RSS News Scroller: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rss-news-scroller/vulnerability/wordpress-rss-news-scroller-plugin-2-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json new file mode 100644 index 00000000000..48be15f3ea3 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23470", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.700", + "lastModified": "2025-01-16T20:15:36.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in X Villamuera Visit Site Link enhanced allows Stored XSS.This issue affects Visit Site Link enhanced: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/visit-site-link-enhanced/vulnerability/wordpress-visit-site-link-enhanced-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json new file mode 100644 index 00000000000..6aeb9c122a1 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23471", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.840", + "lastModified": "2025-01-16T20:15:36.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ect-add-to-cart-button/vulnerability/wordpress-ect-add-to-cart-button-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json new file mode 100644 index 00000000000..408d1459222 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23476", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:36.990", + "lastModified": "2025-01-16T20:15:36.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in isnowfy my-related-posts allows Stored XSS.This issue affects my-related-posts: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/my-related-posts/vulnerability/wordpress-my-related-posts-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json new file mode 100644 index 00000000000..2c302c7cbc5 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23483", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.133", + "lastModified": "2025-01-16T20:15:37.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Niklas Olsson Universal Analytics Injector allows Stored XSS.This issue affects Universal Analytics Injector: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/universal-analytics-injector/vulnerability/wordpress-universal-analytics-injector-plugin-1-0-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json new file mode 100644 index 00000000000..cc0e1e231fd --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23497", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.293", + "lastModified": "2025-01-16T20:15:37.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Albdesign Simple Project Manager allows Stored XSS.This issue affects Simple Project Manager: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-project-managment/vulnerability/wordpress-simple-project-manager-plugin-1-2-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json new file mode 100644 index 00000000000..328fa9e0abb --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23499", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.440", + "lastModified": "2025-01-16T20:15:37.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election allows Stored XSS.This issue affects Board Election: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/board-election/vulnerability/wordpress-board-election-plugin-1-0-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json new file mode 100644 index 00000000000..46d32f0ecc6 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23501", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.593", + "lastModified": "2025-01-16T20:15:37.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SpruceJoy Cookie Consent & Autoblock for GDPR/CCPA allows Stored XSS.This issue affects Cookie Consent & Autoblock for GDPR/CCPA: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cookie-consent-autoblock/vulnerability/wordpress-cookie-consent-autoblock-for-gdpr-ccpa-plugin-1-0-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json new file mode 100644 index 00000000000..c8c4dde622e --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23508", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.737", + "lastModified": "2025-01-16T20:15:37.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in EdesaC Extra Options \u2013 Favicons allows Stored XSS.This issue affects Extra Options \u2013 Favicons: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/extra-options-favicons/vulnerability/wordpress-extra-options-favicons-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json new file mode 100644 index 00000000000..a67f9e43ebd --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23510", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:37.890", + "lastModified": "2025-01-16T20:15:37.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-logging-service/vulnerability/wordpress-wordpress-logging-service-plugin-1-5-4-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json new file mode 100644 index 00000000000..e1bd5524a6f --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23511", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.040", + "lastModified": "2025-01-16T20:15:38.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Viktoria Rei Bauer WP-BlackCheck allows Stored XSS.This issue affects WP-BlackCheck: from n/a through 2.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-blackcheck/vulnerability/wordpress-wp-blackcheck-plugin-2-7-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json new file mode 100644 index 00000000000..b11806bcd39 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23513", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.193", + "lastModified": "2025-01-16T20:15:38.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Joshua Wieczorek Bible Embed allows Stored XSS.This issue affects Bible Embed: from n/a through 0.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bible-embed/vulnerability/wordpress-bible-embed-plugin-0-0-4-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json new file mode 100644 index 00000000000..3521c9ca136 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23514", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.337", + "lastModified": "2025-01-16T20:15:38.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sanjaysolutions Loginplus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Loginplus: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/loginplus/vulnerability/wordpress-loginplus-plugin-1-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json new file mode 100644 index 00000000000..a32732f6b0f --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23528", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.480", + "lastModified": "2025-01-16T20:15:38.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Wouter Dijkstra DD Roles allows Privilege Escalation.This issue affects DD Roles: from n/a through 4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dd-roles/vulnerability/wordpress-dd-roles-plugin-4-1-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json new file mode 100644 index 00000000000..a9b42e1232c --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23530", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.630", + "lastModified": "2025-01-16T20:15:38.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Yonatan Reinberg of Social Ink Custom Post Type Lockdown allows Privilege Escalation.This issue affects Custom Post Type Lockdown: from n/a through 1.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-post-type-lockdown/vulnerability/wordpress-custom-post-type-lockdown-plugin-1-11-csrf-to-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json new file mode 100644 index 00000000000..b22bffd5b0d --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23532", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.783", + "lastModified": "2025-01-16T20:15:38.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Regios MyAnime Widget allows Privilege Escalation.This issue affects MyAnime Widget: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/myanime-widget/vulnerability/wordpress-myanime-widget-plugin-1-0-csrf-to-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json new file mode 100644 index 00000000000..715e564d6fd --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23533", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:38.930", + "lastModified": "2025-01-16T20:15:38.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Adrian Moreno WP Lyrics allows Stored XSS.This issue affects WP Lyrics: from n/a through 0.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wplyrics/vulnerability/wordpress-wp-lyrics-plugin-0-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json new file mode 100644 index 00000000000..1a2ed60027b --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23537", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.070", + "lastModified": "2025-01-16T20:15:39.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oren hahiashvili add custom google tag manager allows Stored XSS.This issue affects add custom google tag manager: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/add-custom-google-tag-manager/vulnerability/wordpress-add-custom-google-tag-manager-plugin-1-0-3-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json new file mode 100644 index 00000000000..c2e62285e57 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23547", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.220", + "lastModified": "2025-01-16T20:15:39.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Shaw LH Login Page allows Reflected XSS.This issue affects LH Login Page: from n/a through 2.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lh-login-page/vulnerability/wordpress-lh-login-page-plugin-2-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json new file mode 100644 index 00000000000..0fe46a51003 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23557", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.363", + "lastModified": "2025-01-16T20:15:39.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kathleen Malone Find Your Reps allows Stored XSS.This issue affects Find Your Reps: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/find-your-reps/vulnerability/wordpress-find-your-reps-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json new file mode 100644 index 00000000000..1c42de9eb43 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.503", + "lastModified": "2025-01-16T20:15:39.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in digfish Geotagged Media allows Stored XSS.This issue affects Geotagged Media: from n/a through 0.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/geotagged-media/vulnerability/wordpress-geotagged-media-plugin-0-3-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json new file mode 100644 index 00000000000..b94ff858406 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23559", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.650", + "lastModified": "2025-01-16T20:15:39.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/memeone/vulnerability/wordpress-memeone-plugin-2-0-5-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json new file mode 100644 index 00000000000..0c6654f81ef --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.797", + "lastModified": "2025-01-16T20:15:39.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Elke Hinze, Plumeria Web Design Web Testimonials allows Stored XSS.This issue affects Web Testimonials: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/web-testimonials/vulnerability/wordpress-web-testimonials-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json new file mode 100644 index 00000000000..def10167306 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:39.947", + "lastModified": "2025-01-16T20:15:39.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Syed Amir Hussain Custom Post allows Stored XSS.This issue affects Custom Post: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-post-type-gui/vulnerability/wordpress-custom-post-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json new file mode 100644 index 00000000000..7da24a615d8 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23567", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:40.090", + "lastModified": "2025-01-16T20:15:40.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Intuitive Design GDReseller allows Stored XSS.This issue affects GDReseller: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gdreseller/vulnerability/wordpress-gdreseller-plugin-1-6-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json new file mode 100644 index 00000000000..7d951739aa6 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23569", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:40.230", + "lastModified": "2025-01-16T20:15:40.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shortcode-in-comment/vulnerability/wordpress-shortcode-in-comment-plugin-1-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json new file mode 100644 index 00000000000..95b0b423ad4 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23572", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:40.403", + "lastModified": "2025-01-16T20:15:40.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dave Konopka, Martin Scharm UpDownUpDown allows Stored XSS.This issue affects UpDownUpDown: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/updownupdown-postcomment-voting/vulnerability/wordpress-updownupdown-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json new file mode 100644 index 00000000000..9d26ef6fa76 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:40.740", + "lastModified": "2025-01-16T20:15:40.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sam Burdge WP Background Tile allows Stored XSS.This issue affects WP Background Tile: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-background-tile/vulnerability/wordpress-wp-background-tile-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json new file mode 100644 index 00000000000..81989dbf0ac --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23577", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:40.877", + "lastModified": "2025-01-16T20:15:40.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sourov Amin Word Freshener allows Stored XSS.This issue affects Word Freshener: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/word-freshener/vulnerability/wordpress-word-freshener-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json new file mode 100644 index 00000000000..f748ffe09f4 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23617", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.027", + "lastModified": "2025-01-16T20:15:41.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal Floatbox Plus allows Stored XSS.This issue affects Floatbox Plus: from n/a through 1.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/floatbox-plus/vulnerability/wordpress-floatbox-plus-plugin-1-4-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json new file mode 100644 index 00000000000..7c0d77a6581 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23618", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.193", + "lastModified": "2025-01-16T20:15:41.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Andrea Brandi Twitter Shortcode allows Stored XSS.This issue affects Twitter Shortcode: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/twitter-shortcode/vulnerability/wordpress-twitter-shortcode-plugin-0-9-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json new file mode 100644 index 00000000000..a1cf846e101 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23620", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.340", + "lastModified": "2025-01-16T20:15:41.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Trofimov Captchelfie \u2013 Captcha by Selfie allows Reflected XSS.This issue affects Captchelfie \u2013 Captcha by Selfie: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/captchelfie-captcha-by-selfie/vulnerability/wordpress-captchelfie-captcha-by-selfie-plugin-1-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json new file mode 100644 index 00000000000..3bef36ac560 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23623", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.480", + "lastModified": "2025-01-16T20:15:41.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Bisen Contact Form 7 \u2013 CCAvenue Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 CCAvenue Add-on: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-cc-avenue-add-on/vulnerability/wordpress-contact-form-7-ccavenue-add-on-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json new file mode 100644 index 00000000000..74fd5321f91 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23627", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.617", + "lastModified": "2025-01-16T20:15:41.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gordon French Comment-Emailer allows Stored XSS.This issue affects Comment-Emailer: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/comment-emailer/vulnerability/wordpress-comment-emailer-plugin-1-0-5-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json new file mode 100644 index 00000000000..97681effbe9 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23639", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.763", + "lastModified": "2025-01-16T20:15:41.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan MDC YouTube Downloader allows Stored XSS.This issue affects MDC YouTube Downloader: from n/a through 3.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mdc-youtube-downloader/vulnerability/wordpress-mdc-youtube-downloader-plugin-3-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json new file mode 100644 index 00000000000..4a08ce2ff90 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23640", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:41.900", + "lastModified": "2025-01-16T20:15:41.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan Rename Author Slug allows Stored XSS.This issue affects Rename Author Slug: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rename-author-slug/vulnerability/wordpress-rename-author-slug-plugin-1-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json new file mode 100644 index 00000000000..ab72b9d68e8 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23641", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.037", + "lastModified": "2025-01-16T20:15:42.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Ehrhardt Powie's pLinks PagePeeker allows DOM-Based XSS.This issue affects Powie's pLinks PagePeeker: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/plinks/vulnerability/wordpress-powie-s-plinks-pagepeeker-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json new file mode 100644 index 00000000000..2d56dabaf8d --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23642", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.190", + "lastModified": "2025-01-16T20:15:42.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pflonk Sidebar-Content from Shortcode allows DOM-Based XSS.This issue affects Sidebar-Content from Shortcode: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sidebar-content-from-shortcode/vulnerability/wordpress-sidebar-content-from-shortcode-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json new file mode 100644 index 00000000000..30b26f7031e --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23644", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.323", + "lastModified": "2025-01-16T20:15:42.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Kuepper QuoteMedia Tools allows DOM-Based XSS.This issue affects QuoteMedia Tools: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quotemedia-tools/vulnerability/wordpress-quotemedia-tools-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json new file mode 100644 index 00000000000..87f312ee731 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23649", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.463", + "lastModified": "2025-01-16T20:15:42.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kreg Steppe Auphonic Importer allows Stored XSS.This issue affects Auphonic Importer: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/auphonic-importer/vulnerability/wordpress-auphonic-importer-plugin-1-5-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json new file mode 100644 index 00000000000..d711582a824 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23654", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.607", + "lastModified": "2025-01-16T20:15:42.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vin\u00edcius Krolow Twitter Post allows Stored XSS.This issue affects Twitter Post: from n/a through 0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/twitterpost/vulnerability/wordpress-twitter-post-plugin-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json new file mode 100644 index 00000000000..14f186393ef --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23659", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.750", + "lastModified": "2025-01-16T20:15:42.