diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json index bc36dfccfa0..e315e6ec520 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json @@ -2,13 +2,13 @@ "id": "CVE-2013-3900", "sourceIdentifier": "secure@microsoft.com", "published": "2013-12-11T00:55:03.693", - "lastModified": "2024-11-21T01:54:30.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:15:09.323", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Why is Microsoft republishing a CVE from 2013?\nWe are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, the information herein remains unchanged from the original text published on December 10, 2013.\nMicrosoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.\nVulnerability Description\nA remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an existing signed file to include malicious code without invalidating the signature. This code would... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" + "value": "Why is Microsoft republishing a CVE from 2013?\nWe are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013,\nMicrosoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.\nVulnerability Description\nA remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" }, { "lang": "es", @@ -19,27 +19,27 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", - "baseScore": 7.4, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.8, - "impactScore": 4.0 + "exploitabilityScore": 1.8, + "impactScore": 3.6 }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -90,7 +90,7 @@ "cisaVulnerabilityName": "Microsoft WinVerifyTrust function Remote Code Execution", "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "description": [ { @@ -98,6 +98,16 @@ "value": "CWE-347" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21965.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21965.json index 6393376746e..41228df9ad4 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21965.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21965.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21965", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:08.537", - "lastModified": "2024-11-21T06:45:47.750", + "lastModified": "2025-01-02T19:15:24.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -106,12 +106,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21965", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21965", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21965", diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21972.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21972.json index db4807cbd48..648b3caaf7d 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21972.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21972.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21972", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.233", - "lastModified": "2024-11-21T06:45:48.497", + "lastModified": "2025-01-02T19:15:24.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21972", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21972", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21972", diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21978.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21978.json index b6640c84343..bf0c7be7651 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21978.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21978.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21978", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.300", - "lastModified": "2024-11-21T06:45:49.157", + "lastModified": "2025-01-02T19:15:25.517", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21978", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21978", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21978", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22011.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22011.json index b1674d7fd01..a13b99d0c24 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22011.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22011.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22011", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.357", - "lastModified": "2024-11-21T06:45:53.310", + "lastModified": "2025-01-02T19:15:32.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22011", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22011", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22011", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22012.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22012.json index f2e2eeb9306..4566ecfb63c 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22012.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22012.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22012", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.413", - "lastModified": "2024-11-21T06:45:53.443", + "lastModified": "2025-01-02T19:15:32.937", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22012", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22012", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22012", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22013.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22013.json index 14770e772ac..d83ccbd532a 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22013.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22013.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22013", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.467", - "lastModified": "2024-11-21T06:45:53.597", + "lastModified": "2025-01-02T19:15:33.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22013", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22013", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22013", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22014.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22014.json index 6685f954469..f62ed52ecde 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22014.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22014.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22014", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.523", - "lastModified": "2024-11-21T06:45:53.743", + "lastModified": "2025-01-02T19:15:33.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22014", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22014", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22014", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22015.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22015.json index 0ceb0c4103c..b6ca41b1328 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22015.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22015.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22015", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.580", - "lastModified": "2024-11-21T06:45:53.893", + "lastModified": "2025-01-02T19:15:33.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22015", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22015", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22015", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22016.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22016.json index 1c3994c3b15..b4654f3048a 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22016.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22016.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22016", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.637", - "lastModified": "2024-11-21T06:45:54.043", + "lastModified": "2025-01-02T19:15:33.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -215,12 +215,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22016", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22016", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22016", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22017.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22017.json index 246c14f7837..8378a0d8e36 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22017.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22017.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22017", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.690", - "lastModified": "2024-11-21T06:45:54.173", + "lastModified": "2025-01-02T19:15:33.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22017", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22017", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22017", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22018.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22018.json index e2705e48982..71006197496 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22018.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22018.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22018", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:12.947", - "lastModified": "2024-11-21T06:45:54.287", + "lastModified": "2025-01-02T19:15:33.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22018", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22018", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22018", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22019.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22019.json index a567ed16343..e4526011787 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22019.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22019.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22019", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.743", - "lastModified": "2024-11-21T06:45:54.400", + "lastModified": "2025-01-02T19:15:34.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22021.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22021.json index 07bde73e172..027e4925250 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22021.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22021.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22021", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.007", - "lastModified": "2024-11-21T06:45:54.553", + "lastModified": "2025-01-02T19:15:34.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22021", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22021", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22021", diff --git a/CVE-2022/CVE-2022-227xx/CVE-2022-22713.json b/CVE-2022/CVE-2022-227xx/CVE-2022-22713.json index 01138ecd3d1..dbe9eed893b 100644 --- a/CVE-2022/CVE-2022-227xx/CVE-2022-22713.json +++ b/CVE-2022/CVE-2022-227xx/CVE-2022-22713.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22713", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.797", - "lastModified": "2024-11-21T06:47:18.063", + "lastModified": "2025-01-02T19:15:34.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22713", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22713", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22713", diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23256.