diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json index 04a0eaad613..4a538f256ed 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45876", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-26T22:15:08.737", - "lastModified": "2024-11-21T07:29:53.063", + "lastModified": "2025-01-17T18:15:18.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0432.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0432.json index 8b8bb5ca785..d6dedd1b560 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0432.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0432.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0432", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-31T16:15:07.390", - "lastModified": "2024-11-21T07:37:10.143", + "lastModified": "2025-01-17T18:15:19.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22300.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22300.json index baa92359ae1..d02e7de76e3 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22300.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22300.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22300", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-27T20:15:09.343", - "lastModified": "2024-11-21T07:44:29.050", + "lastModified": "2025-01-17T18:15:19.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json index 28499dc9346..c45c5aa9a19 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25911", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.923", - "lastModified": "2024-11-21T07:50:24.840", - "vulnStatus": "Modified", + "lastModified": "2025-01-17T17:55:14.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -38,19 +38,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] @@ -110,19 +110,31 @@ "references": [ { "url": "https://csirt.divd.nl/CVE-2023-25911/", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://csirt.divd.nl/DIVD-2023-00021/", - "source": "csirt@divd.nl" + "source": "csirt@divd.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://divd.nl/cves/CVE-2023-25911", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json index 66deeaf3e01..5fa11a81842 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25914", "sourceIdentifier": "csirt@divd.nl", "published": "2023-08-21T21:15:08.970", - "lastModified": "2024-11-21T07:50:25.230", - "vulnStatus": "Modified", + "lastModified": "2025-01-17T17:54:40.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json index f1217e50276..c84da4c0790 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25915", "sourceIdentifier": "csirt@divd.nl", "published": "2023-08-21T21:15:09.170", - "lastModified": "2024-11-21T07:50:25.357", - "vulnStatus": "Modified", + "lastModified": "2025-01-17T17:54:52.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json index 133df2a81ad..a1d1d5058d6 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27304", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.397", - "lastModified": "2024-11-21T07:52:36.693", + "lastModified": "2025-01-17T18:15:20.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json index 89ab915a84f..f8542bd6a79 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27384", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.437", - "lastModified": "2024-11-21T07:52:47.937", + "lastModified": "2025-01-17T18:15:20.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27927.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27927.json index b2932227665..84b303cacb5 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27927.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27927.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27927", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-27T20:15:09.577", - "lastModified": "2024-11-21T07:53:42.827", + "lastModified": "2025-01-17T18:15:21.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28384.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28384.json index d472c24b1cd..d00c7402a9b 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28384.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28384.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28384", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-27T23:15:14.867", - "lastModified": "2024-11-21T07:54:57.990", + "lastModified": "2025-01-17T17:15:07.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28400.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28400.json index c5a68b06f5d..1205a433b0c 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28400.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28400", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-27T23:15:14.917", - "lastModified": "2024-11-21T07:54:59.713", + "lastModified": "2025-01-17T17:15:08.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28650.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28650.json index 540dc62d317..768601974dd 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28650.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28650", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-27T20:15:09.633", - "lastModified": "2024-11-21T07:55:44.473", + "lastModified": "2025-01-17T18:15:21.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28652.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28652.json index a13f6d8dc5b..81a3115ee85 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28652.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28652.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28652", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-27T20:15:09.693", - "lastModified": "2024-11-21T07:55:44.680", + "lastModified": "2025-01-17T18:15:21.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28655.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28655.json index 6e4745d5558..e7828ef0793 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28655.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28655.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28655", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-27T20:15:09.757", - "lastModified": "2024-11-21T07:55:45.003", + "lastModified": "2025-01-17T18:15:21.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28716.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28716.json index 97727d25a33..59f0d4401c6 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28716.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28716.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28716", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-27T23:15:14.963", - "lastModified": "2024-11-21T07:55:51.953", + "lastModified": "2025-01-17T17:15:08.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29150.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29150.json index ed949d7a958..7dc7c73e315 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29150.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29150.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29150", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-27T23:15:15.007", - "lastModified": "2024-11-21T07:56:37.140", + "lastModified": "2025-01-17T18:15:22.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29169.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29169.json index 5c8ce80dd9d..79fa3a8bae3 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29169.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29169.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29169", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-27T23:15:15.050", - "lastModified": "2024-11-21T07:56:39.137", + "lastModified": "2025-01-17T18:15:22.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json index fd93122bf11..e86eef42ce1 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31763", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T00:15:09.583", - "lastModified": "2024-11-21T08:02:15.463", + "lastModified": "2025-01-17T18:15:22.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-294" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json index f5eef2bd3c1..c95ce52c836 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31814", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.087", - "lastModified": "2024-11-21T08:02:17.297", + "lastModified": "2025-01-17T18:15:23.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json index e9a4cd1726b..494b24d4adb 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31826", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.127", - "lastModified": "2024-11-21T08:02:18.720", + "lastModified": "2025-01-17T18:15:24.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31860.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31860.json index 483733f684b..b6520b39f82 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31860.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31860.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31860", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T20:15:10.040", - "lastModified": "2024-11-21T08:02:20.550", + "lastModified": "2025-01-17T17:15:08.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ @@ -80,6 +110,14 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "https://github.com/wuzhicms/b2b/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json index 7c25b0f1791..16149ba86cc 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31994", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.170", - "lastModified": "2024-11-21T08:02:28.753", + "lastModified": "2025-01-17T17:15:09.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json index cc071ed5483..c6b5a3a819d 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31995", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.207", - "lastModified": "2024-11-21T08:02:29.403", + "lastModified": "2025-01-17T17:15:09.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json index 1899edee3c8..d254fd7bf47 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31996", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.247", - "lastModified": "2024-11-21T08:02:29.653", + "lastModified": "2025-01-17T17:15:10.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json index a1b64837eee..37952c0185f 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45590", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-04-09T15:15:27.627", - "lastModified": "2024-11-21T08:27:01.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:08:31.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "7.0.6", + "versionEndExcluding": "7.0.11", + "matchCriteriaId": "0A39CBD1-AAF7-4423-AA29-840CF0DBFD6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*", + "matchCriteriaId": "14320E4A-2445-4930-A8D1-B768B7294B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*", + "matchCriteriaId": "56EE5E2F-CB22-4294-9AA9-DDB344494D9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*", + "matchCriteriaId": "88271718-0DD4-4717-B403-1B44E2E56C91" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-087", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.com/psirt/FG-IR-23-087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json index ac0843f0c67..a216f10ea9a 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47542", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-04-09T15:15:28.207", - "lastModified": "2024-11-21T08:30:25.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:11:28.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,65 @@ "value": "CWE-1336" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.11", + "matchCriteriaId": "5B1EF673-5967-401E-98E3-B7A2B1BEF037" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "4763E504-6974-42C5-B912-3E62A9CC312A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.2", + "matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-419", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.com/psirt/FG-IR-23-419", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json index d151a2ba4a0..37c8d09509b 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48784", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-04-09T15:15:28.617", - "lastModified": "2024-11-21T08:32:26.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:19:51.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.0.16", + "matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.2", + "matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-413", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.com/psirt/FG-IR-23-413", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json index 28e0200dafc..203951a3e95 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52547.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52547", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:08.930", - "lastModified": "2024-11-21T08:40:01.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:32:12.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-130" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*", + "matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json index 428c44e07b8..8473dc4310e 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52548", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:09.753", - "lastModified": "2024-11-21T08:40:01.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:31:57.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,75 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json index c43ffd9f08d..ee59e7fae32 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52710.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52710", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.100", - "lastModified": "2024-11-21T08:40:24.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:32:39.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*", + "matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json index 161e40410a6..2de23f58c20 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52711.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52711", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.490", - "lastModified": "2024-11-21T08:40:24.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:29:39.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:curiem-wfg9b_bios_2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "8EEA4852-6B9E-4FC0-A789-763EC2FCE6D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json index 1c81e8faec1..d4a62e3abf1 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52712.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52712", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-28T07:15:10.810", - "lastModified": "2024-11-21T08:40:24.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:29:32.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0837.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0837.json index 67dc7a520df..aad754d400a 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0837.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0837.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0837", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-06T08:15:07.570", - "lastModified": "2024-11-21T08:47:28.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:47:27.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.3.3", + "matchCriteriaId": "4227C0A1-E9E8-4E69-8347-C5E20CB8F44A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json index b7baa577962..b9944841fa9 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12022.json @@ -2,63 +2,15 @@ "id": "CVE-2024-12022", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:07.677", - "lastModified": "2025-01-07T04:15:07.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:15:10.533", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The WP Menu Image plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wmi_delete_img_menu' function in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to delete images from menus." - }, - { - "lang": "es", - "value": "El complemento WP Menu Image para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wmi_delete_img_menu' en todas las versiones hasta la 2.2 incluida. Esto hace posible que atacantes no autenticados eliminen im\u00e1genes de los men\u00fas." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-52485. Reason: This candidate is a reservation duplicate of CVE-2024-52485. Notes: All CVE users should reference CVE-2024-52485 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 - } - ] - }, - "weaknesses": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-862" - } - ] - } - ], - "references": [ - { - "url": "https://plugins.trac.wordpress.org/browser/wp-menu-image/trunk/init/wmi-functions.php#L126", - "source": "security@wordfence.com" - }, - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96193c0-ddde-463b-a68e-672ab6f812c7?source=cve", - "source": "security@wordfence.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json index e019df85ce9..c3d95680477 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12124.json @@ -2,63 +2,15 @@ "id": "CVE-2024-12124", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:14.340", - "lastModified": "2025-01-07T05:15:14.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:15:10.653", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Role Includer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018user_id\u2019 parameter in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." - }, - { - "lang": "es", - "value": "El complemento Role Includer para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'user_id' en todas las versiones hasta la 1.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54290. Reason: This candidate is a reservation duplicate of CVE-2024-54290. Notes: All CVE users should reference CVE-2024-54290 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], - "references": [ - { - "url": "https://wordpress.org/plugins/role-includer/#developers", - "source": "security@wordfence.com" - }, - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97b3399b-cda2-4ab1-8919-b1e4ba4a5dcf?source=cve", - "source": "security@wordfence.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json index d863c21755f..90185fd4822 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12208.json @@ -2,63 +2,15 @@ "id": "CVE-2024-12208", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T05:15:16.270", - "lastModified": "2025-01-07T05:15:16.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:15:10.740", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Backup and Restore WordPress \u2013 Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.50. This is due to missing or incorrect nonce validation on the ajax_queue_manual_backup() function. This makes it possible for unauthenticated attackers to trigger backups via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." - }, - { - "lang": "es", - "value": "El complemento Backup and Restore WordPress \u2013 Backup Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.50 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n ajax_queue_manual_backup(). Esto hace posible que atacantes no autenticados activen copias de seguridad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-43269. Reason: This candidate is a reservation duplicate of CVE-2024-43269. Notes: All CVE users should reference CVE-2024-43269 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 1.4 - } - ] - }, - "weaknesses": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-352" - } - ] - } - ], - "references": [ - { - "url": "https://wordpress.org/plugins/wp-backitup/", - "source": "security@wordfence.com" - }, - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e461a04b-6456-4930-b3e7-0f808825aa6b?source=cve", - "source": "security@wordfence.