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hernan Javier Hegykozi MercadoLibre Integration allows Stored XSS.This issue affects MercadoLibre Integration: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mercadolibre-integration/vulnerability/wordpress-mercadolibre-integration-plugin-1-1-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json new file mode 100644 index 00000000000..7cc166fe382 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23660", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:42.893", + "lastModified": "2025-01-16T20:15:42.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Walter Cerrudo MFPlugin allows Stored XSS.This issue affects MFPlugin: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mfplugin/vulnerability/wordpress-mfplugin-plugin-1-3-csrf-to-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json new file mode 100644 index 00000000000..7754401be5f --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23661", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.037", + "lastModified": "2025-01-16T20:15:43.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana NV Slider allows Stored XSS.This issue affects NV Slider: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nv-slider/vulnerability/wordpress-nv-slider-plugin-1-6-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json new file mode 100644 index 00000000000..321c6748e42 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23662", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.167", + "lastModified": "2025-01-16T20:15:43.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana WP Panoramio allows Stored XSS.This issue affects WP Panoramio: from n/a through 1.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-panoramio/vulnerability/wordpress-wp-panoramio-plugin-1-5-0-csrf-to-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json new file mode 100644 index 00000000000..e83ffb5f65a --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23664", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.320", + "lastModified": "2025-01-16T20:15:43.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Real Seguro Viagem Real Seguro Viagem allows Stored XSS.This issue affects Real Seguro Viagem: from n/a through 2.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/seguro-viagem/vulnerability/wordpress-real-seguro-viagem-plugin-2-0-5-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json new file mode 100644 index 00000000000..9318a0e8481 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23665", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.460", + "lastModified": "2025-01-16T20:15:43.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rapid Sort RSV GMaps allows Stored XSS.This issue affects RSV GMaps: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rsv-google-maps/vulnerability/wordpress-rsv-gmaps-plugin-1-5-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json new file mode 100644 index 00000000000..92f33c2e2d8 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23673", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.620", + "lastModified": "2025-01-16T20:15:43.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Don Kukral Email on Publish allows Stored XSS.This issue affects Email on Publish: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/email-on-publish/vulnerability/wordpress-email-on-publish-plugin-1-5-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json new file mode 100644 index 00000000000..7a3e9ba071a --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23675", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.753", + "lastModified": "2025-01-16T20:15:43.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SandyIN Import Users to MailChimp allows Stored XSS.This issue affects Import Users to MailChimp: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/import-users-to-mailchimp/vulnerability/wordpress-import-users-to-mailchimp-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json new file mode 100644 index 00000000000..5251b006af7 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23677", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:43.900", + "lastModified": "2025-01-16T20:15:43.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in DSmidgy HTTP to HTTPS link changer by Eyga.net allows Stored XSS.This issue affects HTTP to HTTPS link changer by Eyga.net: from n/a through 0.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/https-links-in-content/vulnerability/wordpress-http-to-https-link-changer-by-eyga-net-plugin-0-2-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json new file mode 100644 index 00000000000..45177704892 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23689", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.040", + "lastModified": "2025-01-16T20:15:44.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Poco Blogger Image Import allows Stored XSS.This issue affects Blogger Image Import: from 2.1 through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/blogger-image-import/vulnerability/wordpress-blogger-image-import-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json new file mode 100644 index 00000000000..f5c04779656 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23690", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.197", + "lastModified": "2025-01-16T20:15:44.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ArtkanMedia Book a Place allows Stored XSS.This issue affects Book a Place: from n/a through 0.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/book-a-place/vulnerability/wordpress-book-a-place-plugin-0-7-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json new file mode 100644 index 00000000000..fb190cb7eaa --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23691", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.353", + "lastModified": "2025-01-16T20:15:44.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Braulio Aquino Garc\u00eda Send to Twitter allows Stored XSS.This issue affects Send to Twitter: from n/a through 1.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/send-to-twitter/vulnerability/wordpress-send-to-twitter-plugin-1-7-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json new file mode 100644 index 00000000000..8386d438849 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23692", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.503", + "lastModified": "2025-01-16T20:15:44.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Slider for Writers allows Stored XSS.This issue affects Slider for Writers: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/slider-for-writers/vulnerability/wordpress-slider-for-writers-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json new file mode 100644 index 00000000000..7968d54619f --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23693", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.637", + "lastModified": "2025-01-16T20:15:44.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stanis\u0142aw Skonieczny Secure CAPTCHA allows Stored XSS.This issue affects Secure CAPTCHA: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/secure-captcha/vulnerability/wordpress-secure-captcha-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json new file mode 100644 index 00000000000..6da36558945 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23694", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.780", + "lastModified": "2025-01-16T20:15:44.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shabbos Commerce Shabbos and Yom Tov allows Stored XSS.This issue affects Shabbos and Yom Tov: from n/a through 1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shabbos-and-yom-tov/vulnerability/wordpress-shabbos-and-yom-tov-plugin-1-9-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json new file mode 100644 index 00000000000..848901ec099 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23698", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:44.910", + "lastModified": "2025-01-16T20:15:44.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Iv\u00e1n R. Delgado Mart\u00ednez WP Custom Google Search allows Stored XSS.This issue affects WP Custom Google Search: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-custom-google-search/vulnerability/wordpress-wp-custom-google-search-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json new file mode 100644 index 00000000000..efdb0bcc4b1 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23699", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.060", + "lastModified": "2025-01-16T20:15:45.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechMix Event Countdown Timer Plugin by TechMix allows Reflected XSS.This issue affects Event Countdown Timer Plugin by TechMix: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/event-countdown-timer/vulnerability/wordpress-event-countdown-timer-plugin-by-techmix-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json new file mode 100644 index 00000000000..62623965413 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23702", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.213", + "lastModified": "2025-01-16T20:15:45.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Schalk Burger Anonymize Links allows Stored XSS.This issue affects Anonymize Links: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/anonymize-links/vulnerability/wordpress-anonymize-links-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json new file mode 100644 index 00000000000..d5367c6dd6b --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23703", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.350", + "lastModified": "2025-01-16T20:15:45.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in CS : ABS-Hosting.nl / Walchum.net Free MailClient FMC allows Stored XSS.This issue affects Free MailClient FMC: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mailclient/vulnerability/wordpress-free-mailclient-fmc-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json new file mode 100644 index 00000000000..f3b9914077d --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23708", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.493", + "lastModified": "2025-01-16T20:15:45.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dominic Fallows DF Draggable allows Stored XSS.This issue affects DF Draggable: from n/a through 1.13.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/df-draggable/vulnerability/wordpress-df-draggable-plugin-1-13-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json new file mode 100644 index 00000000000..835c947adb8 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23710", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.643", + "lastModified": "2025-01-16T20:15:45.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mayur Sojitra Flying Twitter Birds allows Stored XSS.This issue affects Flying Twitter Birds: from n/a through 1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flying-twitter-birds/vulnerability/wordpress-flying-twitter-birds-plugin-1-8-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json new file mode 100644 index 00000000000..f3dbb34c0da --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23712", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.800", + "lastModified": "2025-01-16T20:15:45.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kapost Kapost allows Stored XSS.This issue affects Kapost: from n/a through 2.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kapost-byline/vulnerability/wordpress-kapost-plugin-2-2-9-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json new file mode 100644 index 00000000000..e956e305d09 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23713", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:45.940", + "lastModified": "2025-01-16T20:15:45.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Hack me if you can allows Stored XSS.This issue affects Hack me if you can: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hack-me-if-you-can/vulnerability/wordpress-hack-me-if-you-can-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json new file mode 100644 index 00000000000..9a0beb9064e --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23715", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.083", + "lastModified": "2025-01-16T20:15:46.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RaymondDesign Post & Page Notes allows Stored XSS.This issue affects Post & Page Notes: from n/a through 0.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/post-page-notes/vulnerability/wordpress-post-page-notes-plugin-0-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json new file mode 100644 index 00000000000..b1b6aa214eb --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23717", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.247", + "lastModified": "2025-01-16T20:15:46.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ITMOOTI Theme My Ontraport Smartform allows Stored XSS.This issue affects Theme My Ontraport Smartform: from n/a through 1.2.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/theme-my-ontraport-smartform/vulnerability/wordpress-theme-my-ontraport-smartform-plugin-1-2-11-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json new file mode 100644 index 00000000000..33030c22e97 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23720", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.397", + "lastModified": "2025-01-16T20:15:46.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Web Push allows Stored XSS.This issue affects Web Push: from n/a through 1.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/web-push/vulnerability/wordpress-web-push-plugin-1-4-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json new file mode 100644 index 00000000000..a6e84b7d53b --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23743", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.550", + "lastModified": "2025-01-16T20:15:46.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Martijn Scheybeler Social Analytics allows Stored XSS.This issue affects Social Analytics: from n/a through 0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/social-analytics/vulnerability/wordpress-social-analytics-plugin-0-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json new file mode 100644 index 00000000000..a16c9cd2a3f --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23745", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.687", + "lastModified": "2025-01-16T20:15:46.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tussendoor internet & marketing Call me Now allows Stored XSS.This issue affects Call me Now: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/call-me-now/vulnerability/wordpress-call-me-now-plugin-1-0-5-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json new file mode 100644 index 00000000000..382406f50e8 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23749", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.830", + "lastModified": "2025-01-16T20:15:46.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mahdi Khaksar mybb Last Topics allows Stored XSS.This issue affects mybb Last Topics: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mybb-last-topics/vulnerability/wordpress-mybb-last-topics-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json new file mode 100644 index 00000000000..d2c839c22d9 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23767", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:46.967", + "lastModified": "2025-01-16T20:15:46.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Revolutionart Marmoset Viewer allows Stored XSS.This issue affects Marmoset Viewer: from n/a through 1.9.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/marmoset-viewer/vulnerability/wordpress-marmoset-viewer-plugin-1-9-3-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json new file mode 100644 index 00000000000..def52a61336 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23783", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-16T20:15:47.100", + "lastModified": "2025-01-16T20:15:47.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in carrotbits Greek Namedays Widget From Eortologio.Net allows Stored XSS.This issue affects Greek Namedays Widget From Eortologio.Net: from n/a through 20191113." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/greek-namedays-widget/vulnerability/wordpress-greek-namedays-widget-plugin-20191113-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 19faa822727..f80d9ae124a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-16T19:00:25.298043+00:00 +2025-01-16T21:00:20.238048+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-16T18:57:54.527000+00:00 +2025-01-16T20:43:02.810000+00:00 ``` ### Last Data Feed Release @@ -33,59 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -277667 +277776 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `109` -- [CVE-2023-4319](CVE-2023/CVE-2023-43xx/CVE-2023-4319.json) (`2025-01-16T17:15:11.693`) -- [CVE-2024-37181](CVE-2024/CVE-2024-371xx/CVE-2024-37181.json) (`2025-01-16T18:15:22.307`) -- [CVE-2024-41746](CVE-2024/CVE-2024-417xx/CVE-2024-41746.json) (`2025-01-16T18:15:22.863`) -- [CVE-2024-50633](CVE-2024/CVE-2024-506xx/CVE-2024-50633.json) (`2025-01-16T18:15:24.337`) -- [CVE-2024-57768](CVE-2024/CVE-2024-577xx/CVE-2024-57768.json) (`2025-01-16T18:15:26.003`) -- [CVE-2024-57769](CVE-2024/CVE-2024-577xx/CVE-2024-57769.json) (`2025-01-16T18:15:26.240`) -- [CVE-2024-57770](CVE-2024/CVE-2024-577xx/CVE-2024-57770.json) (`2025-01-16T18:15:26.477`) -- [CVE-2024-57771](CVE-2024/CVE-2024-577xx/CVE-2024-57771.json) (`2025-01-16T18:15:26.717`) -- [CVE-2024-57772](CVE-2024/CVE-2024-577xx/CVE-2024-57772.json) (`2025-01-16T18:15:26.940`) -- [CVE-2024-57773](CVE-2024/CVE-2024-577xx/CVE-2024-57773.json) (`2025-01-16T18:15:27.173`) -- [CVE-2024-57774](CVE-2024/CVE-2024-577xx/CVE-2024-57774.json) (`2025-01-16T18:15:27.407`) -- [CVE-2024-57775](CVE-2024/CVE-2024-577xx/CVE-2024-57775.json) (`2025-01-16T18:15:27.633`) -- [CVE-2024-57776](CVE-2024/CVE-2024-577xx/CVE-2024-57776.json) (`2025-01-16T18:15:27.870`) -- [CVE-2025-0518](CVE-2025/CVE-2025-05xx/CVE-2025-0518.json) (`2025-01-16T17:15:12.577`) -- [CVE-2025-20072](CVE-2025/CVE-2025-200xx/CVE-2025-20072.json) (`2025-01-16T18:15:28.517`) +- [CVE-2025-23673](CVE-2025/CVE-2025-236xx/CVE-2025-23673.json) (`2025-01-16T20:15:43.620`) +- [CVE-2025-23675](CVE-2025/CVE-2025-236xx/CVE-2025-23675.json) (`2025-01-16T20:15:43.753`) +- [CVE-2025-23677](CVE-2025/CVE-2025-236xx/CVE-2025-23677.json) (`2025-01-16T20:15:43.900`) +- [CVE-2025-23689](CVE-2025/CVE-2025-236xx/CVE-2025-23689.json) (`2025-01-16T20:15:44.040`) +- [CVE-2025-23690](CVE-2025/CVE-2025-236xx/CVE-2025-23690.json) (`2025-01-16T20:15:44.197`) +- [CVE-2025-23691](CVE-2025/CVE-2025-236xx/CVE-2025-23691.json) (`2025-01-16T20:15:44.353`) +- [CVE-2025-23692](CVE-2025/CVE-2025-236xx/CVE-2025-23692.json) (`2025-01-16T20:15:44.503`) +- [CVE-2025-23693](CVE-2025/CVE-2025-236xx/CVE-2025-23693.json) (`2025-01-16T20:15:44.637`) +- [CVE-2025-23694](CVE-2025/CVE-2025-236xx/CVE-2025-23694.json) (`2025-01-16T20:15:44.780`) +- [CVE-2025-23698](CVE-2025/CVE-2025-236xx/CVE-2025-23698.json) (`2025-01-16T20:15:44.910`) +- [CVE-2025-23699](CVE-2025/CVE-2025-236xx/CVE-2025-23699.json) (`2025-01-16T20:15:45.060`) +- [CVE-2025-23702](CVE-2025/CVE-2025-237xx/CVE-2025-23702.json) (`2025-01-16T20:15:45.213`) +- [CVE-2025-23703](CVE-2025/CVE-2025-237xx/CVE-2025-23703.json) (`2025-01-16T20:15:45.350`) +- [CVE-2025-23708](CVE-2025/CVE-2025-237xx/CVE-2025-23708.json) (`2025-01-16T20:15:45.493`) +- [CVE-2025-23710](CVE-2025/CVE-2025-237xx/CVE-2025-23710.json) (`2025-01-16T20:15:45.643`) +- [CVE-2025-23712](CVE-2025/CVE-2025-237xx/CVE-2025-23712.json) (`2025-01-16T20:15:45.800`) +- [CVE-2025-23713](CVE-2025/CVE-2025-237xx/CVE-2025-23713.json) (`2025-01-16T20:15:45.940`) +- [CVE-2025-23715](CVE-2025/CVE-2025-237xx/CVE-2025-23715.json) (`2025-01-16T20:15:46.083`) +- [CVE-2025-23717](CVE-2025/CVE-2025-237xx/CVE-2025-23717.json) (`2025-01-16T20:15:46.247`) +- [CVE-2025-23720](CVE-2025/CVE-2025-237xx/CVE-2025-23720.json) (`2025-01-16T20:15:46.397`) +- [CVE-2025-23743](CVE-2025/CVE-2025-237xx/CVE-2025-23743.json) (`2025-01-16T20:15:46.550`) +- [CVE-2025-23745](CVE-2025/CVE-2025-237xx/CVE-2025-23745.json) (`2025-01-16T20:15:46.687`) +- [CVE-2025-23749](CVE-2025/CVE-2025-237xx/CVE-2025-23749.json) (`2025-01-16T20:15:46.830`) +- [CVE-2025-23767](CVE-2025/CVE-2025-237xx/CVE-2025-23767.json) (`2025-01-16T20:15:46.967`) +- [CVE-2025-23783](CVE-2025/CVE-2025-237xx/CVE-2025-23783.json) (`2025-01-16T20:15:47.100`) ### CVEs modified in the last Commit -Recently modified CVEs: `74` +Recently modified CVEs: `58` -- [CVE-2024-25832](CVE-2024/CVE-2024-258xx/CVE-2024-25832.json) (`2025-01-16T17:50:36.260`) -- [CVE-2024-25833](CVE-2024/CVE-2024-258xx/CVE-2024-25833.json) (`2025-01-16T17:50:18.237`) -- [CVE-2024-26621](CVE-2024/CVE-2024-266xx/CVE-2024-26621.json) (`2025-01-16T17:11:37.050`) -- [CVE-2024-35980](CVE-2024/CVE-2024-359xx/CVE-2024-35980.json) (`2025-01-16T17:21:40.277`) -- [CVE-2024-35981](CVE-2024/CVE-2024-359xx/CVE-2024-35981.json) (`2025-01-16T17:22:05.630`) -- [CVE-2024-35983](CVE-2024/CVE-2024-359xx/CVE-2024-35983.json) (`2025-01-16T17:22:28.740`) -- [CVE-2024-40771](CVE-2024/CVE-2024-407xx/CVE-2024-40771.json) (`2025-01-16T17:15:11.850`) -- [CVE-2024-40839](CVE-2024/CVE-2024-408xx/CVE-2024-40839.json) (`2025-01-16T17:15:12.017`) -- [CVE-2024-40854](CVE-2024/CVE-2024-408xx/CVE-2024-40854.json) (`2025-01-16T17:15:12.163`) -- [CVE-2024-41453](CVE-2024/CVE-2024-414xx/CVE-2024-41453.json) (`2025-01-16T18:15:22.540`) -- [CVE-2024-4200](CVE-2024/CVE-2024-42xx/CVE-2024-4200.json) (`2025-01-16T18:07:50.387`) -- [CVE-2024-4202](CVE-2024/CVE-2024-42xx/CVE-2024-4202.json) (`2025-01-16T17:16:54.653`) -- [CVE-2024-4357](CVE-2024/CVE-2024-43xx/CVE-2024-4357.json) (`2025-01-16T17:06:41.727`) -- [CVE-2024-46310](CVE-2024/CVE-2024-463xx/CVE-2024-46310.json) (`2025-01-16T18:15:23.127`) -- [CVE-2024-4837](CVE-2024/CVE-2024-48xx/CVE-2024-4837.json) (`2025-01-16T17:05:52.440`) -- [CVE-2024-48884](CVE-2024/CVE-2024-488xx/CVE-2024-48884.json) (`2025-01-16T17:15:12.310`) -- [CVE-2024-49530](CVE-2024/CVE-2024-495xx/CVE-2024-49530.json) (`2025-01-16T18:15:23.447`) -- [CVE-2024-49531](CVE-2024/CVE-2024-495xx/CVE-2024-49531.json) (`2025-01-16T18:15:23.670`) -- [CVE-2024-53563](CVE-2024/CVE-2024-535xx/CVE-2024-53563.json) (`2025-01-16T18:15:24.573`) -- [CVE-2024-54034](CVE-2024/CVE-2024-540xx/CVE-2024-54034.json) (`2025-01-16T18:15:24.910`) -- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2025-01-16T18:15:25.140`) -- [CVE-2024-54470](CVE-2024/CVE-2024-544xx/CVE-2024-54470.json) (`2025-01-16T17:15:12.433`) -- [CVE-2024-57227](CVE-2024/CVE-2024-572xx/CVE-2024-57227.json) (`2025-01-16T18:15:25.373`) -- [CVE-2024-57228](CVE-2024/CVE-2024-572xx/CVE-2024-57228.json) (`2025-01-16T18:15:25.703`) -- [CVE-2024-57811](CVE-2024/CVE-2024-578xx/CVE-2024-57811.json) (`2025-01-16T18:15:28.167`) +- [CVE-2024-25094](CVE-2024/CVE-2024-250xx/CVE-2024-25094.json) (`2025-01-16T19:09:37.237`) +- [CVE-2024-25098](CVE-2024/CVE-2024-250xx/CVE-2024-25098.json) (`2025-01-16T19:05:08.543`) +- [CVE-2024-26135](CVE-2024/CVE-2024-261xx/CVE-2024-26135.json) (`2025-01-16T19:24:58.253`) +- [CVE-2024-26149](CVE-2024/CVE-2024-261xx/CVE-2024-26149.json) (`2025-01-16T19:31:59.750`) +- [CVE-2024-28190](CVE-2024/CVE-2024-281xx/CVE-2024-28190.json) (`2025-01-16T19:54:16.763`) +- [CVE-2024-29994](CVE-2024/CVE-2024-299xx/CVE-2024-29994.json) (`2025-01-16T19:10:54.100`) +- [CVE-2024-29996](CVE-2024/CVE-2024-299xx/CVE-2024-29996.json) (`2025-01-16T19:11:55.003`) +- [CVE-2024-30006](CVE-2024/CVE-2024-300xx/CVE-2024-30006.json) (`2025-01-16T19:11:30.363`) +- [CVE-2024-30007](CVE-2024/CVE-2024-300xx/CVE-2024-30007.json) (`2025-01-16T19:12:10.263`) +- [CVE-2024-30008](CVE-2024/CVE-2024-300xx/CVE-2024-30008.json) (`2025-01-16T19:12:19.507`) +- [CVE-2024-30009](CVE-2024/CVE-2024-300xx/CVE-2024-30009.json) (`2025-01-16T19:12:54.190`) +- [CVE-2024-30038](CVE-2024/CVE-2024-300xx/CVE-2024-30038.json) (`2025-01-16T19:13:10.340`) +- [CVE-2024-30039](CVE-2024/CVE-2024-300xx/CVE-2024-30039.json) (`2025-01-16T19:13:43.540`) +- [CVE-2024-3466](CVE-2024/CVE-2024-34xx/CVE-2024-3466.json) (`2025-01-16T19:57:57.000`) +- [CVE-2024-48806](CVE-2024/CVE-2024-488xx/CVE-2024-48806.json) (`2025-01-16T19:15:28.320`) +- [CVE-2024-54535](CVE-2024/CVE-2024-545xx/CVE-2024-54535.json) (`2025-01-16T20:36:12.483`) +- [CVE-2024-55553](CVE-2024/CVE-2024-555xx/CVE-2024-55553.json) (`2025-01-16T19:15:28.627`) +- [CVE-2024-56114](CVE-2024/CVE-2024-561xx/CVE-2024-56114.json) (`2025-01-16T19:15:28.787`) +- [CVE-2025-0437](CVE-2025/CVE-2025-04xx/CVE-2025-0437.json) (`2025-01-16T20:35:01.140`) +- [CVE-2025-21134](CVE-2025/CVE-2025-211xx/CVE-2025-21134.json) (`2025-01-16T20:43:02.810`) +- [CVE-2025-21409](CVE-2025/CVE-2025-214xx/CVE-2025-21409.json) (`2025-01-16T20:33:29.353`) +- [CVE-2025-21411](CVE-2025/CVE-2025-214xx/CVE-2025-21411.json) (`2025-01-16T20:33:43.177`) +- [CVE-2025-21413](CVE-2025/CVE-2025-214xx/CVE-2025-21413.json) (`2025-01-16T20:33:54.607`) +- [CVE-2025-21417](CVE-2025/CVE-2025-214xx/CVE-2025-21417.json) (`2025-01-16T20:34:03.303`) +- [CVE-2025-23013](CVE-2025/CVE-2025-230xx/CVE-2025-23013.json) (`2025-01-16T19:15:30.263`) ## Download and Usage diff --git a/_state.csv b/_state.csv index faab28c9839..36ccba44164 100644 --- a/_state.csv +++ b/_state.csv @@ -1547,7 +1547,7 @@ CVE-1999-1564,0,0,2155f1555e68e4ce4d427a1b2534e0952d3f0f9f29afab56eaf55846ee95d5 CVE-1999-1565,0,0,8c899423d6faf0326479ea4d910496ab50c13dab3a45ce2557f338d14b1999b3,2024-11-20T23:31:25.180000 CVE-1999-1566,0,0,db541b5355b47fb745de69b65284974e8a0a2dc1a8e9550e9901a4b7f7b449d5,2024-11-20T23:31:25.320000 CVE-1999-1567,0,0,5c3e26b35cd30fe8091266e23752f2696aff150f750ac5cb9bf955d74a67563a,2024-11-20T23:31:25.460000 -CVE-1999-1568,0,1,f9e013f2e17cceb95bb63ca5571a18a4bacf0c3effdbf1afd4229dc5f34d4107,2025-01-16T18:15:17.147000 +CVE-1999-1568,0,0,f9e013f2e17cceb95bb63ca5571a18a4bacf0c3effdbf1afd4229dc5f34d4107,2025-01-16T18:15:17.147000 CVE-1999-1569,0,0,62f0bc08dc49b354c33eaf214f105ca4f4e043e7c897624d1be24fbb517f4693,2024-11-20T23:31:25.753000 CVE-1999-1570,0,0,101ee9557af2202eecf40aeefb976a2053f72d80cfa51a7c6a589c781cb75ea8,2024-11-20T23:31:25.900000 CVE-1999-1571,0,0,26b83cad9ecd5eae0807ba8e5c034518e0b506811db121a92499dfddfedd6e6d,2024-11-20T23:31:26.050000 @@ -3465,7 +3465,7 @@ CVE-2001-0663,0,0,51c0ba0ec52ffb4eebe44296b7685f48592697042e949384de12956b052147 CVE-2001-0664,0,0,aad1a5b76f5635c6c3cc0b5ad31711d4d2692b566deebe3683c3ebf1ce6f3c41,2024-11-20T23:35:52.213000 CVE-2001-0665,0,0,226bf6b2a783de04fef416b84eebd0a2b8cc72557a2ba4b5e1d2197dd4521580,2024-11-20T23:35:52.357000 CVE-2001-0666,0,0,f5e11c86035dc8832b9a6c2213fbaab256c0e2b3982e37c304f0682348d4f45c,2024-11-20T23:35:52.490000 -CVE-2001-0667,0,1,f6053ba1b13544e5d391070b05d463508b87d5f9f8c733107046e72a4511eb09,2025-01-16T17:15:09.250000 +CVE-2001-0667,0,0,f6053ba1b13544e5d391070b05d463508b87d5f9f8c733107046e72a4511eb09,2025-01-16T17:15:09.250000 CVE-2001-0668,0,0,c371ede6899e70e61393ca7007b3d9ab68b8d1b068598e5bb02631e1d64c793a,2024-11-20T23:35:52.767000 CVE-2001-0669,0,0,057d30d1d24605baedcd449e862aac1e5349bf2dce35f77100002d9f524b9720,2024-11-20T23:35:52.900000 CVE-2001-0670,0,0,e9921b156da078dc92d4c2fc0aebaf5403100087cf71d16184875cc8059093ce,2024-11-20T23:35:53.047000 @@ -3910,7 +3910,7 @@ CVE-2001-1121,0,0,60119ff97b16462f5691482d0f392631f11509f15c971d226ec3d73f16593c CVE-2001-1122,0,0,5b6986b00aa53d6cb725e58ff75cd28af873e2fcab8f06ee5d9424da0e34bfa8,2024-11-20T23:36:55.750000 CVE-2001-1123,0,0,62e778b9ac446c808442dcc3413b0fb4fb2d12481c7ba49ef92549b316ff6d6e,2024-11-20T23:36:55.900000 CVE-2001-1124,0,0,6fccaa4fe9d7068c505e45c5932092ee4f7794270f23dd24a29f317c699b996e,2024-11-20T23:36:56.053000 -CVE-2001-1125,0,1,b0bf5db0256fb17c4d349517c1ca973ca3f90fce16b9909ed9ae80c316ec38f8,2025-01-16T17:15:09.733000 +CVE-2001-1125,0,0,b0bf5db0256fb17c4d349517c1ca973ca3f90fce16b9909ed9ae80c316ec38f8,2025-01-16T17:15:09.733000 CVE-2001-1126,0,0,e16494076873e6754936d8b13b5a4dcad6f44c321dbab95c418f36578794b3dd,2024-11-20T23:36:56.363000 CVE-2001-1127,0,0,bf076857c5bbdda322e6395f9b91f771fa05bd1709fbca1a55d2192c5b39ef71,2024-11-20T23:36:56.497000 CVE-2001-1128,0,0,8488ab39a7bf0abb843e626abcde2acb8c7f0705dd2db548d8a7bae7cd32d145,2024-11-20T23:36:56.640000 @@ -4314,7 +4314,7 @@ CVE-2001-1529,0,0,8432bdd73b7ce7fead2113b16a26b714aaf540772b9a85fa6dd27bff654c0d CVE-2001-1530,0,0,b605042f41f86a491ea37edfabbfa94879abd12645f73dc336787cf813db3f27,2024-11-20T23:37:54.390000 CVE-2001-1531,0,0,ea7db03449ea187c6db3e1569d3ece7d1d9e3cdcfe8584ce7673881e62315448,2024-11-20T23:37:54.523000 CVE-2001-1532,0,0,adaabce833cec8b4f99f0b421accc5fb635be7c1df44c9368270d0b11db76f14,2024-11-20T23:37:54.663000 -CVE-2001-1533,0,0,7f777b0155c10f4cb82e451b1a9a8c49531643f23a2977317a6a41bf1cda8e6a,2024-11-20T23:37:54.800000 +CVE-2001-1533,0,1,bd1786ced872a29facd359a6baae02acd539a76481e94d178faa203476fc7983,2025-01-16T20:15:26.520000 CVE-2001-1534,0,0,18161bbd4dff55509811b9b527da7e70c33b40235c6c8dc30a7796a9545241dc,2024-11-20T23:37:54.947000 CVE-2001-1535,0,0,5839813abe5c8280434cb69902144d060b58eda7f3092f22f245d635bed990af,2024-11-20T23:37:55.090000 CVE-2001-1536,0,0,6a3162b540c5684cf79fe5ef8e0e701fdc7f2fe64a236a6b3f5c7b05c4b59756,2024-11-20T23:37:55.227000 @@ -4327,7 +4327,7 @@ CVE-2001-1542,0,0,d2159bcaaf75cb97870f9d7141b2f871480c401da149a5b0c12f583267146f CVE-2001-1543,0,0,f1f7509804302a8e8bc3a866c964d082fb9fd04e6522bc2295da630ea80eefcf,2024-11-20T23:37:56.310000 CVE-2001-1544,0,0,ab2558dc6f4456ba7a739c3fa99f3d7d53387f932cd640ee47981f5e31ec8029,2024-11-20T23:37:56.440000 CVE-2001-1545,0,0,398b3254b19b74b1fc3e42d84367528216c80819ef7adc70f723143c9af25bf6,2024-11-20T23:37:56.577000 -CVE-2001-1546,0,0,98f1fe4f935e1a7b9fc69732e1fb05db227a4b62a01927bb829024e5f1e4649e,2024-11-20T23:37:56.707000 +CVE-2001-1546,0,1,1621c4e1edef67f22375eae6435d46a041d67b487274f82e0c63a48ba400a2e4,2025-01-16T20:15:26.750000 CVE-2001-1547,0,0,d00df82350bfe122ae9853977e1cb2ef912ea4824800dfd33e812e523af17805,2024-11-20T23:37:56.853000 CVE-2001-1548,0,0,9b64f423465c8257cbc8ed538bf7b784988fcefc0ce69e974d76820930f4c8d8,2024-11-20T23:37:56.983000 CVE-2001-1549,0,0,32681ffb3dd8b433344e916b4b093f6d839591463d6f58fad44a2b9ae1354c9e,2024-11-20T23:37:57.127000 @@ -4423,7 +4423,7 @@ CVE-2002-0047,0,0,ee6f2248552ca2f0b21175e43efe6c77d9f52b6a8cf20c782540b61a44c027 CVE-2002-0048,0,0,61863dc2ad25e9d99a4b41f02a87f90c701bf5ffb3c5800f6321dde2e58acc55,2024-11-20T23:38:10.570000 CVE-2002-0049,0,0,7786fc748593bf96fb23adf369aeb43a1eea94116ee2750949a09b818ad105c1,2024-11-20T23:38:10.743000 CVE-2002-0050,0,0,543c5b8d29482cb8794ea4dff4b754643051f3de5415f5ae81f597f50fe5204d,2024-11-20T23:38:10.897000 -CVE-2002-0051,0,1,e90986287dbcabb75d7de13b96af98ffbdc3b3ffb5e75124ecc7676214d05ef3,2025-01-16T18:15:17.757000 +CVE-2002-0051,0,0,e90986287dbcabb75d7de13b96af98ffbdc3b3ffb5e75124ecc7676214d05ef3,2025-01-16T18:15:17.757000 CVE-2002-0052,0,0,6e0b733542d0a92df7af0b31a0549dd5d07965cf8636e26cd2cc089ce957272c,2024-11-20T23:38:11.210000 CVE-2002-0053,0,0,27968755575c2bbe5823717f749bb435f2864648866f7b8ce6db41312188aef0,2024-11-20T23:38:11.360000 CVE-2002-0054,0,0,c00ca7726a7282749d847f35d0a2124e9962b6d48c032f0ed0e4c2ad30a386ed,2024-11-20T23:38:11.507000 @@ -4754,7 +4754,7 @@ CVE-2002-0387,0,0,6c30f292479ef237e1cb63f3fb3cc58e8def8690795a1d87d52ec174a9936e CVE-2002-0388,0,0,5a8ad908368f4dd9c6de316cb253624bca98788a626216e3044f845f20f3458a,2024-11-20T23:38:57.680000 CVE-2002-0389,0,0,777431ef611f0a507c10f643c799e3eb714807a4907ca0ec3c44f028d8522a87,2024-11-20T23:38:57.817000 CVE-2002-0390,0,0,1d03f572ce249ad054b37a60f8cbfa21a834f2593fde14e790295b0285713581,2023-11-07T01:55:49.613000 -CVE-2002-0391,0,1,4806f47c65875edd15fe2f1c55181ea6e200376d800643f3c95f1b5f99a79370,2025-01-16T18:15:18.137000 +CVE-2002-0391,0,0,4806f47c65875edd15fe2f1c55181ea6e200376d800643f3c95f1b5f99a79370,2025-01-16T18:15:18.137000 CVE-2002-0392,0,0,625cf15ab8a818dcbf91ea6183315fd6ae79164b543b4baa209ec84ba88d9a4e,2024-11-20T23:38:58.190000 CVE-2002-0393,0,0,d73764c826941fa0952fd9b3912532eb010ababca42c6c6fa1e43190022f3517,2024-11-20T23:38:58.457000 CVE-2002-0394,0,0,2a55f56e17773ec695fce563a52d27e839665763da63bb40073492a30b5ec9ad,2024-11-20T23:38:58.617000 @@ -4848,7 +4848,7 @@ CVE-2002-0481,0,0,050b51048efeac7002ac58aacab4620323b12e6740dd76fbc8e88234f714bd CVE-2002-0482,0,0,fa960f5a1f47fae0d801bcb474731ad7b85ea6a3da7b462cc17c0a9e18672810,2024-11-20T23:39:11.790000 CVE-2002-0483,0,0,2f397ef6cc52900b59bf260a1adef20709a131d78d4bfdbb0e01649250cc820e,2024-11-20T23:39:11.917000 CVE-2002-0484,0,0,4fdd6af571d3c39445b028f39190ffe9a08b9a0924d4bf776f2fa3e7bbba4f81,2024-11-20T23:39:12.043000 -CVE-2002-0485,0,1,fd93904dc01fddc4e6f3bd2a337cad6362afef300a6cd3c69d3074876fbd9942,2025-01-16T17:15:09.970000 +CVE-2002-0485,0,0,fd93904dc01fddc4e6f3bd2a337cad6362afef300a6cd3c69d3074876fbd9942,2025-01-16T17:15:09.970000 CVE-2002-0486,0,0,64c73ca667a0c9e729d15518033ed79462783bf67a18838005db61e8d60f7301,2024-11-20T23:39:12.327000 CVE-2002-0487,0,0,23a39c746fb4b30c24b2003c31496f57a34bfa16da33ec1fcde3bd1c17cb9a33,2024-11-20T23:39:12.470000 CVE-2002-0488,0,0,e1c70d5e2d491949e0dc6eb5fe4687c9bc197c9e7e6abb1856473f6633226b68,2024-11-20T23:39:12.613000 @@ -5694,7 +5694,7 @@ CVE-2002-1368,0,0,68167b727b76837efc6ba8e5c7ad195bbe655d2d1d11b4f6319d4e7971c7bd CVE-2002-1369,0,0,3d2f66cf66a5a8c04c50c316b6e1df32bebc25b075a9604625112155e6934e5d,2024-11-20T23:41:08.583000 CVE-2002-1370,0,0,bc7b861421d45f9ef95b4587cc308b73efd5d861159fbb6454b735844861a963,2023-11-07T01:56:01.340000 CVE-2002-1371,0,0,bb51ef0b55359556f3c588a63858016b7f83706eba17c24cdf4cdd9abcefe677,2024-11-20T23:41:08.753000 -CVE-2002-1372,0,1,4f2073729c00fd7f804d7e27fb9804c6949a43c854f77b8fa547f7e68108ff30,2025-01-16T18:15:18.720000 +CVE-2002-1372,0,0,4f2073729c00fd7f804d7e27fb9804c6949a43c854f77b8fa547f7e68108ff30,2025-01-16T18:15:18.720000 CVE-2002-1373,0,0,3df9b99de126549cd1d786b485dded64e585b502abfe1cc45cb2391e71138608,2024-11-20T23:41:09.053000 CVE-2002-1374,0,0,0b3f9a9a7aa38ebd4e0ebf15560a35dc8f702c1ba6e2be88cd4a19047bfdc472,2024-11-20T23:41:09.243000 CVE-2002-1375,0,0,5f3a8601afeb73c824fd6d2c14300aca46eec2daa3afae30beeead27053064e2,2024-11-20T23:41:09.430000 @@ -5979,7 +5979,7 @@ CVE-2002-1653,0,0,430ff36140da07aac4cb1957c2a4c2257fb17593384eae41813118ad8fc449 CVE-2002-1654,0,0,6f592008f257813fb0f36e97de781867ebb811e0b9e027385dbb9458e4834750,2024-11-20T23:41:48.843000 CVE-2002-1655,0,0,c2beae0619f30be526718ae1f390702bee174624b58824c2ce9fd43507823a8b,2024-11-20T23:41:48.987000 CVE-2002-1656,0,0,f9e97020dc3c52d27de0e1db251653ffa5f04ac25da0fda645f7784354b606fd,2024-11-20T23:41:49.120000 -CVE-2002-1657,0,1,bfc4a4d0b1d8c1a6f6998720b4cff89932f5d6c3e72e774c39ff81c76081086d,2025-01-16T18:15:19.133000 +CVE-2002-1657,0,0,bfc4a4d0b1d8c1a6f6998720b4cff89932f5d6c3e72e774c39ff81c76081086d,2025-01-16T18:15:19.133000 CVE-2002-1658,0,0,ec08516e6059214511b94c76232c2f65bd862600a20bba28b7a3841e866770e7,2024-11-20T23:41:49.387000 CVE-2002-1659,0,0,6a9d00d5f72aedc7e393d850a3f1e9b8f6b7b68de0351024a96844068d71cf09,2024-11-20T23:41:49.523000 CVE-2002-1660,0,0,b39a5a7c11148883a4b905df83964e1b1edf85586ba7af5c73f46b0018e94ddd,2024-11-20T23:41:49.660000 @@ -6116,7 +6116,7 @@ CVE-2002-1792,0,0,23d8e9a9f36934dccfe2c8ca0c12b39d63c2fceed650e8b62e5cb6b912ee7f CVE-2002-1793,0,0,4db53f9c3048c839f75585e2c18b0060526fda8cb86a977c5d560075635e17e2,2024-11-20T23:42:08.407000 CVE-2002-1794,0,0,e84993226accdd50e454f443946e6dfdea30ea92b6cc5ff332b83d49ecf65bbd,2024-11-20T23:42:08.543000 CVE-2002-1795,0,0,f4442c9d162e635959d2b18bd954e52bc68f1fa7f2993768c58fce92b2bb1721,2024-11-20T23:42:08.680000 -CVE-2002-1796,0,0,a722af72d72a0b5f08b5f49408e18698854b3b59d79224695c41d8280e7ee980,2024-11-20T23:42:08.823000 +CVE-2002-1796,0,1,95af4b4acb88e59a4ec33ac7103ae3c74db35f736583d5ae82c03627a64abd20,2025-01-16T20:15:26.960000 CVE-2002-1797,0,0,601ae2f8bcb7d314077d0babd4fef94dc023d577904c6fe5db2d5208e01bec17,2024-11-20T23:42:08.970000 CVE-2002-1798,0,0,5b76215e455c48a7ffed9ec09fe303a83008562b59b22af795a104ccad38edf3,2024-11-20T23:42:09.110000 CVE-2002-1799,0,0,66f44eb191e94b40cdb207399780e02a965c0ae3b15a54ed7a9862a80521564d,2024-11-20T23:42:09.260000 @@ -6136,7 +6136,7 @@ CVE-2002-1812,0,0,b8a7c6f553b92dfbd20a6834f4d9f7e788d3c5861d909e959e09d9ba724064 CVE-2002-1813,0,0,f85dc758df6c7b1b9e411c04e6cac39cca971765952704f5edfaac33165d3b9f,2024-11-20T23:42:11.257000 CVE-2002-1814,0,0,f1939dbc5f36348afdb0a0dc38db9c7d99d4092f39723ab209c4387aaefbe194,2024-11-20T23:42:11.400000 CVE-2002-1815,0,0,9562f87f46e2b2e837c54c4669d21e0da365a3716f3e3356561daab08048eaf2,2024-11-20T23:42:11.543000 -CVE-2002-1816,0,0,ad1669d3a13f5abaf6a898b35c1b09863e3e42971f2da61fe6225146da01fe6e,2024-11-20T23:42:11.680000 +CVE-2002-1816,0,1,20bfc5427382f861c3b86ed29fcb52e01eb882a982d80942f832c3c70ee95b5b,2025-01-16T20:15:27.210000 CVE-2002-1817,0,0,fc67b81bd7eee72c5bc9335c01cec4080edf25d27bd8d573c70b2b159d2bd0b6,2024-11-20T23:42:11.817000 CVE-2002-1818,0,0,fca10bc125c7b9db074a097f2c500071706980a45cfce49679413361db33d790,2024-11-20T23:42:11.940000 CVE-2002-1819,0,0,566167e6be1485e23e8ca6c444152174db03b66fc74b86ce3d87ac6e5c88099e,2024-11-20T23:42:12.073000 @@ -6295,7 +6295,7 @@ CVE-2002-1971,0,0,e123873915b5efd9877349f6d295bac999389f92f07f1e598967f57467d50c CVE-2002-1972,0,0,a0bd26f91106353835fcae3a6c347182820d43edeba6afde639df2df167636b7,2024-11-20T23:42:33.510000 CVE-2002-1973,0,0,27323c9f8754d8eed5987eca5157cad7dfb43731753f6382c7547f4debd6b94c,2024-11-20T23:42:33.663000 CVE-2002-1974,0,0,c2a44631bb1d6932749d179037de3c27d3a86ca6e606a6a33e4d15a4adbe277e,2024-11-20T23:42:33.813000 -CVE-2002-1975,0,0,e63c8f4ce22cef4efda03dba234e3968960a52f15defa7bfb52ba9a2a9bd2b24,2024-11-20T23:42:33.970000 +CVE-2002-1975,0,1,b338dc3fd7b1643e4ae185000574eacbb8e11e32f62f7755c65056a854ae44c4,2025-01-16T20:15:27.467000 CVE-2002-1976,0,0,c94e394111f771c5470fbcd6bb69ffc6617d24dbcd6b79c7ccb8288ae52cc916,2024-11-20T23:42:34.130000 CVE-2002-1977,0,0,0172d5f45e199af0ceb18d02519fe0363c7148d02b9832ec5b4e579e3f38b027,2024-11-20T23:42:34.290000 CVE-2002-1978,0,0,17dc746b7ce8ec16bbdcb4c9e27fb3b167b8fa3b8afa1392f9d29c7406ca601a,2024-11-20T23:42:34.440000 @@ -8389,7 +8389,7 @@ CVE-2004-0075,0,0,5445fa3f8cc666ff0eaf01a49503c4a1638599a1c46fc953d6542c6988241a CVE-2004-0076,0,0,afcab1b8e4690d4b8ed9b76bb6942807af52f8fcc3c070c76acc3b36aba74309,2023-11-07T01:56:35.170000 CVE-2004-0077,0,0,199ce0f997d53d0c485a8e9b85e9090730b6cba22187e97a90872c62f56db408,2024-11-20T23:47:42.603000 CVE-2004-0078,0,0,cdb215db39e9ecfe7d55261bfd1309312cb61c90dac24ba7234ded54dacbd3c1,2024-11-20T23:47:42.797000 -CVE-2004-0079,0,1,c13224c0bdd811de9923edcaf6d20cbbaedf79fbf59ea65d382483fa2a794e2d,2025-01-16T18:15:19.483000 +CVE-2004-0079,0,0,c13224c0bdd811de9923edcaf6d20cbbaedf79fbf59ea65d382483fa2a794e2d,2025-01-16T18:15:19.483000 CVE-2004-0080,0,0,6e73f7a3644489ab3d0e5a64943afc520f9d4331c58da6eec5659a2519138948,2024-11-20T23:47:43.240000 CVE-2004-0081,0,0,3b4ae06e23373cdf9a6236397f0b2141d941094c935ed7e6438a804bcf061537,2024-11-20T23:47:43.390000 CVE-2004-0082,0,0,5d83e07030e9c433c7cbf0f205fcd1a1ab5eaa483f99e1bd0fc6d09d4a96fd0d,2024-11-20T23:47:43.593000 @@ -8749,7 +8749,7 @@ CVE-2004-0454,0,0,61d6c2322e920e3f83ab11f1e7ad334df93d1fce13e3f5fe7c5bce010233ef CVE-2004-0455,0,0,c765f4a196f7b1ee077297810c6d40340be1f9e3ccfad146a3a26e41bb48ecc3,2024-11-20T23:48:37.370000 CVE-2004-0456,0,0,daff476265daca8181dd38b36ded54719dbf5065b60afda1df0fb6aeb548e074,2024-11-20T23:48:37.520000 CVE-2004-0457,0,0,48342bb1156876b56b40893333419452ec7b48eaac0c135caf7365110aa233c6,2024-11-20T23:48:37.670000 -CVE-2004-0458,0,1,9e9e7c2ed645d78e4435b858cc606197539311ebaada8e565993d0cf35b843f5,2025-01-16T18:15:20.167000 +CVE-2004-0458,0,0,9e9e7c2ed645d78e4435b858cc606197539311ebaada8e565993d0cf35b843f5,2025-01-16T18:15:20.167000 CVE-2004-0459,0,0,d37391bf7f0564a350bb5c7b781f75a440b14eb9ddcd57021d79f2b840b875ca,2024-11-20T23:48:37.943000 CVE-2004-0460,0,0,db1f15e163c2c0c50ef6b0b0c0d0f9fd565f535e2572f8f759d03ebb5a412666,2024-11-20T23:48:38.083000 CVE-2004-0461,0,0,dae8825f3bca98fa0446b172e79bab43efb9ee981ab740695f09cd35a8652f96,2024-11-20T23:48:38.247000 @@ -9031,7 +9031,7 @@ CVE-2004-0743,0,0,a95fe9fe8552ed48d514e6a026ddb130f66299957147474f8178e36ad7d955 CVE-2004-0744,0,0,e9b415e1cbbfdc3d683df16c9813e9a1633eb3e0e3f55f061296d14fa0eef27b,2024-11-20T23:49:18.240000 CVE-2004-0745,0,0,23f3b4a1337f845a5112462755466c714f0447abf137ae49df8546058c66a10d,2024-11-20T23:49:18.393000 CVE-2004-0746,0,0,7195d57076e5f6e6444ce843344b62294c7b584ee7fc346b12c34188cbd696b3,2024-11-20T23:49:18.533000 -CVE-2004-0747,0,1,0cb7e48f3f2af3776e63a78489cffef1f0a7a8a6790a8d140846e35ec51df49c,2025-01-16T18:15:20.530000 +CVE-2004-0747,0,0,0cb7e48f3f2af3776e63a78489cffef1f0a7a8a6790a8d140846e35ec51df49c,2025-01-16T18:15:20.530000 CVE-2004-0748,0,0,d26b7a4e23d6fa3b74f1fcc1b2a491c671753da9b3c7f454a3bde24f298de29f,2024-11-20T23:49:18.890000 CVE-2004-0749,0,0,16d379f27735f955e2024fef15b6867fad51a3dd3eaf8ce01ae48c00a793241e,2024-11-20T23:49:19.060000 CVE-2004-0750,0,0,2b5724679601be969c5036d8c828c5f50aa71f2778be236ebd885ca40ed22d64,2024-11-20T23:49:19.210000 @@ -10149,7 +10149,7 @@ CVE-2004-1897,0,0,b0f6640083debba34c77a9ee5478039eec75995e78b8648b31b8774a3e2ec6 CVE-2004-1898,0,0,1d48f211e8b27cbf3a38c9e6211daf7dff08bdc3bd03e37b93918ceb9629e4da,2024-11-20T23:52:00.400000 CVE-2004-1899,0,0,641f2c38a8f713db346d67cf474a10ccfdbc67bbedddf930b843da2223f682a1,2024-11-20T23:52:00.547000 CVE-2004-1900,0,0,d102c1dfdb45fd2d40f7a27003e3c45f408c74d68c595adf51daf1fae31307e7,2024-11-20T23:52:00.690000 -CVE-2004-1901,0,1,efd57464998c8e3944de039925d27db958ba9d0e6c354737d27b7bfedc7e4409,2025-01-16T18:15:21.030000 +CVE-2004-1901,0,0,efd57464998c8e3944de039925d27db958ba9d0e6c354737d27b7bfedc7e4409,2025-01-16T18:15:21.030000 CVE-2004-1902,0,0,f0c31470690d47614899f68a6bc844839e6287d1ef2f48ae7ff3adea503e3ea3,2024-11-20T23:52:00.977000 CVE-2004-1903,0,0,46e7589d0c9142c399d60da15157b48501273c0bfd98f26ca8055c433e72c86d,2024-11-20T23:52:01.120000 CVE-2004-1904,0,0,000fd41b7d53a53b813b6c23ea4cd8e0cb04835f15b142cfd4ebbc2e40b770c4,2024-11-20T23:52:01.260000 @@ -10504,7 +10504,7 @@ CVE-2004-2253,0,0,9a06df2a3516461c0e0fc1a29dfa6c38d1ae6d94ad05f086ec751a7db0354a CVE-2004-2254,0,0,d50821e45e837ea3c28bfce1517c9043bb2db026b43c3c1b5da7afa5070fdb38,2024-11-20T23:52:53.130000 CVE-2004-2255,0,0,4e5f26dc96ca8c161789712aa03793f6a55f4e8007c4ef3bd47657d5d5fc9f8b,2024-11-20T23:52:53.280000 CVE-2004-2256,0,0,ea4a0b0f93af551060685b54a22aa3770b5887a04755f67fe2432527bece0281,2024-11-20T23:52:53.427000 -CVE-2004-2257,0,0,75d9684e5108675fe6ec3f44b2612ffda35c59155beea3a57a5a3a4bbf03f021,2024-11-20T23:52:53.573000 +CVE-2004-2257,0,1,510814d33e0402dc4d58db64bf33c1e97a18333d55e61a9464bc22810258ac27,2025-01-16T20:15:27.727000 