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23256.json index f923488f0a2..37e7d4501ee 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23256.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23256.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23256", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:10.500", - "lastModified": "2024-11-21T06:48:16.073", + "lastModified": "2025-01-02T19:15:37.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23256", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23256", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23256", diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23267.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23267.json index 7e119c92452..8dccc902478 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23267.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23267.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23267", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.853", - "lastModified": "2024-11-21T06:48:17.387", + "lastModified": "2025-01-02T19:15:39.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -168,25 +168,9 @@ ], "references": [ { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267", "source": "secure@microsoft.com" }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/", - "source": "secure@microsoft.com" - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23270.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23270.json index 71107893148..f27858464ee 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23270.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23270.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23270", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.907", - "lastModified": "2024-11-21T06:48:17.817", + "lastModified": "2025-01-02T19:15:40.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23270", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23270", diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23279.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23279.json index 566e98ac43a..65e88fc1091 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23279.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23279.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23279", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:09.960", - "lastModified": "2024-11-21T06:48:18.880", + "lastModified": "2025-01-02T19:15:41.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,12 +165,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23279", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24466.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24466.json index e9b45399940..e1c8b581f29 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24466.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24466.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24466", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.017", - "lastModified": "2024-11-21T06:50:28.657", + "lastModified": "2025-01-02T19:15:45.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,12 +160,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24466", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24466", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24466", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24487.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24487.json index 468828d70d5..58742869add 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24487.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24487.json @@ -2,13 +2,13 @@ "id": "CVE-2022-24487", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:10.337", - "lastModified": "2024-11-21T06:50:31.053", + "lastModified": "2025-01-02T19:15:48.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Windows Local Security Authority (LSA) Remote Code Execution Vulnerability" + "value": "Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24495.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24495.json index 9cc51f6d921..e9255adaa37 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24495.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24495.json @@ -2,13 +2,13 @@ "id": "CVE-2022-24495", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:10.753", - "lastModified": "2024-11-21T06:50:32.193", + "lastModified": "2025-01-02T19:15:49.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Windows Direct Show - Remote Code Execution Vulnerability" + "value": "Windows Direct Show Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24527.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24527.json index 3218fe61b08..642eb449566 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24527.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24527.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24527", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:11.163", - "lastModified": "2024-11-21T06:50:36.317", + "lastModified": "2025-01-02T19:15:52.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24527", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24527", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24527", diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26832.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26832.json index 7d90cd20a87..657c8b08bf7 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26832.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26832.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26832", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:14.683", - "lastModified": "2024-11-21T06:54:36.280", + "lastModified": "2025-01-02T19:16:01.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -540,12 +540,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26832", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26905.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26905.json index 177352d446e..45e193be1cf 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26905.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26905.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26905", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.813", - "lastModified": "2024-11-21T06:54:46.083", + "lastModified": "2025-01-02T19:16:02.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26905", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26905", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26905", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26913.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26913.json index 98dcbae8fc4..fad34c0c9de 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26913.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26913", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.077", - "lastModified": "2024-11-21T06:54:46.893", + "lastModified": "2025-01-02T19:16:03.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26913", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26913", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26913", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json index ff1bedf61fd..0b8429d52f0 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26923", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.133", - "lastModified": "2024-11-21T06:54:48.193", + "lastModified": "2025-01-02T19:16:04.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json index ad5eb1d1c3c..5521f35ed44 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26925", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.187", - "lastModified": "2024-11-21T06:54:48.460", + "lastModified": "2025-01-02T19:16:05.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -221,12 +221,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26926.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26926.json index bd71a0a414a..e1c67a1aaa7 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26926.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26926.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26926", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.243", - "lastModified": "2024-11-21T06:54:48.597", + "lastModified": "2025-01-02T19:16:05.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26926", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26926", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26926", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26927.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26927.json index 4b01bb209fd..58db10d1ed8 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26927.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26927.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26927", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.300", - "lastModified": "2024-11-21T06:54:48.740", + "lastModified": "2025-01-02T19:16:05.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -215,12 +215,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26927", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26927", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26927", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json index f2c9d06eb1e..c760f546038 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26929.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26929", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:09.473", - "lastModified": "2024-11-21T06:54:48.980", + "lastModified": "2025-01-02T20:15:14.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -535,12 +535,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26929", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26929", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26929", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26930.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26930.json index 3957b58fb7c..2b765cc3ffb 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26930.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26930.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26930", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.357", - "lastModified": "2024-11-21T06:54:49.113", + "lastModified": "2025-01-02T19:16:05.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26930", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26930", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26930", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26931.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26931.json index 3841b090a25..5238ef99e66 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26931.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26931.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26931", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.410", - "lastModified": "2024-11-21T06:54:49.243", + "lastModified": "2025-01-02T19:16:05.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26931", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26931", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26931", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26932.