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json index 55fc04408f7..6cde344933b 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12540.json @@ -2,67 +2,15 @@ "id": "CVE-2024-12540", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T04:15:08.917", - "lastModified": "2025-01-07T04:15:08.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:15:10.807", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The LDD Directory Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." - }, - { - "lang": "es", - "value": "El complemento LDD Directory Lite para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 3.3 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54288. Reason: This candidate is a reservation duplicate of CVE-2024-54288. Notes: All CVE users should reference CVE-2024-54288 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], - "references": [ - { - "url": "https://plugins.trac.wordpress.org/browser/ldd-directory-lite/trunk/templates/frontend/edit-submit.php#L10", - "source": "security@wordfence.com" - }, - { - "url": "https://wordpress.org/plugins/ldd-directory-lite/#developers", - "source": "security@wordfence.com" - }, - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7675e1c-7194-4cfe-81fb-a78d75e0bb1e?source=cve", - "source": "security@wordfence.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json new file mode 100644 index 00000000000..607458d52d2 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-12757", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T18:15:24.690", + "lastModified": "2025-01-17T18:15:24.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nedap Librix Ecoreader \n is missing authentication for critical functions that could allow an \nunauthenticated attacker to potentially execute malicious code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1239.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1239.json index 767a3d22eab..2ca47181eac 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1239.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1239", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-16T03:15:06.900", - "lastModified": "2024-11-21T08:50:08.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:34:30.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "C55F4AA4-9021-48D1-81C5-8D5CD6E11DCD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json index a472f307282..25ff7ec1f34 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1315", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:16.340", - "lastModified": "2024-11-21T08:50:18.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:30:38.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json index ede70e52c4b..2d2ddac3af1 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1352", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:16.517", - "lastModified": "2024-11-21T08:50:23.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:23:55.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1428.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1428.json index 36c65b8de06..c5fcb9a82d7 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1428.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1428", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-06T08:15:07.767", - "lastModified": "2024-11-21T08:50:33.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:48:58.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.5.4", + "matchCriteriaId": "CEA2F449-CCE8-405D-BA65-FB96CEB9AC61" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json index a81b6aa10cf..aa34512c089 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1458", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.203", - "lastModified": "2024-11-21T08:50:37.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:25:27.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json index 4054d511b31..752527daa08 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1461", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.377", - "lastModified": "2024-11-21T08:50:38.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:24:39.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json index 6c67592a7f0..e3f74e8a38f 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1464", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.703", - "lastModified": "2024-11-21T08:50:38.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:23:39.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json index e6bbd5ecc3f..77ce04bbb34 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1465", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.890", - "lastModified": "2024-11-21T08:50:38.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:20:39.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json index 2bfdb75664a..fe4c94416d6 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1466", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:18.073", - "lastModified": "2024-11-21T08:50:38.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:18:00.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2091.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2091.json index 8bfbe3e115d..bc748d270ae 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2091.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2091", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-28T03:15:07.887", - "lastModified": "2024-11-21T09:09:01.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:35:09.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.3", + "matchCriteriaId": "550B7CCC-BC3D-4B33-9643-E16C71BABE67" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json index 0cd4e85c83e..87d8c7e8afd 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23124.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23124", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.027", - "lastModified": "2024-11-21T08:56:59.373", + "lastModified": "2025-01-17T18:15:25.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json new file mode 100644 index 00000000000..b0bfa8171e8 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26153", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:10.927", + "lastModified": "2025-01-17T17:15:10.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 \nare vulnerable to cross-site request forgery (CSRF). An external \nattacker with no access to the device can force the end user into \nsubmitting a \"setconf\" method request, not requiring any CSRF token, \nwhich can lead into denial of service on the device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json new file mode 100644 index 00000000000..56739b545af --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26154", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:11.147", + "lastModified": "2025-01-17T17:15:11.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting in the appliance site \nname. The ETIC RAS web server saves the site name and then presents it \nto the administrators in a few different pages." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json new file mode 100644 index 00000000000..0689e5b78eb --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26155", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:11.327", + "lastModified": "2025-01-17T17:15:11.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json new file mode 100644 index 00000000000..3e241fa533f --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26156", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:11.533", + "lastModified": "2025-01-17T17:15:11.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json new file mode 100644 index 00000000000..305aec7a8de --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26157", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:11.697", + "lastModified": "2025-01-17T17:15:11.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in get \nview method under view parameter. The ETIC RAS web server uses dynamic \npages that get their input from the client side and reflect the input in\n their response to the client." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3315.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3315.json index 18011ed13f1..71718bd41f1 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3315.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3315", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T21:15:17.430", - "lastModified": "2024-11-21T09:29:22.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:13:08.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/adminininin/blob/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259386", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259386", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/adminininin/blob/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259386", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259386", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309575", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3316.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3316.json index 324fa15fbfe..96559101bd5 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3316.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3316", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T22:15:09.420", - "lastModified": "2024-11-21T09:29:22.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T18:05:50.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/adminininin/blob/blob/main/2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259387", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259387", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.309584", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/adminininin/blob/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.309584", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3376.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3376.json index 057a89af03b..463d163c1f0 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3376.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3376", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-06T12:15:08.603", - "lastModified": "2024-11-21T09:29:29.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:41:21.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,93 @@ "value": "CWE-698" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.311154", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259497", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259497", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.311154", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3377.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3377.json index a999f53fbc8..e96b9be79fe 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3377.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3377", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-06T12:15:08.857", - "lastModified": "2024-11-21T09:29:29.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:35:40.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.311155", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259498", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259498", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.311155", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3427.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3427.json index ddca7f8fd79..4e457d55364 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3427.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3427", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-07T17:15:09.630", - "lastModified": "2024-11-21T09:29:34.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:02:59.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5C774C8-8C38-4E34-B5D3-74872B5F672A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259599", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259599", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.311606", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259599", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259599", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.311606", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json new file mode 100644 index 00000000000..2dbf5b64ef3 --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45832", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:11.870", + "lastModified": "2025-01-17T17:15:11.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hard-coded credentials were included as part of the application binary. \nThese credentials served as part of the application authentication flow \nand communication with the mobile application. An attacker could access \nunauthorized information." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json index 805de3ec62e..f4484c44eaa 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48125", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.477", - "lastModified": "2025-01-15T21:15:13.477", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:25.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests." + }, + { + "lang": "es", + "value": "Un problema en el servicio AsDB de HI-SCAN 6040i Hitrax HX-03-19-I permite a los atacantes enumerar las credenciales de los usuarios a trav\u00e9s de solicitudes de protocolo GIOP manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json index 47530c50075..4a2bf2aeb6d 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48126", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.613", - "lastModified": "2025-01-15T21:15:13.613", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:25.800", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que HI-SCAN 6040i Hitrax HX-03-19-I conten\u00eda credenciales codificadas para acceder al soporte del proveedor y al servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50633.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50633.json index 0326e3a3ce5..c16648019cf 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50633.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50633.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50633", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:24.337", - "lastModified": "2025-01-16T18:15:24.337", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:26.043", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Broken Object Level Authorization (BOLA) vulnerability in Indico v3.2.9 allows attackers to access sensitive information via sending a crafted POST request to the component /api/principals." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de autorizaci\u00f3n a nivel de objeto roto (BOLA) en Indico v3.2.9 permite a los atacantes acceder a informaci\u00f3n confidencial mediante el env\u00edo de una solicitud POST manipulada al componente /api/principals." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cetinpy/CVE-2024-50633", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json index 4a2c05df161..19de24a676d 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50954", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:16.517", - "lastModified": "2025-01-15T17:15:16.517", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:26.310", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XINJE XL5E-16T and XD5E-24R-E programmable logic controllers V3.5.3b-V3.7.2a have a vulnerability in handling Modbus messages. When a TCP connection is established with the above series of controllers within a local area network (LAN), sending a specific Modbus message to the controller can cause the PLC to crash, interrupting the normal operation of the programs running in the PLC. This results in the ERR indicator light turning on and the RUN indicator light turning off." + }, + { + "lang": "es", + "value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en el manejo de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XL5E-16T%20XD5E-24R%20Modbus/XINJE%20XL5E-16T%20XD5E-24R%20Modbus.md", diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json new file mode 100644 index 00000000000..9abd560506e --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-53683", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:12.053", + "lastModified": "2025-01-17T17:15:12.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A valid set of credentials in a .js file and a static token for \ncommunication were obtained from the decompiled IPA. An attacker could \nuse the information to disrupt normal use of the application by changing\n the translation files and thus weaken the integrity of normal use." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json index 9d82b258f39..e38adc40df6 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54101", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-12T12:15:23.763", - "lastModified": "2024-12-12T12:15:23.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T18:09:53.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,82 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json index 96cc72a8973..a3abf58de0c 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54535", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.610", - "lastModified": "2025-01-16T20:36:12.483", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-17T18:15:26.610", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json new file mode 100644 index 00000000000..d136f6f14de --- /dev/null +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-54681", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T17:15:12.227", + "lastModified": "2025-01-17T17:15:12.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple bash files were present in the application's private directory.\n Bash files can be used on their own, by an attacker that has already \nfull access to the mobile platform to compromise the translations for \nthe application." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json index 37ea592cbe1..ef913a02603 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57162", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:33.063", - "lastModified": "2025-01-16T16:15:33.063", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:27.240", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php." + }, + { + "lang": "es", + "value": "Campcodes Cybercafe Management System v1.0 es vulnerable a una inyecci\u00f3n SQL en /ccms/view-user-detail.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57577.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57577.json index 8fbb7fc4342..3fc25b63f3a 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57577.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57577.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57577", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:16.740", - "lastModified": "2025-01-16T21:15:16.740", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:27.893", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro speed_dir en la funci\u00f3n formSetSpeedWan." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/blob/main/4/Readme.