CVE-2004-2258,0,0,446dbc7a252c1d1ca01d4a4ae9adfdd456782321b293c86b7ec2a3c2fb8bf97e,2024-11-20T23:52:53.733000 CVE-2004-2259,0,0,1a5ef1ed2c55e88b5121f013be22993e2cac20283524e1a51d98dc70eef9e9e3,2024-11-20T23:52:53.877000 CVE-2004-2260,0,0,0d22c3299df3ac95852baa79cb1c4bd3f0e57029f92c88a33cae7884bd342e36,2024-11-20T23:52:54.020000 @@ -10586,7 +10586,7 @@ CVE-2004-2335,0,0,24c1f4c19150051beb438e74274b08e10d4a3d329626ce818ce10520afb35c CVE-2004-2336,0,0,17905ea0414556a267420b2bff17dbcfe91b69ec9db8df44efe18b1fa5d8c367,2024-11-20T23:53:05.700000 CVE-2004-2337,0,0,21fde7c430d08bdd8287dbdabcfdd1cfa010e5bda4a4f37c52bb3d638b9d7131,2024-11-20T23:53:05.853000 CVE-2004-2338,0,0,16b40b4ff6c525f333fd5671f5b3f930cd3e3a1d3701d5d926bdbf70ccd3df7c,2024-11-20T23:53:06.013000 -CVE-2004-2339,0,0,5edd74165081d52d2a51f19f01e481ca257df35023ccdbda5b281af95ae260c3,2024-11-20T23:53:06.157000 +CVE-2004-2339,0,1,247e3cafe30892a07043f949cbede1c36557d98b7f856b8057c7a37ee6950f1d,2025-01-16T20:15:27.997000 CVE-2004-2340,0,0,020e56dade3d04018141cf2e3cd9ef54edac3cae6e671a76010a13fc805fe3cb,2024-11-20T23:53:06.307000 CVE-2004-2341,0,0,1c38be39deaadd4c18c20771fbfaca43e0ef4a33f609d14799f488632efd451e,2024-11-20T23:53:06.467000 CVE-2004-2342,0,0,5e0ee4234dec51b7fcce10795177013734f6bc9e6379e037245280a51f2bf210,2024-11-20T23:53:06.597000 @@ -11262,7 +11262,7 @@ CVE-2005-0250,0,0,cdee95f3d5dc5359b18e5f7e4c19834c12e43fcd3b7ac65f95911da609b852 CVE-2005-0251,0,0,18ab747b69f6019bf076c8fe201d5526249c95db7e06345a549daa56592ecfe1,2024-11-20T23:54:43.720000 CVE-2005-0252,0,0,fb32e521d5c250dab6a6d3f82f83e7e8b4761187556290f1fd92a09048d769a2,2024-11-20T23:54:43.850000 CVE-2005-0253,0,0,0103f9ebf7ddbb5d1241dd320669cf783f2435654f872657491ff100940bf80c,2024-11-20T23:54:43.987000 -CVE-2005-0254,0,1,7ba8d395f068fee582711112dbaa3193112959e77a8d27e48ab7dafda78e9332,2025-01-16T18:15:21.397000 +CVE-2005-0254,0,0,7ba8d395f068fee582711112dbaa3193112959e77a8d27e48ab7dafda78e9332,2025-01-16T18:15:21.397000 CVE-2005-0255,0,0,4f03ac0150c630da2765abb9deea75d2be24ebc0fbbe9dd319e674a109e03ed6,2024-11-20T23:54:44.253000 CVE-2005-0256,0,0,d27033cb2ed46afde705e5eda4170e635b0f6da700dbb407abf52536f7e630b1,2024-11-20T23:54:44.397000 CVE-2005-0258,0,0,828cf67e6c9345beb57e086079a881be580b1e33067a11305716350189b1ebc5,2024-11-20T23:54:44.550000 @@ -11373,7 +11373,7 @@ CVE-2005-0365,0,0,c14142093722cef32cb398fc0a4733386fa1d540e1b864ba459bb4455d0c57 CVE-2005-0366,0,0,5caa21f14942b47294031e45dc76271843a0c6ba784274ec92e1b78bb46b2e49,2024-11-20T23:54:58.390000 CVE-2005-0367,0,0,707c836822d3b98a97eaeaf47cb14bda60191dc936b58976fcbd49e9749b7618,2024-11-20T23:54:58.540000 CVE-2005-0368,0,0,c06eb4ddd885dc38f153066a2ca93db0c8b7da2574d74a0280f42783c1de6b6d,2024-11-20T23:54:58.667000 -CVE-2005-0369,0,1,eac6575311ec002f2edb558ef12b2de4dfa47d1348e37b1e0a0d2ba8ac876346,2025-01-16T18:15:21.783000 +CVE-2005-0369,0,0,eac6575311ec002f2edb558ef12b2de4dfa47d1348e37b1e0a0d2ba8ac876346,2025-01-16T18:15:21.783000 CVE-2005-0370,0,0,2eea7b926dfaea4f7759520ae12cd25b134e87a4c68b13d7aeaa24307603bf1d,2024-11-20T23:54:58.913000 CVE-2005-0371,0,0,18b05f9469fec389c15f862174263f2a4c78ec0176537ecf1683b593804b3c2b,2024-11-20T23:54:59.037000 CVE-2005-0372,0,0,523b4d8a8d42794e800e9ee4630587d0320a0cef699e1a0f6304ad10f08d83fe,2024-11-20T23:54:59.160000 @@ -12648,7 +12648,7 @@ CVE-2005-1670,0,0,c401b076f0ba217ea9929e3baef82949444600dbdd82ee0f74f91444364213 CVE-2005-1671,0,0,13b6be07f8419ededbcae5cd9d6a1338b0a4f83f9b78a7ffabd644200d82b6e3,2024-11-20T23:57:51.960000 CVE-2005-1672,0,0,57e09caa1934186b6ddeb6f276b8a49a7894f484fc66ec539e578f886c022041,2024-11-20T23:57:52.090000 CVE-2005-1673,0,0,fd8c852ef3a6cc8a659a1ee641c411a1308f3d04d00fe77deed0548accaab002,2024-11-20T23:57:52.227000 -CVE-2005-1674,0,0,1fdcd60da4278c444d0cbce8d426d98725f23d3823894d2765a210431bb2e281,2024-11-20T23:57:52.360000 +CVE-2005-1674,0,1,1d2ce1d17945b6b331e2a899ba33a67427d27bf92d81c29c204b86d3c9c9a4b3,2025-01-16T19:15:26.427000 CVE-2005-1675,0,0,12f07cb7aef93d5486b0c0c3d81ef39c59df6446a4f07d59d14ec7d0b36e8fa1,2024-11-20T23:57:52.493000 CVE-2005-1676,0,0,2756fa57ee2e3691d7e63dba56047b521e35af53e01b70a4f07328ba519d815c,2024-11-20T23:57:52.630000 CVE-2005-1677,0,0,72ee1ed4d8fd91e7cde4327e6853f6bca9c77da03c686feae496291eed367bee,2024-11-20T23:57:52.767000 @@ -12662,7 +12662,7 @@ CVE-2005-1684,0,0,f1ecf003191bd95dc5da890721db722bd4c65715a663022c2bba60d524ea96 CVE-2005-1685,0,0,cbde560ff5d72535c8f997ffe826a35794f06267b537244efc3e9a5e54caf81a,2024-11-20T23:57:53.810000 CVE-2005-1686,0,0,a79c2ad35a8af82fac918360f2354cbc34b451de47b79c65bfe88d54af5c82a9,2024-11-20T23:57:53.940000 CVE-2005-1687,0,0,b6168694896a2f2dcbc21d76a643b9df590e0038d17182f3e03e03cd8dcd31eb,2024-11-20T23:57:54.080000 -CVE-2005-1688,0,0,46c74921df62389c36b6bbdf96d4441eab53185dd371e0ee16c8d8a8b3740343,2024-11-20T23:57:54.213000 +CVE-2005-1688,0,1,9dc17e6d761d064127d17b5bf3eb0445edb93fbf3718719790df279d8e8addad,2025-01-16T19:15:27.257000 CVE-2005-1689,0,0,c54188d8184963e3f177b1804d17f5cfa30b0e5ce1d4be2ad3b6fdbd471fe060,2024-11-20T23:57:54.353000 CVE-2005-1690,0,0,ba690aacd4a0995e9f2b08e42d3a9d5bc5bf2ba56e4c993658fea24cee1371a6,2023-11-07T01:57:27.843000 CVE-2005-1691,0,0,5a1a562aa26bfffd72b7b73bdefb84ebf00666007556f02112444aba1dd64e3b,2024-11-20T23:57:54.560000 @@ -12805,7 +12805,7 @@ CVE-2005-1827,0,0,f8a38a11e21b13b669f005a498c237a18c42dcf223254746a951696648c379 CVE-2005-1828,0,0,a005d8799dbd966982b54e8516b857b3e3134ff4797145f83b0c950dffc38d65,2024-11-20T23:58:13.773000 CVE-2005-1829,0,0,e31e06c9e13d04c5c9d6cc47103a982923d165ca14f928024935da3e1f0b51d1,2024-11-20T23:58:13.900000 CVE-2005-1830,0,0,4e2e216163559f96cf9a477066c0c5cf6ec5f62691deaa70ba6bd165fe9f2cf2,2024-11-20T23:58:14.023000 -CVE-2005-1831,0,0,ef002e417fee6eaad66612bf39d8ac46d62e136e403b2bdcdcd527d0f6fe08d4,2024-11-20T23:58:14.150000 +CVE-2005-1831,0,1,937e1772177453ac68c1662d73c5f0402a62691ae1d11f731d64d64662d1a907,2025-01-16T20:15:28.213000 CVE-2005-1832,0,0,a650e7ec9654ade439d1e37e182da628000b1afd4ca1b3cf17b62c7219ad081b,2024-11-20T23:58:14.300000 CVE-2005-1833,0,0,650dd22b6275dabd7c3f0929642b4502d7a293b7fbfde06219b8f23e23bed5ad,2024-11-20T23:58:14.770000 CVE-2005-1834,0,0,6caa31d4ed5314b12005dfdd24ddc05bf0e36d3eba9ddbcd1e30024831fe5fd9,2024-11-20T23:58:14.903000 @@ -12850,7 +12850,7 @@ CVE-2005-1872,0,0,1cfab3dfbcaf5ab273ffcd67cdc054923a5010b3ca8a8ab3d8a55581ba49f3 CVE-2005-1873,0,0,40d0f7465ef20be6986cb5f79f8515da14e01a5b30f77461d84deb1d0e8db628,2024-11-20T23:58:19.107000 CVE-2005-1874,0,0,41789326b264cc3733250e32893604abcf0ad4da406f9084dc228b39e70866fb,2024-11-20T23:58:19.240000 CVE-2005-1875,0,0,f7b37a7d1d526e3c7c8723e85335682825bedce57094fb09e95f5ba77496be20,2024-11-20T23:58:19.373000 -CVE-2005-1876,0,0,5913108a59255a2497df03a074147ea7963374a171bda06b7296536547881d26,2024-11-20T23:58:19.513000 +CVE-2005-1876,0,1,2ad8ea1f50579123440e883992f8fd7d880e2486234b3e708cd011c337636eb4,2025-01-16T20:15:28.430000 CVE-2005-1877,0,0,305a07d7afc37760b20f07aaaff6b0d83c05af2ef7c6fa05bc45f6ae49daf425,2024-11-20T23:58:19.653000 CVE-2005-1878,0,0,23927b4830d7758627d390ba17c62b487cab7919156bcb52a78787347f1c33b7,2024-11-20T23:58:19.787000 CVE-2005-1879,0,0,22e7c2c6623ddbcc060de36b064c54194676906b6f0ed0d761d23c3fcf364af7,2024-11-20T23:58:19.923000 @@ -13068,7 +13068,7 @@ CVE-2005-2099,0,0,06b16b60651cd8b77e74a1b45e8caf983a1318fad576a18ba8407c4c3ca40b CVE-2005-2100,0,0,d1dc6d3cd88a00c37a21548586ba8ec84778cf813db8cc73286a1b966b770d3c,2024-11-20T23:58:48.103000 CVE-2005-2101,0,0,111f43f0f73086580474b9d14b2585f747ccb1fe52858c0e43b5529fa4a81f03,2024-11-20T23:58:48.210000 CVE-2005-2102,0,0,685942f0084b55d573bb25370238401b59ee4299978a1e61d23450b6faf4bc52,2024-11-20T23:58:48.320000 -CVE-2005-2103,0,0,4306056a3caf196913910045d749fa931e54c8035c0ec88d4c0b5795aedd62d2,2024-11-20T23:58:48.413000 +CVE-2005-2103,0,1,ef83d453c61221d1137904f861f9c66dbe14ddf65e268e1b5b44916b4f9367cb,2025-01-16T20:15:28.660000 CVE-2005-2104,0,0,647f5c1439ca69a284c60978199038334e0016df01148980dfd28d5934dea5d7,2024-11-20T23:58:48.520000 CVE-2005-2105,0,0,49e500bd8cdc5e4e83e498598c7f0bdec8c09873cfbc4e4d5bcc3194cb50fb3b,2024-11-20T23:58:48.620000 CVE-2005-2106,0,0,0341a90a5fc62a7b535a6d6be835c30238e07683df9f5a4817bc0669368819f9,2024-11-20T23:58:48.763000 @@ -14038,7 +14038,7 @@ CVE-2005-3102,0,0,1576ab558d479c7afb881e9763a3603737ad0afe2670e49057e3dfd0ec0d10 CVE-2005-3103,0,0,a1924d40f0cc65790340e2a2ed07a8d0687e1f67ecaca0373bb89184615fd0a1,2024-11-21T00:01:08.150000 CVE-2005-3104,0,0,eef0c588d50a75cd4cd481e053e445a95c101d4955ace3e63f65231a2df5824a,2024-11-21T00:01:08.280000 CVE-2005-3105,0,0,4a98eb3062561d12872e5ac4b01fb73ada09bd2e3a95ea4de2743b19736e6b97,2024-11-21T00:01:08.410000 -CVE-2005-3106,0,0,04cfa50532ab7e0ea33fdbc758ab24bbf87a3f86726cb5a8b44f09b767224a5c,2024-11-21T00:01:08.543000 +CVE-2005-3106,0,1,9e2ea4b37a760b1dd6075884f6c08e7bdb556a03dd9ceb05b14c3b4cd6c57bfb,2025-01-16T20:15:28.880000 CVE-2005-3107,0,0,1125b052ddc9527589662c7ef72091d6301afaddb7b54dd334fa68ce52180de7,2024-11-21T00:01:08.700000 CVE-2005-3108,0,0,d03cea48bb350eed772c496ae8de44afde03a004964763dc47e6ecbbfecc2aa2,2024-11-21T00:01:08.847000 CVE-2005-3109,0,0,6cbf1c8a2a987be977ffcc507e742040ec170a4646047c40f3008b71b3419e1d,2024-11-21T00:01:08.980000 @@ -14234,7 +14234,7 @@ CVE-2005-3298,0,0,e0d1a1906b5f6902f253e1bbceadde748f238a018e57b4a8171f5d4fbce99d CVE-2005-3299,0,0,89ea7d726b0deb9b29576be59a66d4e9db288144ad32885cec066e61fda8cf0c,2024-11-21T00:01:33.850000 CVE-2005-3300,0,0,c0c96f705c94769231b3abd0671bdafbdfed3760785ed3b05de618d69229075f,2024-11-21T00:01:34.027000 CVE-2005-3301,0,0,9464f8709135f4da456dc2816f4a1e3011cdaf910a920e5cee4565bc15c5784d,2024-11-21T00:01:34.183000 -CVE-2005-3302,0,0,11fa12adba070530ff4c5757e69916c88130ba6de82fc4ffea61fab2da6289da,2024-11-21T00:01:34.333000 +CVE-2005-3302,0,1,c15f99264c6b208aacb44f054994068bb9b7447b68c4b1a7170ef79c9d663cd9,2025-01-16T20:15:29.123000 CVE-2005-3303,0,0,8b1a8c9a5a422829247bfaeb4d0a703f4f030ff2f6505bdecae85daaf7207ed8,2024-11-21T00:01:34.483000 CVE-2005-3304,0,0,7218c5f71fb0d03063e8fd482d87d96540ba1073d1e4cb7467e63e6b7b990cb7,2024-11-21T00:01:34.643000 CVE-2005-3305,0,0,e6319905d4a3b7ec079e23c0ebddc9e6f33629fab13c7fdd82df9160fc73ed99,2024-11-21T00:01:34.800000 @@ -15105,7 +15105,7 @@ CVE-2005-4202,0,0,efcfefc054d923eb888502286f55b4259b9d663a10d7fca39af13fa2378fe7 CVE-2005-4203,0,0,e858252ba11bc2cba8e68f2b268466e87038aa1e5e2b07c5d7087304e6f62320,2024-11-21T00:03:40.760000 CVE-2005-4204,0,0,786a04754bde937ea51bf3c67c098f346917e95529e164a7437852dccaba2fff,2024-11-21T00:03:40.917000 CVE-2005-4205,0,0,f2e7d57eb5ab0775d233c12e418328869881addee7bfd409e1aef2d416d2ff55,2024-11-21T00:03:41.050000 -CVE-2005-4206,0,0,f1e253be69400fe2e0289090171f3b40c0831171c18bf5596118a353dc6162ff,2024-11-21T00:03:41.170000 +CVE-2005-4206,0,1,8d3717b2c8d109826758ba3698d59b26e7f6e27d342bec86a372b07af1e02e57,2025-01-16T20:15:29.350000 CVE-2005-4207,0,0,4dd40247b3da8d80845a66ff087e9295e18b44ad8ad89bd74cee511c2ae65d7e,2024-11-21T00:03:41.317000 CVE-2005-4208,0,0,edbcdf4e7540fbdda7a4efe4285f5507406992899319cb0220c2e825fe9aa8be,2024-11-21T00:03:41.460000 CVE-2005-4209,0,0,49efd56bfdfe984374f1ec6c7d5f6d2f59a3194f5cf92c81bb6a62f41b51f6dc,2024-11-21T00:03:41.603000 @@ -15248,7 +15248,7 @@ CVE-2005-4345,0,0,2f7fdbca9b3df8743c4a9af5a881e4758717cc3b5afbf7a35b8e33e0d790d5 CVE-2005-4346,0,0,56eb9eb02b9215202aef6b315bc9a9dfda2cd69b329e454b056517e5114a2f08,2024-11-21T00:04:02.307000 CVE-2005-4347,0,0,9cbb0e35850bc3d53a19caeb99c23ad7a8f9097c09d61950446d01167e786b44,2024-11-21T00:04:02.470000 CVE-2005-4348,0,0,7e9b9efd3707e509aaf9c74af16b501d741f3c6475f1084a5008267fee0b4839,2024-11-21T00:04:02.650000 -CVE-2005-4349,0,0,ccfe20629c39beddd96c5a6396ff6d47b7e6e810de5977fb087efca69feb8cdf,2024-11-21T00:04:02.880000 +CVE-2005-4349,0,1,31d1b58dded8ac033a2129d82f5887729e8373afa29bd1c6b6034852b528fb25,2025-01-16T20:15:29.580000 CVE-2005-4350,0,0,6920b459c581acbcde3123719d7c85a172e812f169624c47ad6193f5fbccb294,2024-11-21T00:04:03.070000 CVE-2005-4351,0,0,38c42aba64102819cd29acd6651547d2efad18ace61c35d92b11ec69858a4043,2024-11-21T00:04:03.237000 CVE-2005-4352,0,0,f60e76cc7fbb99bb55ede5e42557cc245e573e58efe61419be76df3366834a9a,2024-11-21T00:04:03.417000 @@ -15549,7 +15549,7 @@ CVE-2005-4646,0,0,cb8ff8b7f28330ae6dee26d124fcc58a6fdeecd75cafc28984021e8a01f5b3 CVE-2005-4647,0,0,cca8b6644e955a27c81f750646721d39cedfa975767e7ebed447900a03cfe249,2024-11-21T00:04:49.967000 CVE-2005-4648,0,0,4e522f3daaac49725fd44494f03a5f2d0fb863deafff674b3d343301a8757c39,2024-11-21T00:04:50.110000 CVE-2005-4649,0,0,1394dd7d28bb4a3d3d9d6f6c577ee93d2fae9e432193321bf81ec2d117247571,2024-11-21T00:04:50.247000 -CVE-2005-4650,0,0,968e61cff1dd0b086e630d90005d43531317c12cb781d6d91274f674c3076fcb,2024-11-21T00:04:50.390000 +CVE-2005-4650,0,1,1fb651debd04847625eb42740c4564b5924c0a097c32ec93ac0f1f31337dff95,2025-01-16T20:15:29.803000 CVE-2005-4651,0,0,e8b4313f074c1b9a60c5fd4137ab1234885fb8f173eca384c5466457270463f3,2024-11-21T00:04:50.530000 CVE-2005-4652,0,0,22516c0a82206af37e7d16abc71048e2f14a1c1de18a115693c7126a66664bca,2024-11-21T00:04:50.663000 CVE-2005-4653,0,0,6a9b6496aac8245822c89c04e7a069dab55a32a9488433ad45a9aee85c91a55b,2024-11-21T00:04:50.803000 @@ -15679,7 +15679,7 @@ CVE-2005-4776,0,0,7a63c043cd3f7c0634aa0f53d48d46561e2e0b101de289ee751862562249ad CVE-2005-4777,0,0,3f97312fee438cc93076d99872422833fcee15c2b70327d6abffb395ed653156,2024-11-21T00:05:09.413000 CVE-2005-4778,0,0,ae73fb0198504fda0f4814b2daed7c0b51d96967f7012d6dbdefa39f1d7e7458,2024-11-21T00:05:09.550000 CVE-2005-4779,0,0,ed33d943e1a4afb515294b25d2afc35e644e8b9091ad92b3534fa7f9c7cf40d9,2024-11-21T00:05:09.690000 -CVE-2005-4780,0,0,60ad3a2cf6a26549918f2129b8c6eea5a6eaf964a2384ab71029ad4fcdf974b9,2024-11-21T00:05:09.827000 +CVE-2005-4780,0,1,465ae98df8fee79139e25a91afe6e679d129034b92046b9e288a46135d1cbcdf,2025-01-16T20:15:30.023000 CVE-2005-4781,0,0,9e13a9b50de16f0cb77b358ae40934d24f169f09f545966e0794edbb283db47e,2024-11-21T00:05:09.973000 CVE-2005-4782,0,0,9e82bc8955cd6b3c64d15d4a74b33bf6857137c3b7b76851c7220419c262ac5a,2024-11-21T00:05:10.117000 CVE-2005-4783,0,0,948a1be9a4a7007247045b804e07781d565d56d5fc66d77567d08c7968910eef,2024-11-21T00:05:10.263000 @@ -15849,7 +15849,7 @@ CVE-2006-0050,0,0,a879471921dd55b478ac67f31a432f51811443adc023cab5f82de63fdb62c7 CVE-2006-0051,0,0,09a6f5b73c2bd5efc47a3d9e36052d8e9d091144e45046e668cf012e398e67e0,2024-11-21T00:05:32.377000 CVE-2006-0052,0,0,3a46c78d11247ddc6ff827bc6378af2dcad8c359fc253caff58cded10d1c5c59,2024-11-21T00:05:32.530000 CVE-2006-0053,0,0,acc52185defc4f8ace97b98bda48c3fcb29acdf5c32d1d8c197f907a4482dd92,2024-11-21T00:05:32.697000 -CVE-2006-0054,0,0,d2f8cd64e5878cdad40765846dd77802ef61eeeb733a54e7a25891580c6f4637,2024-11-21T00:05:32.830000 +CVE-2006-0054,0,1,ff2c971b5b70210950ca4d5d4ee84ee11f4109d65c90b58ed8a80462726937a0,2025-01-16T20:15:30.230000 CVE-2006-0055,0,0,584b639b4835952f3798c99a9c7f012b8d9b03c71234cdc7791308d7c955f2e1,2024-11-21T00:05:32.950000 CVE-2006-0056,0,0,3370a06ab6ee50a0659b700766cbc4ee395127381fabb09aac856ea9d2e5e249,2024-11-21T00:05:33.080000 CVE-2006-0057,0,0,003ca248544e522d2c74350d50895e4e000a2d11a402b2c286a94f1369c792b1,2024-11-21T00:05:33.213000 @@ -16542,7 +16542,7 @@ CVE-2006-0751,0,0,3609df1fb96fbc368efab5e6ab04d52d7c46348d3f4b11637e47ea058bdcd1 CVE-2006-0752,0,0,b7cc137de243bb51763509b8f168ff40b56b7e6633c2312c2050a4016b2a5495,2024-11-21T00:07:15.430000 CVE-2006-0753,0,0,1ada172524d96f0544d899bf4ba3c6af33610e112d3bfbd9cfb23f9396cb6193,2024-11-21T00:07:15.570000 CVE-2006-0754,0,0,89742d4e234d60d413fb8952cfa34d6edc043623f6b3ecca63c9db5fa2a1e150,2024-11-21T00:07:15.693000 -CVE-2006-0755,0,0,9d235a8bb7711aa5771c2a7e9daa54c0dacc067bb1812284cb95b2e9be384a4c,2024-11-21T00:07:15.837000 +CVE-2006-0755,0,1,ebefb08fe1e6c8c766e312698c994e521ff3dc12a220416374372d6ba4993788,2025-01-16T20:15:30.433000 CVE-2006-0756,0,0,4eed656cdf970520700e5b461768958599660bf13d213abec3b501de342330a5,2024-11-21T00:07:15.987000 CVE-2006-0757,0,0,a2b0e04c61a6b604c894ace59e24ab09f6ba581823ef88d74f6cc8016dd96391,2024-11-21T00:07:16.127000 CVE-2006-0758,0,0,804e3cd2cee8474148ffabc4e532a51ff87063d4d5705cacc266f1d50f9df7b1,2024-11-21T00:07:16.280000 @@ -16861,7 +16861,7 @@ CVE-2006-1074,0,0,c3ac962dcd4be9f6cd0d2d7cf085da1a010993f49f5be63c545d5886779246 CVE-2006-1075,0,0,68be7d823cd9f0ad5f0389a5e19c99c335d3f31ba17c511b810ed42c84151bb6,2024-11-21T00:08:01.223000 CVE-2006-1076,0,0,a905245472e286923b75f89df35a4324439729ba509272fd0cfeb715a75553e4,2024-11-21T00:08:01.377000 CVE-2006-1077,0,0,b97cb1f5eec6136092057e9f21a3a824619fbb6b8821fde8bc685b93937f26db,2024-11-21T00:08:01.523000 -CVE-2006-1078,0,0,96774ea36adb0609af5bfb1aa2aa469bb88ba2ff28296b24044f06f10550aebb,2024-11-21T00:08:01.660000 +CVE-2006-1078,0,1,12227807c5a239dfc81d9e517bd3e4224ddc81d345829c6d02a359e6c2455b68,2025-01-16T20:15:30.673000 CVE-2006-1079,0,0,ea04d6803424a0db44167646fa233d53b11b71890d81699164a3912ef1480f47,2024-11-21T00:08:01.827000 CVE-2006-1080,0,0,6005fde27da910743320213b1c15f8d55940541e8bb93bd7085760f6d2394755,2024-11-21T00:08:01.980000 CVE-2006-1081,0,0,a3cf0910c68a8195e7e799e6b42bb8549e2e5bbf261de9b5e6ac2763f80d3a82,2024-11-21T00:08:02.140000 @@ -18136,7 +18136,7 @@ CVE-2006-2358,0,0,32397deb7bb0fd00c361a04194edb611ea6f905903dd6d180f66ecd3fdb36a CVE-2006-2359,0,0,1ffca078259156fd57433bcf8eff0b7959fe2f543b024c4ca4d2433712f7b8a0,2024-11-21T00:11:08.887000 CVE-2006-2360,0,0,b3589f87521536c4be699465c425d3b3ee804f4e520d0a3b3744c5fa528c7459,2024-11-21T00:11:09.020000 CVE-2006-2361,0,0,9e465ed67cddc1bd0718979942e49e9bdef4d03551b5b5543e39c82ee995229c,2024-11-21T00:11:09.160000 -CVE-2006-2362,0,0,d746edd17f8c575a848e615111faa2e602d02b34ed1bbaca7f1099f555cb9aa7,2024-11-21T00:11:09.297000 +CVE-2006-2362,0,1,df98a57db7c2ce459ee46ee288ab28a68e558b39f6564ec9f969b1b9b6b7c598,2025-01-16T20:15:30.897000 CVE-2006-2363,0,0,3e53a39af334c7de4ca14425fdf2162f7b6c54bfe3aa905b8af6a59f5772da7a,2024-11-21T00:11:09.463000 CVE-2006-2364,0,0,5077cf809a881cd6b54ac4f220a509f2ae77dab96abecf36f72e22395cd68066,2024-11-21T00:11:09.610000 CVE-2006-2365,0,0,3e13fbd2272293356a0ba011bcdabb3581c632f3cb6f140fe8ed8b4eac8840e5,2024-11-21T00:11:09.747000 @@ -187077,12 +187077,12 @@ CVE-2021-46877,0,0,01b52610eefbc52049cab0f1362545c2e9580a9441319ac016b52f60a2210 CVE-2021-46878,0,0,976c78c0e05b3275dc9910fcf17ae8902dec72996902fb561c68ddd2fc0edb2d,2024-11-21T06:34:50.340000 CVE-2021-46879,0,0,f44d026c35b7227075eba42e8d7d83cbb28cdb496d34743a96d7f81f68300881,2024-11-21T06:34:50.487000 CVE-2021-46880,0,0,7a11fd9cfacf6eae1312fda2c6857f87517ad2a1a8e17a6359483b228839bce6,2024-11-21T06:34:50.627000 -CVE-2021-46881,0,1,99739411f457f35905f02fd16c5d8323012aea0be0b522b0c991e90e75788060,2025-01-16T17:15:10.310000 -CVE-2021-46882,0,1,2d7b53cd3f1e61b7ceb2a58a01ee0a6ee3c4a84f894e0079a6deaab45f1a816b,2025-01-16T17:15:10.507000 -CVE-2021-46883,0,1,445d3eecaa4db3a1497b7671d8f19a31f699cde421418bb0f8b4cf3982d27b4f,2025-01-16T17:15:10.663000 -CVE-2021-46884,0,1,096844999c39256abf2ff6492bc610c26442ee052a6fe401eb424d221dd92c2b,2025-01-16T17:15:10.827000 -CVE-2021-46885,0,1,4c1b4f615c4d8fdd42b7bf32f90ee6fdd43ef1430471b5475da8a5e2306d2b4e,2025-01-16T17:15:10.987000 -CVE-2021-46886,0,1,29e5c924fd24651496ad6a4a53945545d599bf0ea07fb75dda87161ec34b208c,2025-01-16T17:15:11.150000 +CVE-2021-46881,0,0,99739411f457f35905f02fd16c5d8323012aea0be0b522b0c991e90e75788060,2025-01-16T17:15:10.310000 +CVE-2021-46882,0,0,2d7b53cd3f1e61b7ceb2a58a01ee0a6ee3c4a84f894e0079a6deaab45f1a816b,2025-01-16T17:15:10.507000 +CVE-2021-46883,0,0,445d3eecaa4db3a1497b7671d8f19a31f699cde421418bb0f8b4cf3982d27b4f,2025-01-16T17:15:10.663000 +CVE-2021-46884,0,0,096844999c39256abf2ff6492bc610c26442ee052a6fe401eb424d221dd92c2b,2025-01-16T17:15:10.827000 +CVE-2021-46885,0,0,4c1b4f615c4d8fdd42b7bf32f90ee6fdd43ef1430471b5475da8a5e2306d2b4e,2025-01-16T17:15:10.987000 +CVE-2021-46886,0,0,29e5c924fd24651496ad6a4a53945545d599bf0ea07fb75dda87161ec34b208c,2025-01-16T17:15:11.150000 CVE-2021-46887,0,0,4d2aeaa5fdfffc72430e8673e513062c79400a9d30bf93d3a46b1ad013945275,2025-01-15T22:15:25.260000 CVE-2021-46888,0,0,e916f9fdc43e2550a1951cb944d65325cf86dac8b181c95d8165c6f948b1a16a,2024-11-21T06:34:51.543000 CVE-2021-46889,0,0,ba37aaad1a60dd4ba930fc90098de431225bce3bf5bc16d406fd0629e21a4a90,2024-11-21T06:34:51.703000 @@ -187279,12 +187279,12 @@ CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba CVE-2021-47080,0,0,b2998f659a4b3e4f9d004f3f3d103d7ee3c84ede27b87e416214f7ed38cac5e7,2024-12-09T18:45:03.330000 CVE-2021-47081,0,0,c79ecd1b9946b285c3884a9a56e60cd0cb09c044ce0d23fa0a81bf00575bd5a3,2024-12-09T18:45:24.617000 CVE-2021-47082,0,0,0f0c74b65e307fcfa0d16506bba71f65915ff0bfdaa4c2f809f3fdb22d66de2d,2025-01-14T15:00:32.153000 -CVE-2021-47083,0,1,b4564f0d72fed68def3360234355cfffe0c9859ec4f8d4647518f746a56a2d33,2025-01-16T17:24:59.897000 +CVE-2021-47083,0,0,b4564f0d72fed68def3360234355cfffe0c9859ec4f8d4647518f746a56a2d33,2025-01-16T17:24:59.897000 CVE-2021-47084,0,0,8d21d41f3883696e4e6639e5c99ebe9ddd0bd5818bf039723bb272148d178138,2024-03-19T14:15:07.540000 CVE-2021-47085,0,0,99425eb67a70567219ce9050998d710c23af03d38c7b64b5ce0c488c80c15b34,2024-03-19T14:15:07.603000 -CVE-2021-47086,0,1,97374726f4d81b13e3e0fcd0fd950d498979b52d832f8136792be62734d99a87,2025-01-16T17:13:09.150000 -CVE-2021-47087,0,1,25c97ac4fda2e561b2af6c8de0608f442e35153284faacd0793809b281ff7b19,2025-01-16T17:19:57.450000 -CVE-2021-47088,0,1,76bfcd61b1680f7de367b3e8bdf24a6e4259682774fc43d1348d11d3a1fcb41e,2025-01-16T17:20:45.687000 +CVE-2021-47086,0,0,97374726f4d81b13e3e0fcd0fd950d498979b52d832f8136792be62734d99a87,2025-01-16T17:13:09.150000 +CVE-2021-47087,0,0,25c97ac4fda2e561b2af6c8de0608f442e35153284faacd0793809b281ff7b19,2025-01-16T17:19:57.450000 +CVE-2021-47088,0,0,76bfcd61b1680f7de367b3e8bdf24a6e4259682774fc43d1348d11d3a1fcb41e,2025-01-16T17:20:45.687000 CVE-2021-47089,0,0,3c63067315f69f55d4d68a1f446b6c6645fe126c9efbab98d8eec1fa81d922df,2024-11-21T06:35:22.480000 CVE-2021-47090,0,0,6db0d43f1a2c9e72b0da19e5aaaad073fc89b530dc54a875e9bad79b12380136,2024-11-21T06:35:22.647000 CVE-2021-47091,0,0,01b41e88028f350f16a13041540bc4155867909fe7c12b4c9b8428b97f0dd61a,2024-11-21T06:35:22.760000 @@ -220274,7 +220274,7 @@ CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1 CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000 CVE-2023-26213,0,0,918cbfbd489d618354d4dc527419766f5a31b4b4653d8b2671ae25fc3f1414fe,2024-11-21T07:50:55.620000 CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000 -CVE-2023-26215,0,0,31a0dc0cb7f4215176f5048a82c4fc24e9aa6012c863cc8dda73ff78f7cf09eb,2024-11-21T07:50:55.940000 +CVE-2023-26215,0,1,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000 CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000 CVE-2023-26217,0,0,0e60ad092e65063ef7020c16c5b0a91280295785bdc42713af773bd70806d513,2024-11-21T07:50:56.180000 CVE-2023-26218,0,0,41242c4741187226492d9c23150ebcf3b305e2354645eb6558a173b800b74283,2024-11-21T07:50:56.317000 @@ -221250,7 +221250,7 @@ CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160 CVE-2023-27510,0,0,6f959761032f230455e8bf272eebaab9228d33fdd1038574e4ed1d2c95e2943b,2024-11-21T07:53:03.877000 CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000 CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000 -CVE-2023-27514,0,0,314e52bdd9d7e3ec80a434f788b6b7bc34d32405a735b5aa1c9d75c3e908451c,2024-11-21T07:53:04.273000 +CVE-2023-27514,0,1,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000 CVE-2023-27515,0,0,8dfc9617f583bdd1babe238c49e7e58612036e70ee685520461ed821ca4854ca,2024-11-21T07:53:04.393000 CVE-2023-27516,0,0,63cc8b4dfa2de06886c95f604edc887930374b8e766f7347b609a4a1d828c6aa,2024-11-21T07:53:04.520000 CVE-2023-27517,0,0,7a85bd8631558a4f1c51f4ef9ecd17db6da99592c83a599fc24a29f9268f289f,2024-11-21T07:53:04.653000 @@ -223399,7 +223399,7 @@ CVE-2023-30131,0,0,e098ad323162eb9e1d490a7a0316cb94f586f4d29ed0e78d4772fb619fbcd CVE-2023-30132,0,0,09a73d51f7875d392cb17e57f19213861472198646bd9982466cd1784a4881ea,2024-11-21T07:59:49.727000 CVE-2023-30135,0,0,28029c0c876039a2ea19d0259bbc275264b5b7a69c9301bd02b9aa38cead5fb2,2024-11-21T07:59:49.877000 CVE-2023-3014,0,0,0e3b828364a7e71a714627f7bff76921cee5de2245d025d8d97bac7dc268609a,2024-11-21T08:16:14.603000 -CVE-2023-30145,0,1,abd5742d07a284ce1cd9a8d00d61f6326b8eae61ff028e120e46d324b2376ec6,2025-01-16T17:15:11.327000 +CVE-2023-30145,0,0,abd5742d07a284ce1cd9a8d00d61f6326b8eae61ff028e120e46d324b2376ec6,2025-01-16T17:15:11.327000 CVE-2023-30146,0,0,47f78097a903c2be223bfc1e40b4393199b4917afaf531cbc2c6715590fe96ca,2024-11-21T07:59:50.177000 CVE-2023-30148,0,0,b94aac1599c024a39dc406b4df1c745f84e300d5ed607caf50e2ba928c96b514,2024-11-21T07:59:50.350000 CVE-2023-30149,0,0,0f6dbbb511cf6b056c5536a2c4805decdf86d1077bdafea4f90c4e46d250e00e,2024-11-21T07:59:50.503000 @@ -224286,7 +224286,7 @@ CVE-2023-31221,0,0,8f6a44bdf7822116be89f45c3a27e661ea46b3f4959c654dc384195e503a1 CVE-2023-31222,0,0,7961a39815ac2759759ce411687c93596119ee1f2b490d852d79d101cabe03c1,2024-11-21T08:01:39.230000 CVE-2023-31223,0,0,d6b4463920b025a3c4c2ff78c6ce72039d883d4d0ee015b7e0c57ff5227d6c3a,2024-11-21T08:01:39.360000 CVE-2023-31224,0,0,f0811b5c5188602ccf913e1f9c204f9fa1146aa79807b8093094e08b07797914,2024-11-21T08:01:39.500000 -CVE-2023-31225,0,1,c179ff0062cdecc8949e280eac70e5653236acbbefd2c7eee3423ec7fd2c4db4,2025-01-16T17:15:11.517000 +CVE-2023-31225,0,0,c179ff0062cdecc8949e280eac70e5653236acbbefd2c7eee3423ec7fd2c4db4,2025-01-16T17:15:11.517000 CVE-2023-31226,0,0,b624206e6bd26b66e04ba787947c0cfc9054c6de981dd4726eebb088955551d6,2025-01-15T22:15:26.220000 CVE-2023-31227,0,0,a79c72351c00c0dfc94ea740102d77e7e111a4196fb6ceb215505e0c32ed7290,2025-01-15T21:15:11.430000 CVE-2023-31228,0,0,5549fdeb2526d07e9e45b500b38f669c0404737afd5dc9f59c6b72c76f820c34,2024-11-21T08:01:39.970000 @@ -233456,7 +233456,7 @@ CVE-2023-43177,0,0,3cdf6260b12f937dd9abdb2135d7e0b87aac6bd76578d48de1c96a23d6f51 CVE-2023-4318,0,0,deb02359ed1711b8ed20cfd32027690779ee3f2a26192543e29a5e980ca44f8a,2024-11-21T08:34:50.773000 CVE-2023-43183,0,0,c13267089eafe46e962d11f78ca2de77ef7b33f3b769440892f42cf7052d80d4,2024-11-21T08:23:47.437000 CVE-2023-43187,0,0,e3da0a23012fedb341ff6c448f8e494d785456d25361620be00866f4702fcfc1,2024-11-21T08:23:47.600000 -CVE-2023-4319,1,1,93cb0cf55bd4f12d7e468915fbfb6f6bd0c5803186dcd067e24abac91b533bf4,2025-01-16T17:15:11.693000 +CVE-2023-4319,0,0,93cb0cf55bd4f12d7e468915fbfb6f6bd0c5803186dcd067e24abac91b533bf4,2025-01-16T17:15:11.693000 CVE-2023-43191,0,0,21a5ca6fda27296550527bda811dc8a6972158fd45c72998838de7471f9d2d5e,2024-11-21T08:23:47.770000 CVE-2023-43192,0,0,2d123c0d8e9afe0b1ade84f5096f7b43ac98bf4033d1892ddd65388907429f15,2024-11-21T08:23:47.940000 CVE-2023-43193,0,0,47307cbc1ba514dd32b26ec031a4e8a24e1c74782387194fce9318db1bba0ef4,2024-11-21T08:23:48.077000 @@ -239134,8 +239134,8 @@ CVE-2023-51384,0,0,6e58bfcfb6da1155236afb4714eaff5a0d73193b62b87388c071ed9812c66 CVE-2023-51385,0,0,4dd6adfe4e8a547ab40bfa763b57db46069409ffd40c7ea0c384ce7720703ef7,2024-11-21T08:37:59.990000 CVE-2023-51386,0,0,bf7934aed68840a6291648f540bc6a2a2d179fe58b03fabc7e3763433e5d12ef,2024-11-21T08:38:00.183000 CVE-2023-51387,0,0,9ae6c1ce6708d7742b5f3ef922ed1a40fc6c73895105309aad89d41f5482a5c0,2024-11-21T08:38:00.317000 -CVE-2023-51388,0,0,784f53a667e4ebd3e800108ed939512f72b2952a0185dbcde27900757fe9c331,2024-11-21T08:38:00.467000 -CVE-2023-51389,0,0,b68ed775daebaed828ba4b940dc62017ef974c0dbb223395d833bbd647413291,2024-11-21T08:38:00.603000 +CVE-2023-51388,0,1,e796f7488e7d5b6b4b0a66e7d3ffd1e8a78e8a6718f16e8d70eb3c18f01c1387,2025-01-16T19:11:41.830000 +CVE-2023-51389,0,1,d649e3b2edf5cd45e39e2051986c530abb76abf16e5c8d5a9bbdd06f97aabfe4,2025-01-16T19:08:36.017000 CVE-2023-5139,0,0,69361bc1a2213f0600fc2fb192d98b406084fbbaf2768468c5067c08059961d2,2024-11-21T08:41:08.487000 CVE-2023-51390,0,0,496dd0af99b7fb72c4ebdc3c318e1a8996c2f7f491249e5fc1088cab7b14ac21,2024-11-21T08:38:00.733000 CVE-2023-51391,0,0,f2097631d097ae23ddb8f8956d024413f324b87cd0f46e72c0193f503c53e7f2,2024-11-21T08:38:00.863000 @@ -239421,7 +239421,7 @@ CVE-2023-5165,0,0,3f5a6cd169442941a89e708d426d91665dc5259f42e8672e9b08aba1ff9c59 CVE-2023-51650,0,0,2f216a8a35441793fd8c040b6a5f4d1e641706a4eddb5c6f2648582bb8371f1e,2024-11-21T08:38:32.290000 CVE-2023-51651,0,0,5e0d84ceb36bb7bbcf590dc1bc18e3faaa5d046cddec719112ad744dda6f823d,2024-11-21T08:38:32.420000 CVE-2023-51652,0,0,2d775919d9307fee3bdc0e4ea44fb4c315f0c561cc8a5e74ca625b09f9987148,2024-11-21T08:38:32.550000 -CVE-2023-51653,0,0,93df48f521140a4b3e6a758a5e9afb77c21caa883c0899717d4fb8df6de143e8,2024-11-21T08:38:32.677000 +CVE-2023-51653,0,1,dd6954321aaa255d3be0784a285314d8d9b6701758abbd11e378426f1c3e64f5,2025-01-16T19:04:56.533000 CVE-2023-51654,0,0,c5d5f99f459f84ba951eeb62d2d6bd91b122f02eb2cde0a9b30cfd7d6fc656ee,2024-11-21T08:38:32.797000 CVE-2023-51655,0,0,798f763fdf003ac2a4d776193fbe546aa14799e16b8dffbddc1b635be6768b59,2024-11-21T08:38:32.920000 CVE-2023-51656,0,0,a6f4910c94ed9e900a598985d657809681a7265d1786879f1a5e8d687111bbcf,2024-11-21T08:38:33.063000 @@ -239528,7 +239528,7 @@ CVE-2023-51765,0,0,7e2f6975525437c04272d273eaf98fe256b560ab01ad36b2b6e2672e6d8bf CVE-2023-51766,0,0,114e1e8e2c1406a7fa8dc848ad9b3fd5205eb5f0b1df5fa8f1d15dd02351b9c7,2024-11-21T08:38:45.183000 CVE-2023-51767,0,0,42ec61e274623168f6016f98034a679f4f2f822014284b06db46270dae0d9165,2024-11-21T08:38:45.390000 CVE-2023-5177,0,0,fd6961574e96d085692baff4969571b1ccd119738ee2e78b61ea3bd5daa8151c,2024-11-21T08:41:14.373000 -CVE-2023-51770,0,0,2906a42183e8169e8801c253ad7530e879c7f5f32d8281aca33ef8bf53252a1c,2024-11-21T08:38:45.550000 +CVE-2023-51770,0,1,7ae42c7a9caa7dcbb7f975459e58ccc847fa8015fc37f5fcdf9206c6a4ae1ac5,2025-01-16T19:48:57.647000 CVE-2023-51771,0,0,a7ac71abfd89ef5632e670acdbbcd67d8ac889a72653a4881695aadd2c3059c4,2024-11-21T08:38:45.667000 CVE-2023-51772,0,0,e4b0308fde952cfef3d05376dbaa53a837ecd451c80dc621beb3afccf73d1cd9,2024-11-21T08:38:45.810000 CVE-2023-51773,0,0,65e2d498b226725270c6ae7096ef28f1fac465f65a55d715b16863ebfcd4ab8f,2024-11-21T08:38:46.037000 @@ -240111,14 +240111,14 @@ CVE-2023-52559,0,0,d19b9ab292d63ef7322e1b7ec06597d9cfc233c4b8c403c3fc71c495ddc8d CVE-2023-5256,0,0,f25b36e2d6816d15ae13d24827e811b1ce1bdb4f814d5704d120858d960e9cb7,2024-11-21T08:41:23.240000 CVE-2023-52560,0,0,8101dc5e12b61978499f3c1f952560bbf0c85a42b7e572f0d17179ed35ab4ed2,2024-12-11T15:24:15.463000 CVE-2023-52561,0,0,bbc18871877cad65375af08e325f56ae47245e643f99add72f816b7bee748d2b,2024-11-21T08:40:03.893000 -CVE-2023-52562,0,1,4890184f51d6e74542818e9c65fc90069fa0340b4f94300644651b70efd1e96e,2025-01-16T17:02:14.957000 +CVE-2023-52562,0,0,4890184f51d6e74542818e9c65fc90069fa0340b4f94300644651b70efd1e96e,2025-01-16T17:02:14.957000 CVE-2023-52563,0,0,01157a06c1bdeb4c4102bca50ef9a48709c1400e6898d82272f45549e1856933,2024-12-11T15:23:23.317000 CVE-2023-52564,0,0,368c7f05707add455dbe5f5abcb8ce9056a0b45ef412d168e0c72b5fa5d229e4,2025-01-07T17:34:18.947000 CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947218,2024-12-11T15:22:29.917000 CVE-2023-52566,0,0,0561ca08823b0139170f0520b6f130894bad2ca52e446eddfcab5d955446225a,2024-11-21T08:40:04.560000 CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000 CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000 -CVE-2023-52569,0,1,acae99d79ce34dd4ff6e2aa23bdd3e8e5bfff8c20e53119da007b1ed6daf44c2,2025-01-16T17:08:05.613000 +CVE-2023-52569,0,0,acae99d79ce34dd4ff6e2aa23bdd3e8e5bfff8c20e53119da007b1ed6daf44c2,2025-01-16T17:08:05.613000 CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000 CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000 CVE-2023-52571,0,0,3d763ea049692222c9f2aaac9caf87c4a36407d587a5bdcdc18e08fbadbf44e6,2024-11-21T08:40:05.753000 @@ -240131,9 +240131,9 @@ CVE-2023-52577,0,0,5bd6982550137aea20a2ecd267614d20749b25811f7f7f8a84e7c7b156c3f CVE-2023-52578,0,0,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d5040d9,2024-12-11T17:44:23.533000 CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000 CVE-2023-5258,0,0,e7de433a5f8b0381668aa81c56f5663c687e057bf10b9164f07834413eaf9c06,2024-11-21T08:41:23.570000 -CVE-2023-52580,0,1,be0a0e06ead2361ae48d45b0aa80d77f09800c6568f6ac2725bd6b1b9aefbeb8,2025-01-16T17:43:05.203000 +CVE-2023-52580,0,0,be0a0e06ead2361ae48d45b0aa80d77f09800c6568f6ac2725bd6b1b9aefbeb8,2025-01-16T17:43:05.203000 CVE-2023-52581,0,0,c3e6d5af82028afac4a4ca1f703859e3b8715280d49e5b32567a0d2d07c327b8,2024-11-21T08:40:07.010000 -CVE-2023-52582,0,1,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09985,2025-01-16T17:33:18.490000 +CVE-2023-52582,0,0,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09985,2025-01-16T17:33:18.490000 CVE-2023-52583,0,0,8b9c89afe400a6ca03d637b734e61bba901e1be3a9d933dc3f9210eb865fd5fd,2024-11-21T08:40:07.307000 CVE-2023-52584,0,0,5a522db273229117adff319e88be80a572f8d8a3e6725b090908b5d18b4058f9,2024-11-21T08:40:07.433000 CVE-2023-52585,0,0,db7e2649e543632d88de0ba5f9f4eb76dfbd693c00750d96eb1fd47af92129fb,2024-11-21T08:40:07.623000 @@ -242654,7 +242654,7 @@ CVE-2024-0373,0,0,b3d6470f0700058f6e23c0d0b489ad351710ad7e19a0b33418d3b851d8dc60 CVE-2024-0374,0,0,8a8885831ece676186f8806efeec3a4eb9c300cbed5e4e0d0e9da25264b19834,2024-11-21T08:46:26.073000 CVE-2024-0376,0,0,e519b0b3ccb0380dc644ca1c0a0d806c3aa99c34eb8019def3cd5d2de9305e23,2025-01-09T15:13:53.520000 CVE-2024-0377,0,0,735a1af5eb43820c1d494a6cccbb0f7ffef81c321c8032d6a00b46fa1e7caf3b,2024-11-21T08:46:27.067000 -CVE-2024-0378,0,1,6327e42d183029a8d5af62628ec61e961d0148256785c05c3ae05fdc51bde6b0,2025-01-16T18:30:44.367000 +CVE-2024-0378,0,0,6327e42d183029a8d5af62628ec61e961d0148256785c05c3ae05fdc51bde6b0,2025-01-16T18:30:44.367000 CVE-2024-0379,0,0,7f2a5e29717edae18ab4f87ffdcc74cd55d78d960b0bb83761954261632040c0,2024-11-21T08:46:27.353000 CVE-2024-0380,0,0,b13ba26b2c93293898a30471c8b142088e326e5cfea22174ba924ab8efd84293,2024-11-21T08:46:27.490000 CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db08a,2024-11-21T08:46:27.643000 @@ -245853,7 +245853,7 @@ CVE-2024-13212,0,0,5d3d9340b90adc02a73b2a397cbc7b9a824f5e41958bbb77ca0e0a733f439 CVE-2024-13213,0,0,3077bf102e80b6ad26d9de82b06cecbfeedc1b0a01c454e5ec2b3b19555a517b,2025-01-09T04:15:12.453000 CVE-2024-13215,0,0,2cf6f0084be0a9fe5a33e4045196786b0da0bee172b3bed5b1fc1d9fb2e98dd5,2025-01-15T13:15:09.263000 CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000 -CVE-2024-1323,0,0,63ac2cb10ca4755662ac35d59563526e26b5fa0e58c6b5db1bc1601423d748c8,2024-11-21T08:50:20.007000 +CVE-2024-1323,0,1,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13237,0,0,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000 CVE-2024-13238,0,0,e97946c1ed27832515b261c210f4ad897caef0bf1252b79ed355ec42751c24a5,2025-01-09T21:15:25.130000 CVE-2024-13239,0,0,91e163b85b63de6da134a1efa6398bca19ed0ada57bcebfc51e085d959e0fa81,2025-01-10T18:15:19.477000 @@ -246192,7 +246192,7 @@ CVE-2024-1588,0,0,064c6c0dd6f975ea15e06fcb223479e78a68292a40c160ed7cd24d23d617f1 CVE-2024-1589,0,0,1931589006a4c51bc1b5b6052d50e4e25fdb31d7b1487761957f59c98cc0a546,2024-11-21T08:50:53.787000 CVE-2024-1590,0,0,4dc30fb7211c32b8bd0f209116be4eeecd77c4a250e9e6e10c6ce684d7b60c87,2024-11-21T08:50:53.977000 CVE-2024-1591,0,0,fdacf83330a01a977bb97372c215a2802e538c5ea7c288c69493936a1bb317d5,2024-11-21T08:50:54.090000 -CVE-2024-1592,0,1,22e091e91f9551746ee97464de3b99184eb3e5de07904bb056b791931902b874,2025-01-16T18:44:36.740000 +CVE-2024-1592,0,0,22e091e91f9551746ee97464de3b99184eb3e5de07904bb056b791931902b874,2025-01-16T18:44:36.740000 CVE-2024-1593,0,0,391512bb7d3f57cbae758070034062909cc1d39f455b58143eea3832736cd4d4,2024-11-21T08:50:54.320000 CVE-2024-1594,0,0,dccb92d3d1c0bb225dc01e2735f71c68449444381efde8c83572d5c3ad8b65da,2024-11-21T08:50:54.443000 CVE-2024-1595,0,0,526b516f9c10c33e50425b60b231b2ea8a5ba90250edae49ae4c689cc755ce36,2024-11-21T08:50:54.570000 @@ -246360,7 +246360,7 @@ CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af44933027 CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000 CVE-2024-1773,0,0,cf04e4c0c1e4bfcf1aa2d828b9bc8d0c39a72216a49df579bdba39c0486b0fcb,2024-11-21T08:51:16.823000 CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000 -CVE-2024-1775,0,1,b8c203919e47126bb6c2af66dc4bbb6f7b785958b0e56ffc05a0a4a6fa9fb683,2025-01-16T18:39:46.423000 +CVE-2024-1775,0,0,b8c203919e47126bb6c2af66dc4bbb6f7b785958b0e56ffc05a0a4a6fa9fb683,2025-01-16T18:39:46.423000 CVE-2024-1776,0,0,8f687e2a9e9f6a8a4412858b8c915f4a1820886d213022ced72ddabc13336d9f,2025-01-16T14:34:59.577000 CVE-2024-1777,0,0,8e9471bcb086116767fd181f7492497a52ae5dd8ef35ff837c62ea8f2d749fa2,2025-01-16T14:35:48.920000 CVE-2024-1778,0,0,2cfc75707a8d03f8d413a8de4930720674c1d029b285b395e008211573cb799b,2025-01-16T14:36:39.337000 @@ -246385,8 +246385,8 @@ CVE-2024-1796,0,0,4f640317e0b20db68247964837e1e23fa544a659be70e600c828d7e9cf517c CVE-2024-1797,0,0,183002d6382a038d76709953f57646b35469fe82c13c2541a9bb1173360c659e,2024-11-21T08:51:20.520000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 CVE-2024-1799,0,0,4fe6b469e0dfdfa7580497300a6e88df3efeb98aee5b6039e938180c097fa959,2024-11-21T08:51:20.813000 -CVE-2024-1800,0,1,4198f2af30da2326c4f00a8a81874f56fa7d692eb5115afc306e3d02e598b03f,2025-01-16T17:07:24.633000 -CVE-2024-1801,0,1,09176e4274a4aad405863647b4bf412248999db3a16422c417a364400eabf7f2,2025-01-16T18:04:52.037000 +CVE-2024-1800,0,0,4198f2af30da2326c4f00a8a81874f56fa7d692eb5115afc306e3d02e598b03f,2025-01-16T17:07:24.633000 +CVE-2024-1801,0,0,09176e4274a4aad405863647b4bf412248999db3a16422c417a364400eabf7f2,2025-01-16T18:04:52.037000 CVE-2024-1802,0,0,e397e6b7dee998d4237cdf34cb2f4f4f12723d9ff7f8f5340fd21a36dcdd1526,2025-01-07T17:38:34.240000 CVE-2024-1803,0,0,4dce34fe6e230d1682861cc571df27955adc84c1351e2be9c0fcf45315c51d7b,2025-01-07T17:32:44.720000 CVE-2024-1804,0,0,ac920f0514ab771b01277f413454aa542e7f03ee80e295a638eca8b6dbe9c716,2024-11-21T08:51:21.513000 @@ -246437,7 +246437,7 @@ CVE-2024-1852,0,0,b9d683f5957eff25406d3f28768343d0f941f69d129acd817b869c293ba088 CVE-2024-1853,0,0,6a68689fcd79fefcde169f14e1209eaf1cec9e306cb6544a77f67f77747e937e,2024-11-21T08:51:27.640000 CVE-2024-1854,0,0,973ee80e3e427350ee0bf12e2cef5e53d2d4cc1dcb4a9d3fcf4b26d3e3bed940,2024-11-21T08:51:27.773000 CVE-2024-1855,0,0,5da118eea0cc13494480a1e1ca01f87ce624311ad317555a282db08ea9acd47d,2024-11-21T08:51:27.897000 -CVE-2024-1856,0,1,e7e84d2ffc2542d366b810418f9a74b608acbb369f4f1196ae3112dfdd4ef3fc,2025-01-16T18:06:29.870000 +CVE-2024-1856,0,0,e7e84d2ffc2542d366b810418f9a74b608acbb369f4f1196ae3112dfdd4ef3fc,2025-01-16T18:06:29.870000 CVE-2024-1857,0,0,c5708d7f5b9aa52c50a089d9d955a2ad47405cd7286310e3cff153bb8ed9df7a,2024-11-21T08:51:28.163000 CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce9272259b,2024-11-21T08:51:28.283000 CVE-2024-1859,0,0,68ed486ef8bc590af7f4ff2d77e8196bc5c8bb0caadbf80e7533449bb6bd0fd3,2024-11-21T08:51:28.423000 @@ -246552,12 +246552,12 @@ CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf245 CVE-2024-1974,0,0,ddf10b2e07b26483d69810a06ba5463d244f8930001a2db1397a922f561c064f,2024-11-21T08:51:42.867000 CVE-2024-1975,0,0,1ae0a6f555a0b739aa7c380171466dc1803a13ce978f8add5306445e96cc4399,2024-11-21T08:51:43 CVE-2024-1976,0,0,a3555dbbbe1be129a03f073ac3b859df5d9dc7ad39e5f16531bc3f78a64440d9,2024-11-21T08:51:43.140000 -CVE-2024-1977,0,1,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000 -CVE-2024-1978,0,0,ac4f987c538934e6d0d130af83bdd8a36590580cc46fb0bd6418f0016a967f23,2024-11-21T08:51:43.387000 +CVE-2024-1977,0,0,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000 +CVE-2024-1978,0,1,8f0da3a791c56dd51e116dd0e304a23b122a9f09309b0ca3d1aef0344f258d71,2025-01-16T19:01:27.267000 CVE-2024-1979,0,0,450c8bced69f6acee39bec8a0cbc5907a91ea6349c4a430e3400e611d5082a4e,2024-11-21T08:51:43.507000 CVE-2024-1980,0,0,d05d6a10f51fa5cb95450081d05531b2a97dcdb5a95466a13c126d057076b9b9,2024-05-31T15:15:09.393000 -CVE-2024-1981,0,0,7c4a167a132cebe7d603562a0c84397bcae6c178b5ee27f2e4e8d69ad1a99ff1,2024-11-21T08:51:43.663000 -CVE-2024-1982,0,1,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c6579,2025-01-16T18:57:54.527000 +CVE-2024-1981,0,1,cffe2c737efb8789ba097f31f0d9c0625560e844705711832217b8456fb6a355,2025-01-16T19:00:16.603000 +CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c6579,2025-01-16T18:57:54.527000 CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000 CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000 CVE-2024-1985,0,0,ddbab545ec02d294b6416c7868800e9a27601dfb8f32ff4c59f765a072c0c2f0,2024-11-21T08:51:44.230000 @@ -248970,7 +248970,7 @@ CVE-2024-22901,0,0,f8817b899ceb1629cc996df67014840f3c15617fb0cfcadad86e101e8672c CVE-2024-22902,0,0,1f98b4df3d92c1b4353be91b1edaa3fdbcdc2b1db3150231969451d275d57b12,2024-11-21T08:56:46.427000 CVE-2024-22903,0,0,6708444e34564e004b896bb8981f7169cd4c4881135ac624373fea3bf4635dad,2024-11-21T08:56:46.583000 CVE-2024-22905,0,0,af861a89b31b1cd519cf02c39e78baf454e4f374e5027f26c4ee555cf353373b,2024-11-21T08:56:46.740000 -CVE-2024-2291,0,1,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000 +CVE-2024-2291,0,0,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000 CVE-2024-22910,0,0,8c467bd6905f47328179bbf1d802932c88b496fc8de8231d42c1b81ba98e84e0,2024-12-04T17:15:12.300000 CVE-2024-22911,0,0,6aca86d2bd93d1d1cd8841e3ed3042a697b92f9c7912c75fd5b2128b9709533c,2024-11-21T08:56:47.090000 CVE-2024-22912,0,0,5ea775660d89bfc8062a1a2e64de2f4dcb16849b1db5073b4dff385a0b1fad2c,2024-11-21T08:56:47.240000 @@ -248985,9 +248985,9 @@ CVE-2024-22922,0,0,b0319a189f506f1a888f687384cd1bf3488c9cb7fd1a3dc518313ca5d80bc CVE-2024-22923,0,0,712e6bc3c4f4e572b910d2f427233c499cf247cb31eb01aa9e167b1c35b2f276,2024-11-21T08:56:49.010000 CVE-2024-22927,0,0,722d12d2d644a7c5b4f0f753b2616098333cb8008e2b3d888b97baae6694f6a0,2024-11-21T08:56:49.187000 CVE-2024-2293,0,0,700e1fca060eef4c58290073679482a5324e031199ecfbd1ec6cabd10e14554f,2024-11-21T09:09:26.767000 -CVE-2024-22936,0,0,bb7c3d014e5ca52908345ad5327e7defa1e0acde063b8648a84d46a2e543b9c7,2024-11-21T08:56:49.357000 +CVE-2024-22936,0,1,1b600cbd732fd3caba706bed37e6aff42d5f330e74d21c7a465e5893df8434df,2025-01-16T19:10:39.077000 CVE-2024-22938,0,0,d535532346a60d7861e61f660ede81510f7524ae0d2e46c3b2d5f7b538a7cb6f,2024-11-21T08:56:49.620000 -CVE-2024-22939,0,1,3ffcf95a5808ba6dc907299c9eb15e660c1b5ea83eb26cb77d823340e741ecb2,2025-01-16T17:52:27.713000 +CVE-2024-22939,0,0,3ffcf95a5808ba6dc907299c9eb15e660c1b5ea83eb26cb77d823340e741ecb2,2025-01-16T17:52:27.713000 CVE-2024-2294,0,0,1effbd22458256fe66408ac0ea8ed3a355e6b8e30245f685a9acaa494c340f66,2024-11-21T09:09:26.897000 CVE-2024-22942,0,0,70fbb7b13690db5e0ea270a9db06cbef5fc5d22db003b9b7feed6994516eabac,2024-11-21T08:56:50.037000 CVE-2024-22949,0,0,253536c9d2d1cda9a6b5cdc7db5c0814e55d025d647630ad24c9ee6337808627,2024-11-21T08:56:50.197000 @@ -249012,7 +249012,7 @@ CVE-2024-23034,0,0,f4f664a4a31c484f7eed2bcd4ad32346a076a1dfba5bb52ec53f33d4f295c CVE-2024-2304,0,0,230462e62d4597d9526e82d1b5f4a2f18975cd9c4bc9f381b618660e1e44cfc7,2024-11-21T09:09:28.047000 CVE-2024-23049,0,0,123bfbcf3c065f85e1671e94c372b42e7730e61d2f549ac590a6713bc73df88a,2024-11-21T08:56:51.953000 