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57578.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57578.json index e8f38cb8ffd..9c2290dad0b 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57578.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57578.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57578", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:16.893", - "lastModified": "2025-01-16T21:15:16.893", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:28.430", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro funcpara1 en la funci\u00f3n formSetCfm." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/blob/main/5/Readme.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57579.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57579.json index 4d42a07d73f..99b89069520 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57579.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57579.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57579", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.057", - "lastModified": "2025-01-16T21:15:17.057", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:28.983", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the limitSpeedUp parameter in the formSetClientState function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro limitSpeedUp en la funci\u00f3n formSetClientState." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/tree/main/6", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json index 49641b164e5..5e35e9e3ac4 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57580", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.223", - "lastModified": "2025-01-16T21:15:17.223", - "vulnStatus": "Received", + "lastModified": "2025-01-17T17:15:12.410", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro devName en la funci\u00f3n formSetDeviceName." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/tree/main/7", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json index 6e87d2922a9..a3fba9c1265 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57581", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.437", - "lastModified": "2025-01-16T21:15:17.437", - "vulnStatus": "Received", + "lastModified": "2025-01-17T17:15:12.597", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro firewallEn en la funci\u00f3n formSetFirewallCfg." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/tree/main/8", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json index b18f47a49ad..0a1041919cf 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57582", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.627", - "lastModified": "2025-01-16T21:15:17.627", - "vulnStatus": "Received", + "lastModified": "2025-01-17T17:15:12.797", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the startIP parameter in the formSetPPTPServer function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro startIP en la funci\u00f3n formSetPPTPServer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/qijiale/Tenda/tree/main/9", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57615.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57615.json index 40774979429..4204ace536b 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57615.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57615.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57615", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:09.833", - "lastModified": "2025-01-14T01:15:09.833", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:29.320", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the BATcalcbetween_intern component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente BATcalcbetween_intern de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MonetDB/MonetDB/issues/7413", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57616.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57616.json index f778075eb11..a0fd9868531 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57616.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57616.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57616", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:09.947", - "lastModified": "2025-01-14T01:15:09.947", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:29.573", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the vscanf component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente vscanf de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MonetDB/MonetDB/issues/7412", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57617.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57617.json index 5b25cba48d7..b965b7f1f0c 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57617.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57617.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57617", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:10.060", - "lastModified": "2025-01-14T01:15:10.060", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:29.803", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the dameraulevenshtein component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente dameraulevenshtein de MonetDB Server v11.49.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MonetDB/MonetDB/issues/7432", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json index cd4ce79aa45..f8c36b8c1ae 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57642", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.873", - "lastModified": "2025-01-14T01:15:12.873", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:30.030", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the dfe_inx_op_col_def_table component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente dfe_inx_op_col_def_table de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1191", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57768.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57768.json index 55808fc422d..f7443401711 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57768.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57768.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57768", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.003", - "lastModified": "2025-01-16T18:15:26.003", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:30.633", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente validRoleKey?sysRole.key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUMT", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json index c40ff741cd5..51312907064 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9673.json @@ -2,71 +2,15 @@ "id": "CVE-2024-9673", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T07:15:27.980", - "lastModified": "2025-01-08T07:15:27.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T17:15:12.997", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." - }, - { - "lang": "es", - "value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de encabezado del complemento en todas las versiones hasta la 2.4.31 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22333. Reason: This candidate is a reservation duplicate of CVE-2025-22333. Notes: All CVE users should reference CVE-2025-22333 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 6.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.1, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "security@wordfence.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], - "references": [ - { - "url": "https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/assets/js/extension-pafe-tooltip.js", - "source": "security@wordfence.com" - }, - { - "url": "https://plugins.trac.wordpress.org/changeset/3217875/", - "source": "security@wordfence.com" - }, - { - "url": "https://wordpress.org/plugins/piotnet-addons-for-elementor/#developers", - "source": "security@wordfence.com" - }, - { - "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/317a0e93-fcd7-41a0-a83e-98c50bfc6be2?source=cve", - "source": "security@wordfence.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json new file mode 100644 index 00000000000..c5e08e99bd1 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-0430", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-17T18:15:30.920", + "lastModified": "2025-01-17T18:15:30.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Belledonne Communications Linphone-Desktop \n is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json new file mode 100644 index 00000000000..bc0062eec82 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0532", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-17T18:15:31.237", + "lastModified": "2025-01-17T18:15:31.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/new_submit.php. The manipulation of the argument m_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TIANN0/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292416", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292416", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.479100", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json new file mode 100644 index 00000000000..3b5d5b18db9 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0533", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-17T18:15:31.577", + "lastModified": "2025-01-17T18:15:31.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://1000projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/onupset/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292417", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292417", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.479119", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json index c3a44d28e83..2e656bef2fb 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22904", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.313", - "lastModified": "2025-01-16T03:15:06.313", - "vulnStatus": "Received", + "lastModified": "2025-01-17T18:15:31.870", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptpUserName en la funci\u00f3n setWAN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://re11s.com", diff --git a/README.md b/README.md index ad16c4270bb..08494365d38 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-17T17:00:37.582012+00:00 +2025-01-17T19:00:28.406135+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-17T16:56:52.770000+00:00 +2025-01-17T18:35:09.950000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -277958 +277970 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `12` -- [CVE-2024-50967](CVE-2024/CVE-2024-509xx/CVE-2024-50967.json) (`2025-01-17T15:15:12.313`) -- [CVE-2025-0528](CVE-2025/CVE-2025-05xx/CVE-2025-0528.json) (`2025-01-17T15:15:12.430`) -- [CVE-2025-0529](CVE-2025/CVE-2025-05xx/CVE-2025-0529.json) (`2025-01-17T15:15:12.670`) -- [CVE-2025-0530](CVE-2025/CVE-2025-05xx/CVE-2025-0530.json) (`2025-01-17T16:15:33.937`) -- [CVE-2025-0531](CVE-2025/CVE-2025-05xx/CVE-2025-0531.json) (`2025-01-17T16:15:34.250`) +- [CVE-2024-12757](CVE-2024/CVE-2024-127xx/CVE-2024-12757.json) (`2025-01-17T18:15:24.690`) +- [CVE-2024-26153](CVE-2024/CVE-2024-261xx/CVE-2024-26153.json) (`2025-01-17T17:15:10.927`) +- [CVE-2024-26154](CVE-2024/CVE-2024-261xx/CVE-2024-26154.json) (`2025-01-17T17:15:11.147`) +- [CVE-2024-26155](CVE-2024/CVE-2024-261xx/CVE-2024-26155.json) (`2025-01-17T17:15:11.327`) +- [CVE-2024-26156](CVE-2024/CVE-2024-261xx/CVE-2024-26156.json) (`2025-01-17T17:15:11.533`) +- [CVE-2024-26157](CVE-2024/CVE-2024-261xx/CVE-2024-26157.json) (`2025-01-17T17:15:11.697`) +- [CVE-2024-45832](CVE-2024/CVE-2024-458xx/CVE-2024-45832.json) (`2025-01-17T17:15:11.870`) +- [CVE-2024-53683](CVE-2024/CVE-2024-536xx/CVE-2024-53683.json) (`2025-01-17T17:15:12.053`) +- [CVE-2024-54681](CVE-2024/CVE-2024-546xx/CVE-2024-54681.json) (`2025-01-17T17:15:12.227`) +- [CVE-2025-0430](CVE-2025/CVE-2025-04xx/CVE-2025-0430.json) (`2025-01-17T18:15:30.920`) +- [CVE-2025-0532](CVE-2025/CVE-2025-05xx/CVE-2025-0532.json) (`2025-01-17T18:15:31.237`) +- [CVE-2025-0533](CVE-2025/CVE-2025-05xx/CVE-2025-0533.json) (`2025-01-17T18:15:31.577`) ### CVEs modified in the last Commit -Recently modified CVEs: `69` +Recently modified CVEs: `73` -- [CVE-2024-3416](CVE-2024/CVE-2024-34xx/CVE-2024-3416.json) (`2025-01-17T15:43:40.360`) -- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2025-01-17T15:52:40.257`) -- [CVE-2024-3418](CVE-2024/CVE-2024-34xx/CVE-2024-3418.json) (`2025-01-17T16:35:52.327`) -- [CVE-2024-3419](CVE-2024/CVE-2024-34xx/CVE-2024-3419.json) (`2025-01-17T15:35:15.880`) -- [CVE-2024-3420](CVE-2024/CVE-2024-34xx/CVE-2024-3420.json) (`2025-01-17T15:24:53.263`) -- [CVE-2024-3421](CVE-2024/CVE-2024-34xx/CVE-2024-3421.json) (`2025-01-17T15:22:26.840`) -- [CVE-2024-3422](CVE-2024/CVE-2024-34xx/CVE-2024-3422.json) (`2025-01-17T15:18:05.700`) -- [CVE-2024-3424](CVE-2024/CVE-2024-34xx/CVE-2024-3424.json) (`2025-01-17T16:39:48.853`) -- [CVE-2024-3425](CVE-2024/CVE-2024-34xx/CVE-2024-3425.json) (`2025-01-17T16:43:20.130`) -- [CVE-2024-3426](CVE-2024/CVE-2024-34xx/CVE-2024-3426.json) (`2025-01-17T16:56:52.770`) -- [CVE-2024-3743](CVE-2024/CVE-2024-37xx/CVE-2024-3743.json) (`2025-01-17T15:03:47.047`) -- [CVE-2024-49142](CVE-2024/CVE-2024-491xx/CVE-2024-49142.json) (`2025-01-17T15:09:15.647`) -- [CVE-2025-21363](CVE-2025/CVE-2025-213xx/CVE-2025-21363.json) (`2025-01-17T15:10:17.307`) -- [CVE-2025-21364](CVE-2025/CVE-2025-213xx/CVE-2025-21364.json) (`2025-01-17T15:11:24.487`) -- [CVE-2025-21365](CVE-2025/CVE-2025-213xx/CVE-2025-21365.json) (`2025-01-17T15:11:34.843`) -- [CVE-2025-21366](CVE-2025/CVE-2025-213xx/CVE-2025-21366.json) (`2025-01-17T15:12:20.677`) -- [CVE-2025-21370](CVE-2025/CVE-2025-213xx/CVE-2025-21370.json) (`2025-01-17T15:33:41.967`) -- [CVE-2025-21372](CVE-2025/CVE-2025-213xx/CVE-2025-21372.json) (`2025-01-17T15:36:24.423`) -- [CVE-2025-21374](CVE-2025/CVE-2025-213xx/CVE-2025-21374.json) (`2025-01-17T15:39:11.143`) -- [CVE-2025-21378](CVE-2025/CVE-2025-213xx/CVE-2025-21378.json) (`2025-01-17T15:42:41.810`) -- [CVE-2025-21382](CVE-2025/CVE-2025-213xx/CVE-2025-21382.json) (`2025-01-17T15:42:09.233`) -- [CVE-2025-21389](CVE-2025/CVE-2025-213xx/CVE-2025-21389.json) (`2025-01-17T15:44:04.177`) -- [CVE-2025-21393](CVE-2025/CVE-2025-213xx/CVE-2025-21393.json) (`2025-01-17T15:45:26.027`) -- [CVE-2025-21395](CVE-2025/CVE-2025-213xx/CVE-2025-21395.json) (`2025-01-17T15:46:01.927`) -- [CVE-2025-21405](CVE-2025/CVE-2025-214xx/CVE-2025-21405.json) (`2025-01-17T15:47:39.780`) +- [CVE-2024-3315](CVE-2024/CVE-2024-33xx/CVE-2024-3315.json) (`2025-01-17T18:13:08.297`) +- [CVE-2024-3316](CVE-2024/CVE-2024-33xx/CVE-2024-3316.json) (`2025-01-17T18:05:50.107`) +- [CVE-2024-3376](CVE-2024/CVE-2024-33xx/CVE-2024-3376.json) (`2025-01-17T17:41:21.647`) +- [CVE-2024-3377](CVE-2024/CVE-2024-33xx/CVE-2024-3377.json) (`2025-01-17T17:35:40.243`) +- [CVE-2024-3427](CVE-2024/CVE-2024-34xx/CVE-2024-3427.json) (`2025-01-17T17:02:59.153`) +- [CVE-2024-48125](CVE-2024/CVE-2024-481xx/CVE-2024-48125.json) (`2025-01-17T18:15:25.547`) +- [CVE-2024-48126](CVE-2024/CVE-2024-481xx/CVE-2024-48126.json) (`2025-01-17T18:15:25.800`) +- [CVE-2024-50633](CVE-2024/CVE-2024-506xx/CVE-2024-50633.json) (`2025-01-17T18:15:26.043`) +- [CVE-2024-50954](CVE-2024/CVE-2024-509xx/CVE-2024-50954.json) (`2025-01-17T18:15:26.310`) +- [CVE-2024-54101](CVE-2024/CVE-2024-541xx/CVE-2024-54101.json) (`2025-01-17T18:09:53.447`) +- [CVE-2024-54535](CVE-2024/CVE-2024-545xx/CVE-2024-54535.json) (`2025-01-17T18:15:26.610`) +- [CVE-2024-57162](CVE-2024/CVE-2024-571xx/CVE-2024-57162.json) (`2025-01-17T18:15:27.240`) +- [CVE-2024-57577](CVE-2024/CVE-2024-575xx/CVE-2024-57577.json) (`2025-01-17T18:15:27.893`) +- [CVE-2024-57578](CVE-2024/CVE-2024-575xx/CVE-2024-57578.json) (`2025-01-17T18:15:28.430`) +- [CVE-2024-57579](CVE-2024/CVE-2024-575xx/CVE-2024-57579.json) (`2025-01-17T18:15:28.983`) +- [CVE-2024-57580](CVE-2024/CVE-2024-575xx/CVE-2024-57580.json) (`2025-01-17T17:15:12.410`) +- [CVE-2024-57581](CVE-2024/CVE-2024-575xx/CVE-2024-57581.json) (`2025-01-17T17:15:12.597`) +- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-01-17T17:15:12.797`) +- [CVE-2024-57615](CVE-2024/CVE-2024-576xx/CVE-2024-57615.json) (`2025-01-17T18:15:29.320`) +- [CVE-2024-57616](CVE-2024/CVE-2024-576xx/CVE-2024-57616.json) (`2025-01-17T18:15:29.573`) +- [CVE-2024-57617](CVE-2024/CVE-2024-576xx/CVE-2024-57617.json) (`2025-01-17T18:15:29.803`) +- [CVE-2024-57642](CVE-2024/CVE-2024-576xx/CVE-2024-57642.json) (`2025-01-17T18:15:30.030`) +- [CVE-2024-57768](CVE-2024/CVE-2024-577xx/CVE-2024-57768.json) (`2025-01-17T18:15:30.633`) +- [CVE-2024-9673](CVE-2024/CVE-2024-96xx/CVE-2024-9673.json) (`2025-01-17T17:15:12.997`) +- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-01-17T18:15:31.870`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 52f65ff55c0..2e9bcfad5cd 100644 --- a/_state.csv +++ b/_state.csv @@ -22658,7 +22658,7 @@ CVE-2006-6971,0,0,30b4c36a4b25ee7e8069fc317f679dc4380c3f55bebfb9d35761bf8fec2026 CVE-2006-6972,0,0,8f506b6f5f516e97cdd3e30f94839929e12aa68d6feb8403ee1ab0c3bb098ae8,2024-11-21T00:24:04.983000 CVE-2006-6973,0,0,b0c172571a7e3fbbf9bb7bd23aa66d539a6c75574b53958836b26207966214a1,2024-11-21T00:24:05.127000 CVE-2006-6974,0,0,ef3fde9bd83e6fa4f6a8890f9e5915fbbe457d0b22fce140393cdc707a3ae85c,2024-11-21T00:24:05.263000 -CVE-2006-6975,0,1,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000 +CVE-2006-6975,0,0,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000 CVE-2006-6976,0,0,418d71c951e11f4c17afe22a63b28728d0eacdd2a404ee6ec0bdd5068faf47a8,2024-11-21T00:24:05.540000 CVE-2006-6977,0,0,3d8c66879361d3274cbbae843e88fd16c44e5d69c8ff35cef5fa1923a0c7578e,2024-11-21T00:24:05.687000 CVE-2006-6978,0,0,c34f966b5f1cd610e3b77698c252679236b5e95a7a79f55b64bfe3927cde1e68,2024-11-21T00:24:05.823000 @@ -22714,7 +22714,7 @@ CVE-2006-7027,0,0,bde2d7620e70fe3e9fd88b7eee3d8f2affe93b5a4f505608f505d9f899bd97 CVE-2006-7028,0,0,10c7c6647d4b92142f35a3dad4b5e3da7798e0f1fba3b8973942d232aed61916,2024-11-21T00:24:12.987000 CVE-2006-7029,0,0,d05274c9edad507fc94a06a70dc295c14ea47ea562b6430a2623089554c3f6f7,2024-11-21T00:24:13.123000 CVE-2006-7030,0,0,b371a291b807c5db02b79cabd3266dc6bf4e437b85903aef9e8ab3d115d76dbe,2024-11-21T00:24:13.267000 -CVE-2006-7031,0,1,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000 +CVE-2006-7031,0,0,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000 CVE-2006-7032,0,0,9a0a02bec8c509c0efda365345d80221095fd13e7b0c60b15e25bc48243b6e78,2024-11-21T00:24:13.550000 CVE-2006-7033,0,0,f293e1e2b08eed970b1d5f2d377c547c7f860b0b99d8ac492f5c8c3e52025f1a,2024-11-21T00:24:13.687000 CVE-2006-7034,0,0,310913b770c09ad04bab56a279511942f2faf0d37ed071b984f9a944ca4e6d7e,2024-11-21T00:24:13.820000 @@ -22788,7 +22788,7 @@ CVE-2006-7101,0,0,54914dfc2f2d8c05f5718c4b9fcb082ea15b97165b5f9266b73b1cc0ea96e2 CVE-2006-7102,0,0,c878466fc041bd488504e91ea2b7bd1b546b20fdcdf04216d53e54a78c900c99,2024-11-21T00:24:23.983000 CVE-2006-7103,0,0,fb5030e3101f936fcdba6e8af7c10f4af95c902a1d5ca21ede646503cc45a4b1,2024-11-21T00:24:24.180000 CVE-2006-7104,0,0,75e8ab9990855ce63c9efad6686e517def05049afa5915ea3bc6340c5bfe925b,2024-11-21T00:24:24.350000 -CVE-2006-7105,0,1,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000 +CVE-2006-7105,0,0,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000 