CVE-2024-2305,0,0,ebf585b0fc63d5aeb634f952383d1e0c14b5b4ef6ba4de8b432c53217b286d26,2024-11-21T09:09:28.173000 -CVE-2024-23052,0,1,f64915640578da4aa31f36b2448b98b95ef3ed79182c0b353ac064ff3a6c2d29,2025-01-16T17:53:25.507000 +CVE-2024-23052,0,0,f64915640578da4aa31f36b2448b98b95ef3ed79182c0b353ac064ff3a6c2d29,2025-01-16T17:53:25.507000 CVE-2024-23054,0,0,57c8ee13e5deea4252b00a79726f9264b2ea14e0ed94c41b033e36787c15e590,2024-11-21T08:56:52.347000 CVE-2024-23055,0,0,424171c81b8faebe79d8fa44169374c5df8b725bc8a3c3cfaa5dd80c008f24c8,2024-11-21T08:56:52.597000 CVE-2024-23057,0,0,c9a0fba17c8ddfbbfffb041e148435e71b05f1ddb663ebd20878bf31d80a5eb5,2024-11-21T08:56:52.757000 @@ -249236,7 +249236,7 @@ CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06 CVE-2024-2330,0,0,cdcec8973933eb0cc3358dc4fd7944cf2c999cfac8dfe75d740b313d9c04bdc5,2024-11-21T09:09:31.107000 CVE-2024-23300,0,0,92499b814981e53b75c7050bbd8ce71be76456c250b43f7da58ee0c441188ec7,2024-12-09T15:00:30.860000 CVE-2024-23301,0,0,0736d725ddc84811b8556172b804f1fab47c733216f8f43a8e03e7c70d0a8e99,2024-11-21T08:57:27.587000 -CVE-2024-23302,0,1,5043f715c2fa63c722dc3efa75b00dbd5486ddd9a33d197f8822311b66d8826a,2025-01-16T17:52:09.087000 +CVE-2024-23302,0,0,5043f715c2fa63c722dc3efa75b00dbd5486ddd9a33d197f8822311b66d8826a,2025-01-16T17:52:09.087000 CVE-2024-23304,0,0,92c39ed25142e10292f4cf492619ffe50eef087dc223559e6d3336ffb6a74a4d,2024-11-21T08:57:27.987000 CVE-2024-23305,0,0,3fe779548b89272de22e625cd41cc0080e83a2006ef286cd61ac82fef6cc5817,2024-11-21T08:57:28.113000 CVE-2024-23306,0,0,edde950ea5922ba255a0d83d63eb4aad08f941b8aae52599bd480c8fbb7eb7d0,2024-11-21T08:57:28.243000 @@ -249441,7 +249441,7 @@ CVE-2024-23497,0,0,690754b376a4f826260c5e2a1f7823688f134f93841ecc8abc87700360e95 CVE-2024-23499,0,0,a567f67f8a898cecf56cd3e99b45d46285aa97e9b1102b601cf155c788a0b10e,2024-09-06T20:43:04.353000 CVE-2024-2350,0,0,4f138608b38538f75ace942d9d7c41e26d39aeed0567a4de9bc6de3f94bd6d26,2024-11-21T09:09:34.270000 CVE-2024-23500,0,0,6764e8e544c564217a9a1f568ba1f5fdb721df601e20408bd6ee269400cfc85e,2024-11-21T08:57:50.297000 -CVE-2024-23501,0,1,18f778157000318129d263ca4db8c30bd02fafbf6c574003d458f8e8181a78ca,2025-01-16T17:42:20.350000 +CVE-2024-23501,0,0,18f778157000318129d263ca4db8c30bd02fafbf6c574003d458f8e8181a78ca,2025-01-16T17:42:20.350000 CVE-2024-23502,0,0,cb1590bf0c865e0cf146e05cb95cd62dace1b15d201587c34885c0d75d1f53d7,2024-11-21T08:57:50.537000 CVE-2024-23503,0,0,c5bc7f250fc02c8ee59401a2ead32a2680a0f570cbcdc31895e8a9cdc264d9ea,2024-11-21T08:57:50.670000 CVE-2024-23504,0,0,654fe103a93f2bf1d8cd0d5d788ef19bb882eb3ba82517172847ffba82819ac3,2024-11-21T08:57:50.820000 @@ -249705,7 +249705,7 @@ CVE-2024-23803,0,0,10f3e9a8f3cecd3bd5e79f7cf056640d63758c696b5dac74067b76c301f1f CVE-2024-23804,0,0,5ed488c14b857970d2142f67c43d2b5530c65e868b95823f75a36dcdf27934ac,2024-11-21T08:58:27.367000 CVE-2024-23805,0,0,bfc06a300b76d855656e499453de6a2febdd5e93279f95b30c9afdcca5e12cdf,2024-11-21T08:58:27.523000 CVE-2024-23806,0,0,9d829fca3834f4b79580eb189255076ef10c6078bd0e056438230fee41d8a8e9,2024-11-21T08:58:27.657000 -CVE-2024-23807,0,1,1b8575bc8a82d32cc06f5bea6ac8791009b0d290ab9e89fa4395ac86da1a6ad6,2025-01-16T17:51:40.503000 +CVE-2024-23807,0,0,1b8575bc8a82d32cc06f5bea6ac8791009b0d290ab9e89fa4395ac86da1a6ad6,2025-01-16T17:51:40.503000 CVE-2024-23808,0,0,842f67d830d40bbdccbee3dceed160f694418bdd49df687322b2edab20d3eba0,2025-01-02T19:07:39.450000 CVE-2024-23809,0,0,d62bad76e60bf7ba73d75b1fe72094d81e760aa89965413d1f01d3e0b442bc2b,2024-11-21T08:58:28.127000 CVE-2024-2381,0,0,f66ddad084efb65ff7bf956ee961f930c1176d8e9e8c0f951e63dbd6dfd2cc0e,2024-11-21T09:09:37.907000 @@ -249945,7 +249945,7 @@ CVE-2024-24148,0,0,3de3823ab87901c737ba908b33250b7caf946edc72327d35c051b3a6c6de2 CVE-2024-24149,0,0,25185e19a5d74a50e733ccc4c2aaa13e707228e68566784ac21989b8d0b07a98,2024-11-21T08:58:59.270000 CVE-2024-2415,0,0,e3ac62f8cd5ffdefadc686b2f7498541a23744a1036aae7d48882383b1c54711,2024-11-21T09:09:42.320000 CVE-2024-24150,0,0,20d6f0f6b7277b80f157b4c6aefd41b93488bd10a2227adf78214e76a53a22e0,2024-11-21T08:58:59.480000 -CVE-2024-24155,0,1,49ec57e0dd398b5531fdcf2291cb8f1e4145124f3ba1d0286f937c23db066855,2025-01-16T17:51:56.167000 +CVE-2024-24155,0,0,49ec57e0dd398b5531fdcf2291cb8f1e4145124f3ba1d0286f937c23db066855,2025-01-16T17:51:56.167000 CVE-2024-24156,0,0,3815a9b481e5f67ffe320a44b74580cbc0dc336a73285c0ee4ddc8e2a7e9e3de,2024-11-21T08:58:59.820000 CVE-2024-24157,0,0,5ef0db66e72878b96384995f708990bf1c83d0f3a2ac390432c9a67a3832d542,2024-11-21T08:59:00.010000 CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2cb,2024-11-21T09:09:42.427000 @@ -250130,7 +250130,7 @@ CVE-2024-24560,0,0,5f765f9ec157c84f1d790c1e7f16e1294e5a3cdc82e70f6ae8831f5cc1027 CVE-2024-24561,0,0,29d448b6b5b14211432c6f68d0d09ea0d9e60521c14b338f7bb0a46c29755c7f,2024-11-21T08:59:25.447000 CVE-2024-24562,0,0,a91ccc68b39a45be495dfc4ab049d344bf8b69441512661809173b7cd9aa3f2c,2024-11-21T08:59:25.580000 CVE-2024-24563,0,0,686efbb8142716225be42cf68a23f2ac286aad10cd7f4498edb7b2cf2909a7bb,2024-11-21T08:59:25.710000 -CVE-2024-24564,0,0,2789da9bc06f546cf0d26fabb39142234b64c7969eebaeddffca046aa0e56773,2024-11-21T08:59:25.840000 +CVE-2024-24564,0,1,fc2e4cb80c95469913f6e0baeb0841400ff71ed2ca965cac1d5e26a9da23deee,2025-01-16T19:34:13.567000 CVE-2024-24565,0,0,24c36b393c7dbbbf96722937f00a162aa087cf926a8b157541d91d0040d3d644,2024-11-21T08:59:25.960000 CVE-2024-24566,0,0,bdd754328dfa0c55c8dcf5ac320a21629725e842e54764a4ffc36532d5f703ec,2024-11-21T08:59:26.090000 CVE-2024-24567,0,0,18f30adc1f3edc368cb20b4126d7148723b64e7025cec69f45a2845b66ed87a2,2024-11-21T08:59:26.220000 @@ -250532,12 +250532,12 @@ CVE-2024-2509,0,0,510d68fb265d5373301c868492c2f38f78ab26fa146a3d6ef10108c07db113 CVE-2024-25090,0,0,124c3bb8e0eb033310c3975082357ae895b5792d315b7ea409ecd748d89d29f0,2024-11-21T09:00:14.127000 CVE-2024-25091,0,0,6bb680fed5af8eec1488bddfdb411260f4b1e0c550867f969d9c81946906bcf1,2024-11-21T09:00:14.257000 CVE-2024-25092,0,0,09b56eac684a72f100555096154f261ee1ef024434d5d64f27ee5018f9636d4f,2024-11-21T09:00:14.440000 -CVE-2024-25093,0,1,7eea3dec9b90b62623daebdbcc4923466ca6991fde5a27887c5d4f8426d8459b,2025-01-16T17:40:31.697000 -CVE-2024-25094,0,0,5a0d0f479e973f07cd44ac879c8a59b1b510aac66e840d2892fba50ade926deb,2024-11-21T09:00:14.703000 +CVE-2024-25093,0,0,7eea3dec9b90b62623daebdbcc4923466ca6991fde5a27887c5d4f8426d8459b,2025-01-16T17:40:31.697000 +CVE-2024-25094,0,1,b63b8f62d0827941191e3b3aa61420ea3a1c039d7fc072b71ce975f59e97a833,2025-01-16T19:09:37.237000 CVE-2024-25095,0,0,071a0e893adddaf4c8990d871a79da8559ca8c6ea36cade0ecebd8aa372d85e1,2024-11-21T09:00:14.823000 CVE-2024-25096,0,0,0a4cc5cd62670b48a96aa834592cda92ec1e730262eea101c7c43d0039d97bb7,2024-11-21T09:00:14.980000 CVE-2024-25097,0,0,7a17da446a848067f64ad3beae0e132d38a7be4b81df383c2647d487431ce055,2024-11-21T09:00:15.117000 -CVE-2024-25098,0,0,30f71c37a3fd2fdae2cb76e58bf73fb568c086c3e3ed9a39ac4c4679bf093a58,2024-11-21T09:00:15.253000 +CVE-2024-25098,0,1,7bf87938eb91bca7e97e4122242d148928aacfe0d777197b7862273045d7154d,2025-01-16T19:05:08.543000 CVE-2024-25099,0,0,615985817d4928ef2f628a9a30cadf3944211895cfb756d386fa2ca42878b0d3,2024-11-21T09:00:15.380000 CVE-2024-25100,0,0,8dc073ebeeb5612406a0fe85c3411871bfb7fe05e8295087ca6b4b8d7e3e94d6,2024-11-21T09:00:15.510000 CVE-2024-25101,0,0,f6eae5cdc9347ef48e0c334d1510c71ff7e0607305767168b86b63d462a9fcc3,2024-11-21T09:00:15.643000 @@ -250756,7 +250756,7 @@ CVE-2024-2543,0,0,558817e2338b45eb79d19337a526c6451eb8d21a6db08856499491a42017b1 CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000 CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000 CVE-2024-25435,0,0,b1ac5db3774769c8dcad2d7cb31ed1823fce3cb4a9c2dc98c92811050617ebda,2024-11-21T09:00:48.427000 -CVE-2024-25436,0,1,4140a5bb36df4fc94ad92dad2a731fafbfa4d373f7749856dabd0879f363f6a1,2025-01-16T18:49:12.043000 +CVE-2024-25436,0,0,4140a5bb36df4fc94ad92dad2a731fafbfa4d373f7749856dabd0879f363f6a1,2025-01-16T18:49:12.043000 CVE-2024-25438,0,0,86e139445bf89c384de05db05f02e7c27a28ea183fdbe47a130e69a2b5316727,2024-11-21T09:00:48.710000 CVE-2024-2544,0,0,4c55e28a99e5d3958db647c23010a7cf4949f9b06a6faeb1f138458b6ed494cf,2024-11-21T09:09:58.883000 CVE-2024-25442,0,0,a568ee98d8497d7f7e25f7c5c7f2726772e408b765f723aa59d08114276cdbce,2024-11-21T09:00:48.930000 @@ -250958,7 +250958,7 @@ CVE-2024-25709,0,0,31489fbef83fb265c90fba2ad01feb192daca17cb8946a88d5b798b413e18 CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000 CVE-2024-25710,0,0,14c488f94704110bccb0ebc194fb3de52b81c1368723fbc1d3df69c3748109e4,2024-11-21T09:01:15.113000 CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000 -CVE-2024-25712,0,1,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000 +CVE-2024-25712,0,0,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000 CVE-2024-25713,0,0,7cb9846da4920671c42e088b26485e0952d0f913d5cb2aa4287dd0a1359ca489,2024-11-21T09:01:15.537000 CVE-2024-25714,0,0,5f5ec83991c8636624f4337fd8c71900ea8e4cac894cd5c5104c7c5d2e9cd5cb,2024-11-21T09:01:15.770000 CVE-2024-25715,0,0,887d8932bcfac8adcfbc6486e84838e399b323dbff1591e24e7eb0ed7512d224,2024-11-21T09:01:16.017000 @@ -251011,9 +251011,9 @@ CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15 CVE-2024-25828,0,0,7704101df7974df2553e5c114fc3996ab2b2d0f7ce43c80fca5b36cf4a93a54d,2024-11-21T09:01:23.217000 CVE-2024-2583,0,0,a2a2389968f4a8b3c048254b843037350c90c5fb2732f8795c088c446c672bdb,2024-11-21T09:10:03.747000 CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b1197ce,2024-11-21T09:01:23.427000 -CVE-2024-25831,0,1,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 -CVE-2024-25832,0,1,4bbe4be7f5e3dc776aebcb65e171010ecfa1bf1c2a8aa0f96d07eea3ec5aceb1,2025-01-16T17:50:36.260000 -CVE-2024-25833,0,1,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 +CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 +CVE-2024-25832,0,0,4bbe4be7f5e3dc776aebcb65e171010ecfa1bf1c2a8aa0f96d07eea3ec5aceb1,2025-01-16T17:50:36.260000 +CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 CVE-2024-25837,0,0,86d76b7ebf93751ffe6cf8d9f95368b24e68bf00449c3aaf1e935929e8a4ec61,2024-10-30T15:35:08.810000 CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000 CVE-2024-2584,0,0,7259a53875a43a61fa11b6b9ac982a7df3cc5b6e0f45fed6dadaa860751fd035,2024-11-21T09:10:03.963000 @@ -251298,7 +251298,7 @@ CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af40 CVE-2024-26132,0,0,276f956129ff17889c7494d0dab8cf40bce32133285459c625bfc72a90dade70,2024-11-21T09:02:00.017000 CVE-2024-26133,0,0,414e865b4d71c6e97782d5b5ae0b162d8235dd6d767b1d33bac291a9dbd931b9,2024-11-21T09:02:00.150000 CVE-2024-26134,0,0,4b0383f16deb8444e0ffe32a9ced439fcf2df8e070f9714cd8b9bac5583f2c2d,2025-01-02T14:18:48.553000 -CVE-2024-26135,0,0,970acaf21438df1f9187c3be15d03ed7ce7dd8a5f98c4d95d3f1dea6045024e6,2024-11-21T09:02:00.410000 +CVE-2024-26135,0,1,779dc441638c260d7cf5f634019d9991826fae60fddcfb8bc24dadacfd0496f8,2025-01-16T19:24:58.253000 CVE-2024-26136,0,0,78c4ea448beb9cf3c6ef8342e477ea2790594fc079dbed58994d56834e580c2e,2024-11-21T09:02:00.540000 CVE-2024-26138,0,0,10f267c4d549b45918b8c4c0ec8306e620c8fc245861cd94369601b1edb19ed5,2024-11-21T09:02:00.660000 CVE-2024-26139,0,0,ffc8a35c7d6ef55a8d6cab5ce0546eacb4822ef0570208b878cfcfdc9f776772,2024-11-21T09:02:00.783000 @@ -251312,7 +251312,7 @@ CVE-2024-26145,0,0,6dc5bf286f14aa8984ea8af88873d919023b6c12a56f0d9189bcaef028ccb CVE-2024-26146,0,0,8dc62e9d940d311f2d35244b525decd4904e25ae0400de39893b8407770122dc,2024-11-21T09:02:01.697000 CVE-2024-26147,0,0,b1698ff9ded5764b7b1e4894dc0839ae17e3f87e890d24e083b22b38e1acfb2e,2025-01-09T14:40:25.983000 CVE-2024-26148,0,0,14d573260f4aedc4d3b62bd8e7a500a230a51424db1776258fa40cff396758ea,2024-11-21T09:02:01.957000 -CVE-2024-26149,0,0,e2c20b5b9c4ca14d1a0ece5a8dd15c77c0459ac6af39a89bedcb1dbfe776d410,2024-11-21T09:02:02.087000 +CVE-2024-26149,0,1,509040b71e933c4c83efda97eedbb5927f70f30be145577cb1eb2d0c4d223bbf,2025-01-16T19:31:59.750000 CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb87d,2024-11-21T09:10:08.153000 CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000 CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000 @@ -251611,7 +251611,7 @@ CVE-2024-26618,0,0,3be46d8e494c76778ce26f489ff9887dc160c7e4937984d288af7894c48c4 CVE-2024-26619,0,0,47ef9d76f9826a5a5e8ba4e9250a722df14dc33a348ae160fc1d23110278689d,2024-12-12T15:19:41.967000 CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000 CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000 -CVE-2024-26621,0,1,2cef5f3b9034b09be05aedbba02c8c8e6662a458df7f1f7360f9cc5779521c1d,2025-01-16T17:11:37.050000 +CVE-2024-26621,0,0,2cef5f3b9034b09be05aedbba02c8c8e6662a458df7f1f7360f9cc5779521c1d,2025-01-16T17:11:37.050000 CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000 CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 @@ -253043,7 +253043,7 @@ CVE-2024-28187,0,0,0a3450f5073be1d4240c0ef0f2f407d6b15b5cea6d54b8a4ffe80e8263924 CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f316aa,2024-11-21T09:05:59.380000 CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000 CVE-2024-2819,0,0,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000 -CVE-2024-28190,0,0,64d767f22b54a8c9829905152c1dacb62aa7a3ac07ced83ef3dfd226a336afb0,2024-11-21T09:05:59.677000 +CVE-2024-28190,0,1,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000 CVE-2024-28191,0,0,3c951e3228d562f8d7ca690d2b0ff43bd081b803248dafa6446513391a31dff4,2024-11-21T09:05:59.800000 CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000 CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1e2b,2024-11-21T09:06:00.070000 @@ -254200,9 +254200,9 @@ CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3 CVE-2024-29991,0,0,e6c92de831c5b9397fb58d42a78c8f9297134d243589c2e28af7e0ae14338a9c,2024-11-21T09:08:45.657000 CVE-2024-29992,0,0,644115a5ada5fd5eaed583dff910388cd7f6edd044c415d410798c64ac367a76,2025-01-09T14:45:52.750000 CVE-2024-29993,0,0,8ee39683bcc6bbc416a9ae96b7bc55ff379fb32e28c9270e9552fcd426131466,2025-01-09T14:37:56.660000 -CVE-2024-29994,0,0,401b2ebea5b3655b89d58ef2168f6ee03930364a1f8ad10ecebfc36b02ec974a,2024-11-21T09:08:46.013000 +CVE-2024-29994,0,1,f65b69994d750908f737db869af19a3c1faa7da239f527bc4d8473a3cc86632d,2025-01-16T19:10:54.100000 CVE-2024-29995,0,0,8c6caf00e8855cb82db52fa0529294735cfd59d615ffc63ca1450ffb28deeb66,2024-08-16T20:53:34.700000 -CVE-2024-29996,0,0,f680c02315187d999d2bc09cf762d4c0ca8a5fbad4f13e5797afcd28e3b12f8a,2024-11-21T09:08:46.253000 +CVE-2024-29996,0,1,2e6f5fbb6d88c4f2ae0f941759f924d6f2eda5d0f7d45d871dd154af05d216c2,2025-01-16T19:11:55.003000 CVE-2024-29997,0,0,defc107fe9ea79a2bf62f30d8bbcdf35032a204044383d9980ebbc63f162afd6,2024-11-21T09:08:46.403000 CVE-2024-29998,0,0,74ca6e6a372674194fc55eebd9ffe24e2f18418426acd322a32804210dfc6c92,2024-11-21T09:08:46.563000 CVE-2024-29999,0,0,5c8c7491630bf34216341268eafef470fe4da64c699a4ab247cf5eb902826f10,2024-11-21T09:08:46.707000 @@ -254213,10 +254213,10 @@ CVE-2024-30002,0,0,04a245cfdbcd8929c9c179da6d63caa062cc9d38a4646e1f4f755002c517f CVE-2024-30003,0,0,18b4414a3e4687540f233a0d504cc4edc3848c3dfef670a70c2ecf55587df1a6,2024-11-21T09:11:02.120000 CVE-2024-30004,0,0,86639d07d442387ec5141c768cce25d28a112072bf64785fad0cced44a4a50fb,2024-11-21T09:11:02.273000 CVE-2024-30005,0,0,a10e8ce70ef8a2b18593cc46b35c1b417b2b182de2da7749dc4d14423999aa66,2024-11-21T09:11:02.417000 -CVE-2024-30006,0,0,cfdddefa45a9103491137329d91abccf9c66904b7162829f1249f9386f80b83e,2024-11-21T09:11:02.567000 -CVE-2024-30007,0,0,81e8a9d80acb0fd4b4d2e28f1473ce582950380596c9f3bd4ac01f0b63c783f0,2024-11-21T09:11:02.717000 -CVE-2024-30008,0,0,73164509e0d550004dfc26ecd32fcb0af01f43487cc022cd53e562266e54016b,2024-11-21T09:11:02.853000 -CVE-2024-30009,0,0,6ce6cd3fab64823a18507498edbeb715aa197def63be726e7885ed988a8aa767,2024-11-21T09:11:02.997000 +CVE-2024-30006,0,1,85487601b394e4400d2d377d9af92036b89a4b5e712a4c30d19151aba00d0ac4,2025-01-16T19:11:30.363000 +CVE-2024-30007,0,1,6969f53c602df9b8b1a9651ceeaaf013496fe697b331e6a013532ca7de82247f,2025-01-16T19:12:10.263000 +CVE-2024-30008,0,1,184e27992dff98b931bdb1cdf87558ed39bf1df29ad79a5d33d6bc08dc38ab88,2025-01-16T19:12:19.507000 +CVE-2024-30009,0,1,2091b88189900c68040dba1bcb5fcb6679fa444deb61d6cce70b651d2c2660c3,2025-01-16T19:12:54.190000 CVE-2024-3001,0,0,a7374e476d7442a06066a14e1bd58098fcf6ff210b0ec172c2e3dfeb580cd5c2,2024-11-21T09:28:39.010000 CVE-2024-30010,0,0,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000 CVE-2024-30011,0,0,656da07e190efbff9361ca41e3b1ba9c4f70c5c9e619a121ad703b0c703533ed,2025-01-08T15:45:48.600000 @@ -254247,8 +254247,8 @@ CVE-2024-30034,0,0,8d8bb16b32dc1d0cf05d2093c5f3e8b850a95559ada3729f30b7d93b5b53a CVE-2024-30035,0,0,da8189a989c95cce8d5f08da706fcc687c021b05179b24bb1973f6a61805d1ca,2025-01-08T15:49:31.547000 CVE-2024-30036,0,0,c7113a79574222a795bbda176773c48ee1043e69142ebe5cda8a43517fcf8ccd,2025-01-08T15:49:50.370000 CVE-2024-30037,0,0,f73d6ad5114cbe6a80525e62afbba48e677b916d63cf3e605483de0567bba938,2025-01-08T15:50:32.630000 -CVE-2024-30038,0,0,a110458651a9eccf20a20127267985311cd4020527c39bb7fe92fbd8245e1a43,2024-11-21T09:11:07.077000 -CVE-2024-30039,0,0,6d4c2a358502acece6d39ccda69e9264f55f52a713bb5953f79ee8082ca9b1ab,2024-11-21T09:11:07.213000 +CVE-2024-30038,0,1,c55c6db9516d0a531d6cfe05df8ad554b214c5ce110172d785ac2f6b63962f5a,2025-01-16T19:13:10.340000 +CVE-2024-30039,0,1,b3516fe35f35a9e1c92b386b516570ec7d2f5667119e2029f5518e1596c8476d,2025-01-16T19:13:43.540000 CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000 CVE-2024-30040,0,0,86ea64696090a4f19b501789fbf7af1284c9d5bce3667303606a9d36752672d8,2024-11-29T15:41:55.210000 CVE-2024-30041,0,0,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000 @@ -257804,7 +257804,7 @@ CVE-2024-34656,0,0,9882428c2057777a17b21f403a4aabd8599796253281d64eb90471b260020 CVE-2024-34657,0,0,8b402566675b1ec4f7d9ec9358e9a6e9a4e286a21c3319ea0f604a0bd357fd84,2024-09-05T13:48:54.077000 CVE-2024-34658,0,0,7811b9cfcab29057adc381f84ce839a68ce68f251efd58c721790d7dd390bd0b,2024-09-05T13:48:52.273000 CVE-2024-34659,0,0,d79c4aac70bb737b2cb73357c5c406b3e1c78530b6c9fc08e8940bec34c543fe,2024-09-05T13:48:55.767000 -CVE-2024-3466,0,0,8cbedc28c6571312de0df1af5b0f4ae0012995db277846173adc4539b2fd2cfd,2024-11-21T09:29:39.610000 +CVE-2024-3466,0,1,ecd5f12af1e3f1ffa2455d918a300d7243d64725209c48218e8cd86f42834899,2025-01-16T19:57:57 CVE-2024-34660,0,0,c7c7b03048d5121b8db19ce9a4997f938dcac3419853c206acff4ecb5664ae77,2024-09-05T13:30:28.343000 CVE-2024-34661,0,0,14a094499ed8207f12772fe54fbf42358cdb047ac71b2f7fc408450c54668c1b,2024-09-05T17:57:44.563000 CVE-2024-34662,0,0,543a7860b4241fb2c19345f59175486e471043bdc2a93dbe65764b4dac2d459f,2024-11-15T16:34:28.937000 @@ -258792,10 +258792,10 @@ CVE-2024-35977,0,0,a446100538552b0ac8619b2d5ff8dee209e0fc8980e14c7e2f863ee391ff1 CVE-2024-35978,0,0,454b5f38fcf94da8a14587a7c8869850b14e624b1555e8c5359f80cfaf7c7c5c,2024-11-21T09:21:20.740000 CVE-2024-35979,0,0,ff355c28a062e46d39e43896daaf00268a65dffde89d511abdde3cd46755464a,2025-01-14T17:28:20.793000 CVE-2024-3598,0,0,119ef9f5041f661536a93962da8549d2898a293c6c446964f2fd4168e3c1d071,2025-01-08T17:26:13.300000 -CVE-2024-35980,0,1,e7bc4fcf29598fdffe21176c22495897164ba9b36b1c7c3b885c74c0e5e9bf4e,2025-01-16T17:21:40.277000 -CVE-2024-35981,0,1,8543da0a9234503841c41ffac90a5465da162429ed9c24c3c20a62106671346a,2025-01-16T17:22:05.630000 +CVE-2024-35980,0,0,e7bc4fcf29598fdffe21176c22495897164ba9b36b1c7c3b885c74c0e5e9bf4e,2025-01-16T17:21:40.277000 +CVE-2024-35981,0,0,8543da0a9234503841c41ffac90a5465da162429ed9c24c3c20a62106671346a,2025-01-16T17:22:05.630000 CVE-2024-35982,0,0,ffc0591ff45e47ac4517cfe2ad4e5279acd4b701b9862173d0d4a17749d9809c,2024-11-21T09:21:21.300000 -CVE-2024-35983,0,1,e984518d9b7d576d5068f7c7f488ac95189cdb72c5ebc6040b189098fa4845d3,2025-01-16T17:22:28.740000 +CVE-2024-35983,0,0,e984518d9b7d576d5068f7c7f488ac95189cdb72c5ebc6040b189098fa4845d3,2025-01-16T17:22:28.740000 CVE-2024-35984,0,0,bf26a53c916bc290686411572af86b5c948d99c52a4fff4fa3fa9f741b4a8c76,2024-11-21T09:21:21.677000 CVE-2024-35985,0,0,813ee7a10b86bc19ed2c5eb541b2e7b7ab313531e54d6d9f0b050ded02e6c2f9,2025-01-16T16:43:59.487000 CVE-2024-35986,0,0,8ff492a53fdf455409ad92cd45306dbb01a3f4f9f2a9b442438565e4e3d580ee,2024-11-21T09:21:21.980000 @@ -259141,6 +259141,8 @@ CVE-2024-36399,0,0,5d8883d4e31da5ef7c620f45aac4672768456d98184ff090ae8593b5bfc95 CVE-2024-3640,0,0,03d30f90776beeec67f3b1ddca74d31ed1690ede1e0f09c18d136bb1708f6dc7,2024-11-21T09:30:03.560000 CVE-2024-36400,0,0,65a0b2b37341a1219cac5f112aecea97fd94f3de0c9457671290235a7be01af8,2024-11-21T09:22:06.187000 CVE-2024-36401,0,0,31255c330f99246bfe0bc2f818cca78d4cdf5df279630134ddcb3f5120ee0894,2024-11-29T15:32:24.923000 +CVE-2024-36402,1,1,37891ac3d531b82db35872fade88c6394eae48b68a53d6c71ea4404bd563519e,2025-01-16T20:15:32.047000 +CVE-2024-36403,1,1,4b0fe82325f13775fa48110f6c6190e4b434c614c0caeb5f822bb5c44fd035ac,2025-01-16T20:15:32.197000 CVE-2024-36404,0,0,c6169be2a4b80ff24796d6aab24ff44ee78807a200d0b8ed7d88e5f2592cc7ca,2024-11-21T09:22:06.500000 CVE-2024-36405,0,0,f5f795ee430dca5c7d27caf7356fa61c08cbd48e466e77638f6465518e714dba,2024-11-21T09:22:06.647000 CVE-2024-36406,0,0,cb6e68653fe4438582177029263fde35127de543849a1ed6f4134f125234ae90,2024-11-21T09:22:06.770000 @@ -259723,7 +259725,7 @@ CVE-2024-37178,0,0,6c1e6df29c920286f76f5880a509f9fb076af2ebcc1fcf3445d3b19211e3e CVE-2024-37179,0,0,213277cfc254289be643d33de0ef2ecf58ed29ffaf33a33d91f9d9c1e50a5994,2024-11-14T17:35:54.067000 