CVE-2006-7106,0,0,052b68c4c39ccb711da3927959cf230d15f6600c3fb1cf33e8f09bc5266a475e,2024-11-21T00:24:24.623000 CVE-2006-7107,0,0,b300b5b09c1d008d729a1137d8096bba1d25751214425e6895bc895e2e2ac98f,2024-11-21T00:24:24.763000 CVE-2006-7108,0,0,389816ff42b48fcd19238e824feabdc94205ba8dce210b6e7f66674be6d41e40,2024-11-21T00:24:24.903000 @@ -24583,7 +24583,7 @@ CVE-2007-1674,0,0,898736af90d43b12c675c7e7004a27e56fc818344a9f6200fab13fdb761141 CVE-2007-1675,0,0,88134bcea51f5528cc9733a9accd544287ed7c381d7d445aaa9046fa0dd3b3af,2024-11-21T00:28:54.357000 CVE-2007-1677,0,0,0d8d9740476b59067a995c1051659a20b4ab1382d3f430913062e79affd45b64,2024-11-21T00:28:54.503000 CVE-2007-1678,0,0,0a6ff503a77c9ab19ba61a79356b174a036a6c7cbdde074750fb90ef72605439,2024-11-21T00:28:54.647000 -CVE-2007-1679,0,1,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000 +CVE-2007-1679,0,0,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000 CVE-2007-1680,0,0,74f9e3bd230e34b6b2cac36b9597aab7cc63538c886572c19b9e602bea0ac609,2024-11-21T00:28:54.940000 CVE-2007-1681,0,0,6766222a3f8845792a3a9b2e2ba5d04f6b75cfd04f3ab195ccb360a1544e7a03,2024-11-21T00:28:55.090000 CVE-2007-1682,0,0,8b65392eb4bcf0bf28074b04459b71babaa2150d883096605ffdf6a345da76af,2024-11-21T00:28:55.240000 @@ -24921,7 +24921,7 @@ CVE-2007-2016,0,0,219237bef47cd3d89a064e2008096ec22251fd5a404ebc1e6a827e95ade95e CVE-2007-2017,0,0,546535e5dcff5b88db8527e35deee25aa0d76c69039039747c9d4e33db0860be,2024-11-21T00:29:42.150000 CVE-2007-2018,0,0,3bdf4adeddcab5ac1ea6297b19f88a79344dc31e6f0bb3ce03a9c68b215e9766,2024-11-21T00:29:42.297000 CVE-2007-2019,0,0,2d45d4f38af76aad986c8235d259f4ca92688a48ad3708a35598872a6d917679,2024-11-21T00:29:42.443000 -CVE-2007-2020,0,1,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000 +CVE-2007-2020,0,0,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000 CVE-2007-2021,0,0,21684c09b0a57b5b7505bdbe148093d50d0d0492eecb224a83fa928e7b5314cc,2024-11-21T00:29:42.753000 CVE-2007-2022,0,0,0a74377aec1e158ed10e3fdcb91b5ff2c83587fbf81c424f39b9648e3cbcced7,2024-11-21T00:29:42.900000 CVE-2007-2023,0,0,c036be7fab3ae0920f3c3ad37b2f9059dfb50c6a9251f645923397d9ed0adcdc,2024-11-21T00:29:43.100000 @@ -25323,7 +25323,7 @@ CVE-2007-2418,0,0,0ce5ecf8ba84947258950ede570da848ddbad9277ca8ddafd1fc1896b8c132 CVE-2007-2419,0,0,7e864fd0311ba966e74cdf0abafa623b4ad43b67f12d94ddca837b539eacf600,2024-11-21T00:30:44.467000 CVE-2007-2420,0,0,5e67598ecc5684ef53e014523f7e87cadd2b55f950679768101d0718a5eb3330,2024-11-21T00:30:44.617000 CVE-2007-2421,0,0,f6020ed7e34caeaa4010ff8b47fa5b09bbb005e2115ed3bb4822fb78060e9bac,2024-11-21T00:30:44.753000 -CVE-2007-2422,0,1,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000 +CVE-2007-2422,0,0,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000 CVE-2007-2423,0,0,0b83896635331471d87404141f16467346739f0b8dca420f20a9271baf77866c,2024-11-21T00:30:45.040000 CVE-2007-2424,0,0,1c922304dee11dfd180a30859ca86a37f00ad1204bc14ec7002335aba011e2b7,2024-11-21T00:30:45.187000 CVE-2007-2425,0,0,4552c35414ca77abd157ab5a3c322bca479025668f503b79b5811d98cdf7fb96,2024-11-21T00:30:45.340000 @@ -26084,7 +26084,7 @@ CVE-2007-3190,0,0,4c2508555f4bb672ac6fa91936f379a042cd9025c1ecb47e69b838a9b848a6 CVE-2007-3191,0,0,f1c66cdf736c9784d9b1b03151b892596c7dbfcbf068ae4299a30d347bda4f86,2024-11-21T00:32:37.463000 CVE-2007-3192,0,0,a7bc488985ed5711ca70747f44e04ef839b560fcecfa1dbf4570d2f6db55fb83,2024-11-21T00:32:37.613000 CVE-2007-3193,0,0,466a6a90fd68b59e93e31de5a45f967fb6c099e73bfea3cda27528cca8dcfc32,2024-11-21T00:32:37.757000 -CVE-2007-3194,0,1,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000 +CVE-2007-3194,0,0,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000 CVE-2007-3195,0,0,5a2516527b23144ca52bbe1a590a8c793b0f79113d69dd198a4da4cfc807a21e,2024-11-21T00:32:38.057000 CVE-2007-3196,0,0,dc730fa8a9a244caa73a32806f04ab6274e74d634ec6f01253d83153e7921ef4,2024-11-21T00:32:38.220000 CVE-2007-3197,0,0,ef856130105c25f2996c49fe89d04372d79ac0dc781e31ebe2dbac49fbee18cd,2024-11-21T00:32:38.367000 @@ -26297,7 +26297,7 @@ CVE-2007-3405,0,0,5b68aa2bd44434ecb40c35a2db1a1ff65bd24ea5952ab3b45ee119092df93b CVE-2007-3406,0,0,5ba8c0c40aab2e7442619791db7d4e95da8b58c61f3368f64caa41ef76e3f6e5,2024-11-21T00:33:09.647000 CVE-2007-3407,0,0,6eb5791da788424b85b93887dd4ab3b5066e55d4a8940bbcb108b80ed5021c62,2024-11-21T00:33:09.787000 CVE-2007-3408,0,0,2537f832c34e0219d5119235ad7fdb726c6da4d2033e5cc183b2a35820ccfb21,2024-11-21T00:33:09.927000 -CVE-2007-3409,0,1,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000 +CVE-2007-3409,0,0,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000 CVE-2007-3410,0,0,42b713d16d98e71bfb2ba894991c109d004caccc2efa8def8cc2046a3736c6a6,2024-11-21T00:33:10.220000 CVE-2007-3411,0,0,71fbf15baab87b4d496c0a297ed15355d61657fa52df993ad567ff0c695bd40f,2024-11-21T00:33:10.377000 CVE-2007-3412,0,0,c8cae3f674ab922974283adb017b9bf909a76f69ed166bbe1ea05401586f1635,2024-11-21T00:33:10.983000 @@ -26698,7 +26698,7 @@ CVE-2007-3812,0,0,a057a88bd62dd2cf84a9585f0e43e2f7615b3b0e7b564410bf9af9930b322b CVE-2007-3813,0,0,1dfe731dfdd2a22844282db9d3fa39dfccd2b0bd21b2bc57fa7b8ecd6594574d,2024-11-21T00:34:07.503000 CVE-2007-3814,0,0,24b69119cc8609a7cd25db046bdc3c20bf6de9632f8146e48ff4bb67790f47d0,2024-11-21T00:34:07.630000 CVE-2007-3815,0,0,ccb135b637c4c9ff92a342957f77873ab5c48907ba7a1c386ff0a4a5de52df18,2024-11-21T00:34:07.780000 -CVE-2007-3816,0,1,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000 +CVE-2007-3816,0,0,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000 CVE-2007-3817,0,0,84ecd5fce551683d845d9045254e63af0981844cb29f63a66e2739c2492c581e,2024-11-21T00:34:08.073000 CVE-2007-3818,0,0,fc09393facd0c477d75888fde9b5aa3492afbc6a73cc3ada69cb86c8d0d42745,2024-11-21T00:34:08.207000 CVE-2007-3819,0,0,68133b1983fea415ba02f4fa9f75646105d692487e126200e69a66987de833f6,2024-11-21T00:34:08.347000 @@ -27160,7 +27160,7 @@ CVE-2007-4286,0,0,a7bb9581bd5bc906382f293b635bfafa72ad3eb5b191fc51019dabb7fc895d CVE-2007-4287,0,0,196aa319b27704f0ce3a5618753d29fc691896f5273ebab8e0e9328ac0411313,2024-11-21T00:35:14.283000 CVE-2007-4288,0,0,34de55785ba29073fd74acc6e47ecc477e01d8869fa33e96a015fbbef9e70217,2024-11-21T00:35:14.417000 CVE-2007-4289,0,0,0c61281a3729f2fc152ee1b619c73e3e6c289f4c4d38fc47082b03b6dcb05d01,2024-11-21T00:35:14.557000 -CVE-2007-4290,0,1,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000 +CVE-2007-4290,0,0,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000 CVE-2007-4291,0,0,05f61638f5563cebb165558e108521cd9423d24be16bad06eab53e10b29f4608,2024-11-21T00:35:14.827000 CVE-2007-4292,0,0,3aa371c016fa4984d6c6b2f3844ec60dfd8dfee0d33117bba91f721014ce093a,2024-11-21T00:35:14.983000 CVE-2007-4293,0,0,3f353b7109765b5bb62e7a94d53af98e6c56d8181eeae53878246d59c2220773,2024-11-21T00:35:15.140000 @@ -27332,7 +27332,7 @@ CVE-2007-4461,0,0,3de60db2724f4cef72bfe99980b55efdfcee3fdd4646732fa7e581574acc16 CVE-2007-4462,0,0,62101041934fa56bdc980b528c55bbcd757d54a71d56a58218495bf1e1547f38,2024-11-21T00:35:39.610000 CVE-2007-4463,0,0,187c35e0bf0628b966b267bc1c20e11ba64192d1628e5020ea4f24910af48fa7,2024-11-21T00:35:39.750000 CVE-2007-4464,0,0,a2db813a61522b747171f39949a8a83c7f59e55ceb2ec5f6094d1e0a6a441f5e,2024-11-21T00:35:39.890000 -CVE-2007-4465,0,1,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000 +CVE-2007-4465,0,0,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000 CVE-2007-4466,0,0,05d022ac82f920a784de2112b8419f5269a66d668bf3c80f9401be43420d1d57,2024-11-21T00:35:40.293000 CVE-2007-4467,0,0,be85cfac49c9b9ce778282c01b1300dc0010257db8d67ffb621aeecd6b60767f,2024-11-21T00:35:40.407000 CVE-2007-4470,0,0,d2964a4e088d929f64a62b03df0f35a0373ba3c3e84cb9890054f4a568d17366,2024-11-21T00:35:40.527000 @@ -27421,7 +27421,7 @@ CVE-2007-4555,0,0,6630d2bb6667238dff571881b0a8ccb540b1ec43c0c9b7c0887e73db144be6 CVE-2007-4556,0,0,b4f43e784681fe6b8359c2e109a742f06d2ba34d81180afd975ba9d99accf207,2024-11-21T00:35:53.020000 CVE-2007-4557,0,0,5ae75a658353db31a4879c7fa1ac3c85c80de620baaeda978b5eb301c1292028,2024-11-21T00:35:53.183000 CVE-2007-4558,0,0,33d7b38ab69a2dc921cd0efb9caba7a58f73953a56c79eb00aeb3febab15c613,2023-11-07T02:01:04.180000 -CVE-2007-4559,0,1,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000 +CVE-2007-4559,0,0,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000 CVE-2007-4560,0,0,e8c605cc3b9174d5b334105b42dc4ea85ecf4b8dc1c209149ac82d7f531fdc69,2024-11-21T00:35:53.530000 CVE-2007-4561,0,0,a9da5f6fa70f2fbcd69e1fdd36c7725610022097f397c1d4b55428b3ec9d4286,2024-11-21T00:35:53.707000 CVE-2007-4562,0,0,3001d31d10a6ff798d15ba5d0418e8a3943db487e0b5659ddd65909addf80b3f,2024-11-21T00:35:53.857000 @@ -27643,7 +27643,7 @@ CVE-2007-4782,0,0,bc6f8aa60af4d2816d1b78e5baff5490f24615214441f891054d2e957f7523 CVE-2007-4783,0,0,ce96bf486d496ce94fbb5d4887520e06f7cddd71865a721244fdc00b4e88faae,2024-11-21T00:36:26.440000 CVE-2007-4784,0,0,2ba6eb1397b30f09b5a0267c90e3e94b01cfdf1f4d69d06a0c1251d9e9e1ab82,2024-11-21T00:36:26.580000 CVE-2007-4785,0,0,4432cfce3d278c9ab8292c097f4a7afca4ac429366bdf34e9208711ceb20e264,2024-11-21T00:36:26.717000 -CVE-2007-4786,0,1,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000 +CVE-2007-4786,0,0,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000 CVE-2007-4787,0,0,05a5aaaf7dfaf6d662f1c8419b632e8613242f91390c751301b0be183cfd605a,2024-11-21T00:36:27.020000 CVE-2007-4788,0,0,b012ee81b96bd7841ea38ade60bff976f2b03be1131c6d750d0430313390d2d5,2024-11-21T00:36:27.153000 CVE-2007-4789,0,0,f6fac4f1eed433732ee4e0c6354a53039dbe7410a73a0f7964b5630fdd0bc2c2,2024-11-21T00:36:27.303000 @@ -27925,7 +27925,7 @@ CVE-2007-5093,0,0,993cb60156fc86ec2ef785c0575991e6b3bd7019f93383a3da535c331912bf CVE-2007-5094,0,0,df0d6f2388dcca221fce10b9f40a5244914eb8a410b5a246260385fcead6884d,2024-11-21T00:37:06.763000 CVE-2007-5095,0,0,6d5b9f346211fcc92b3cb1d0b460a8fc98ea7697bf7142b16f04eebf2c20f67f,2024-11-21T00:37:06.893000 CVE-2007-5096,0,0,a29e920bb6f95fd23e034a4fc32d21393f32a7a19873eb0fd35d32a1df572bcd,2024-11-21T00:37:07.030000 -CVE-2007-5097,0,1,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000 +CVE-2007-5097,0,0,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000 CVE-2007-5098,0,0,7445261d4bd176ec3d4e503623e4daa9f4870d18a5851afe1ef0312bfd4b2279,2024-11-21T00:37:07.297000 CVE-2007-5099,0,0,ac7efde8aad5508385d88d0a2400f6afbc1f46a73da3ad9a54d8fff463b9ae2d,2024-11-21T00:37:07.433000 CVE-2007-5100,0,0,36c4ebde2519d1d0636d11c2d48cf76171b1d8111e6ab854c797e1e14ffaa61a,2024-11-21T00:37:07.570000 @@ -28385,7 +28385,7 @@ CVE-2007-5561,0,0,99edf9ec5bfc1d9f89a72bf2ea29bfe7d418fe97a61d4d8e9dc519d66b7591 CVE-2007-5562,0,0,92b4ca2b297bdb7ce215a17dad700ae49eede3dc3692583a73b609b9cef653c4,2024-11-21T00:38:11.423000 CVE-2007-5563,0,0,54a2bac93cce3961b913f7e901c091a9509f74c8ff9e36c21f8bddea28ccce0e,2024-11-21T00:38:11.557000 CVE-2007-5564,0,0,947d90e9c1d7f3e853f110562e11b0ecde8e8aa4caafdba3e112f7797b9cbb45,2024-11-21T00:38:11.690000 -CVE-2007-5565,0,1,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000 +CVE-2007-5565,0,0,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000 CVE-2007-5566,0,0,e5bb5b6554c8b5920f9bdd17dc2969ad5e9fba7349d31fe67dcc6fbbabaaf7db,2024-11-21T00:38:11.953000 CVE-2007-5567,0,0,4a71954d2aa6b64a0e2814cb8d361731e3c0789ef11f1c169c554a98e60f66c4,2024-11-21T00:38:12.100000 CVE-2007-5568,0,0,9ee5143b09df6d9171180041edc412ea03f580c151ae1409087cc639df1f7959,2024-11-21T00:38:12.237000 @@ -29591,7 +29591,7 @@ CVE-2008-0077,0,0,0e1bac7dd448a66bc0cfeda427b0b7eccfbbbbcd16dae2ea2988eaf3c68523 CVE-2008-0078,0,0,b0c76c054456efed9bc03f0d63a8c45c69b58d7db12612ac8af88c57bf6ccbaa,2024-11-21T00:41:07.197000 CVE-2008-0079,0,0,1838c9168aeba926515133757754f2f2588c409b8db6c9502b4f2a642fa4a72c,2023-11-07T02:01:40.037000 CVE-2008-0080,0,0,8412f77974bae998d3f560d3bb88b735a41789f49938bbdb0b2bd6d7500ce698,2024-11-21T00:41:07.333000 -CVE-2008-0081,0,1,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000 +CVE-2008-0081,0,0,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000 CVE-2008-0082,0,0,14df28dec90609a090ec96df339f8fe485b84402601d50278dc98d736092038a,2024-11-21T00:41:07.647000 CVE-2008-0083,0,0,8687f7f0c7a7bc1282b56ce44e732012ba0b44e61620fe9d5985af95c2ec761a,2024-11-21T00:41:07.797000 CVE-2008-0084,0,0,8d9d53772b44e9dcf5259626258fdc8a9bea67493536450ffec6dddab88039cc,2024-11-21T00:41:07.947000 @@ -30732,7 +30732,7 @@ CVE-2008-1242,0,0,ade061dbfa3c75b3eae21375dcb17b46551787c88bb56bbea1c3e1a1f55408 CVE-2008-1243,0,0,42145c5f7625854ffe44a16aadd9267afa8a87f9945dc50f532834db7dc599d8,2024-11-21T00:44:02.443000 CVE-2008-1244,0,0,4f75e571a4c461d078fc50e2768c8f6fc64e082b7cb7f899e8ecd70ba2e4d236,2024-11-21T00:44:02.607000 CVE-2008-1245,0,0,499329cbc5730cdbfe3a919e91d36f9384e84ec1c61f007b1e1e33d3d64ffe61,2024-11-21T00:44:02.770000 -CVE-2008-1246,0,1,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000 +CVE-2008-1246,0,0,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000 CVE-2008-1247,0,0,581e127726d913db054905cf0f171f9dbc4f07f20d4919c7a581266c1b3bd5e5,2024-11-21T00:44:03.133000 CVE-2008-1248,0,0,5025b7537aedeb4eed0917b19cd88ea905d1785c1e11d61e51e5caea29be940a,2024-11-21T00:44:03.283000 CVE-2008-1249,0,0,acdf034143a4271ec6a79d81d9e059030241aad4ad188f11b2205412ceed93da,2024-11-21T00:44:03.420000 @@ -31834,7 +31834,7 @@ CVE-2008-2370,0,0,021fd53a864ecce480ee755ce14f76e201760b771f120e1881240bf82ea28b CVE-2008-2371,0,0,65e826a347a7d47a2217d9f8fdb2282d1c6e3ac77345bbff683c1cf114001c2d,2024-11-21T00:46:44.070000 CVE-2008-2372,0,0,06752596f4dc9c5f79bde310a8a8761c7b1b4e4fce57ed9c3c2ce61ab6497eec,2024-11-21T00:46:44.267000 CVE-2008-2373,0,0,b9e02b4b3e04278094a56d4d148fcf6e26cb39c5f845f8624159072ae5e27fac,2023-11-07T02:02:12.140000 -CVE-2008-2374,0,1,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000 +CVE-2008-2374,0,0,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000 CVE-2008-2375,0,0,0eab456f6d2e06dda163307088b16f729c480edc6e685ec5b5b9949cabd0ba33,2024-11-21T00:46:44.563000 CVE-2008-2376,0,0,5bafc7bc7070c289491a0683e4b7912e267b230e9643e4b4c4341e8b8c5bb9ac,2024-11-21T00:46:44.693000 CVE-2008-2377,0,0,ab06d4b349e72855c527159f834167645fa48b583d213fc8d0aac2034b654596,2024-11-21T00:46:44.837000 @@ -32716,7 +32716,7 @@ CVE-2008-3278,0,0,e68e5a27346081e1298093dadeaf20095f7733d0ce735acc6e303b7d3dd2b8 CVE-2008-3279,0,0,77c22df27107f79ee78ca6a9c77007419f2ec711a34afe9981863476185cea93,2024-11-21T00:48:52.403000 CVE-2008-3280,0,0,bb719b7417b6631526a61fff546be1cfbe43e717c54a73ae62a6272c7b212e85,2024-11-21T00:48:52.517000 CVE-2008-3281,0,0,5571ac81465c0dbbe8c1613369bafa7fe48230b1b507e820179984401d5b8a62,2024-11-21T00:48:52.650000 -CVE-2008-3282,0,1,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000 +CVE-2008-3282,0,0,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000 CVE-2008-3283,0,0,8aec0e178bc1a698060d811f8bebf9066e08935179f2e4373edd0ad291c9f238,2024-11-21T00:48:52.943000 CVE-2008-3284,0,0,babe9ad38a5b74cc29fce5b8467b30419739070eb54015a780d8919aef96fddc,2023-11-07T02:02:26.743000 CVE-2008-3285,0,0,af5f49f5a709d1ff96a0b92c966c513d54b1d0075b847f0e12b6e55aa036235c,2024-11-21T00:48:53.077000 @@ -32899,7 +32899,7 @@ CVE-2008-3461,0,0,8fd9d75ee9a5599892ac6cd3fe7b26179d0ab8de1f672e01aeb8373954a6e0 CVE-2008-3462,0,0,4ec65f92f08900243a5963de40140263596057033b8bc26433b011690d2476ee,2023-11-07T02:02:28.933000 CVE-2008-3463,0,0,579d4a43998c9b2eac5853f8ef6aea44a356e5c281b110cdfeb120f43a4f5f8c,2023-11-07T02:02:29.213000 CVE-2008-3464,0,0,6f30f28ce388878e8688e31283f6c16c7f1b76bbf8b79290d35ede35c8adeef4,2024-11-21T00:49:18.913000 -CVE-2008-3465,0,1,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000 +CVE-2008-3465,0,0,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000 CVE-2008-3466,0,0,3f605f7ad58aecd6880381ea770fcf5510e7426e4d6d423aca4a9402decf9654,2024-11-21T00:49:19.160000 CVE-2008-3467,0,0,3e16ef74df19bcf7e3f85c918700aa0bf0d9420e425a933a41011fdf73f726e7,2023-11-07T02:02:29.467000 CVE-2008-3468,0,0,bd97f0bdb30e21367d5b70a2692b44a7f6c22cf3161cc2ab669d869b11fa2ef3,2023-11-07T02:02:29.687000 @@ -32908,7 +32908,7 @@ CVE-2008-3470,0,0,0386f2718b67efa7c55c859658f69a06fbdf68f14dd09170f22c4d9e5b085e CVE-2008-3471,0,0,e118a701ddcff55a460444618ccc543da969635fbab102c051dc799fe622d87e,2024-11-21T00:49:19.340000 CVE-2008-3472,0,0,9a9a0bc60d777b949854990bac94c9696ed91fef448021ee436120cdab087d43,2024-11-21T00:49:19.480000 CVE-2008-3473,0,0,eb30fa73efa675fafeee269652d27a922d1d707ca34f4ce34e69e671c9c979b5,2024-11-21T00:49:19.613000 -CVE-2008-3474,0,1,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000 +CVE-2008-3474,0,0,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000 CVE-2008-3475,0,0,c2e55ba56e3a4ec6c1a80729adc9df6c0e1e36d44bb3bf47e15a0f5dafb7ee1f,2024-11-21T00:49:19.883000 CVE-2008-3476,0,0,bd23dd8f4411c5b005db25888cd78f3500823b5bb145eeec5bd65ec076da7811,2024-11-21T00:49:20.040000 CVE-2008-3477,0,0,f34f16d7433d761a449b8b1788f5d67109642537fda255c851afb35898d1cdbb,2024-11-21T00:49:20.177000 @@ -33203,7 +33203,7 @@ CVE-2008-3771,0,0,387d2734e293e9d4229a89ad93ef198a75ba6c7ec0b26ca9f05a68c3fa88ea CVE-2008-3772,0,0,10c8f7803da5128d98699b607b08b383018544e73c12e8d7bc455979c5415818,2024-11-21T00:50:05.667000 CVE-2008-3773,0,0,efdfe6746783710e84d486e743d6bee162233dd54ca938e337f0f3e37666a519,2024-11-21T00:50:05.807000 CVE-2008-3774,0,0,1d223336b1a5025e63e3b121302bde6341a8c0a93d033d5f359e5f8028235a6d,2024-11-21T00:50:05.960000 -CVE-2008-3775,0,1,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000 +CVE-2008-3775,0,0,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000 CVE-2008-3776,0,0,759b26637b4be74cbae069136454e0dbc436b18431192b8be6914f0998319ad3,2024-11-21T00:50:06.263000 CVE-2008-3777,0,0,932fb89f1d21261d37ad054956f4845b55faebb9712e16f734a6949004a19edd,2024-11-21T00:50:06.407000 CVE-2008-3778,0,0,d0cabf0e2407f6ee82738a6b8cc4b9767f9748891b1c6fe930a3ad8538752744,2024-11-21T00:50:06.560000 @@ -34329,7 +34329,7 @@ CVE-2008-4925,0,0,4f7b18e393b0fa381e68773dfa5861d88a6292105b49d543a9c33f99190cb6 CVE-2008-4926,0,0,7c5e36ad6b1c797c68693f2837e1a9f94c0ce082be6d6e481ddc90150efaeb36,2024-11-21T00:52:51.593000 CVE-2008-4927,0,0,2fc3b624b859ef30c91f0ec77ccaff5a10184bccdd99e3983e23fca43dbe3e25,2024-11-21T00:52:51.740000 CVE-2008-4928,0,0,2f6634b1bd080ca5525d6ed8a3f95c34b424b18654ad6a6d16afacfd255a7fbf,2024-11-21T00:52:51.880000 -CVE-2008-4929,0,1,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000 +CVE-2008-4929,0,0,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000 CVE-2008-4930,0,0,2c4d59623a2b0b5f63a7916dcb2796169922093478803e0499fb6b55b90d42d3,2024-11-21T00:52:52.193000 CVE-2008-4931,0,0,f86582cbf3eb6ca78b80be18df159e3bb694669014c2df3c7b3109abb16602d5,2024-11-21T00:52:52.330000 CVE-2008-4932,0,0,8c4eb265c406b9ab48545d0fa32e531b8fe25ee35aafa7649d9f84dd93e5abcb,2024-11-21T00:52:52.473000 @@ -34394,7 +34394,7 @@ CVE-2008-4992,0,0,e0f2f6bcbbb725f5fd495269be6f4f746da7c0f999ac300af622b04a4b3fe6 CVE-2008-4993,0,0,c4d0175ad3336bd886cdf610ccdfd78bf1755efb9a12d99edafaf3f6a027ef42,2024-11-21T00:53:01.417000 CVE-2008-4994,0,0,cd8d7f094ddd75032df41117ffc7311d6254c621c52e2c185509f21c18799602,2024-11-21T00:53:01.563000 CVE-2008-4995,0,0,bfa93d844fb22352ab90cf141189edab832ce3a5c30a5fd3e1edbdd19ac833df,2024-11-21T00:53:01.710000 -CVE-2008-4996,0,1,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000 +CVE-2008-4996,0,0,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000 