CVE-2024-3718,0,0,dd5d8a591f32d0e48035ea74d0790c0768f4ce77c482ef67eeded39048d38629,2024-11-21T09:30:14.200000 CVE-2024-37180,0,0,39a574cf19521cc8ec0e2382ae82b349ca227f9b779760d1bf33cb7c61ea38c8,2024-11-21T09:23:22.447000 -CVE-2024-37181,1,1,13e87ff1c099cd0f431ceafddc8e600c83ba68dc6655e6a74c056e6bbafbdd05,2025-01-16T18:15:22.307000 +CVE-2024-37181,0,0,13e87ff1c099cd0f431ceafddc8e600c83ba68dc6655e6a74c056e6bbafbdd05,2025-01-16T18:15:22.307000 CVE-2024-37182,0,0,ff57a2e4bed42f9467d325306e200b6316c33088aa65f4131915cabcb04e6b8f,2024-11-21T09:23:22.580000 CVE-2024-37183,0,0,6ce37c0b960969be55a1b8d0b63f2cd3ab0310494d4ffb09591924c2b580b1ad,2024-11-21T09:23:22.750000 CVE-2024-37184,0,0,ba3cd5c4c49204ec2d244126d2771b707991412a7945bb4e09c4a91560a23b50,2025-01-14T16:15:29.803000 @@ -262346,7 +262348,7 @@ CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde5f0,2024-09-24T14:55:38.737000 -CVE-2024-40771,0,1,dac0ccf91eeef1db3f9b139084c8b3826343b0af5bffe0baf015ba27c2d3e811,2025-01-16T17:15:11.850000 +CVE-2024-40771,0,0,dac0ccf91eeef1db3f9b139084c8b3826343b0af5bffe0baf015ba27c2d3e811,2025-01-16T17:15:11.850000 CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000 CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000 CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000 @@ -262415,7 +262417,7 @@ CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e7 CVE-2024-40836,0,0,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 -CVE-2024-40839,0,1,3b6f63d0f34b330c3131081b0536c08531faaa601e2ad7ca5f1a87737d41a09d,2025-01-16T17:15:12.017000 +CVE-2024-40839,0,0,3b6f63d0f34b330c3131081b0536c08531faaa601e2ad7ca5f1a87737d41a09d,2025-01-16T17:15:12.017000 CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000 CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 @@ -262431,7 +262433,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 -CVE-2024-40854,0,1,dc2774b11c70c35cbd43d0844ecc1093d7c886f6c08ca65037d452aa436f73e2,2025-01-16T17:15:12.163000 +CVE-2024-40854,0,0,dc2774b11c70c35cbd43d0844ecc1093d7c886f6c08ca65037d452aa436f73e2,2025-01-16T17:15:12.163000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000 @@ -262864,7 +262866,7 @@ CVE-2024-41443,0,0,112900acf6296a0606f26b9ca6c3fe2526981521a955b48b667fbb724d4df CVE-2024-41444,0,0,40dc2a2ff5c1d7d012984e5f8e458529a422a415ff1fc824c0d056c0835c5ec3,2024-09-05T18:36:39.773000 CVE-2024-41445,0,0,39f65e85a8026950b749bd33850514ea1abf27c7d809b4b0d704f4057a44f5ed,2024-10-01T19:03:27.197000 CVE-2024-4145,0,0,bf30081aa256f27ec5ec45b8e903ae674bd8ea9a8556cad62f5df9c1c025c206,2024-11-21T09:42:16.447000 -CVE-2024-41453,0,1,ca223a754854826e8622a14a8b2af6b1993b3c3d5360c8f104b3a028994b74b2,2025-01-16T18:15:22.540000 +CVE-2024-41453,0,0,ca223a754854826e8622a14a8b2af6b1993b3c3d5360c8f104b3a028994b74b2,2025-01-16T18:15:22.540000 CVE-2024-41454,0,0,a6593741b1c518fd65163e1e0988c57d908a0806e1e98de00b6f0875f6257336,2025-01-15T23:15:09.130000 CVE-2024-41459,0,0,945e7666277f92adefa4a45ea355c655829c2bacc91d62c763534ab8d13fdaf5,2024-11-21T09:32:40.673000 CVE-2024-4146,0,0,0663ca1946310f885e7b84f94c4d0e50a90d3f22de3a0daeb9adf70314f7435a,2024-11-21T09:42:16.633000 @@ -263055,7 +263057,7 @@ CVE-2024-4174,0,0,351c15947bb701aa0f06097d0b29e94daa2eeb6bcf3253c51405ecf8081dca CVE-2024-41741,0,0,87808c3a5a97a8a12b0599786276b0bacbc5a8e2f5d1ce88333c8491b2440d52,2024-11-14T20:42:44.150000 CVE-2024-41744,0,0,a1ec9b6f722dfb7b5eb719083ed54b520e388eadf02f9306b2b2589df4b2c46b,2024-11-01T20:24:53.730000 CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9d69,2024-11-14T20:35:33.390000 -CVE-2024-41746,1,1,11e80c505b3f05f969e1a5d13af29f9f3c401e750e9a2efdf4e6033a05c63130,2025-01-16T18:15:22.863000 +CVE-2024-41746,0,0,11e80c505b3f05f969e1a5d13af29f9f3c401e750e9a2efdf4e6033a05c63130,2025-01-16T18:15:22.863000 CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a15,2024-11-21T09:42:20.143000 CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 @@ -263261,7 +263263,7 @@ CVE-2024-41995,0,0,562670eb3929ae3fa2b7db278d9a2acefed3aa91fc0e520f91603c7dbd292 CVE-2024-41996,0,0,465e19ecbc008435f24fa122a623a4cfdf81339aa061110fb73b503c73f964d8,2024-08-26T16:35:11.247000 CVE-2024-41997,0,0,a5787dad61b3723c40b797f6fd854a03dc4548108cceaf3eb48d20ea21c7c027,2024-10-16T20:35:12.430000 CVE-2024-41999,0,0,b97edfde7ae6eb79fac26588dc330cd7e8dfe8ef88db849221e314600b8cf35e,2024-09-30T17:35:09.340000 -CVE-2024-4200,0,1,057d70f1ff5d501a647d5c35d512364c45c4a9f6cb2fece18ff51a33e66a04fd,2025-01-16T18:07:50.387000 +CVE-2024-4200,0,0,057d70f1ff5d501a647d5c35d512364c45c4a9f6cb2fece18ff51a33e66a04fd,2025-01-16T18:07:50.387000 CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000 CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000 CVE-2024-42004,0,0,e93a1deb59f2930d0e4972e1d1a430142b595eaa321eb4aac784ccf58ce9ec5e,2024-12-19T17:15:09.120000 @@ -263276,7 +263278,7 @@ CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88 CVE-2024-42017,0,0,5509e2b803cf969223b73bdcf88f1502d3b190466153a8d92dad3bae23d94eb3,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,eb9a1a6ae48726fe6d8ca5270a76e202e200b6b8c357ecfcb36c7033e7e13c63,2024-11-06T20:35:23.377000 CVE-2024-42019,0,0,3685530b36a39a63856807b2e771ed1cffbe416901360d0224102921ef6aa582,2024-09-09T17:35:05.247000 -CVE-2024-4202,0,1,cd42359c1b21fc769f879c1384ee1c2c1322dbc238d0ef6567e7dbfbb051908d,2025-01-16T17:16:54.653000 +CVE-2024-4202,0,0,cd42359c1b21fc769f879c1384ee1c2c1322dbc238d0ef6567e7dbfbb051908d,2025-01-16T17:16:54.653000 CVE-2024-42020,0,0,3ae4a555964a5b7715d3199084fdcd6ec4c70c8fdce0e1a022fc653cd1290be8,2024-10-27T15:35:08.650000 CVE-2024-42021,0,0,aaa84c2c4d2b9decece82eef73f3c460cd732ef4ac4d2afae01af49d1fa67dfa,2024-09-09T14:35:04.620000 CVE-2024-42022,0,0,63ce4985403a0d4fa4e12fb04b8d9799eabbbfca0a5698a336366d971f1da1e0,2024-09-09T15:35:09.917000 @@ -264513,7 +264515,7 @@ CVE-2024-43564,0,0,ce2169c0cd5849833d3bc1025d1096322c39a549050d4963e08f44d5a10ec CVE-2024-43565,0,0,5eae782ca04bb81bde4fa6ad9dc0b591312be7ea54333cc8bcc462e09270216a,2024-10-17T18:59:41.177000 CVE-2024-43566,0,0,706f7bb3755d8c31033f9ee3165e2d501c2a0d69a3cac02877b5829b2d944a41,2024-10-18T16:49:47.340000 CVE-2024-43567,0,0,0826caf004afbbe883f59cd7499da6d2dce68be1426e7da70d2a82b2ac695f8c,2024-10-17T18:29:15.913000 -CVE-2024-4357,0,1,d0d2a21bb806d61219901778e7cc09885dd704c2cb404fdd82196f9f0fab2508,2025-01-16T17:06:41.727000 +CVE-2024-4357,0,0,d0d2a21bb806d61219901778e7cc09885dd704c2cb404fdd82196f9f0fab2508,2025-01-16T17:06:41.727000 CVE-2024-43570,0,0,26ecef3e5b0cb6981f75600d9e4ee9e551a0992c8c8ae719cb4114f7aef0b066,2024-10-16T21:53:41.207000 CVE-2024-43571,0,0,fbc457e06743c7f03409ab222959c88835b5f5fd03f6b0ecd901a8e593bcec66,2024-10-16T21:53:47.887000 CVE-2024-43572,0,0,b53b07ee0ed22cb0630559e2fdeca02c92a59252eed4be7581154e05a6a8099d,2024-10-25T18:17:28.223000 @@ -266302,7 +266304,7 @@ CVE-2024-46300,0,0,6a8d7c1dfb1358af3b6a2d888860f4bd0f51cc893ec305be3d651f975d853 CVE-2024-46304,0,0,f2308ace0e3855c77f0ea6a953a03c48300c28ef52897aa953b7959e459b6f35,2024-10-10T14:15:05.100000 CVE-2024-46307,0,0,354fa930eea3d99eb7fe8341a2ba5a2dbb298d263210ab23b2888816fdb23a54,2024-10-15T14:57:38.387000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 -CVE-2024-46310,0,1,b42410b9ea01e501a62118ea85d76df401cc3718d24c2a038ea56abdd99f9e93,2025-01-16T18:15:23.127000 +CVE-2024-46310,0,0,b42410b9ea01e501a62118ea85d76df401cc3718d24c2a038ea56abdd99f9e93,2025-01-16T18:15:23.127000 CVE-2024-46313,0,0,a4475f21065819107b679f002f45aecb4f6fe3381612a107a4943beedb28de95,2024-10-04T13:51:25.567000 CVE-2024-46316,0,0,f153a1de1b2d63eaa55f7a87805baef45f2c081f83905d6b1651684c54b5dc31,2024-10-10T12:51:56.987000 CVE-2024-4632,0,0,88178c627a2a2444e9a5481c086756a7133c95edfb672bbe2e48b806cabf429a,2024-11-21T09:43:15.227000 @@ -267831,7 +267833,7 @@ CVE-2024-48357,0,0,527b3b47a9bd0dd8ea52972a7f5f8d29e64f5ed4fa898b301343b4beb9da3 CVE-2024-48359,0,0,4472fa600139ff2a5cc83feda30936e4a1215195f020cdd7c52b43f6905e8f7b,2024-11-01T21:35:04.220000 CVE-2024-4836,0,0,b46eb66373ee9c7205dc4e47a376290cfcc14a21eeef8a54f2457394680abb16,2024-11-21T09:43:42.437000 CVE-2024-48360,0,0,c6fdaaecfb661522cf812d8a38973f560d2ff304005b9a728baea440c26b0bf3,2024-11-01T21:35:04.963000 -CVE-2024-4837,0,1,bf6369bee9a6dfac96ce0733693f5a63eb4e5fe5734ee8dad577fcabd7825627,2025-01-16T17:05:52.440000 +CVE-2024-4837,0,0,bf6369bee9a6dfac96ce0733693f5a63eb4e5fe5734ee8dad577fcabd7825627,2025-01-16T17:05:52.440000 CVE-2024-4838,0,0,c0d63d16282dd18c836e8aa545fdb45b66bb486d6db7456648ee8a63dd42b02f,2024-11-21T09:43:42.687000 CVE-2024-4839,0,0,a7d79def0ddf9d653428a5a591ff65b460cad2e8b5231f743494cd8efe4a3d5a,2024-11-21T09:43:42.800000 CVE-2024-48396,0,0,02200ea69824b1ea09777c3c3c73e74f2ba131f00cf994b110bfdb34b8d358bb,2024-10-30T20:35:31.167000 @@ -267995,7 +267997,7 @@ CVE-2024-48796,0,0,af934df534ab75235e1b609d30ba8aaacbf70e231eca2b1d83bb7c56f7435 CVE-2024-48797,0,0,2110fc80ce6bc93f3409e41d3f07d7dd5f915b042535d12c80259e5f23c33e53,2024-10-15T15:35:21.060000 CVE-2024-48798,0,0,dadb9566d8b17c10e086a899d0bc5f2eefdadd4b8fe689e19e59e53466693f38,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,08708f80d6f8e09461b37a6e3d378feddc587adfbbfb6b6612c565f84b843309,2024-10-15T15:35:21.350000 -CVE-2024-48806,0,0,cf462794c194cfb8c5dde4193d682250671e969bd2724c97bd5e93104c277eff,2025-01-09T21:15:29.190000 +CVE-2024-48806,0,1,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000 CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e85926e,2024-11-01T12:57:03.417000 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 @@ -268048,7 +268050,7 @@ CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b2 CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000 CVE-2024-48881,0,0,ebc6f1728ddca45a5c4c77e921d1ab1f076b9c09394d13101391d66674a8d76b,2025-01-11T13:15:23.437000 CVE-2024-48883,0,0,40a7c06416987571c8a8b08bd952b0491dd531f3479f503fba90cb6ed5c81613,2025-01-13T20:15:28.770000 -CVE-2024-48884,0,1,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000 +CVE-2024-48884,0,0,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000 CVE-2024-48885,0,0,bd322d0919f1f5bfc17b7462306e27a9d23817b549080ee56f875128913f049f,2025-01-16T09:15:06.737000 CVE-2024-48886,0,0,e66f6047d306aaedc1af3f50921854a8ed3741d3b76c9be2c96afcce2b1dd88b,2025-01-14T14:15:33.027000 CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000 @@ -268530,8 +268532,8 @@ CVE-2024-49526,0,0,6ef6d6f05bd7b59190267d76cac69cbc17f285e201f5210cab72f3c01e3c6 CVE-2024-49527,0,0,2aa6a84e4675e2195018ca2b89e39728b9baba0d87502ca908133e0e2b2a4ff1,2024-11-18T18:39:52.213000 CVE-2024-49528,0,0,0689ce0d066659539549c0d5fe4e5762c988f22c283394e11cdcc7c4af3336e9,2024-11-18T18:34:56.667000 CVE-2024-49529,0,0,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000 -CVE-2024-49530,0,1,9eb7c54cdbb09db79406785b64c7f424068945e0767388b103f993d0e83b6b6e,2025-01-16T18:15:23.447000 -CVE-2024-49531,0,1,72a101a7f0b20954f289b7806bff21b8398116060e99bbcff6ff673242c24b6a,2025-01-16T18:15:23.670000 +CVE-2024-49530,0,0,9eb7c54cdbb09db79406785b64c7f424068945e0767388b103f993d0e83b6b6e,2025-01-16T18:15:23.447000 +CVE-2024-49531,0,0,72a101a7f0b20954f289b7806bff21b8398116060e99bbcff6ff673242c24b6a,2025-01-16T18:15:23.670000 CVE-2024-49532,0,0,cabb7d628c45a7a3751eb851d9a37dcb0dee5d325edeaad66bc4f4b2866949d3,2024-12-11T12:15:20.753000 CVE-2024-49533,0,0,2810856bd75248205690772208ec800f6fe4ce7fc996956e4a6e6446a723d041,2024-12-11T12:48:18.580000 CVE-2024-49534,0,0,91a4013066a325ea34e6a4847385d92f7ca030956a33318227acbcce3d67f1ce,2024-12-11T12:48:19.230000 @@ -269535,7 +269537,7 @@ CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34 CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000 CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000 CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000 -CVE-2024-50633,1,1,bffa469638f740cac5bce5ceb980b8f0c4d11ecde1ec474e9ebfaf88e77990a1,2025-01-16T18:15:24.337000 +CVE-2024-50633,0,0,bffa469638f740cac5bce5ceb980b8f0c4d11ecde1ec474e9ebfaf88e77990a1,2025-01-16T18:15:24.337000 CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000 CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000 @@ -270754,6 +270756,7 @@ CVE-2024-52590,0,0,456a975e409b485eb1fab048e88bd3bd7a2b5e415820906fa6548cac46158 CVE-2024-52591,0,0,1908a28e763e86a52de8ec35ca4c34e076c9f6a13999dc40733ae939de8f116c,2024-12-18T20:15:23.697000 CVE-2024-52592,0,0,9044c893c6c95803c26d0913203762294668b7e7d32de7707c4944e436d81d8f,2024-12-18T20:15:23.840000 CVE-2024-52593,0,0,d77b8c708c744a44fe19015feff5ee578786048e46c35a6eca675f337b52eafa,2024-12-18T20:15:23.983000 +CVE-2024-52594,1,1,6b3ca8cc4a643bce8f282863a596695cbcc2dfd0a2ddca95081ddbb1cb6ad5ca,2025-01-16T19:15:28.480000 CVE-2024-52595,0,0,897ee135760f31a40fde077940d0915d9d6eacc203929b9473ecd250bb6b6ddb,2024-11-25T14:27:38.087000 CVE-2024-52596,0,0,f3a36e6746d90779d638b312d4c826a468906b9bc77aa701634ae63129f1dc58,2024-12-02T17:15:12.353000 CVE-2024-52597,0,0,66d5ffd2bc6b002b25a9fdd759f439714e790757fa7dcdfc2d3f27142c3f3287,2024-11-21T13:57:24.187000 @@ -270761,6 +270764,7 @@ CVE-2024-52598,0,0,47dc45c1ab85a5c823a1a36c4d8f9937ef6c2dfd969360f3e9511e6544eaa CVE-2024-52599,0,0,0db0a011c2a72c6bb6dd64e9b34949435e5305b006875a178839b0fbb4bb2f3f,2024-12-09T19:15:13.863000 CVE-2024-5260,0,0,94e815a87d6c591d24da63e43d3039cd8c9b83efb1be3bb3f841ed63fe37b4b7,2024-11-21T09:47:17.820000 CVE-2024-52600,0,0,a943c0271bba15206eb04ad43ca34044fe44d51a2cff4ca3141bbb7e1938b0c4,2024-11-19T21:56:45.533000 +CVE-2024-52602,1,1,18433771544a110bc4b7b8ab6d75f89d070e58e0ee5b36a2bf756b8807dfb84d,2025-01-16T20:15:32.503000 CVE-2024-5261,0,0,580aa98e51c4d4415b97bb4b6e967076a591fa4b24cde3cedd85bd2f60c23569,2024-11-21T09:47:17.947000 CVE-2024-52613,0,0,ea4f19d3def098c89d96f3bdc7b096fa414b50502db28af233d85fbd71ae6cda,2024-11-20T17:35:28.730000 CVE-2024-52614,0,0,7f2270286c9c1ae4321e62b34a3d4e298b4e533b10f50a6189cade1437a72fbd,2024-11-21T13:57:24.187000 @@ -270817,6 +270821,7 @@ CVE-2024-52787,0,0,b46fccd6281487e8d8c3482a3336a26f545248bd88528968c6c559fc14398 CVE-2024-52788,0,0,0c4984cad79461973d5de4a3e05903c6c7f7a01bd7ed12fc5aeba0db1c060907,2024-11-22T17:15:10.490000 CVE-2024-52789,0,0,68191a5d73d8014f438d5df1ccf489e1805479b35c445ebc54b246cf3a38dd5a,2024-11-22T17:15:10.660000 CVE-2024-5279,0,0,530d0192da77dcbc8feb4408edacbba7e53338a22689bc73d3f61e58249150ff,2024-11-21T09:47:20.467000 +CVE-2024-52791,1,1,a94c4e7115203d92b52df9b9e3b76f65483e107400ace0bcbcc36af89b0c843d,2025-01-16T20:15:32.667000 CVE-2024-52792,0,0,6bf74e6f5214a0e91327eeabb25158e05107d93ae5bf7d1b5ce6e248f27625cb,2024-12-17T22:15:07.083000 CVE-2024-52793,0,0,c259519361bf0f2bada907a2abf587f20a0b7b99896b145765bec60711987750,2024-11-22T16:15:34.103000 CVE-2024-52794,0,0,74da6ef4e158fa373b5567025e41b90b053ffdf18f4589a42837eeb80082f0be,2024-12-19T20:15:07.513000 @@ -271307,7 +271312,7 @@ CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000 CVE-2024-53561,0,0,07197a1147eb76ea94ad9b5b789ca7ccbe3e6fe5f5f95385b99043f921c68c5a,2025-01-14T17:15:17.667000 -CVE-2024-53563,0,1,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf549,2025-01-16T18:15:24.573000 +CVE-2024-53563,0,0,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf549,2025-01-16T18:15:24.573000 CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000 CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000 @@ -271619,9 +271624,9 @@ CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159 CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000 CVE-2024-54031,0,0,7ffae447ca5aefabce8d84ab05bcf6663d65ecc3f38c69751ed968974e15b4e3,2025-01-15T13:15:11.203000 CVE-2024-54032,0,0,44cb0433c08109f277c1dd7cec5998b3891bdf37d9d532da1f33f5a7f93f3073,2025-01-15T17:39:38.073000 -CVE-2024-54034,0,1,af902fe770d25a96f01838d2a06f240d679ee0c2b25584bd9e2a03f959c34219,2025-01-16T18:15:24.910000 +CVE-2024-54034,0,0,af902fe770d25a96f01838d2a06f240d679ee0c2b25584bd9e2a03f959c34219,2025-01-16T18:15:24.910000 CVE-2024-54036,0,0,4ee392ab45a7ebdf90ca04024f547832268a482e455a4e1084a47025aea11ef9,2025-01-15T17:54:40.237000 -CVE-2024-54037,0,1,79d80ca15cdfd939a9cc7d8cafff1169bc435ed28fb4a463eaddc453316195e9,2025-01-16T18:15:25.140000 +CVE-2024-54037,0,0,79d80ca15cdfd939a9cc7d8cafff1169bc435ed28fb4a463eaddc453316195e9,2025-01-16T18:15:25.140000 CVE-2024-54038,0,0,1ebcd557ca23799bbeb2e80a52f537e72287bcdd2730e894b1c918ad8a1c5bb3,2025-01-15T17:39:33.503000 CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000 CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000 @@ -271992,7 +271997,7 @@ CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac257 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 -CVE-2024-54470,0,1,d2a2eb7e77dec59873d13ff3ed78e7bf5c675b16602c0d7c42612756c7059f1e,2025-01-16T17:15:12.433000 +CVE-2024-54470,0,0,d2a2eb7e77dec59873d13ff3ed78e7bf5c675b16602c0d7c42612756c7059f1e,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -272034,7 +272039,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 -CVE-2024-54535,0,0,d2d25f0707ec6464e182c375aa360c23a7e7fe3de2397e55c833d496da5c2b5f,2025-01-15T20:15:28.610000 +CVE-2024-54535,0,1,be256317681c38b876d8afffa28833fae912c494d09f5fe9974200b1678cbe2e,2025-01-16T20:36:12.483000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-54540,0,0,cec5648fa22fe0cc733814d4be0bb9219cc980c202703a2aa5266fee5fe4c719,2025-01-16T15:15:13.697000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 @@ -272276,7 +272281,7 @@ CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85af CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000 -CVE-2024-55553,0,0,13bfa9f6578b0e367e07f1ddced44768912e274a9195e02e1345bddc78f13274,2025-01-09T22:15:29.350000 +CVE-2024-55553,0,1,a620b33e0a94f1efc35bccc16e37953ae1a7d2f801a22a21958872350f70bb50,2025-01-16T19:15:28.627000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000 CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000 @@ -272395,6 +272400,7 @@ CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fab CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 CVE-2024-55952,0,0,40f06e6cb54766cf7357654cb464e4bb21c58158c39af1ac076f236e96ec903d,2024-12-18T19:15:11.933000 CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519feab13,2024-12-18T19:15:12.067000 +CVE-2024-55954,1,1,5d7bab6dc29eb9eedaaaab2deb00ec4a143be4e9272de74e49b5d63d205a4700,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 @@ -272523,12 +272529,13 @@ CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a38 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000 CVE-2024-56113,0,0,9c6eebe0f1bc1bdcb42beb239f6097e41ca0a3c73e7b62b154e7547ecc0e7184,2025-01-10T19:15:37.920000 -CVE-2024-56114,0,0,86a5bda3b0dc5f3190bd9efda3b63869522ae9588f5c311e3902e071f356da1d,2025-01-09T20:15:39.730000 +CVE-2024-56114,0,1,80b97861862ba12f51aa4e46485551b632a0c2a52df86bcb564294ea58a1f8c7,2025-01-16T19:15:28.787000 CVE-2024-56115,0,0,ccfdd8ee6f18e71a09e80e77c239dd784626f96d64ab8285164962abb0ea0b53,2024-12-31T20:16:07.903000 CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a317,2024-12-31T20:16:08.107000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 +CVE-2024-56136,1,1,8e040b984ed4255eca39f7beec891b3cdbc5a151bedc3871f33db6f2544981de,2025-01-16T20:15:33.047000 CVE-2024-56137,0,0,5dfe89d1ae5911eb9a89f977030c79ce761d66499f995b20161d28de051d48cd,2025-01-02T18:15:20.213000 CVE-2024-56138,0,0,c26f02a4eac81dfae75a8836a9e8fa5686cb21c66701aede7c765fbc01a1ae0c,2025-01-13T22:15:14.313000 CVE-2024-56139,0,0,3024c21b786c6ca0bdd0206dcd9c6c0aa19c59d867560c6433c6053807599e34,2024-12-20T21:15:09.787000 @@ -272767,6 +272774,7 @@ CVE-2024-56511,0,0,372c3149918ac629ac10a134aace0fbd7732ea1726a83cd3f44608028ce6d CVE-2024-56512,0,0,9c068b365c4512dce8c612c9c28583046961ffa6d0e903214500eeef2ace3ea0,2024-12-28T17:15:07.967000 CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 +CVE-2024-56515,1,1,93bcabaf10ccab9244aea61e0ffbf0fa18e77b425b036d6943e0a158fb356b16,2025-01-16T20:15:33.197000 CVE-2024-56516,0,0,8ab2e608947364b0ae07f700d0c92e02cbdfe27375d1a973791166b99f9664df,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,7c3d524fcdfdaec8c61e6084a922097b52b4d5b66ec799d189e8cf76cc61f4e2,2024-12-30T17:15:09.840000 CVE-2024-56519,0,0,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 @@ -273135,8 +273143,8 @@ CVE-2024-57223,0,0,7aa014bd144e210943598673adc96f88513f7f5847e8e5029067c6d354536 CVE-2024-57224,0,0,d743b28053138e146f17b7d9d8eba5f98ad07a1fbfe64e9ab1d1f1b2b7162bec,2025-01-13T21:15:13.773000 CVE-2024-57225,0,0,e72498860bbaa18f2a0eb6b55d3b3d2e7524cdea4fc6c5c9b67999bdcbb71019,2025-01-13T21:15:13.910000 CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0ed7b,2025-01-15T21:15:14.303000 -CVE-2024-57227,0,1,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000 -CVE-2024-57228,0,1,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000 +CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000 +CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000 CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 @@ -273236,7 +273244,16 @@ CVE-2024-57662,0,0,82223b4f40f12b96f5423e36ea8f649d2dfea4cbf0a26f28016781049d041 CVE-2024-57663,0,0,10f1486df8c3f5a82c4f86c80f328ec8760cb83f380bd29bfd86da9af10ac259,2025-01-14T01:15:15.187000 CVE-2024-57664,0,0,495a30d278c52ee34887ad9e1f6fefc6fa5a4cb23e9094e753a9604bd1380128,2025-01-14T01:15:15.300000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 +CVE-2024-57676,1,1,392b9407535234ea88060b71d9d56b63ecbdee48b13a00bc0aabb302edabecc6,2025-01-16T19:15:28.937000 +CVE-2024-57677,1,1,587420cee0d4447f0bd6145f7ebf171b7d8cd1b3d9fbb45d385161991d77af29,2025-01-16T19:15:29.033000 +CVE-2024-57678,1,1,6835383b3053a766029806c0076775d5a30ba4cfd3bfa69e898279602894def2,2025-01-16T19:15:29.130000 +CVE-2024-57679,1,1,9fda0f12cca54a44f03e49f1960e9547205ca4e368b17687ec25083624479d0d,2025-01-16T19:15:29.220000 CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000 +CVE-2024-57680,1,1,d1911181bb4c5fb23468070277b0a39d0d1c914721682838a3b1e34b4f5807cb,2025-01-16T19:15:29.323000 +CVE-2024-57681,1,1,7b26771db3efdf99fbb1093568f62df72d15864c052a6f0d783eb2a162ef63db,2025-01-16T19:15:29.413000 +CVE-2024-57682,1,1,0d6e69929d204b6ccfeb2e42bd6f48ebc6bc0d0f37e8bd2127f11fe0410f1239,2025-01-16T19:15:29.513000 +CVE-2024-57683,1,1,440374b397e1e19fb6a9ee16c22d170cc0635c62b6919e2f20281fddc1e61aef,2025-01-16T19:15:29.603000 +CVE-2024-57684,1,1,3a309c340f6a612a35a35d49cb3f60932daa24202c0540dc8d0143cefcbf5a31,2025-01-16T20:15:33.340000 CVE-2024-57686,0,0,9693f74223f7ecaac36b2eca4db89cb00842aaac043c797c5e6ab0d3b74faceb,2025-01-10T15:15:16.003000 CVE-2024-57687,0,0,1fac24f111ce948aa649d677d5475281ca9e9effa31423b615dde7128b0c7319,2025-01-10T16:15:29.670000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 @@ -273259,16 +273276,16 @@ CVE-2024-57764,0,0,3cd9e45ed954c368ca54c9cbce60c96dcde31d52c07d079203117bd00108d CVE-2024-57765,0,0,6f15a3a607d40a0f75d69003588b78a560775ad59d258daea1d42c4f28b5e872,2025-01-15T00:15:34.323000 CVE-2024-57766,0,0,e0e048b4421fccb07d8708542e32dcef1a59cbb8b6e613b7067f5ff9210d3a7b,2025-01-15T00:15:34.433000 CVE-2024-57767,0,0,4f47def2a552fd83c7f1d4d6e4ae3f549133dbbf6dd763e021c9ec2612ee896f,2025-01-15T00:15:34.543000 -CVE-2024-57768,1,1,dfbe7adf9c1441490d4a473b51ff96f30462e0fe2c48818a67e3bff0cdd4d06f,2025-01-16T18:15:26.003000 -CVE-2024-57769,1,1,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000 +CVE-2024-57768,0,0,dfbe7adf9c1441490d4a473b51ff96f30462e0fe2c48818a67e3bff0cdd4d06f,2025-01-16T18:15:26.003000 +CVE-2024-57769,0,0,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 -CVE-2024-57770,1,1,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000 -CVE-2024-57771,1,1,2ed98c34902e22a70e7b63a5e54276d184dbbeae4239fdbb56a8bc0d123677e2,2025-01-16T18:15:26.717000 -CVE-2024-57772,1,1,e6fe6cbb354fa2200298a78f4967828bbfdf37d3f5b00c38e963c3e8388740bf,2025-01-16T18:15:26.940000 -CVE-2024-57773,1,1,601aba151fd19159151205e88e5dd588a10d16eb68de27f849a6227a81932856,2025-01-16T18:15:27.173000 -CVE-2024-57774,1,1,52fce27e3dd31606833944922f51e291b476b3d4e853efcfea2411756ac1f99c,2025-01-16T18:15:27.407000 -CVE-2024-57775,1,1,bced128f47f27969b45b4ad208644666ffdbc83639a349068438129ba6a37530,2025-01-16T18:15:27.633000 -CVE-2024-57776,1,1,c0a67b49a90cc9b9d7a77b20fc281aca2d07f8bee130f1d93a078f1b92e37c86,2025-01-16T18:15:27.870000 +CVE-2024-57770,0,0,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000 +CVE-2024-57771,0,0,2ed98c34902e22a70e7b63a5e54276d184dbbeae4239fdbb56a8bc0d123677e2,2025-01-16T18:15:26.717000 +CVE-2024-57772,0,0,e6fe6cbb354fa2200298a78f4967828bbfdf37d3f5b00c38e963c3e8388740bf,2025-01-16T18:15:26.940000 +CVE-2024-57773,0,0,601aba151fd19159151205e88e5dd588a10d16eb68de27f849a6227a81932856,2025-01-16T18:15:27.173000 +CVE-2024-57774,0,0,52fce27e3dd31606833944922f51e291b476b3d4e853efcfea2411756ac1f99c,2025-01-16T18:15:27.407000 +CVE-2024-57775,0,0,bced128f47f27969b45b4ad208644666ffdbc83639a349068438129ba6a37530,2025-01-16T18:15:27.633000 +CVE-2024-57776,0,0,c0a67b49a90cc9b9d7a77b20fc281aca2d07f8bee130f1d93a078f1b92e37c86,2025-01-16T18:15:27.870000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 CVE-2024-57791,0,0,83661499662923b8e594bd3c5dc0a8d681b527e42b69f986563d1222446c0028,2025-01-11T13:15:29.253000 @@ -273287,7 +273304,7 @@ CVE-2024-57806,0,0,019cc1f303b977f37ee697aea77eacdcb7c64dccefa2a11f2e9b2f2ac1ba3 CVE-2024-57807,0,0,7c167a71bf4213c73b2f4023fdde2c2f3e50104e65076319414a8227aa52f9f3,2025-01-16T15:19:34.147000 CVE-2024-57809,0,0,de2e3d10a38eb17297e0b63db428739f373043b7a0a3a88c9dcbf5bb2a5c6fb9,2025-01-11T14:15:25.080000 CVE-2024-5781,0,0,69395241527fa89308022b467956bfc8d570e92d8c337ad970260c71cef498ec,2024-06-12T08:15:51.363000 -CVE-2024-57811,0,1,60bcb98410f82c01b6c379325d6adadeedd616825b5491b71cece8e8801178f8,2025-01-16T18:15:28.167000 +CVE-2024-57811,0,0,60bcb98410f82c01b6c379325d6adadeedd616825b5491b71cece8e8801178f8,2025-01-16T18:15:28.167000 CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698b0,2024-06-12T08:15:51.423000 CVE-2024-57822,0,0,8458651cb53a99880f0cbbbe484b34e3e7b673f78d525ed0f203f8ee0c783222,2025-01-10T15:15:16.337000 CVE-2024-57823,0,0,ce9e1886072fcefc22a66f2c450b9ee2aa3eb44d9a6ffc06c176c717eb634915,2025-01-10T14:15:29.583000 @@ -277069,7 +277086,7 @@ CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d CVE-2025-0434,0,0,6b09fdee4a1c3fd4134245b9fe1d0b966b891282ee9f6481cd52455196ff3273,2025-01-15T15:15:14.273000 CVE-2025-0435,0,0,12a908c6bc976560385e7102d635ad66ec30f16edcaf6473415ff2f9c1a74a6e,2025-01-15T15:15:14.430000 CVE-2025-0436,0,0,857240181b7b3c09b957ab2dbad6e416781a51bbb4f39b3bb16f673e65f24a93,2025-01-15T15:15:14.620000 -CVE-2025-0437,0,0,1aa75256f3944026d8c9f72ae2520a3068740eb27db83d8528ea831a4aae1559,2025-01-15T11:15:09.800000 +CVE-2025-0437,0,1,8144e791baf083d7704b74c466b5cfc428fa8bd0723d4a5e124341152ac85113,2025-01-16T20:35:01.140000 CVE-2025-0438,0,0,40f0515d9c066b2dd61b04257bab55c62a984bd63173c0c1585818cd7db6e9be,2025-01-15T15:15:14.817000 CVE-2025-0439,0,0,a590b776eae64c78f39e80dda70995610893b1edcbd81c01f8a8d17030aa4390,2025-01-15T15:15:15 CVE-2025-0440,0,0,0a1c8b7a965f24c577d8b893158c2889c18e935558c6f32f5da5cc0794405274,2025-01-15T15:15:15.247000 @@ -277111,12 +277128,12 @@ CVE-2025-0492,0,0,8a17b017a98a002e0eca45e84c80fdbdf21fc23599e7b8c3264d472e991510 CVE-2025-0500,0,0,7c3466d64b8c8ab9f735aa3c3f46ce64626b7310542fe424f3c28d5da1451b7e,2025-01-15T19:15:27.003000 CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c6547,2025-01-15T19:15:27.190000 CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000 -CVE-2025-0518,1,1,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000 +CVE-2025-0518,0,0,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000 CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000 CVE-2025-20055,0,0,4481d7f4c3cc830705c1eb16fa82e8c2d4adf8a0cdb08b44fd27c81f868a9268,2025-01-14T10:15:07.710000 -CVE-2025-20072,1,1,2136f3a7cab22da66e40db95bad66767ecfd0d993ae429c8c373621ce4a9fdaf,2025-01-16T18:15:28.517000 +CVE-2025-20072,0,0,2136f3a7cab22da66e40db95bad66767ecfd0d993ae429c8c373621ce4a9fdaf,2025-01-16T18:15:28.517000 CVE-2025-20086,0,0,f06f00b9d9fcd55024711b0c01af1bc7d43df8107ae65daf906a2c6079a313de,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d947ee56da92b2c33874db16a945d4b37e4644d68fcc15e5fd6ff2d06176517e,2025-01-15T17:15:19.243000 CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000 @@ -277125,6 +277142,8 @@ CVE-2025-20166,0,0,188546bff78f1ed6c60c3dafa709981ac0aa7d116e226da5b14281c3f0f04 CVE-2025-20167,0,0,ea01454738582257d8f0561c538bde2bc3fca79642eac6232d7fa05917ea3b87,2025-01-08T17:15:17.163000 CVE-2025-20168,0,0,f8a58ad4899086a228f10ada9d537b9205b9094ad2b0c298be3af0260ad230d2,2025-01-08T17:15:17.323000 CVE-2025-20620,0,0,1e8e0ac38b52cc7a57624834c34b6768518bcb15ec9ff959866d53e2714e094f,2025-01-14T10:15:07.860000 +CVE-2025-20621,1,1,a65c666f7692d0cfe1f7d2220eac9397bf75609cf1b16a162daee04d247c0f37,2025-01-16T19:15:29.960000 +CVE-2025-20630,1,1,fa7d465d0e72226e8edb725874a5f0534c31bc32c30554e38d1b837bd26cc94b,2025-01-16T19:15:30.110000 CVE-2025-21083,0,0,bde230085acae3b8ee82987a40474bc6f89f698fff6d68c5dc4d6a15adaaf265,2025-01-15T17:15:19.393000 CVE-2025-21088,0,0,4d97650e61074d15eb4f9ac852002ba22f48e9e2102c319672013d500f9743ea,2025-01-15T16:15:32.413000 CVE-2025-21101,0,0,b27767eb018ca9208e6e3b4d35ab2fa7cf1157b29665b05a7014c432bc061e47,2025-01-15T05:15:09.097000 @@ -277138,7 +277157,7 @@ CVE-2025-21130,0,0,1ea189944845a565bc44334e695cd6a6f228b586a4b9f574b6080febad245 CVE-2025-21131,0,0,9435278b39c790aea56faefb5d658cf29261cf2e6c2db44218093643f87fb323,2025-01-14T19:15:33.897000 CVE-2025-21132,0,0,c7ce0cc4debd2a88d5f74d6388701c777476d4600691f382335a26d22d6bf07d,2025-01-14T19:15:34.047000 CVE-2025-21133,0,0,f39e797c9e3761662690c0d0c0e02c0c918947858d1f9156eb425e12cd546319,2025-01-14T19:15:34.187000 -CVE-2025-21134,0,0,6aefe971f73767371144dda5210275e93dd3a0b3cff4fc8e03edec5ca1c20059,2025-01-14T19:15:34.337000 +CVE-2025-21134,0,1,c93daea6012e8c7d66590fc258c4a36aadabfb4ef78a3c9c6e5bab6127e3d755,2025-01-16T20:43:02.810000 CVE-2025-21135,0,0,c9c3ecb3908293d81f3245af42be596eafeb2d021f670b2a2e192c0c24a4a599,2025-01-14T20:15:30.853000 CVE-2025-21136,0,0,79dae5181fa7da195a50b7fadddf90fba53db25c31080837f1c9ba57a6f51e47,2025-01-14T20:15:31.007000 CVE-2025-21137,0,0,687083356b2e544e1043ff9bf940d90d5318f3e7185e9a7d2b0e0f2da0415a78,2025-01-14T20:15:31.157000 @@ -277299,10 +277318,10 @@ CVE-2025-21395,0,0,c09bb8f13b08d523bec5b8bba11e7f126328f99d8fcce108028d23100e489 CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000 CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000 CVE-2025-21405,0,0,0c37dc23a7e806c5063cdbeb8ef2022626f1bce362b1b69e506c9797a5863d8a,2025-01-14T18:16:04.507000 -CVE-2025-21409,0,0,b7eefaf6a67ad6c17f343f50c8945efd428b75a88b59f2910be36e7d279e96c9,2025-01-14T18:16:04.673000 -CVE-2025-21411,0,0,b6abeac4316aebfd3b2dd248228d31af4ec3baaef43f82d3d095b1e1459879cf,2025-01-14T18:16:04.860000 -CVE-2025-21413,0,0,58d8da00c1a86d47264a619ae60510778fffbdd11e713068e6049da467eede46,2025-01-14T18:16:05.103000 -CVE-2025-21417,0,0,8cde729c72655ee9876bd5ef1b8808cd82660b76320ca0f8db649135fda62b6b,2025-01-14T18:16:05.307000 +CVE-2025-21409,0,1,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000 +CVE-2025-21411,0,1,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000 +CVE-2025-21413,0,1,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000 +CVE-2025-21417,0,1,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000 CVE-2025-21592,0,0,c76e12f3b53731aaade2a77d1972500240d5eb74acd4fba716952d05d47905b1,2025-01-09T17:15:18.203000 CVE-2025-21593,0,0,9b3446b9a612891bc98169a3bb8c97e2abea25024522a1368e878da109404cd9,2025-01-09T17:15:18.380000 CVE-2025-21596,0,0,aa7c0fc4f0d758bf67e3e13a54dacfc1fc5b4b975f6328e6068299303dc7e966,2025-01-09T17:15:18.593000 @@ -277623,7 +277642,7 @@ CVE-2025-22983,0,0,818f0a40d17098ac93c0b9b96dbd9489c7b8bd9e521ddba6a0116d1bc14ba CVE-2025-22984,0,0,1a545998f559ee7e76b6e0da26fd2ee7d20b16b478982f1cd328aa26a28e86f8,2025-01-14T16:15:35.710000 CVE-2025-22996,0,0,8353f71e1021a99be2843ee26c19df5f4da352df92661e6ab1f14b6f88fb0dd3,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,784fa7ead53bc349c92561866d97c2fb20b9fab0d953b0c5445a13195ff35fef,2025-01-15T17:15:22.193000 -CVE-2025-23013,0,0,a29081d4edb0c576a2d77b4ea2bc4f7ff7b11edc6be78b0629afe5a34242f91b,2025-01-16T13:15:07.723000 +CVE-2025-23013,0,1,038b48d339089a616d688e34d498ff1e242bf3fa69cd250c01d39f81b55728c9,2025-01-16T19:15:30.263000 CVE-2025-23016,0,0,31a93833611c1f04fca5216d55a04a7c92375e0aedfa95a405475196dac4f70b,2025-01-10T12:15:25.480000 CVE-2025-23018,0,0,04057ebd16387f0035876264d984029a54f25d41dceb84c91b788d3f78ef776b,2025-01-14T20:15:32.440000 CVE-2025-23019,0,0,2441b4edcc7db27f67ae614720ac0c1927e9c7e1651443ff935f830ebd7e09ee,2025-01-14T20:15:32.577000 @@ -277666,3 +277685,93 @@ CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 CVE-2025-23366,0,0,9c322475015bf02d1585352d78c1a1b463f803a5f9fa5af211a6e73349c16f8f,2025-01-14T18:16:06.290000 +CVE-2025-23423,1,1,b6f59e601cdbaad011f370832d8ff10b7231d5875d4fb9da3b536bb65b8259e8,2025-01-16T20:15:33.573000 +CVE-2025-23424,1,1,af50c9c9dec5ab1ce79e37d50537a1d0fe21f0f1e703c32c29cd7fa3dc996735,2025-01-16T20:15:33.723000 +CVE-2025-23426,1,1,da1018a73261aac5a2b4f238cd6f302a4e1e133abbe0c8f6a7182ec916efe32a,2025-01-16T20:15:33.877000 +CVE-2025-23429,1,1,92abcae65a651d5b622dd653fa65692c399402aa26ffd969c6c831aa8379215e,2025-01-16T20:15:34.057000 +CVE-2025-23430,1,1,60b19b589ccf280e1c904471033eb09508c559c9147250502dd56eae329b1242,2025-01-16T20:15:34.287000 +CVE-2025-23432,1,1,ec5cba36ef2b26e7f9355a80c0a1dcf65bb2f3fabb7fa8de2d29bb0796c937b7,2025-01-16T20:15:34.467000 +CVE-2025-23434,1,1,1a8864c8e97fe8c485e6c051ea9cc1c944fd2b00e688e67a0e56ff10a0894de8,2025-01-16T20:15:34.607000 +CVE-2025-23435,1,1,34b7e40de48187a89a1e11a99f8672ce681670b032cc85574b82a28fd8112fb4,2025-01-16T20:15:34.770000 +CVE-2025-23436,1,1,d127d00d66151db96cec56277058c487b132add0f7bc3439ec2bf6c9b89ac48d,2025-01-16T20:15:34.920000 +CVE-2025-23438,1,1,c60100b5f6556da84df13e9b110209c8689cedc095671bd11e34a427897219a5,2025-01-16T20:15:35.067000 +CVE-2025-23442,1,1,0adc3b717cf8bd8b25bd54b650e3388b823da8e6fd0baa5a3ec7ee07e26edbeb,2025-01-16T20:15:35.210000 +CVE-2025-23444,1,1,6924dc355446d465d8b58c0f2996858e47fe4455f32f5c96b3862ff0606fa7fc,2025-01-16T20:15:35.360000 +CVE-2025-23445,1,1,5a0d071330f88160e7eed1b47552865828b72156d3ebfed5c967d86d7f4c1ec4,2025-01-16T20:15:35.513000 +CVE-2025-23452,1,1,701717c5247ac87d56fba966afcfc8745becc1043656cd56bc8d611a1ef8b6d8,2025-01-16T20:15:35.730000 +CVE-2025-23453,1,1,b44ca31010abbf14d0270dccc9206be73eb6c895d8ac4d1fd2bf022c4192b439,2025-01-16T20:15:35.883000 +CVE-2025-23455,1,1,fde001dd00d3abc3e1521471530c9bd7f91a52f62656721cbe42f9a8f0a83070,2025-01-16T20:15:36.033000 +CVE-2025-23456,1,1,06ce93af52627c73c1bdecdd3d24a95c333bc9dfab69a18c51cd134edbb7763d,2025-01-16T20:15:36.247000 +CVE-2025-23463,1,1,3ee91e4b1e74bea90989a01143b675b49bd1548c0849979bcbf92c07a5d4278e,2025-01-16T20:15:36.397000 +CVE-2025-23467,1,1,8924c5a493c09538d6a6c976762b66eb780ce06fb8cc86b58ab323230acb1946,2025-01-16T20:15:36.547000 +CVE-2025-23470,1,1,2037ffb67f4816e6678b1001047b842571a8b65f5276915c64da3695bde71775,2025-01-16T20:15:36.700000 +CVE-2025-23471,1,1,9fce40228629c107f47b736cf0020477687c00b89e969a479477ccc14a218a94,2025-01-16T20:15:36.840000 +CVE-2025-23476,1,1,9696718a971751e7721a14ae1341800da97f8c36f9d9bbd4960e3aea9c1915f9,2025-01-16T20:15:36.990000 +CVE-2025-23483,1,1,84318389a82aeab4b161887b6fc62d027bde782c4b4be1e8cb4b1acf339000e4,2025-01-16T20:15:37.133000 +CVE-2025-23497,1,1,6a9c2da9900458d5cb1a061c746e16b19c6a26af0807b7748e8031c6525ac8c5,2025-01-16T20:15:37.293000 +CVE-2025-23499,1,1,fc2a31d72ee03832a972ba4a2d022d25f15b93b9469635891a3e608c297e2e1d,2025-01-16T20:15:37.440000 +CVE-2025-23501,1,1,40b851b519926f0dbd64f4ad13f99ee302d31e1ea1cd96d293bee9ecc7736e71,2025-01-16T20:15:37.593000 +CVE-2025-23508,1,1,3c566806322c6c5b821bb9d1d255973fe72db58af4c3254a32cf53777681c906,2025-01-16T20:15:37.737000 +CVE-2025-23510,1,1,bbceb2ad8a45ce45a08a391d9fdbb08063cb574d6cbc35f482d62f2062111489,2025-01-16T20:15:37.890000 +CVE-2025-23511,1,1,aab2b46f6752056471f8e11040251d32337faf2d847b46d9d44f7cae8a5790c0,2025-01-16T20:15:38.040000 +CVE-2025-23513,1,1,929832e5a9a94c89aad2e5dae6e951cf5adbc51f6c8dd8c2baee4a28075868fc,2025-01-16T20:15:38.193000 +CVE-2025-23514,1,1,bf5fb8cc1f21add62996c76e5d04d893c728272a01ec9aa5712bf75ab859c083,2025-01-16T20:15:38.337000 +CVE-2025-23528,1,1,4395d802338bd6dd9e5997e780cbf02e4b9272f71ef8651bd19df4261e208517,2025-01-16T20:15:38.480000 +CVE-2025-23530,1,1,e8e30857156d259540051b6ec9293bdfd3b3647bcd265a6753139efd0e9479ed,2025-01-16T20:15:38.630000 +CVE-2025-23532,1,1,01b2cfce49915566f445981cb1ae069ed0bba7b48c0d7759a7af3142952ee996,2025-01-16T20:15:38.783000 +CVE-2025-23533,1,1,06e30167196cd7345a7856e38d61b04a188db8c39e5685c606a9a21d9294c341,2025-01-16T20:15:38.930000 +CVE-2025-23537,1,1,c8004735b24a456c2206f4e611f2c883dab7c6d1b56ff2355c03ee20b3f89337,2025-01-16T20:15:39.070000 +CVE-2025-23547,1,1,358ab86fee53bfb11e5bcc7dd20ec566c17a449195af04426627e64458841376,2025-01-16T20:15:39.220000 +CVE-2025-23557,1,1,122e8cb6782981745bbbeba4bcad42cdbc7e15583b84bff7ec68bc36c7c83fb8,2025-01-16T20:15:39.363000 +CVE-2025-23558,1,1,2e566318ce388c2945fb5a8422679125ac62b679e31b1fbd8300a048bea6af3a,2025-01-16T20:15:39.503000 +CVE-2025-23559,1,1,547fb637b77394e45badefd1dee6c34753c4485f26d776a8c467a65fab4eed47,2025-01-16T20:15:39.650000 +CVE-2025-23560,1,1,84a6e2fff43c2d7850eeee143d2ec6bfc15fc7c159e31c4ee64d24c03104fa1a,2025-01-16T20:15:39.797000 +CVE-2025-23566,1,1,3f5dde794781116025c0061f6147cc96adf7d279d68261737ec287c647c4bd25,2025-01-16T20:15:39.947000 +CVE-2025-23567,1,1,dc46f6550d087389fd45a335f6cc3abcb5ea1ac74dbd1cf932a5cf76c114e016,2025-01-16T20:15:40.090000 +CVE-2025-23569,1,1,aba2fe45b4813ca8c28746dc03dc8699f12f25719c98a702713038e19fc6355b,2025-01-16T20:15:40.230000 +CVE-2025-23572,1,1,03938c80a2a3d819c133e7431cb9eed5f235c8309eef405313f8648bf9a1eb5e,2025-01-16T20:15:40.403000 +CVE-2025-23573,1,1,f72dafe6716b1b1fd5ceb3df99788ab4eb4d075a2316dbd71a752a3f58b20af7,2025-01-16T20:15:40.740000 +CVE-2025-23577,1,1,c28b131193e91d90b213ba0ee51ca18a69b0c0df3248f5700bcdde8602ca652d,2025-01-16T20:15:40.877000 +CVE-2025-23617,1,1,b8f15f79999711a57bb1f9cf64e4d87a3fbf5004b175627f4843098a490c5c81,2025-01-16T20:15:41.027000 +CVE-2025-23618,1,1,146ab39e789b3aa2eaf91cf134b1bfe73fa5c6f077da70b378c4defb9d52b6eb,2025-01-16T20:15:41.193000 +CVE-2025-23620,1,1,73ed9ca1e8327d7b15caab2d47dd65816bb39a7c575b32bba346902029cc695a,2025-01-16T20:15:41.340000 +CVE-2025-23623,1,1,1d36d5b5d68a239f28052076e4c7ec82086b8cd2838b3940609e8d58d0b9f039,2025-01-16T20:15:41.480000 +CVE-2025-23627,1,1,860733670829159e71fec4d700cdfbca7d0adb97da0342bf8166ea6b564a82e2,2025-01-16T20:15:41.617000 +CVE-2025-23639,1,1,497e892821f931f513f5f765bb16d30ca6e309c18da0c90d683002b05b37d54b,2025-01-16T20:15:41.763000 +CVE-2025-23640,1,1,7251a70336f746b22ef311fc3e0437ad2e901fb6eb25a140216bf9c2bb95d429,2025-01-16T20:15:41.900000 +CVE-2025-23641,1,1,6802618b9c88a681edead299110cb8b03b7f0930f419d8818a7098b91f831b9a,2025-01-16T20:15:42.037000 +CVE-2025-23642,1,1,efa2800eab11e4cb1de7885422b3de458a6ab7fdcf665110c4528824df44e5ef,2025-01-16T20:15:42.190000 +CVE-2025-23644,1,1,76245b76b2f6175618b119a6338054ba5126bc043f2b36bcdb8689fe140aea5e,2025-01-16T20:15:42.323000 +CVE-2025-23649,1,1,b082c2a051de0a684fca8a1cfd2e89f28b43fad2fcad9cf6ba2a921b6f21912c,2025-01-16T20:15:42.463000 +CVE-2025-23654,1,1,b412852599475c08e76e80fe1ecbd101f79a59480c6f163128d7ba2234d5aff9,2025-01-16T20:15:42.607000 +CVE-2025-23659,1,1,f7e11ae9031bc8a146f5ad3171564491d39fb1fe9b6ac88a296124b65bc77320,2025-01-16T20:15:42.750000 +CVE-2025-23660,1,1,d83e551f2c776a6a2ecb95b8f618168431e07c917e6e21e4bb225ef5d173454f,2025-01-16T20:15:42.893000 +CVE-2025-23661,1,1,5d1bc3ff7d601bab4e659a733b20605fb2af3b53e32f13a0b589b55b0e572858,2025-01-16T20:15:43.037000 +CVE-2025-23662,1,1,37143449dd56328dd9044eeec7140fb5741a5e83ccdd728b52d1066cdcb0f346,2025-01-16T20:15:43.167000 +CVE-2025-23664,1,1,a54fb798f5bfd80c609525e24bde3106b1becc39c2eb0a0d5df8f9d3e68a9a4f,2025-01-16T20:15:43.320000 +CVE-2025-23665,1,1,1be67c53e089c6bd76265171bb99adf71767dc0cfffe4995b0e502f20e1403a4,2025-01-16T20:15:43.460000 +CVE-2025-23673,1,1,6333e4b38ef648e71a6bcb2935d76a0c522352fbdeeb65706d14ad3de29092cb,2025-01-16T20:15:43.620000 +CVE-2025-23675,1,1,3d1ec1e8cea2dbfebb767462f782f619a7a2516abdd4f0c4932b1551250a6a4f,2025-01-16T20:15:43.753000 +CVE-2025-23677,1,1,cd611e88b28a793533662a1072d8f746bc8c6f2c98f60859625afc8bb1b8b58a,2025-01-16T20:15:43.900000 +CVE-2025-23689,1,1,90b3656cf02e584db275c4f4a442dc7f4ad4fa32914032fd319e570ef771aff4,2025-01-16T20:15:44.040000 +CVE-2025-23690,1,1,5b0c2a203e6280cfa2d12357c3f1653b9bab9e021b8cb1e274b3db6ac334e912,2025-01-16T20:15:44.197000 +CVE-2025-23691,1,1,af455fc4293a5123b7be8bb1120b8ff6f749f0509037c08fc97880f32cfe4aef,2025-01-16T20:15:44.353000 +CVE-2025-23692,1,1,f981c3b5d1d979c04c8e89cb26c1175103d8767011670e950a5611fa4b878e6d,2025-01-16T20:15:44.503000 +CVE-2025-23693,1,1,da96fb751d63026af0608dc419f713c1bf960ece346d581b9916737107460c62,2025-01-16T20:15:44.637000 +CVE-2025-23694,1,1,edebc3f671e98f59a648409e827efb365fc7fc08bfc6ab1277245eec985fe130,2025-01-16T20:15:44.780000 +CVE-2025-23698,1,1,e38b2db5dd2be0579bc1f50032024621ecd8f0f6c2e46bd0b0ce47a8f586aa7c,2025-01-16T20:15:44.910000 +CVE-2025-23699,1,1,5db36419e9beba7908b810fe2d625e8f2b6b163cd41dd00c55f5374ee9d02748,2025-01-16T20:15:45.060000 +CVE-2025-23702,1,1,ea4eafa6aba881dc0871b579de731e4414f66f44db6ee5710b06eb2b700eb4d0,2025-01-16T20:15:45.213000 +CVE-2025-23703,1,1,c6fe3c7bd6a64142936928233f79fd2c642912924583f677b289790981082b2f,2025-01-16T20:15:45.350000 +CVE-2025-23708,1,1,2ede054cb4f94456ef6d295dfeb91ef72c3e735f77c6931bd1f19b56e7b204e3,2025-01-16T20:15:45.493000 +CVE-2025-23710,1,1,77c29f99e8113aa1cd463419ef41d6366a3196a40af8d97949ffdc3f1d3e2c69,2025-01-16T20:15:45.643000 +CVE-2025-23712,1,1,f4b75932ef05a8c6377584a34aa5370274433077a7f0426155155247d4f2571e,2025-01-16T20:15:45.800000 +CVE-2025-23713,1,1,6a8d43d30df45151e50a3e21cc5c41cd05290edbde0dcf9499b4f66adc1cc093,2025-01-16T20:15:45.940000 +CVE-2025-23715,1,1,157864ffa5b9b917829fe0585449d5c195123d0afecd0966072b39a84754c6d5,2025-01-16T20:15:46.083000 +CVE-2025-23717,1,1,07da5a25929356c6d2e8004efdfcd695993fbb014f380e0decbf9275c462914b,2025-01-16T20:15:46.247000 +CVE-2025-23720,1,1,10989cd13bbe74f8cf71efa50e93952eba1b6797839bf614519725f4d4e52b78,2025-01-16T20:15:46.397000 +CVE-2025-23743,1,1,70a0d9da026bb696b137f6a0387a3c2369ac0de4e94463c8a5f2321034b23668,2025-01-16T20:15:46.550000 +CVE-2025-23745,1,1,0697eede581a05c0c95206408d3800bae7c1b58cf62eae2776083a82ed3c25d3,2025-01-16T20:15:46.687000 +CVE-2025-23749,1,1,5c9c7277ca1f479bf37fa787c4b36bbddd0994b1e3f41306b37c2a21f383a26a,2025-01-16T20:15:46.830000 +CVE-2025-23767,1,1,34b0223f37db1d9edb9475c4182bed37d6082eec913b35ecf776d2398ea943ea,2025-01-16T20:15:46.967000 +CVE-2025-23783,1,1,669f118ecfaf3185f1aff828dc928071d3e565935e8b38f6a23270d577a7302a,2025-01-16T20:15:47.100000