CVE-2008-4997,0,0,7566fced22bd3a3484772345ab5f1fa69faee1d11bd335f12aa38d0edbbe4ecf,2024-11-21T00:53:01.993000 CVE-2008-4998,0,0,15d45704380071e9a9953ea7abe65daa350aa04c7b05aadf01b367c96688628f,2024-11-21T00:53:02.140000 CVE-2008-4999,0,0,080946ba4f06dbec211b9d55cdaf058e0c090d5863b6c277e9665e45ca5d363e,2024-11-21T00:53:02.283000 @@ -194208,11 +194208,11 @@ CVE-2022-24801,0,0,4d611f7d290a30c49a36c129519fc7ac71513b1cadc078eef638f25ab4b14 CVE-2022-24802,0,0,07b26b8ea497569aa400e89e075f85d7d8497c28c46912dc679b0c636ee600b1,2024-11-21T06:51:07.880000 CVE-2022-24803,0,0,a6c71e9f6a94b9ae6df5c5767e3e8dc001f3c63ef8ed87909483e22596226c5a,2024-11-21T06:51:08.023000 CVE-2022-24804,0,0,5a8858465a7aa4104bded7bf6892b5e6c2df6ee69b3f374e48216b70388e95c9,2024-11-21T06:51:08.150000 -CVE-2022-24805,0,1,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000 -CVE-2022-24806,0,1,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000 -CVE-2022-24807,0,1,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000 -CVE-2022-24808,0,1,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000 -CVE-2022-24809,0,1,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000 +CVE-2022-24805,0,0,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000 +CVE-2022-24806,0,0,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000 +CVE-2022-24807,0,0,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000 +CVE-2022-24808,0,0,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000 +CVE-2022-24809,0,0,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000 CVE-2022-2481,0,0,c6a77134c010c7c4f180df8a4e72b5e901853f245db8d830c126eabeb72bb5e9,2024-11-21T07:01:04.973000 CVE-2022-24810,0,0,817bcf4801ae83c9d34aee0f0d6e71d5b6597a20671eeeac937cf8f303599939,2024-11-21T06:51:08.977000 CVE-2022-24811,0,0,f0de78415af361c1f04eeb300962362dac1f5d4ed9c4710ea6a7d48db701773b,2024-11-21T06:51:09.093000 @@ -198481,7 +198481,7 @@ CVE-2022-30018,0,0,a47d8c584648cd074d4197c63600f888a035f4f5141dceac3dc37e5b59189 CVE-2022-3002,0,0,599cae5f99d3994ff275a3aaa8236083e9e9cd9b24d19afcc45b27053349a4ed,2024-11-21T07:18:37.230000 CVE-2022-30023,0,0,c77df69c371246d0c17ca301e646e05c6ea0a815ac1ccd569e618bae3cef56a8,2024-11-21T07:02:05.730000 CVE-2022-30024,0,0,33b065c539ef1ec787028658cb8d0d89066d0e41bbd4e18734571d1dde05fdad,2024-11-21T07:02:05.870000 -CVE-2022-30025,0,1,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000 +CVE-2022-30025,0,0,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000 CVE-2022-30028,0,0,5da8221e49099da25b4f0bc147828862aa0640753c02395177ba48e88a040936,2024-11-21T07:02:06.170000 CVE-2022-30033,0,0,24cd3dbe45c902507edac8e8bf7464ce3d09e8ab95eff5aef496b56a61833675,2024-11-21T07:02:06.313000 CVE-2022-30034,0,0,8fe6274bdb8b07197fe928571802beaec94b5f94476e6088bc8f77d56e8d836a,2024-11-21T07:02:06.453000 @@ -207284,7 +207284,7 @@ CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb6 CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000 CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000 CVE-2022-41220,0,0,ad29ea38b072bf58585a8e13186655e2e23bda37dd415a6a1e953b27bc78646e,2024-11-21T07:22:51.447000 -CVE-2022-41221,0,1,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000 +CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000 CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000 CVE-2022-41223,0,0,d5c686c09d3342e8d375627b9a2b1c429335074239336f50b05e7aea94075f24,2024-11-21T07:22:51.913000 CVE-2022-41224,0,0,166e5234c48c055c19f09bc2c5da4feda446cc9117a08eefd15b6324545e43f6,2024-11-21T07:22:52.057000 @@ -208116,7 +208116,7 @@ CVE-2022-4221,0,0,c3ed54d13577be1fcbbe89f9fe5d6a7f7aec0478031808f088803ba0f73de9 CVE-2022-42218,0,0,e56bbc1e79a6b7b715ab5c96de7dc81a5b5bf8f992bc94909b2a8075ff481af3,2024-11-21T07:24:31.957000 CVE-2022-4222,0,0,9f0f62e0ad502fd7900c569783ad9029d782bd46a0513ab22d201296ac5a6335,2024-11-21T07:34:49.263000 CVE-2022-42221,0,0,22cb1d5c362e6ce83cad250d332a9b8ebcaf3a72dd7627752e8a0f435d5aa533,2024-11-21T07:24:32.100000 -CVE-2022-42225,0,1,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000 +CVE-2022-42225,0,0,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000 CVE-2022-42227,0,0,d1eb18a0c4fc2be883366222adf7b8f679fb279c1d46312139a0a5942b91a003,2024-11-21T07:24:32.430000 CVE-2022-42229,0,0,30d4ffa5106cde8593ccff0549029cf9a81b07534e7c788198cdb3cec710b8c4,2024-11-21T07:24:32.590000 CVE-2022-4223,0,0,43ffd072faee8cd340b416e1c49fed0811d650f79e3ed18c62f5d8dc99587977,2024-11-21T07:34:49.397000 @@ -210755,7 +210755,7 @@ CVE-2022-45872,0,0,a907443ce4f03e99a976737e2d47cb015ba05e3816eae1b1e624fcdd21611 CVE-2022-45873,0,0,42c6c1129d53ef778f4baa826bc586cb39ac06b30554c1745f3ebd88089eac8c,2024-11-21T07:29:52.680000 CVE-2022-45874,0,0,604801db89e4183fba09cead9348f5c7327b92d504380bbdcca7e4a2e64d1fb8,2024-11-21T07:29:52.830000 CVE-2022-45875,0,0,1aac1f8a1a71defacecd22a49897d882cf79fc760121966b688b6327a6a1addb,2024-11-21T07:29:52.943000 -CVE-2022-45876,0,0,d42b75b223aa3974435b6f221d5bb446829779a7df31b5b159eafcfd795a7d4c,2024-11-21T07:29:53.063000 +CVE-2022-45876,0,1,d70a8354437a5d727daeeefbf8e766205015f588234179d2757a51060bbed30f,2025-01-17T18:15:18.117000 CVE-2022-45877,0,0,06951f61cfe71647f0cc3451d7152061025f7464a71023684c548a20a56e8dff,2024-11-21T07:29:53.193000 CVE-2022-4588,0,0,d97280b0462e32d7444e6df8f57ab38a4f8f5cd3c5d546d73a8096388c6bf7c0,2024-11-21T07:35:32.953000 CVE-2022-45883,0,0,61d96562f23562a14c36a83a13dd17a03fd4abc321b9a6adf2fd11a4fa522081,2023-11-07T03:54:55.933000 @@ -213538,7 +213538,7 @@ CVE-2023-0428,0,0,0de93bb0e535635eebbfedf99112ce8cef3ca284b9e0bd9f8cd68750853b4f CVE-2023-0429,0,0,e0618680b78219428317d6601f27ee8a8a87ae62e6dd517b8d19758523eb5906,2024-11-21T07:37:09.807000 CVE-2023-0430,0,0,acc72707e03d0df228268319b61aeb8ed5dd3736ea4142fcd4397f7588a561d9,2025-01-10T19:15:31.433000 CVE-2023-0431,0,0,459bdaa83a3fb57e14cccc7abf189e66653179e7b70ce44db48ce68f910d878c,2024-11-21T07:37:10.037000 -CVE-2023-0432,0,0,c18e0783d1e0318a05bbd49e4ea8bbbe47ddc14a8a5fde83bcbd13b6911b30c3,2024-11-21T07:37:10.143000 +CVE-2023-0432,0,1,f570b71e1e00458582a8171c05750fba52db4f805d00c30b1811d9ebeabd8ec9,2025-01-17T18:15:19.433000 CVE-2023-0433,0,0,d42e70fbf8f746ae44adccb8cc0a5b25d08ad867d573fa4f7fa6107bc224a64c,2024-11-21T07:37:10.260000 CVE-2023-0434,0,0,f6a521f3082f28ce6108fa4ac69c86e0205efd2c815548544f3fe58009020014,2024-11-21T07:37:10.390000 CVE-2023-0435,0,0,e42db54bec450824437717898db9abe4d680ff3a0ab18892f0b145e2a2a338f5,2024-11-21T07:37:10.510000 @@ -217072,7 +217072,7 @@ CVE-2023-22297,0,0,e2cfb145db1e3ffb902651a518ec98e6141d79673ccfed77db7cf2dbcc633 CVE-2023-22298,0,0,f6dc805831e3b12f7de9ebd55e11a238a6127133a62593b1508897e8f9f4cb83,2024-11-21T07:44:28.837000 CVE-2023-22299,0,0,84693ef0c7bb509df895e8bac855b156e0a311fd0ff082f7e19ad8e321dcec41,2024-11-21T07:44:28.933000 CVE-2023-2230,0,0,2376b593af6286fafded76ff5926b1e2b7d1ae9ecbf888641f9486885a8dfaba,2023-11-07T04:12:14.200000 -CVE-2023-22300,0,0,050be24c7c96f9e183e131604c3ab54b16bc7dfef76b8b41af210a17fa0bad62,2024-11-21T07:44:29.050000 +CVE-2023-22300,0,1,dbcdd932d1d304d05b27d88d5f52e3ef46ee88dd096a5519f2d41c93013439bc,2025-01-17T18:15:19.947000 CVE-2023-22301,0,0,0a10a6dd91105447bae548de98a8ea94a99eaf9991d4047f34aab0e2b29db3a4,2024-11-21T07:44:29.147000 CVE-2023-22302,0,0,ff5426583dc64cb2c6b21518546068fd3e471ffa8da3386dd10671de652a67d5,2024-11-21T07:44:29.253000 CVE-2023-22303,0,0,61c82bc74511e23b43e9e302a9d93cbbbc62e7ebeb9f7c7eff0d77d6380a2b1e,2024-11-21T07:44:29.373000 @@ -219730,7 +219730,7 @@ CVE-2023-25594,0,0,8abf09e59f68ceced335bf46e94e35be82d646a84818ef449033b8635a8f5 CVE-2023-25595,0,0,726a4d03782813d387168e4496552502f96f8a0a02861e47f01e358207039d15,2024-11-21T07:49:47.773000 CVE-2023-25596,0,0,f88f62634ad25859484d0cc31d9b059e5a63e3289ddac7a38fb605882d4dd22a,2024-11-21T07:49:47.883000 CVE-2023-25597,0,0,4517b2582a5f522ffedbc2116021e054810f3e35d0154a016d6237b2a8116c33,2024-11-21T07:49:47.997000 -CVE-2023-25598,0,1,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000 +CVE-2023-25598,0,0,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000 CVE-2023-25599,0,0,e8f10bf4c5e1aae36571db6e2ab215516a8e52f6532eb9e92eed30ee54734b43,2025-01-16T21:15:14 CVE-2023-2560,0,0,31b34f6bacde082f5f057474e07f836071f934616db2b7cff0b0479c82958eb1,2024-11-21T07:58:49.790000 CVE-2023-25600,0,0,74c80d7f9443116975fdc60b897e0fe9401c713116e099707e64f108069de608,2024-11-21T07:49:48.400000 @@ -220028,11 +220028,11 @@ CVE-2023-25908,0,0,d44360c825c09bea35279d42c7153a53fdd12277415e34c57903e54091770 CVE-2023-25909,0,0,714cddfdd75f1b4ea7e881417d151c8506ba152190ec1d08ab811eee9d658732,2024-11-21T07:50:24.600000 CVE-2023-2591,0,0,7c27e595b888753998a6776d8423b11e7f3b409c6e0417d28bf825dd5249753f,2024-11-21T07:58:53.503000 CVE-2023-25910,0,0,142bba38733997b5c55a3c0d314fb84004341c894367bd7f169e7fa153e7a506,2024-11-21T07:50:24.710000 -CVE-2023-25911,0,0,fc74b4cf72f9b9c4e0b7fc011c9ec763163c929ac5129f1d0f337641a7b3894b,2024-11-21T07:50:24.840000 +CVE-2023-25911,0,1,3a98c867d12555c60f4262e8e77d7030a7b621afb972e2fc259dffbe88e1dec4,2025-01-17T17:55:14.593000 CVE-2023-25912,0,0,894b2fd5456e8fbe83ab0b10f0eab811da9a1928879e0c3db64875eb953082fd,2024-11-21T07:50:24.967000 CVE-2023-25913,0,0,6a91a9eded59c00cc598635ddbe6932ed1f65268ece3db527fc9c04fac8cb0f4,2024-11-21T07:50:25.080000 -CVE-2023-25914,0,0,59463d2416f03e6ec5060d7963c40a18472420a29b874c6c0db6f09f0993e112,2024-11-21T07:50:25.230000 -CVE-2023-25915,0,0,ac1356fb3904fb3480ee562c53e20c2c96f303b68ae0d6270f1b87a4d55643e6,2024-11-21T07:50:25.357000 +CVE-2023-25914,0,1,36c08243bbd0fd2e7dd128385e9c7089591b2279e1b972aff853340762b88b5b,2025-01-17T17:54:40.107000 +CVE-2023-25915,0,1,05f4a66d1d321910afa31096f2d912825cea9a498d14478101ad02866603e99b,2025-01-17T17:54:52.697000 CVE-2023-2592,0,0,d74a21ad07e81cc347069c4edc810aec39f12ab86f734829ab6d0c99d89af9e9,2024-11-21T07:58:53.627000 CVE-2023-25921,0,0,f72a487373fc04597a1201466c7f2d8d56c50717e5bd21fbde587ac436cc3f45,2024-12-13T20:53:05.783000 CVE-2023-25922,0,0,0f1b8f78298cca9f068ffab08027b1337d94c98e2e6d7df4df0fdc8dba2aaec7,2024-12-13T20:59:47.813000 @@ -221033,7 +221033,7 @@ CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f0 CVE-2023-27300,0,0,2731d707de1e6137ea37ccb1442ea1cbd992ea5ff26bc94a835093c579079405,2024-11-21T07:52:36.353000 CVE-2023-27301,0,0,e75569c03530c3787db8a5025aaab05ee1c08fac50fc8089fc27bbc2e8472b25,2024-11-21T07:52:36.463000 CVE-2023-27303,0,0,eaba63aa37eb9af5018680bdd423400f9bb61ff48e38b570d90bcfc6fc3388c9,2024-11-21T07:52:36.580000 -CVE-2023-27304,0,0,0cc477c992ee1b38ae38bbdc46238b14feb337e2b454b418b8dab36b98667dc7,2024-11-21T07:52:36.693000 +CVE-2023-27304,0,1,a501e65e3e5e550e7f4b34c3cc05177415e4066170476ccfb2c5465e18a13d85,2025-01-17T18:15:20.303000 CVE-2023-27305,0,0,4cf303d0c0928a90e24c0a02412c953ca387fd40216cdb277dcd541ec2552dd6,2024-11-21T07:52:36.803000 CVE-2023-27306,0,0,847b158e63f2fc7a89b9766d995e5e48514f49c69fc074204576112481970259,2024-11-21T07:52:36.923000 CVE-2023-27307,0,0,213313277f2b73db10152e58d2dba3376cab552d70210ef03d7d5a0122e0a747,2024-11-21T07:52:37.050000 @@ -221119,7 +221119,7 @@ CVE-2023-2738,0,0,935afffba4de04fc2776d13f93d9bc63c51d6e63056330c8371d2f5d680acc CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9dd12,2024-11-21T07:52:47.567000 CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000 CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000 -CVE-2023-27384,0,0,6504a55fe0ffca21f7605fabdf0a7b2260b2c2ce952fc153e652bb9e0e1e8fd6,2024-11-21T07:52:47.937000 +CVE-2023-27384,0,1,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000 CVE-2023-27385,0,0,c68ecdf016bf2281f407cb9610cd4bbaeed3891f5aa2195ad6bf2208b3c782a6,2024-11-21T07:52:48.053000 CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000 CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000 @@ -221570,7 +221570,7 @@ CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea CVE-2023-27923,0,0,3a143fd60fb8ad11feb760b5ed0965b170454e4647e49db79d5756135e427dea,2024-11-21T07:53:42.473000 CVE-2023-27925,0,0,5ca31ace52a2e3cccc0fdb2255ed7d5bbe1b629ee84594ecb1eee3b8e95dc54a,2024-11-21T07:53:42.590000 CVE-2023-27926,0,0,92311e685781f75574201f01b5d1ef2b44ddb89904a003df3573343542e48164,2024-11-21T07:53:42.710000 -CVE-2023-27927,0,0,52779eb444208f1ba62abd320b1a5c02f84dc7b293d3dd48c6ff5c6cf3a83eb7,2024-11-21T07:53:42.827000 +CVE-2023-27927,0,1,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000 CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000 CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000 CVE-2023-2793,0,0,a02ac57ccfcc6bf1345b991bf0b54c08efcba6693c369c3c8f72453068bd79c2,2024-11-21T07:59:18.110000 @@ -221663,7 +221663,7 @@ CVE-2023-28010,0,0,cea1c83b1a1de56721d3fff63387ec5e4316025f3be2e1922fd578f16178e CVE-2023-28012,0,0,597f3d542aa3e6d473b0ee06f4f2e30fc7a3c4c261db6e2d7465a4141feca741,2024-11-21T07:53:55.727000 CVE-2023-28013,0,0,ca8516e045e8d827755979c2497ae1dcbf1ff4b1ae4c4f57debc7acf63dfc852,2024-11-21T07:53:55.853000 CVE-2023-28014,0,0,ae9cd8ad6f351e0324a3851e33ca9a5e2e664060b026db12d466ef4138088fe0,2024-11-21T07:53:55.993000 -CVE-2023-28015,0,1,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000 +CVE-2023-28015,0,0,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000 CVE-2023-28016,0,0,0ea99d77c33f9c7f63039000d06d08b21178affc71516064cbbfab51ae1cb932,2024-11-21T07:53:56.240000 CVE-2023-28017,0,0,35716eab1dbf086839b9951cc0fa716a1f08b1df0f6dd81d881099e22403968f,2024-11-21T07:53:56.363000 CVE-2023-28018,0,0,2094804c51d0176650ceccc697a32d6ba95bbcbf330493713ccb998d3d224411,2024-11-21T07:53:56.500000 @@ -222025,7 +222025,7 @@ CVE-2023-28380,0,0,ab6a7a500298be9ef83244b76d2b0ab34530ee1d27727ed37830671bc6501 CVE-2023-28381,0,0,1a9707f277ef8a423a186132cbd8b4225a287d1b1d7725f1112d0c37de025b98,2024-11-21T07:54:57.673000 CVE-2023-28382,0,0,54474447f09dc7eb708c86707f5aa7484af8959e42f6d0e871698326dab881d3,2025-01-15T16:15:26.460000 CVE-2023-28383,0,0,48697de1cca90d6b3ae134dc9ce22dcb6a22b4802be54231637854c435aacd58,2024-11-21T07:54:57.887000 -CVE-2023-28384,0,0,e957b9384de65ebb6a80a839cb3cd2ea8a514b08919aa116c79524b409a5f376,2024-11-21T07:54:57.990000 +CVE-2023-28384,0,1,4aa33c82e76bb6f8b4b0942e1b075d8e06f17782150f9a17400d8fd319ec11ad,2025-01-17T17:15:07.697000 CVE-2023-28385,0,0,61bd73f4c07fb2f7be9167196c277434b81452ce75602fd8f2e661a62695b4ea,2024-11-21T07:54:58.083000 CVE-2023-28386,0,0,3d8c94f9f394dc7e85a4ca0e062a20b7cf4b75bb1621666ff00503e30a10da09,2024-12-09T18:15:19.273000 CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb1395ac,2024-11-21T07:54:58.317000 @@ -222043,7 +222043,7 @@ CVE-2023-28397,0,0,4bff9ed10c02507982d7b9dab6671245255794a218efdc6bf229f1abb9748 CVE-2023-28398,0,0,2aabdbc180b2d9821f7c6981a841f35d5201adbb04843a3da9d33c58786be7c5,2024-11-21T07:54:59.510000 CVE-2023-28399,0,0,111e9d6b4464164ec693f6735189466b823de7819518dc53ec80cbfa558e019c,2025-01-09T21:15:22.560000 CVE-2023-2840,0,0,0555537b6851b1fe0f6a1eeae24d6aca47261971d05f2008fe758de20f6417ba,2024-11-21T07:59:23.673000 -CVE-2023-28400,0,0,67a025af7ef4baf741188bdcf00c3ad589d6aec1acd29840c9e7a073fa94c0cc,2024-11-21T07:54:59.713000 +CVE-2023-28400,0,1,d2704defd653ccb34a33fe61fb32d5cdc1e9e3155cf972a3d09da48df74e31d6,2025-01-17T17:15:08.363000 CVE-2023-28401,0,0,102355fdd79556c54d740c7afa362a52f2c638a67b948508ee1e87ffe44821d9,2024-11-21T07:54:59.807000 CVE-2023-28402,0,0,c38e72831463b69c6b40624d71abcb938422de02ddbe9d1a7ec65f3416f64165,2024-11-21T07:54:59.930000 CVE-2023-28404,0,0,8cba623eb88a12f1ff1c663d93cba5426a2b008fd2ff25ef48ad773dee2738e3,2024-11-21T07:55:00.030000 @@ -222289,12 +222289,12 @@ CVE-2023-28647,0,0,6e622e4c8c506d34225481f32977a08d6344f5c37a9e28afb412ed024963a CVE-2023-28648,0,0,858ff9277a18ca9a6568baa82146abca15de5820e777ceee09d8606939c08232,2024-11-21T07:55:44.227000 CVE-2023-28649,0,0,b546ed1247b528c80127d17229ccdf396336cfa9f485e93db64beff6ef3a7373,2024-12-09T18:15:20.430000 CVE-2023-2865,0,0,4ca47513f5d6c6a421ad8e01776d00552671f81eb53474ef196889d12cfa70d1,2024-11-21T07:59:27.100000 -CVE-2023-28650,0,0,1450dfd4e00e9813b9f852d7a370533d90f4dbe8459b3ea198bdd944c6ccfc68,2024-11-21T07:55:44.473000 +CVE-2023-28650,0,1,eb49d182b6197d597a763add36dcef3af56c2de51acaec560234488e891091f6,2025-01-17T18:15:21.340000 CVE-2023-28651,0,0,f7cb336db603427fd325f39326faadfed8890a1591be62055f8fc4903963d889,2025-01-09T21:15:22.740000 -CVE-2023-28652,0,0,ff42aa9eecf10ae50957c0e1ecd97ffcd5926fcdca37afd4572284e734c4f3d4,2024-11-21T07:55:44.680000 +CVE-2023-28652,0,1,fe4235591b4c07f5e3485ad090b6ce9d4d95c115269d5c6ab90efc13f7f374f9,2025-01-17T18:15:21.607000 CVE-2023-28653,0,0,85425f9a644d94dcc88660335cf1fba4048b509d7b414b67f0faa690535532b2,2024-11-21T07:55:44.780000 CVE-2023-28654,0,0,131327885e5fa2643b72e4d86d04cdaa97dcfd352bd1c6dbe7aa3f5c6b65815c,2024-11-21T07:55:44.897000 -CVE-2023-28655,0,0,8409128c7a1b366a01a25f870d9615353d35f13c524988216bf809a856adddca,2024-11-21T07:55:45.003000 +CVE-2023-28655,0,1,6686d9a13539db5cf9c93492ef593c530700e40eb842775590ba3529e11a8526,2025-01-17T18:15:21.850000 CVE-2023-28656,0,0,71923347f2d14def6102f4bf85546159cbcf14358f9ea6a41c9c6f7bdf0458ca,2024-11-21T07:55:45.103000 CVE-2023-28657,0,0,b598ea5dd934ee0fcc5ee876e12d99ee8cec046c6f6f43a4f6bea3784038d2c5,2025-01-09T20:15:32.300000 CVE-2023-28658,0,0,4721cc7813fa8c14291ea10a6bd934084fd896731e35e1047a44b653e020baa0,2024-11-21T07:55:45.320000 @@ -222359,7 +222359,7 @@ CVE-2023-28712,0,0,65d46ac765e466c7b19911f8fe09fff905333a780340064cdf6d30726ab5b CVE-2023-28713,0,0,0c63ac3fc393e79d8eb979361877f48466e2baf57ce0eccdfd761ffa103b8706,2025-01-09T20:15:32.550000 CVE-2023-28714,0,0,7963e328f5538c35128d9e328b5ad35d468e921ea64ebebd603d2bde06d9db28,2024-11-21T07:55:51.683000 CVE-2023-28715,0,0,639383fbbab5d4f6889d81c843a9748eac9707d5ee8b338fa759de273f23cf9c,2024-11-21T07:55:51.827000 -CVE-2023-28716,0,0,b7087015f3c47188165e814a63a01569dc6584313b021a53e9f89c7fb622fab3,2024-11-21T07:55:51.953000 +CVE-2023-28716,0,1,42e0d8096fb1f7bfe4f3c119d4a3f0ef669a7c634429090ac53fcf3d97ed21d4,2025-01-17T17:15:08.537000 CVE-2023-28718,0,0,f847f98e8b25e13dddbbfc5d671ea260cbe9537c6d0d2d7c291bab4c19d69849,2024-11-21T07:55:52.073000 CVE-2023-2872,0,0,c809c535f35d54173eac0975d903d1696c449f170ba2895550c167a12d662551,2024-11-21T07:59:27.960000 CVE-2023-28720,0,0,ac09d331d5cfd20938bb7223dd423e76cc8964f995f8c7729deac6115c29c8ea,2024-11-21T07:55:52.187000 @@ -222744,7 +222744,7 @@ CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3e CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000 CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000 CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000 -CVE-2023-29150,0,0,53fd9d7666e4c7481ad461d2c290eea5e35316c6b0e762d9d695758c393300a2,2024-11-21T07:56:37.140000 +CVE-2023-29150,0,1,c2f33a58cfaa7e9c12e1da6a90a6dfb46bfd0d9dec7fa728bf1442451c2a122d,2025-01-17T18:15:22.093000 CVE-2023-29151,0,0,727047795af5b498bb8bb582c46dd36be3631963786c95d5e8a4ca6f1c857b84,2024-11-21T07:56:37.237000 CVE-2023-29152,0,0,eceffce06206d987481c535a3ea7c671bd8caa5cd08c017b9a186e3d386a055d,2024-11-21T07:56:37.357000 CVE-2023-29153,0,0,4a8bc2238fb5bbbda2a2410b86d68f6271586134e8d4666b131c2ea851408a47,2024-11-21T07:56:37.470000 @@ -222763,7 +222763,7 @@ CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a8 CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000 CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000 CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000 -CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000 +CVE-2023-29169,0,1,1f1155f544b4cef09f3c22f102bc2105a854d1e4172805984714266e7b7a0f86,2025-01-17T18:15:22.337000 CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34 CVE-2023-29170,0,0,a14eee9c3b65ac3bd8d74bcf4947cbc176ea7dede3e441303f55531eb26d21b7,2024-11-21T07:56:39.230000 CVE-2023-29171,0,0,209e525798550871fedb6e85e35b4c826a5963d1b417ebdf34529996104307bb,2024-11-21T07:56:39.340000 @@ -224593,7 +224593,7 @@ CVE-2023-31759,0,0,a2d84b0a8dca779bd4a75f12eaed410b890b68e8e762e9e85d5ea4a9f199b CVE-2023-3176,0,0,999fe1ea7317073fe2b31bb323d98a6f29f6d8081642f27e32d077db6c6b4e5e,2024-11-21T08:16:37.740000 CVE-2023-31761,0,0,5b67bf26500bf4283d4625610816cb1fea1c4f34676ccb4e96c23468ee410707,2024-11-21T08:02:15.193000 CVE-2023-31762,0,0,74ed2cc1b24d33344283a6a9f3444e0b89de3bf42393ee059f6f223b7fd77e5e,2024-11-21T08:02:15.327000 -CVE-2023-31763,0,0,529cb6c35ab3508fbb4fe5b768b5a89cfedf5e45655775944ccb778d70d078ce,2024-11-21T08:02:15.463000 +CVE-2023-31763,0,1,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000 CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000 CVE-2023-31779,0,0,57d1dd015d41bdb7a16d9d6f14cf7992f409481c534697d1fe2caa03c46dac25,2024-11-21T08:02:15.617000 CVE-2023-3178,0,0,3137810340e9e86c4c3b5db496a9f5d0dabc9dbc8cd8490fceb40dfc4e419573,2024-11-21T08:16:38.017000 @@ -224612,7 +224612,7 @@ CVE-2023-31807,0,0,767b5f080466fa8df5df923ded96cba99455e65929a37edf8f27f16c63dcd CVE-2023-31808,0,0,4b91e1f555e81a8997ddae2e290898c6d0be80669ff94777a810f5c7a28d6784,2024-11-21T08:02:17.140000 CVE-2023-3181,0,0,f85113ad48f7de9b5138016b5a769db3ba1263ef4e9bd2ae1e4348037f618738,2024-11-21T08:16:38.460000 CVE-2023-31813,0,0,8e8fc395bcbeac8e899865e7f66dbb1c6df21b82d10cdc9a327fabcc1831a1ae,2023-12-16T02:15:07.263000 -CVE-2023-31814,0,0,7a627986bb85e8e35b669fb28e3cdea34a3c6eec5454bcdf5d5b8d2da970f381,2024-11-21T08:02:17.297000 +CVE-2023-31814,0,1,63e15e3e48004d4af1bddab36ab4ec66f76fbc3890eef88216b584ab5e7988f8,2025-01-17T18:15:23.030000 CVE-2023-31816,0,0,adbf1d16e4cc0799caba61ef60180156a31de4b8c68096c52a492443b815a87f,2024-11-21T08:02:17.440000 CVE-2023-31818,0,0,e2293c2ab2a56409b4ddc5add2c2e04bfaa690b925948f5dfb2f11b0fa3fe3f6,2024-11-21T08:02:17.570000 CVE-2023-31819,0,0,f8ffea9ec7bbc711c06c9fb7fdeb8d6590e2c99b3e86e7a8fedc11e5f8dc25dc,2024-11-21T08:02:17.720000 @@ -224623,7 +224623,7 @@ CVE-2023-31822,0,0,45613132497589a9dcb950e1f37ac3a395cbe029e376bf9556698be4e3a27 CVE-2023-31823,0,0,0ce96b85f0042f0b6d51089686bb1cbb368a5ff87b8ac60c040e2010e668d2c1,2024-11-21T08:02:18.273000 CVE-2023-31824,0,0,1f194dcc013dbea37681faeac319ede47ce10cb4422c1beef9219e2bc0a23d81,2024-11-21T08:02:18.413000 CVE-2023-31825,0,0,03dbe4b1a5682614e9eab4c399d6d51c119b6e7b094e5b42da6f242bce34bafa,2024-11-21T08:02:18.570000 -CVE-2023-31826,0,0,262ced0a2e626dbfd2a116dba5aa150ca6fa01a95f2a5e4879a4b55e3ad96f54,2024-11-21T08:02:18.720000 +CVE-2023-31826,0,1,94ad697a1cf2f06936284069cbcf1523df00d869d08e163fd3260b126185eab1,2025-01-17T18:15:24.380000 CVE-2023-3183,0,0,53da3111600f6b312ce92b28909fdc893a3ab679b13c31964b17fca0c5c6dac0,2024-11-21T08:16:38.710000 CVE-2023-3184,0,0,5a98f666e0a46484595c3fa08341e96998bbd480baa7f5b498adc629dfeb2239,2024-11-21T08:16:38.857000 CVE-2023-31842,0,0,216b8f15018b084ece08520bbe6db9754d2bfd5a6c33dfcefd31c96d920099ee,2024-11-21T08:02:18.863000 @@ -224639,7 +224639,7 @@ CVE-2023-31854,0,0,1afe22a18848e9c434b0c259f6d2c90301fa42928d2094ebf0bc1b4b52fc6 CVE-2023-31856,0,0,ce256db1525fce6a46e28d9cc8111df499b2085637139fa8706530beb5896492,2024-11-21T08:02:20.267000 CVE-2023-31857,0,0,7bd3853f2c55682965431fa0d6799811d368a0e716fd1913e523e8cb2e1eb410,2024-11-21T08:02:20.413000 CVE-2023-3186,0,0,14a8a3e02f8d6ed26188c9f463e876e766ad72b9a21434e816a4de3953e3d487,2024-11-21T08:16:39.013000 -CVE-2023-31860,0,0,b19f93d6a0c37e48d579870939cf38501c29b9fec1e4af7e585d4bb8b6a49d17,2024-11-21T08:02:20.550000 +CVE-2023-31860,0,1,c8cd823357aabe2248349ead353aa43605af9164cf40845a237ab4fd189848d1,2025-01-17T17:15:08.863000 CVE-2023-31861,0,0,00ed8b460a421cbea6dd8b076a614dfb6e50c87d17fb1a33433f66e14cf7477d,2025-01-16T15:15:10.720000 CVE-2023-31862,0,0,e5d2282f2c43ebaed31f9de83715b1445773fd7849c890a179b5317ad27e92a4,2024-11-21T08:02:20.827000 CVE-2023-31867,0,0,3f97c746a106b59feb7da8efbb130c3ebd33dce765f13b1306b2c553d6ba473a,2024-11-21T08:02:20.963000 @@ -224708,9 +224708,9 @@ CVE-2023-31983,0,0,ef58504e0a637118d6f8845dd53840a1d2db8ad16799a879832aa8e940c8d CVE-2023-31985,0,0,bd98f2530ab95ee94061aa53e90417410a462732cff960d98902197614bfe101,2024-11-21T08:02:28.473000 CVE-2023-31986,0,0,4554667e4b44524c54a58b9599dc684ffccd4e428d7fd728ba8c634cc47230b6,2024-11-21T08:02:28.607000 CVE-2023-3199,0,0,3090d868ba2232b79a6345d288a327f64a94c462d32135357515a4c0d92e958f,2024-11-21T08:16:40.807000 -CVE-2023-31994,0,0,8f3259b7baaa21013a3ed60deaccd9028d223659ec6283d27b8b7206dc79d99b,2024-11-21T08:02:28.753000 -CVE-2023-31995,0,0,fd73938999eb646be2e37ed7c0ede7812f9d86f32a33bf7da0a61b1076e2ef3c,2024-11-21T08:02:29.403000 -CVE-2023-31996,0,0,5bb80e295e15fdb70abb0cfcbfb03a96a8d6ce706d3028dd7b043d4557847bbc,2024-11-21T08:02:29.653000 +CVE-2023-31994,0,1,f52d122711ee0b067c08e1d09861ac42925c6e7f35be5acf7e4bdc9abaee5571,2025-01-17T17:15:09.097000 +CVE-2023-31995,0,1,7b0c1be4afc967363ddd9adb4811ac5626f5b72b8d18cee0978a04ff5aed9f62,2025-01-17T17:15:09.840000 +CVE-2023-31996,0,1,8addd81106eaa0f63a624672d923cf5a11a3c2aa0439ab8109e4f0cc63f3e2ea,2025-01-17T17:15:10.213000 CVE-2023-31997,0,0,23a6860242c9df6be185c42cfd4a4a473fe5b3dfcafad46e19bcae2a47554244,2024-11-26T19:15:20.320000 CVE-2023-31998,0,0,ac25b80b9728b3ab0412e032d163754f5150cf9245971c8f4f1d63d9f7860f81,2024-11-21T08:02:29.997000 CVE-2023-31999,0,0,4453265e6b17508561fd877c6ee02695732cb6b46320f037e8dc6cfcebeb75c8,2024-11-21T08:02:30.127000 @@ -234977,7 +234977,7 @@ CVE-2023-45585,0,0,ae76bf0d2278756cf8178bb595651b14f13c7b9a7bccf13bd28d7b4108cbf CVE-2023-45586,0,0,6b565c71ab704bd8e631f209959d1898851432ed4bb3fc8b2b21c0a6ef49fb65,2024-11-21T08:27:00.740000 CVE-2023-45587,0,0,025d5ccaec3461c7aae70d71ac1f3ff5df6906dcd056c99dca83a5aac53bbe47,2024-11-21T08:27:00.890000 CVE-2023-4559,0,0,6d3dd9975708c32ae11f782d8520452850e9b29b83aba9a24d0d60628e2c25a2,2024-11-21T08:35:25.270000 -CVE-2023-45590,0,0,6524e3cd1fe04a3ebb0f01ad1b0473d8c7217e18eba48abc93f18386ca01fba8,2024-11-21T08:27:01.027000 +CVE-2023-45590,0,1,05ecf04760c6be91163ac0bd5d4f759690d034198a058ca36f4c11671ed8f2dc,2025-01-17T17:08:31.843000 CVE-2023-45591,0,0,45936665370901cf6bd6f3c4d1fb0775d3e157fe83efb64965918cf648dd4184,2024-11-21T08:27:01.167000 CVE-2023-45592,0,0,668bbe96709a91593d310b83f278f0ab698a6defdb9b3a305c9d33af64243101,2024-11-21T08:27:01.310000 CVE-2023-45593,0,0,15650ee38208d7c8cffe49c3f51f946f93a352336d9e31486e0ce70c376d733a,2024-11-21T08:27:01.460000 @@ -236485,7 +236485,7 @@ CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66 CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000 CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000 CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000 -CVE-2023-47542,0,0,2c301ea3fc1923df3d1786b1c81f5d6312992d198827db876d7bcd4ba7084720,2024-11-21T08:30:25.520000 +CVE-2023-47542,0,1,308ff121ada77a017b97131c594f13cddaa5bbd0edbee9d59a4996597c3587ab,2025-01-17T17:11:28.947000 CVE-2023-47543,0,0,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000 CVE-2023-47544,0,0,37c99d07aab35bc0bebf060938c609faefc3158817cf4b2a384b1ee52ef99508,2024-11-21T08:30:25.707000 CVE-2023-47545,0,0,4f687d84e6811695356b024af283b6469f1342f0a2079897109fb36bb91ed5d4,2024-11-21T08:30:25.830000 @@ -237508,7 +237508,7 @@ CVE-2023-48780,0,0,c639956bfab0ce7bfd5af6156a8111806fc286d7ec80bb19f8083e2bac841 CVE-2023-48781,0,0,443c0eaace84c8a3023340ca81970964577a0302cfc23bcb008a36d2a89d846b,2024-11-21T08:32:25.940000 CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382cba,2024-11-21T08:32:26.063000 CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000 -CVE-2023-48784,0,0,fad171fd5c14eb35c1913cc0abf8a8b72cc534253e00f688d3b68ba966faf302,2024-11-21T08:32:26.347000 +CVE-2023-48784,0,1,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd6241e,2025-01-17T17:19:51.033000 CVE-2023-48788,0,0,117cd7d9101610b085c354a97190a21e5f1fc93ca8e7af0fad52f3fe309ccf1e,2024-11-21T08:32:26.470000 CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000 @@ -240096,8 +240096,8 @@ CVE-2023-52543,0,0,5283d1b3068666f9df1d4bd34373b734822e71b72480090d12dd8445b86c1 CVE-2023-52544,0,0,406148b07c3e067d8a9476be53ce0c11d92291c013d48a8edbe35d723499379b,2024-11-21T08:40:00.890000 CVE-2023-52545,0,0,9a8fc8901aa644cde1d29ca0a0573e4a085058e72b5ee8839f817feebb241a74,2024-11-21T08:40:01.073000 CVE-2023-52546,0,0,595e1c1b42c7971cff7132e9cb85749c3833d2ddda52158da49cbfedf79cf606,2024-12-09T13:54:48.487000 -CVE-2023-52547,0,0,8137c1d12289f1a7f98ca28b5eeaf4141cb9fd996bf309fb636147e5123add7c,2024-11-21T08:40:01.370000 -CVE-2023-52548,0,0,041a4244e394c3d794809c7145324075f3f7c8df545d2b61c18f23ceec55ccd7,2024-11-21T08:40:01.510000 +CVE-2023-52547,0,1,13cfbe1c918f5a4b0cd0a89536bf425d70e25d07630d011e3b1655a8627d09ed,2025-01-17T18:32:12.300000 +CVE-2023-52548,0,1,5e9b74916239ca79bb24807d83861f84cd24ded664a5de58fa1b70ca1489bc61,2025-01-17T18:31:57.740000 CVE-2023-52549,0,0,ee9009133fbe9f80d74dff5352f9b88a18a64ffd6ce72d5c26cd7d7807302fcc,2024-11-21T08:40:01.647000 CVE-2023-5255,0,0,b25817cf164b6b92e839f9fb2ed96a7d7247900cb99b8587774e529fa151fa4e,2024-11-21T08:41:23.090000 CVE-2023-52550,0,0,df02f2239718e53b99444de87a20222af6feaf7990812f74cec672b0ce4ff90b,2024-11-21T08:40:01.840000 @@ -240275,9 +240275,9 @@ CVE-2023-52706,0,0,834345482be0d546ba50b0cb794dcb116ce50eb7b30eea30e56c36d1bfaa6 CVE-2023-52707,0,0,1bc7b595266b548d6027993e063414952e1e09f68ff73fe8319f05c3207dc492,2025-01-06T20:39:33.220000 CVE-2023-52708,0,0,79d1647a46a1e762e1f72065b91297259c43d8680df6c2128c54f559c8998f6f,2025-01-06T20:39:58.813000 CVE-2023-5271,0,0,57c69f88684b23484c89729e90ea1a49339f972575180d1b4d31fadcdba0e1a2,2024-12-23T15:18:44.853000 -CVE-2023-52710,0,0,047e81a360897731f880d0599d295390f5494134b8904c6c7f6a32cc4bcc9d22,2024-11-21T08:40:24.760000 -CVE-2023-52711,0,0,cc83855bf8e359d211f376a5ee43650e9cad5f7403105f7df8dba026dfcb6788,2024-11-21T08:40:24.883000 -CVE-2023-52712,0,0,65525446b7fe131921c52f55da75710a708ef74b13614948d7ca7ba37ec14414,2024-11-21T08:40:24.993000 +CVE-2023-52710,0,1,9bbd1f7a1a4ed012966ab0abb1a3fc7deb2b0ba4106e8e59e3113756325b8d92,2025-01-17T18:32:39.963000 +CVE-2023-52711,0,1,d29b43a79a6ec43805b15017ff2a9696d678c401f57fa7f6617f0b13154b0601,2025-01-17T18:29:39.560000 +CVE-2023-52712,0,1,d1b8d695e6cb234f9215c75edf54a720cfc64714a12f2c0ba8d6f0c02b1ba711,2025-01-17T18:29:32.770000 CVE-2023-52713,0,0,de6af38550e0c85a611046675f7763ec3d45059f76427f0389872a42693db02b,2024-11-21T08:40:25.107000 CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a0ec,2024-11-21T08:40:25.300000 CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000 @@ -243093,7 +243093,7 @@ CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc73 CVE-2024-0834,0,0,4909462b05092a27a61fc0c22b9068b69fa51b5caf1c544fca449cadfb1bfd00,2024-11-21T08:47:28.510000 CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d8662f,2024-11-21T08:47:28.640000 CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000 -CVE-2024-0837,0,0,54f84e3002cfdda564fee9168d6c1c7df787ca0f6cd3259ca2097134909dbeda,2024-11-21T08:47:28.917000 +CVE-2024-0837,0,1,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000 CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000 CVE-2024-0839,0,0,49086e11eae50fdeaa0fd1455d8cc94d52d9a0af6af252bac9ff62fabed8f3b8,2024-11-21T08:47:29.143000 CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000 @@ -244996,7 +244996,7 @@ CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000 CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000 CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000 -CVE-2024-12022,0,0,8ddb6cca3fbeae75228ec6bf3688dd732e1771ac09aec57ec3253b8f7ff26581,2025-01-07T04:15:07.677000 +CVE-2024-12022,0,1,4b0c4a5413ab235f6d4162bb8baa2320652f2e63275aee3944d2530558cd3296,2025-01-17T17:15:10.533000 CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000 CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000 CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000 @@ -245064,7 +245064,7 @@ CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921c CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000 CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000 CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000 -CVE-2024-12124,0,0,546dc01e2004b604a5fc415ca243f058dc4bcf606929b3949091b081b3f7e353,2025-01-07T05:15:14.340000 +CVE-2024-12124,0,1,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae9478697896b9,2025-01-17T17:15:10.653000 CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000 CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000 CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000 @@ -245131,7 +245131,7 @@ CVE-2024-12204,0,0,dd2419f837ae2e8153f295f52cb2a01f412a1909c214527d0037cf9f21b9c CVE-2024-12205,0,0,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000 CVE-2024-12206,0,0,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000 CVE-2024-12207,0,0,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000 -CVE-2024-12208,0,0,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb921361cd,2025-01-07T05:15:16.270000 +CVE-2024-12208,0,1,570ae5920f0e6b28dc0cde719aa86834356ad1572351e3f8a72e245ec26cd554,2025-01-17T17:15:10.740000 CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000 CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 @@ -245270,7 +245270,7 @@ CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000 CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 -CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000 +CVE-2024-1239,0,1,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000 @@ -245395,7 +245395,7 @@ CVE-2024-12536,0,0,a925f1a48eff74b537962fd623796390384e9d276d37e7a9cb0d9ba10f946 CVE-2024-12538,0,0,09768d3293edcfe78eeb71291a6d043c617de31a086c72fbf20722cd5259fcb2,2025-01-07T04:15:08.720000 CVE-2024-12539,0,0,bf2bc8684b4967ec9692452689aaa296f660969c9ab0dd0ec9b638e64908ab0d,2024-12-17T21:15:07.183000 CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c91,2024-11-21T08:50:09.993000 -CVE-2024-12540,0,0,e5d4dce4760b17e4b41f398ec25e8f7eaa8cdf3185b056e79b164244a895d465,2025-01-07T04:15:08.917000 +CVE-2024-12540,0,1,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000 CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 @@ -245539,6 +245539,7 @@ CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000 CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000 +CVE-2024-12757,1,1,01072d625822b49e01384e601159c9c64ccc9d51e280e2ccbf25f2d79b8491d5,2025-01-17T18:15:24.690000 CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 @@ -245812,7 +245813,7 @@ CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417 CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000 CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000 CVE-2024-13145,0,0,d619d4a0aac8850d0c75f520a9103dfd5ad1c1ab851866f38b7082760726771a,2025-01-06T01:15:06.253000 -CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 +CVE-2024-1315,0,1,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e526,2025-01-17T17:30:38.363000 CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000 CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000 CVE-2024-13156,0,0,41775375a80c93fa0950178962cf86cfd1e2c8b60f46eda85c616b6213d4e16e,2025-01-14T09:15:20.910000 @@ -245994,7 +245995,7 @@ CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a8169 CVE-2024-13502,0,0,e35d372750cc88cf9cffae844c3d280bfcd57c36093969e074e189ae9463f58a,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,7576f806eda86dcd6b291425bfcddf3d4f266c37af3d5042d8bdb800498b7aa7,2025-01-17T14:15:31.317000 CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000 -CVE-2024-1352,0,0,85cabdc392d08eea6a3af07faeea17433d56015caabb9ac17b4ff2bf52f31c91,2024-11-21T08:50:23.583000 +CVE-2024-1352,0,1,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000 CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 @@ -246049,7 +246050,7 @@ CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628 CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af3816,2024-11-21T08:50:30.790000 CVE-2024-1405,0,0,f1f20b7fcf6fcb7016c5464ac9de09f0711e13473f6f7d4ae7139e675dbe1403,2024-11-21T08:50:30.937000 CVE-2024-1406,0,0,6b28f10833aa0266c21bf391a699e38b0fbc18d07df506bf50ade27d766794c5,2024-11-21T08:50:31.093000 -CVE-2024-1407,0,1,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000 +CVE-2024-1407,0,0,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000 CVE-2024-1408,0,0,6ef60a72951d16c0b9e728b84742a4d35c67925763670f067b8c3c5941c31590,2024-11-21T08:50:31.397000 CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d89933849,2024-11-21T08:50:31.520000 CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000 @@ -246070,7 +246071,7 @@ CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000 CVE-2024-1426,0,0,23b1a7306f53e67c5a563c9eb21d3cdb5365fa187ec8c954a68012e8a35c2dc8,2024-11-21T08:50:33.500000 CVE-2024-1427,0,0,045d36306302d266d38f2f3182a2a05490c1c0ad4388299e4f45dc3722894b2a,2024-11-21T08:50:33.653000 -CVE-2024-1428,0,0,3cd64d4a3fa95db0c0830882d4e3074eb351510266e9e0c2b39fd04a5a4216fe,2024-11-21T08:50:33.803000 +CVE-2024-1428,0,1,7796e13a2999d1217a0322c4c01e6866cfb2671a8159abaf43ba19808bf938a3,2025-01-17T17:48:58.150000 CVE-2024-1429,0,0,5058e99ef8f14eb515834ad0343e76a35ce86f45fd71d223b1d90d473652ec8f,2024-11-21T08:50:33.927000 CVE-2024-1430,0,0,3bc978d4dd692ba7ee4a7cc4d11c20fe662c755ea27eb731ad29addddec20cba,2024-11-21T08:50:34.050000 CVE-2024-1431,0,0,1230d8600678d12f7d6985eeb6243f7c0dc22668eba8d5138026b4c6a9e8e477,2024-11-21T08:50:34.230000 @@ -246098,15 +246099,15 @@ CVE-2024-1453,0,0,0227e7a01863c94405e531357cdb0c10b796444052d7a86292908c61c86741 CVE-2024-1454,0,0,efee886e7293fa134cee300a2fdd8efed7a47176b613af6fe8be478634f8010f,2024-11-21T08:50:37.150000 CVE-2024-1455,0,0,e455ef50023fd394d707ee63f10df4453b9d4808077ff1d6df4f5071b048364b,2024-11-21T08:50:37.310000 CVE-2024-1456,0,0,8633e71f4c77a0e946debb84f2a4c8ad3ebd080d1f02a90e0c9dc34b01539861,2024-11-21T08:50:37.443000 -CVE-2024-1458,0,0,ec3c20bc97fb6748d28a5192421ff51abc4fc396fdfc1241392bb352efb114cb,2024-11-21T08:50:37.560000 +CVE-2024-1458,0,1,64c7a0990a0e5ef06a6e068d0f77c7374d95774ca4d8bc6bad25be47e5b94f2b,2025-01-17T18:25:27.900000 CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d0440,2024-11-22T12:15:18.250000 CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000 -CVE-2024-1461,0,0,f584e3dbeb8031a8d480cb017e172e2d88e2d972ca75e28d7328042b55e0ef9c,2024-11-21T08:50:38.083000 +CVE-2024-1461,0,1,8dba5338edac7720c236df8c7d75c36d10f5b1986f4c4e03d386744d26d52663,2025-01-17T18:24:39.060000 CVE-2024-1462,0,0,22404aaf8a49dc841b4dfb8015ef3d92bcfb9afb2b174c3158b4a5b6857e5937,2024-11-21T08:50:38.210000 CVE-2024-1463,0,0,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000 -CVE-2024-1464,0,0,774ba0954367abdcfc9850ebba4296f304d8bfcdbba1a93325f46f442fb6af2e,2024-11-21T08:50:38.453000 -CVE-2024-1465,0,0,5ee667cd15d63ff1bbe794bed1e8ceb6109854a7af40827b767f317b47dc50fd,2024-11-21T08:50:38.583000 -CVE-2024-1466,0,0,8462e6000ae5180e55e19d0c1e3e4e7bfb5efcb71a99f4875c7c2804764d132a,2024-11-21T08:50:38.723000 +CVE-2024-1464,0,1,5381513a296e0115ec061d8021538ebcb7a85f8770f33c8709fe5ce514f2b318,2025-01-17T18:23:39.073000 +CVE-2024-1465,0,1,6e2482f9a41a51ae12b482537f83a337bec29ff5e6cdb76e1e42ee95e1d60318,2025-01-17T18:20:39.593000 +CVE-2024-1466,0,1,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe9e,2025-01-17T18:18:00.443000 CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000 CVE-2024-1468,0,0,85909a6551afb5c9ed643a3adcc66d39fbe3b663e240971373eb4ce702b3469c,2024-11-21T08:50:38.970000 CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000 @@ -246257,7 +246258,7 @@ CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13a CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000 CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000 -CVE-2024-1638,0,1,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000 +CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000 CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000 CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebeaf,2024-11-21T08:50:59.030000 CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000 @@ -247353,7 +247354,7 @@ CVE-2024-20906,0,0,b4d72f656cf19f941cb7a69e3c7a565591c3735c1ab6b1104f219eb9464e8 CVE-2024-20907,0,0,9de2ea9ebaa4c3fac2611c739233ad03c8e983e9691002701b71e49fbffb565d,2024-11-27T16:32:05.720000 CVE-2024-20908,0,0,e474d686b39416846ee4634efb324374d3301b95c4cba0a19fa75306b0cac4d0,2024-11-21T08:53:24.567000 CVE-2024-20909,0,0,e43d2b35de49633667df467f3c5d76ceef589ccb2fb385fce0db3081ab7dffa6,2024-11-27T16:32:02.417000 -CVE-2024-2091,0,0,ed67c4fdff53bdb98073a15f2bb6c16b7511d3ac2ec4c3ab94c7ebb85210e54c,2024-11-21T09:09:01.480000 +CVE-2024-2091,0,1,93bc41da0198455afcea975292628c6f37c463bc63f01893faeaf48ffb1acf07,2025-01-17T18:35:09.950000 CVE-2024-20910,0,0,0bebdc0efa26f8e0ead70e258e2c32c4d75b4b13d5813b7de7da8abdb4d78871,2024-11-21T08:53:24.803000 CVE-2024-20911,0,0,44ed94f6571ba1ed6ab71ecc01af753b87e7e45ad9412fbc292b9940946694a8,2024-11-27T16:31:58.250000 CVE-2024-20912,0,0,4e4c54d5b304f113a69d58829f20fa3206b36f29bc855bce84ffcddf8905f158,2024-11-21T08:53:25.047000 @@ -249088,7 +249089,7 @@ CVE-2024-23120,0,0,ac06c2c8db62927ae0ff0b52d59bb679bc1d15c17597778456fb9ce2f4737 CVE-2024-23121,0,0,f927b1f7d7032f240c6a22fe10e3d2651315dc82dec1abe13791c8df2c776bd6,2024-11-21T08:56:58.800000 CVE-2024-23122,0,0,ea802f83148f077bdcacee0853bb097b88aa7ceae9c8e0c76ab719a3e8347479,2024-11-21T08:56:58.993000 CVE-2024-23123,0,0,89e1dd12c90aff262f16a0b9365760f22dc8506be190b933a3cedf3239423eec,2024-11-21T08:56:59.180000 -CVE-2024-23124,0,0,3b1c96fd882b953a33460a38ff4c1b12232b92cb58f94c23614efc884e43af35,2024-11-21T08:56:59.373000 +CVE-2024-23124,0,1,cf624f3b7cab7fb6fee299c2ba5a965e125ffc8d32f57a5bc3192c1a58f0ad11,2025-01-17T18:15:25.030000 CVE-2024-23125,0,0,554e34bed34462f3c5363e8b180e04e5c1d1cc8bc89dab422d642a824457d1a0,2024-11-21T08:56:59.570000 CVE-2024-23126,0,0,f8e5b5479f3c4daf2ec0a157b4f70ad1b3649cbac015e49b433a4827e6695343,2024-11-21T08:56:59.750000 CVE-2024-23127,0,0,e62634191327f3ef7db3dc55bd00ca620754343e9d8fb17493a6507775a8363d,2024-11-21T08:56:59.940000 @@ -251320,7 +251321,7 @@ CVE-2024-26125,0,0,2c3257bf64e1f9bb73b26a4fbfc8be684d1eca4cc144ede6e81b1ca262a90 CVE-2024-26126,0,0,0704f19f338f2bb0acb508b253d0a2da44d884d4f86de92b6da40568e6480cad,2024-11-21T09:01:59.287000 CVE-2024-26127,0,0,a7e023b5ba5da3ad7af563324822a120bd0bfe59d4cb07ca927224a3bef75883,2024-11-21T09:01:59.407000 CVE-2024-26128,0,0,6ec59e3a008feca6738de761b3be3df5c35466eb2f92117550b0e2c3bfd06b31,2024-12-20T19:30:47.733000 -CVE-2024-26129,0,1,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000 +CVE-2024-26129,0,0,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000 CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b17,2024-11-21T09:10:07.777000 CVE-2024-26130,0,0,59dbefc86c1031aba378031c672a5f376743b0d682ff90d25ffac7caadc4d1ea,2024-11-21T09:01:59.757000 CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af4029a,2024-11-21T09:01:59.880000 @@ -251346,6 +251347,11 @@ CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb8 CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000 CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000 CVE-2024-26152,0,0,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000 +CVE-2024-26153,1,1,8c3ae9d2191858fd283b4e2f045e9afabdf52853492d2134f5e3c0013293cdc1,2025-01-17T17:15:10.927000 +CVE-2024-26154,1,1,7a55563f56bdbef2620b8c6a609d390524041b120bd24f125f40f1983869dda1,2025-01-17T17:15:11.147000 +CVE-2024-26155,1,1,9d6b88e7dbfad19e0aa14afa460da6171af4b161cec0634841d95815c20f7672,2025-01-17T17:15:11.327000 +CVE-2024-26156,1,1,5ab58b3651faaafae4e5f4c0ea29eb006a0c55d0423cdf2a04d4a07b8a66b5c1,2025-01-17T17:15:11.533000 +CVE-2024-26157,1,1,29cbdb0747048f6bf38c1a2fd7f90815e3a23c4798446d9d3ff85458ea1e4770,2025-01-17T17:15:11.697000 CVE-2024-26158,0,0,09fc1d75121ad09ea3a275f9cccd32b38ff46d4cb1778bb89e6ac29161fd0e25,2024-12-06T15:40:50.143000 CVE-2024-26159,0,0,1b48fef43c59f3ec54fb486cca3f3676b117339286d3339609cb0579c3d1ce4c,2024-12-05T03:06:07.380000 CVE-2024-2616,0,0,3c1888c11eeab37d5acfcf6bb075f78798d2b23b1d25b092860d7147320c3bea,2024-11-21T09:10:08.330000 @@ -253073,7 +253079,7 @@ CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f31 CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000 CVE-2024-2819,0,0,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000 CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000 -CVE-2024-28191,0,1,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 +CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000 CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1e2b,2024-11-21T09:06:00.070000 CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 @@ -253104,7 +253110,7 @@ CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c75 CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000 CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000 CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 -CVE-2024-28235,0,1,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000 +CVE-2024-28235,0,0,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000 CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000 CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000 @@ -254220,13 +254226,13 @@ CVE-2024-29982,0,0,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adc CVE-2024-29983,0,0,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000 CVE-2024-29984,0,0,1e929976d60d8d8c80a8b4b034fd4acc9655224e09e9042f98560c9a35205d22,2025-01-15T18:43:37.357000 CVE-2024-29985,0,0,95b40f746fa954c9414076d1fb815efea23aa50e94505fc471b09342077083a5,2025-01-15T18:43:11.970000 -CVE-2024-29986,0,1,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000 -CVE-2024-29987,0,1,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000 +CVE-2024-29986,0,0,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000 +CVE-2024-29987,0,0,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000 CVE-2024-29988,0,0,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000 CVE-2024-29989,0,0,56c8da873d916d5205300f56ed402933d12560adf2d90e379890eed42730b04d,2025-01-09T13:56:22.663000 CVE-2024-2999,0,0,2ad67e6bafa77ccafcc440f8e6b2fdd38c9778d3b6a3320578b33ffe57141c4d,2024-11-21T09:11:01.453000 CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000 -CVE-2024-29991,0,1,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000 +CVE-2024-29991,0,0,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000 CVE-2024-29992,0,0,644115a5ada5fd5eaed583dff910388cd7f6edd044c415d410798c64ac367a76,2025-01-09T14:45:52.750000 CVE-2024-29993,0,0,8ee39683bcc6bbc416a9ae96b7bc55ff379fb32e28c9270e9552fcd426131466,2025-01-09T14:37:56.660000 CVE-2024-29994,0,0,f65b69994d750908f737db869af19a3c1faa7da239f527bc4d8473a3cc86632d,2025-01-16T19:10:54.100000 @@ -254295,7 +254301,7 @@ CVE-2024-30051,0,0,5ec7db5e17e429ad755582fa5375a88e7eac6c3de3113f00754fbbb45b33c CVE-2024-30052,0,0,0c318c74f7faa87993deeda3866261297ec0ddb2746c0eda81dbb9b59e40e3d0,2024-11-21T09:11:08.930000 CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000 CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000 -CVE-2024-30055,0,1,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000 +CVE-2024-30055,0,0,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000 CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000 CVE-2024-30057,0,0,ba33c9985864f7902ef361ee4e4e325819ac2bc85f178562cda86ff59e397ce3,2024-11-21T09:11:09.533000 CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000 @@ -255923,7 +255929,7 @@ CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf29561 CVE-2024-32147,0,0,0015a72344f3020594d938609bf1336e585f7e37db5d3978f4116a4c5b174873,2024-11-21T09:14:33.310000 CVE-2024-32148,0,0,bcbcb84cdf067050c2de05f2b2117ff412680d783b9484863f82a8a6e2a92a10,2024-11-21T09:14:33.430000 CVE-2024-32149,0,0,e0c6e240bf305db98fa85abfaf803a0c1cbaf878c7d8f6ce0402b338521663c9,2024-11-21T09:14:33.557000 -CVE-2024-3215,0,1,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000 +CVE-2024-3215,0,0,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000 CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f25738557d1,2024-11-26T11:21:59.167000 CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000 CVE-2024-3216,0,0,6e9522f1c7c9e9a3f76fb9a1485b608987693fafdd4c6cd3272aed28685da99b,2024-11-21T09:29:10.010000 @@ -256723,10 +256729,10 @@ CVE-2024-33146,0,0,171629cc4b8cb62195d164515a6fed4d8999741d196bb0f46c6f160081fc7 CVE-2024-33147,0,0,c2cfd2d98b97ea5fdcb835818c9cad8c555afacce5b3b33cc198b2c0c2ba88be,2024-11-21T09:16:34.300000 CVE-2024-33148,0,0,2ee283993abecdd7aea3eb59900cb3b6cc9343c210c9948918a7a2beecc034d8,2024-11-21T09:16:34.530000 CVE-2024-33149,0,0,d43e332631e90db62a378f49f2cf8a062308e47f9d7a2517b540f3e0dac713f1,2024-11-21T09:16:34.763000 -CVE-2024-3315,0,0,147f97c493fc524e9b618f92596e58ed1d424e789310fc8b1cc391b05a1ea242,2024-11-21T09:29:22.670000 +CVE-2024-3315,0,1,e98ec5c2219d8a677fdb86f16335eacd9f6d03801c8a70ecb07c7bf871cb992d,2025-01-17T18:13:08.297000 CVE-2024-33153,0,0,481314339668aaf169249d85fd2b6e9627ecf80bba0d1e9713ac541257b23ab0,2024-11-21T09:16:34.973000 CVE-2024-33155,0,0,fdf923dee29327949bc8bb3302e7b608f6177ab22c676a11a94533e29c6e2def,2024-11-21T09:16:35.187000 -CVE-2024-3316,0,0,e0385a047eae736d56fa7774a4819a8e38f51b8b96e680f666f810bc895aa910,2024-11-21T09:29:22.837000 +CVE-2024-3316,0,1,098aeca75fce567e175a1215c88d935de40f13c8ed1cdac936f1abcb274d6bf2,2025-01-17T18:05:50.107000 CVE-2024-33161,0,0,bfd6ab00b53005b4160e045b162320b83cb8a5f21cb9faf3e3e69d505f0c9e2d,2024-11-21T09:16:35.457000 CVE-2024-33164,0,0,4c5ec4d6c3445b968e7db0a41e1381ba58914545669a129a94c9838b9164e330,2024-11-21T09:16:35.903000 CVE-2024-3317,0,0,2300ffb19702a15d6babc122c587a264a1a6930b14e95b1445b1a2f5a5cdb317,2024-11-21T09:29:22.997000 @@ -257100,13 +257106,13 @@ CVE-2024-33749,0,0,f12371c90977a51378783144de48785764dc249964e292b81c628eeced6df CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000 CVE-2024-33752,0,0,303257eae9122abbdacdf0312dd251da9cbaf8817e28d2e256d7349a5b409390,2024-11-21T09:17:26.520000 CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000 -CVE-2024-3376,0,0,092de719ff3e0b505e3632d0bd47da3bcd5d657b0208533d3e02409827184b57,2024-11-21T09:29:29.570000 +CVE-2024-3376,0,1,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000 CVE-2024-33763,0,0,1e99603accd6dab0b74b0083676bbb54ce1319eb251cb7662607692e2fc57aef,2024-11-21T09:17:26.930000 CVE-2024-33764,0,0,6af47bd6c4a3dca716e33159039af29ff3b524b01eaeb6a1f2c644c72e853c6c,2024-11-21T09:17:27.127000 CVE-2024-33766,0,0,03eec9cc0fd600612d151defefb0e31ff4e0c9a3876ab639dc77d4c88cc5a358,2024-12-04T17:15:12.700000 CVE-2024-33767,0,0,b80958f05e128719de0648dd8cae5c2d8a3e5faf8f3e970a0e7ab179c3bfc022,2024-11-21T09:17:27.407000 CVE-2024-33768,0,0,6bfd88d3b1297a873ea532d4c8a7bbd94c13baa508d333d99b1c9978e541270c,2024-11-21T09:17:27.533000 -CVE-2024-3377,0,0,2f7b71339dc9c8a4dca130edf1c6e7db5d640bb443c45acc1b81e08e2d799f2d,2024-11-21T09:29:29.710000 +CVE-2024-3377,0,1,d8ca10a55411d4c80f26dc1944f5e959ac69d5da65bf6d27cff0d4b4c6ab3d94,2025-01-17T17:35:40.243000 CVE-2024-33771,0,0,ed0b49470c65e3871d1940fa0b3cbacf7ab413d179c5d64a9d938d0a4abdc56b,2024-11-21T09:17:27.720000 CVE-2024-33772,0,0,a6a00fe9413924c4a4b26071283f7474a04c107e4dee0d16d05d331c8ad95c1b,2024-11-21T09:17:27.913000 CVE-2024-33773,0,0,56f82f3734f8ba835b2e983e98b73956fee4286b1269d584a86ea254d75725ee,2024-11-21T09:17:28.097000 @@ -257444,7 +257450,7 @@ CVE-2024-34153,0,0,0130eed18b1a9a87fe4a501a0193d13a00438732c37407da9f8fd10e2ff55 CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16960,2024-11-21T09:18:12.633000 CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000 CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000 -CVE-2024-3416,0,1,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000 +CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000 CVE-2024-34161,0,0,2c366ee1b57d461f68e85fe2d68570b44da9298dbc452eb855b30363fe2b90fc,2024-11-21T09:18:13.217000 CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000 CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000 @@ -257452,18 +257458,18 @@ CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b8 CVE-2024-34165,0,0,05db88a6da35010dc20b3e8a9d223822b8683997a0c67d0b2d4f9d52b701ab91,2024-11-15T14:00:09.720000 CVE-2024-34166,0,0,b65e3f742ada4aa97bbad2fd2ef9b5642c8b234eddbb763ea26559729ad0d782,2025-01-14T16:15:29.033000 CVE-2024-34167,0,0,b64f17228e82af8e3cfbfc8cc266e318fd2d8ce529ce993856d797ebadc36da9,2024-11-15T14:00:09.720000 -CVE-2024-3417,0,1,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000 +CVE-2024-3417,0,0,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000 CVE-2024-34170,0,0,5d43fe9fb1c0c5ca40611077a724b542eaa2e023bbe67fbf24d729c47b6470ee,2024-11-15T14:00:09.720000 CVE-2024-34171,0,0,eebe78f5b25cec30dcd14a8f47bfb97c41cf65760a12406709beda21c627599d,2024-11-21T09:18:13.917000 -CVE-2024-3418,0,1,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000 -CVE-2024-3419,0,1,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000 +CVE-2024-3418,0,0,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000 +CVE-2024-3419,0,0,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000 CVE-2024-34191,0,0,e746afd9a92f9dff6e4ada85c106d8b00b6270936c8e514e831f73fb24a6a2a3,2024-11-21T09:18:14.050000 CVE-2024-34193,0,0,8446fc40425660bbb6c8faef1d786a3a74e2e9b3c7e39f75ac6bb75d99f360f8,2024-11-21T09:18:14.267000 CVE-2024-34195,0,0,7b2b923be1f39c81e8f2094bddad2be6ed9b0bc12f72616acced47e2f24d4bcf,2024-08-30T15:59:08.873000 CVE-2024-34196,0,0,2a0e6ad915887cb7c9651bb279549110d78b7b88d707afa20e4abe342cff21a5,2024-11-21T09:18:14.660000 CVE-2024-34198,0,0,e2696bcaf016e336b09510488bbf039e6a5097a3cbd9eb67814b2f340c9fcdfe,2024-08-29T20:36:45.497000 CVE-2024-34199,0,0,94c50635c16fea9c525571c62b1cb43b7f636cac29ea803ba2bd2ee61ce52389,2024-11-21T09:18:15.107000 -CVE-2024-3420,0,1,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000 +CVE-2024-3420,0,0,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000 CVE-2024-34200,0,0,27e9d45db103eb5460a1a1cb3bfb76d60f31d6a9bd7b2a9bab39305be55f805b,2024-11-21T09:18:15.337000 CVE-2024-34201,0,0,5bd793720e4992bf4857da402a400e18ebfefbdbaf38794a60325a551dacbd74,2024-11-21T09:18:15.563000 CVE-2024-34202,0,0,cf9bad4b83a5394bd60c41bc93dcc1e3c923cf8f2ca02251f5f5ea3f115e28df,2024-11-21T09:18:15.790000 @@ -257473,7 +257479,7 @@ CVE-2024-34205,0,0,8d36985104ff5d5e120aea9cb4bce9e1f31a2da5102693a76352bda9c549d CVE-2024-34206,0,0,945078f994a796433d592f08bcc7a2ed915743a5f69a10a672d804d02d45662a,2024-11-21T09:18:16.650000 CVE-2024-34207,0,0,ee087726f9078c9026d8651cbe397c80879d18133b733e62347b6235647be16c,2024-11-21T09:18:16.863000 CVE-2024-34209,0,0,23a0086974f749b70babda4a61b3cd611f85f71fd52536d4fc99d9fef3a3a1a4,2024-11-21T09:18:17.070000 -CVE-2024-3421,0,1,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000 +CVE-2024-3421,0,0,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000 CVE-2024-34210,0,0,5ab268367892a7ed66ca9f970f4f449d8840eaff0c9063f4a35282a4b3fd6034,2024-11-21T09:18:17.283000 CVE-2024-34211,0,0,ac334ae6e5cb8a1d967262bc4c496b0210ce6d92661fd47d7167a29a9a7cc9dc,2024-11-21T09:18:17.500000 CVE-2024-34212,0,0,f932dcb31169cf40186f594cc95fc35ae4efb6b9b581f9f5bcd98eca1d85c35e,2024-11-21T09:18:17.733000 @@ -257482,7 +257488,7 @@ CVE-2024-34215,0,0,e6cddb986c9b85172cf3b1fa1cc572977eefc052534144ada951fb8e0fa4a CVE-2024-34217,0,0,e75b7e7eac7040fd4961b5eeb39d860bff29689de9e80a56b29cd2f45991c310,2024-11-21T09:18:18.453000 CVE-2024-34218,0,0,209c3963a8dea0aeb75193e0a4f4688e9c10ef53892b4d2abe98b260daca377d,2024-11-21T09:18:18.677000 CVE-2024-34219,0,0,d04dc7f4bd443b20338ba824e66b3ed379623b6bac0958da54f08cfc0407971e,2024-11-21T09:18:18.893000 -CVE-2024-3422,0,1,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000 +CVE-2024-3422,0,0,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000 CVE-2024-34220,0,0,ea3b638a0ad7e7b5b21e6837c13d51fd0282a71ba173fdb7f01e6006ada82a85,2024-11-21T09:18:19.117000 CVE-2024-34221,0,0,5bdb0fc79cd75e9a7f818a361c57194b1225b8358331fcf3592024f663afd166,2024-11-21T09:18:19.333000 CVE-2024-34222,0,0,0c26215edbf7be7db1f1ad76aecbebfdeed9b1a3a427504e193a4c98f675c75c,2024-11-21T09:18:19.557000 @@ -257493,7 +257499,7 @@ CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4c CVE-2024-3423,0,0,d93fa2aa82d74348c343103dd41dfdcb78f23bbbf018959a0d2f38920066aca6,2024-11-21T09:29:34.370000 CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000 CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000 -CVE-2024-3424,0,1,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000 +CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000 CVE-2024-34240,0,0,a6cc74a4b7e6ac1ff4630f4dda1cfe0067255faac0d07ac084685fd926fc750d,2024-11-21T09:18:21.180000 CVE-2024-34241,0,0,e6b9fe6b441390d6d7cebe002b321929ea0e881ede166ad6eb49a567d3b43c57,2024-11-21T09:18:21.420000 CVE-2024-34243,0,0,ab2b6cc30302098b272d3d3616ac174369a493b8cecc500f7c3250ac61308f25,2024-11-21T09:18:21.647000 @@ -257501,15 +257507,15 @@ CVE-2024-34244,0,0,c0de0ab156df18aaf776b84719fdfc1b4932e2d3f59ca3253b2c3b8740d66 CVE-2024-34245,0,0,e6fd27a6271a5f5585096a1b7b99399bdc11d0aefde030caef76f62e04f9a659,2024-11-21T09:18:22.043000 CVE-2024-34246,0,0,3e22ad074fe9d91e948d79151371bfaf86765e202dbc830978a91d2fe9e4241b,2024-11-21T09:18:22.303000 CVE-2024-34249,0,0,3dab1167fd4f27a134b3ac9112bd70fe01cb7720cfdffee84276a73a90df12df,2024-11-21T09:18:22.590000 -CVE-2024-3425,0,1,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000 +CVE-2024-3425,0,0,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000 CVE-2024-34250,0,0,9ed02b35edbbbb26b151553fdc0aa392154afe3a9b2196b878ecf4ad1d34aadb,2024-11-21T09:18:22.880000 CVE-2024-34251,0,0,fd07ec3cb070a3ae80f69dded9157369c3f0df86b00ea0fcf962e7e317fa75d0,2024-11-21T09:18:23.187000 CVE-2024-34252,0,0,3c13aff3fdad9ff41dabf1e45dc15b69fc8f7be09feb79dac572b3754bae489a,2024-11-21T09:18:23.470000 CVE-2024-34255,0,0,d19f6d83e426b3cebffe58f2c412d7bd0aa9d6a92605a880b672c30923e8e6b2,2024-11-21T09:18:23.707000 CVE-2024-34256,0,0,bc98fd7190fcd122da0b5cd3b0e20bec504d7930a3a44be4b14317b7d5a4dc9a,2024-11-21T09:18:23.973000 CVE-2024-34257,0,0,9334e0dc917b4c810f0435df51ac13770da0c132d8236e8b356e47e3fecaec9e,2024-11-21T09:18:24.203000 -CVE-2024-3426,0,1,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000 -CVE-2024-3427,0,0,16acd00baaee8833427ce732a1683b4733501d48836096a2b47715bfe7bfaf47,2024-11-21T09:29:34.933000 +CVE-2024-3426,0,0,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000 +CVE-2024-3427,0,1,6d2c58ef390e816481f4abfc3a3695a143bfb0d9c0cce52634f39617c254b53e,2025-01-17T17:02:59.153000 CVE-2024-34273,0,0,b2d5bd0db28edc08b98857b038ad9abcd63178cec6ca2b16d62e526c095d82eb,2024-11-21T09:18:24.437000 CVE-2024-34274,0,0,15fd2109f2bacc33eb25ace43e53125aefa94083620124221c093ea11690842f,2024-11-21T09:18:24.653000 CVE-2024-3428,0,0,3038c9702cc204891c747b542f4612e219eee1881f1fe769520d370fc294fda5,2025-01-17T13:44:10.790000 @@ -259995,7 +260001,7 @@ CVE-2024-37426,0,0,3293d67bf998ead79e31c0d3ab1db91404f4d097e7d7c778732752052388c CVE-2024-37427,0,0,ca62e1a1fb136dd5921e721be945658c95f18d221b28bab4e797b9c114f2e12e,2024-11-01T20:24:53.730000 CVE-2024-37428,0,0,e0967feb0808fdb437078244ff52b2d8e71358f0e68724f3d851c25c00e914b4,2024-11-21T09:23:49.880000 CVE-2024-37429,0,0,5f8575bf5ff94ebcdae86f116fd20534f9071936711e2c54792c3462f65eb058,2024-11-21T09:23:50.013000 -CVE-2024-3743,0,1,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000 +CVE-2024-3743,0,0,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000 CVE-2024-37430,0,0,ddd123a7460cd354e7c0ed943ed5fc44297b333202a2cdd449df9cadc0cb77ba,2024-11-21T09:23:50.140000 CVE-2024-37431,0,0,b496291512c08284b73bb4e9ff47c34844386c77487b67fd4a8733b21890f892,2025-01-02T12:15:19.650000 CVE-2024-37432,0,0,aa8f36053b0942c9c26f582f8f5dd0c866a94355bfb57fd6a4fbe735eb72ea35,2024-11-21T09:23:50.263000 @@ -266164,6 +266170,7 @@ CVE-2024-45827,0,0,14b2e3c223bee3e57f3f499ba2a6632d8d5cb7e001c1dd0d7aff42ddb6920 CVE-2024-45828,0,0,73bbe0dd60535323b4b9452d4adddfba7eb9c9fe8494d20ce8a68ff41c4895cf,2025-01-11T13:15:21.450000 CVE-2024-45829,0,0,ab7f0021bb7a93beaac116d04129f4163df742a680ddbc4de2302713f584254c,2024-11-05T19:38:57.827000 CVE-2024-4583,0,0,785a5bb3a36957836b7a383b7765b0b67cf9852b800aeb286c820ff0407ffb78,2024-11-21T09:43:09.317000 +CVE-2024-45832,1,1,d75bfc3e389f08270f7efbda4f6a9926c8035de2d7487181b2202066be5a30a1,2025-01-17T17:15:11.870000 CVE-2024-45833,0,0,ae7b140338ecffbe1ee920d82db8b77234d8b98166b6071308a3a15f45eb4089,2024-09-23T13:43:42.073000 CVE-2024-45835,0,0,702ff79a19ec21ea639e2383e91f88244f4dc786df2938ac17e866b8515461ee,2024-11-01T14:20:56.350000 CVE-2024-45836,0,0,5680ea0def6f9713e80f70cc8753dae36b28506dd79a8f561bc910ac3bc36a66,2024-10-03T00:35:53.797000 @@ -267760,8 +267767,8 @@ CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12ecc CVE-2024-48121,0,0,3214bee7da8e3f509f7412f3e279397011d850b12d106151290f87bcfd743976,2025-01-15T21:15:13.063000 CVE-2024-48122,0,0,ef4dbe73ddcbe3747d75bc0f305c7993ceeca917a7b17b9ddb38c3b776858056,2025-01-15T21:15:13.200000 CVE-2024-48123,0,0,1ce64456a782985d4c9c698673e093b6139525cfb44a23952e0fe7744f609606,2025-01-15T21:15:13.340000 -CVE-2024-48125,0,0,c3755bd226434427c2b180f569b2230179d5af35e7843e7c981f9561e09afddd,2025-01-15T21:15:13.477000 -CVE-2024-48126,0,0,a82082fdb76a284967c26fe2fcc716154230021a5b401682f7689f4e75b72428,2025-01-15T21:15:13.613000 +CVE-2024-48125,0,1,52b4c432cd9d44248f4716ba7255cd00638eb9bcc133a6e2c0153681beb1d818,2025-01-17T18:15:25.547000 +CVE-2024-48126,0,1,39da822ea5af8f88748dbe07438d4c6a18c6f0004db8538062615ee5258f4755,2025-01-17T18:15:25.800000 CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000 CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000 CVE-2024-48139,0,0,1d758cb962b76524a06521373672f481daf5d3617952ffba3fa119154194d14e,2024-10-25T19:35:12.730000 @@ -268309,7 +268316,7 @@ CVE-2024-4913,0,0,8f1077ca1f909bbf49b8f2a274026fe5a87623cec281204da7efc615ad191b CVE-2024-49132,0,0,a869c7f291d5f7192227780fdd0e95f330808e8aa6cad44f6af8f94cb45de649,2025-01-14T17:48:33.683000 CVE-2024-49138,0,0,286dc37677622c63dcdad4f86c15d7e8b98bbb3aa097b7516a11d8c38b7b5d16,2024-12-13T18:09:53.140000 CVE-2024-4914,0,0,c1e4acb17def81a0854cc115da953100335e1c8f9a391685fb384320f3256d4e,2024-11-21T09:43:51.437000 -CVE-2024-49142,0,1,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000 +CVE-2024-49142,0,0,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000 CVE-2024-49147,0,0,6fba53ba9d6b385fdc5b31747e6fa75096746742b3ab2cf525cf8f2b1550ed5c,2025-01-10T18:09:53.377000 CVE-2024-4915,0,0,0db50bbbf81e6509cf2f04f7c74802ee1539c5988eb17e78bcc8e3a916243d8d,2024-11-21T09:43:51.583000 CVE-2024-4916,0,0,46062bb382c89200b166e2e86c9831624440cd917b76f7208234261e0e99e402,2024-11-21T09:43:51.723000 @@ -269571,7 +269578,7 @@ CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34 CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000 CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000 CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000 -CVE-2024-50633,0,0,bffa469638f740cac5bce5ceb980b8f0c4d11ecde1ec474e9ebfaf88e77990a1,2025-01-16T18:15:24.337000 +CVE-2024-50633,0,1,d0153926c6a02e76397a49275cdaba4d567a050b25f3435171b670652de25f8e,2025-01-17T18:15:26.043000 CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000 CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000 @@ -269686,13 +269693,13 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721 CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000 CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000 CVE-2024-50953,0,0,aaae13e550df547900d535976c765e7cfcbd4c5ca420ae827af2927bdbd375a0,2025-01-16T16:15:31.227000 -CVE-2024-50954,0,0,477775d2966f5589398f5cc34462d3c653cd70d54eda8068d474e05199a05ce7,2025-01-15T17:15:16.517000 +CVE-2024-50954,0,1,18bee49920c53fb8283b1524ffbd022141797de9d8bf6bf69cc613e4bb16be47,2025-01-17T18:15:26.310000 CVE-2024-50955,0,0,b7968787a5cfb7ac17e9f82a1b15116d586dfbbc8f589b423fc4833d2d57ec69,2024-11-21T22:15:09.370000 CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000 CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000 CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000 CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000 -CVE-2024-50967,1,1,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000 +CVE-2024-50967,0,0,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000 CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000 CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000 CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000 @@ -271389,6 +271396,7 @@ CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f4 CVE-2024-53680,0,0,8f6a0e7e0ab328aba846c45a5169e8953dc6dbfca85d9cca37f56439e3715008,2025-01-11T13:15:25.710000 CVE-2024-53681,0,0,b5981a5f23a050c58621754137465bbe9a27a78bd67559fa015494e5b655da4f,2025-01-15T13:15:10.963000 CVE-2024-53682,0,0,8fff7fe6ed56d7be9465617e7f5434428ac8e26e2cf3262f7b6c754f477833c1,2025-01-11T13:15:25.860000 +CVE-2024-53683,1,1,8ed3f44393e22eea3f080e26403389aa2eeebf5c0860ee00e51eb42f73e4ab91,2025-01-17T17:15:12.053000 CVE-2024-53685,0,0,f14f882249b9db19115e9f5bd40c211ab0535cda9ea0386cce46e0a1a952c567,2025-01-17T14:15:32.120000 CVE-2024-53687,0,0,db69b3a3aa7d0b6527150d997ca94f951ff7fdd68c92c6f81dd6f27f46185a16,2025-01-11T13:15:26.120000 CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000 @@ -271697,7 +271705,7 @@ CVE-2024-54098,0,0,fcf0a7b4b42a408ef14e2cdd83601e83ad8a047dacc93336f07058716f90e CVE-2024-54099,0,0,256f48ffd68ad9fa5138803838c0141f4287c0f26c618e01fad47b5eef64495e,2025-01-10T18:29:23.150000 CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000 CVE-2024-54100,0,0,40cea7c72a838645d4d4129dd8cb348c8ad2f756f8f2e526c035f7424171b78f,2025-01-14T18:32:54.897000 -CVE-2024-54101,0,0,b28cbee4fde9c770888478d7d50338a6e8959ae8cd4abd6f917e1c088fc4ab93,2024-12-12T12:15:23.763000 +CVE-2024-54101,0,1,8efc0d479ad38c214523a161299fa1bc431fa727996542f76023b3a82305d936,2025-01-17T18:09:53.447000 CVE-2024-54102,0,0,321dcb146364267c789b6dd20cd279989263c444f9a47d81a6e8ddb19d3e09d0,2025-01-14T18:04:39.450000 CVE-2024-54103,0,0,521378467b2ba6dcd27ca36115f9ecdab36f5f26a2021270812eb31426c0502d,2024-12-12T20:15:40.217000 CVE-2024-54104,0,0,b5d2bab146798e653b7f0c16aaf328d32a4beaf04fab7d328eae5e47092e960c,2024-12-12T20:16:31.800000 @@ -272077,7 +272085,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 -CVE-2024-54535,0,0,be256317681c38b876d8afffa28833fae912c494d09f5fe9974200b1678cbe2e,2025-01-16T20:36:12.483000 +CVE-2024-54535,0,1,206bf99a3aa890b83364e2d0aff86c3b8f6596e8472b76b2fdf32b4a4989a18f,2025-01-17T18:15:26.610000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-54540,0,0,cec5648fa22fe0cc733814d4be0bb9219cc980c202703a2aa5266fee5fe4c719,2025-01-16T15:15:13.697000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 @@ -272103,6 +272111,7 @@ CVE-2024-54677,0,0,7738db23e6dfe0ca7bf4e6721884297e1312bf0f9f87462addf38007bea25 CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000 CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000 CVE-2024-54680,0,0,23c42810796888c623043dfa17bf2c05e67e8cb1f0dd95a5d3bb0378d9b39a60,2025-01-16T15:17:54.520000 +CVE-2024-54681,1,1,253e5dec99c9346d03e651bfd86679c7c1afa29b9d10690c2c2c73d3edd05e49,2025-01-17T17:15:12.227000 CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000 CVE-2024-54683,0,0,35ec2d70086ae912ff4eae7d82bb097dcf57dbd99c9eaf862ef970893175a37f,2025-01-16T15:18:09.453000 CVE-2024-54687,0,0,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000 @@ -273168,7 +273177,7 @@ CVE-2024-57159,0,0,15583a75064e55d87bf75fed70e73d79d360d20391d0e99a0f639f7334a51 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,cfd418c2294a4aad4ffaf0f6e6c02c6c9c462f90fd047701ea5321fce5ab1453,2025-01-16T16:15:32.817000 CVE-2024-57161,0,0,7d001b6ede91e7126dba3cd73d4b23f42855fc1336561bd2cb109c174d7ee6df,2025-01-16T16:15:32.937000 -CVE-2024-57162,0,0,b1e0cf18e266cbe55d44930aeeee1d897cfa1bcb86f690acd1626cef8a0545f2,2025-01-16T16:15:33.063000 +CVE-2024-57162,0,1,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 @@ -273225,21 +273234,21 @@ CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff117 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000 CVE-2024-57575,0,0,0325e9b9beebc39d453bf2fb98a790fc58c0448755bf827de5d20c6d07a85690,2025-01-16T21:15:16.537000 -CVE-2024-57577,0,0,86ceef2dbb95c37e54c3b90cd4d3ebd8b74724e0a4ac66d71462560ea6c0aff6,2025-01-16T21:15:16.740000 -CVE-2024-57578,0,0,a8a3c07649abdae35839bc68d147c5787c95c3770dcd835902b0c2ccfa15a666,2025-01-16T21:15:16.893000 -CVE-2024-57579,0,0,5ba17d368e5dbe193f489ec4d6c9a22186058bf13a707672ef5429e8fb28ede2,2025-01-16T21:15:17.057000 +CVE-2024-57577,0,1,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000 +CVE-2024-57578,0,1,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000 +CVE-2024-57579,0,1,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 -CVE-2024-57580,0,0,40ce06b8b3bad391b0423dce669bb66461a68e864c0ab61b351a2049f79d8d33,2025-01-16T21:15:17.223000 -CVE-2024-57581,0,0,ba8a50519c95b9165041173ef8a2abb403c689b63326baa2909a14502c81be34,2025-01-16T21:15:17.437000 -CVE-2024-57582,0,0,1d36287388fe01061acd621e5fd71ef6ba928983d1172795a92a2d624d34f9cd,2025-01-16T21:15:17.627000 +CVE-2024-57580,0,1,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000 +CVE-2024-57581,0,1,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000 +CVE-2024-57582,0,1,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57583,0,0,0a9b32a2c9e5a9aa7a9b9841c10dc898724b6f12184bcb5639e412fb8b164e68,2025-01-16T21:15:17.800000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-57611,0,0,6fae1f378c2de7211d8601642d793b718892b838d45e3641195667b838c7ac2a,2025-01-16T16:15:33.893000 -CVE-2024-57615,0,0,3b154d15d9d342606b70482eb9cc2d6a4cc130a8065aa7d0da89540a1bd1ede9,2025-01-14T01:15:09.833000 -CVE-2024-57616,0,0,7470c60d8605d9c063b37e649a0109bc38842816df47856772ca2131f8a175f6,2025-01-14T01:15:09.947000 -CVE-2024-57617,0,0,216302b4e1a3d5a8c021085fb6cfebcd9359b852e85ad845706a7528c42cb425,2025-01-14T01:15:10.060000 +CVE-2024-57615,0,1,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000 +CVE-2024-57616,0,1,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000 +CVE-2024-57617,0,1,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000 CVE-2024-57618,0,0,71f87f6663ee1ef40a6261800f5cbef1a4e202c68cadd758bd9595ac1ec388f3,2025-01-16T21:15:17.943000 CVE-2024-57619,0,0,ce9b917af0f01e2c94f858dbfb420a55aded7c18073a3201f781d8208b5592cd,2025-01-15T17:15:18.470000 CVE-2024-5762,0,0,c0d3df55e57fc9acf7b150356443c67a5f0ff2ceca17905a4d2ee526faf1413e,2024-08-23T16:43:19.497000 @@ -273267,7 +273276,7 @@ CVE-2024-57639,0,0,81c18119d0796036207b52600fc301d317795cf7d5d03a2144ee581f0cbeb CVE-2024-5764,0,0,b7612214e0b4c36a7adafd04d08b4fff0bd1bfea33c567d6f09d0bd135904604,2024-11-06T16:41:00.277000 CVE-2024-57640,0,0,823f369a4e2512904de0df496d9844ebefb1caff102a1b29f5249371b8eb5e9b,2025-01-15T16:15:30.570000 CVE-2024-57641,0,0,6e122f8000b5036a35ba9684cd03b685662827038107eaaf29a6c154497ed980,2025-01-15T16:15:30.750000 -CVE-2024-57642,0,0,5d41527b8eba6a05efbeb7957f944b909619e65db0c2a503a1ffa7feaae96b0d,2025-01-14T01:15:12.873000 +CVE-2024-57642,0,1,071107a624b8ce997fd26421425efc402383b312771c18eeb873b78aa96ffdfa,2025-01-17T18:15:30.030000 CVE-2024-57643,0,0,ba698b452eaa8706043a8e92fd8ea179cc020ce88d0d466280f0183a4e4e911c,2025-01-16T16:15:34.030000 CVE-2024-57644,0,0,914574fe0b7a114777c2567fd96e73785d33e0046c4e449438fad7358a5594a5,2025-01-15T16:15:30.943000 CVE-2024-57645,0,0,e6113a0ab42f5baeb6ef1e12e65104eacf5948c5f09dd54b54f3011c787894d1,2025-01-15T16:15:31.120000 @@ -273327,7 +273336,7 @@ CVE-2024-57764,0,0,3cd9e45ed954c368ca54c9cbce60c96dcde31d52c07d079203117bd00108d CVE-2024-57765,0,0,6f15a3a607d40a0f75d69003588b78a560775ad59d258daea1d42c4f28b5e872,2025-01-15T00:15:34.323000 CVE-2024-57766,0,0,e0e048b4421fccb07d8708542e32dcef1a59cbb8b6e613b7067f5ff9210d3a7b,2025-01-15T00:15:34.433000 CVE-2024-57767,0,0,4f47def2a552fd83c7f1d4d6e4ae3f549133dbbf6dd763e021c9ec2612ee896f,2025-01-15T00:15:34.543000 -CVE-2024-57768,0,0,dfbe7adf9c1441490d4a473b51ff96f30462e0fe2c48818a67e3bff0cdd4d06f,2025-01-16T18:15:26.003000 +CVE-2024-57768,0,1,e00f69a24549670426cf3162728515b005047dfd2006716c80c3c15216823f81,2025-01-17T18:15:30.633000 CVE-2024-57769,0,0,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 CVE-2024-57770,0,0,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000 @@ -276719,7 +276728,7 @@ CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa035 CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000 CVE-2024-9672,0,0,061e80a15aeea3b03a12d8109775a38b18a9082ea48b25cd40a1b2c0322c9214,2024-12-10T00:15:22.893000 -CVE-2024-9673,0,0,160515eb8f09fd336d7ce6380098aac12ba2c5c30d65868d874d0b5bf3432905,2025-01-08T07:15:27.980000 +CVE-2024-9673,0,1,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000 CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000 CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000 @@ -277136,6 +277145,7 @@ CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000 CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000 CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000 +CVE-2025-0430,1,1,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000 CVE-2025-0434,0,0,6b09fdee4a1c3fd4134245b9fe1d0b966b891282ee9f6481cd52455196ff3273,2025-01-15T15:15:14.273000 CVE-2025-0435,0,0,12a908c6bc976560385e7102d635ad66ec30f16edcaf6473415ff2f9c1a74a6e,2025-01-15T15:15:14.430000 CVE-2025-0436,0,0,857240181b7b3c09b957ab2dbad6e416781a51bbb4f39b3bb16f673e65f24a93,2025-01-15T15:15:14.620000 @@ -277183,10 +277193,12 @@ CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c65 CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000 CVE-2025-0518,0,0,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000 CVE-2025-0527,0,0,d2b51becab8c01f94a687e28d364a879eb752a601305b6821988eb5f9c5bbc2f,2025-01-17T14:15:32.840000 -CVE-2025-0528,1,1,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000 -CVE-2025-0529,1,1,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000 -CVE-2025-0530,1,1,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000 -CVE-2025-0531,1,1,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000 +CVE-2025-0528,0,0,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000 +CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000 +CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000 +CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000 +CVE-2025-0532,1,1,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000 +CVE-2025-0533,1,1,00c854b2342ff9edb13ef61155d7cae29025b472a6af5e1d39d09a6ad67d9690,2025-01-17T18:15:31.577000 CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000 @@ -277360,23 +277372,23 @@ CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb CVE-2025-21360,0,0,1f25a63fd6925175ed8d8d2e1f8b5dc753b0e006a806367a61359ecb27a1425f,2025-01-14T18:16:01.470000 CVE-2025-21361,0,0,804d0233cc132fe798add3b592d7f7064997d09b5448edddf8d4a0a9f30d78ed,2025-01-14T18:16:01.637000 CVE-2025-21362,0,0,f17a56e11ed70d97b1fec4ab21c8742e9afb6632f3e2d692fb4aae8c406af704,2025-01-15T00:15:43.533000 -CVE-2025-21363,0,1,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000 -CVE-2025-21364,0,1,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000 -CVE-2025-21365,0,1,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000 -CVE-2025-21366,0,1,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000 -CVE-2025-21370,0,1,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 -CVE-2025-21372,0,1,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 -CVE-2025-21374,0,1,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000 -CVE-2025-21378,0,1,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000 +CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000 +CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000 +CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000 +CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000 +CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 +CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 +CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000 +CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000 CVE-2025-21380,0,0,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000 -CVE-2025-21382,0,1,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 +CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000 -CVE-2025-21389,0,1,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 -CVE-2025-21393,0,1,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 -CVE-2025-21395,0,1,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 +CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 +CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 +CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000 CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000 -CVE-2025-21405,0,1,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 +CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 CVE-2025-21409,0,0,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000 CVE-2025-21411,0,0,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000 CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000 @@ -277684,7 +277696,7 @@ CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000 -CVE-2025-22904,0,0,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000 +CVE-2025-22904,0,1,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,abc87a85c7bc7d9d749537f6e4185a3608bb9fb9938aa6d93312fdeb15cc69d3,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,c442b828ae2bdbc2d39f15b231587f53bcedbd794c904b4144293ba283dc2985,2025-01-16T15:15:15.357000 CVE-2025-22907,0,0,afe94c593034a06a548c8df5f439a7a34ed21665762277eb367e4b3ea8c24c00,2025-01-16T15:15:15.547000