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26932.json index 9cfa8d731d1..aa33d96077e 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26932.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26932.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26932", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.467", - "lastModified": "2024-11-21T06:54:49.387", + "lastModified": "2025-01-02T19:16:05.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26932", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26932", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26932", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26933.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26933.json index 9c01c18c271..80380fe45dc 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26933.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26933.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26933", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.523", - "lastModified": "2024-11-21T06:54:49.497", + "lastModified": "2025-01-02T19:16:06.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26933", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26933", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26933", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26934.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26934.json index 0841f762dbe..0c2ef76cd0c 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26934.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26934.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26934", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.580", - "lastModified": "2024-11-21T06:54:49.623", + "lastModified": "2025-01-02T19:16:06.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26934", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26934", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26934", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26935.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26935.json index 4d64ac42790..9ecb542678e 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26935.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26935.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26935", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.637", - "lastModified": "2024-11-21T06:54:49.777", + "lastModified": "2025-01-02T19:16:06.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -285,12 +285,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26935", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26935", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26935", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26936.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26936.json index 2660aef1be6..163009027e5 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26936.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26936.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26936", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.693", - "lastModified": "2024-11-21T06:54:49.920", + "lastModified": "2025-01-02T19:16:06.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26936", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26936", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26936", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26937.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26937.json index fbf312993aa..36a40d2334a 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26937.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26937.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26937", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.750", - "lastModified": "2024-11-21T06:54:50.063", + "lastModified": "2025-01-02T19:16:06.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -140,13 +140,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26937", - "source": "secure@microsoft.com", - "tags": [ - "Mitigation", - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26937", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26937", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26938.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26938.json index ea32f518513..f60c8f06b82 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26938.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26938.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26938", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.800", - "lastModified": "2024-11-21T06:54:50.190", + "lastModified": "2025-01-02T19:16:06.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,12 +105,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26938", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26938", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26938", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26939.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26939.json index 346b1e223e7..2ad8718744d 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26939.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26939.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26939", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.857", - "lastModified": "2024-11-21T06:54:50.310", + "lastModified": "2025-01-02T19:16:06.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26939", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26939", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26939", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26940.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26940.json index 43672027f9d..fcbcb52a7b4 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26940.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26940.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26940", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.953", - "lastModified": "2024-11-21T06:54:50.420", + "lastModified": "2025-01-02T19:16:07.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26940", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26940", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26940", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29102.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29102.json index 19a403a6507..6d1dfe45659 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29102.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29102.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29102", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.117", - "lastModified": "2024-11-21T06:58:29.000", + "lastModified": "2025-01-02T19:16:07.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29102", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29102", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29102", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29103.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29103.json index 7fc90d03f9f..4111908c08b 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29103.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29103.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29103", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.170", - "lastModified": "2024-11-21T06:58:29.127", + "lastModified": "2025-01-02T19:16:07.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29103", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29103", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29103", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29104.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29104.json index 91b0aef89f8..51a06b64717 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29104.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29104.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29104", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.223", - "lastModified": "2024-11-21T06:58:29.280", + "lastModified": "2025-01-02T19:16:07.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29104", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29104", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29104", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29105.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29105.json index eb71885d81e..0a9155c6759 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29105.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29105.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29105", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.277", - "lastModified": "2024-11-21T06:58:29.423", + "lastModified": "2025-01-02T19:16:07.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -285,12 +285,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29105", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29105", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29105", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29106.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29106.json index 557370cc5db..9c73ce0472b 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29106.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29106.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29106", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.330", - "lastModified": "2024-11-21T06:58:29.577", + "lastModified": "2025-01-02T19:16:07.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29106", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29106", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29106", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29107.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29107.json index 8f7089ff00c..44a9dfbfdd1 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29107.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29107.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29107", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.397", - "lastModified": "2024-11-21T06:58:29.703", + "lastModified": "2025-01-02T19:16:07.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29107", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29107", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29107", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29108.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29108.json index 9565157b9f3..a79ec0441a0 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29108.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29108.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29108", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.450", - "lastModified": "2024-11-21T06:58:29.833", + "lastModified": "2025-01-02T19:16:08.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29108", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29108", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29108", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29109.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29109.json index 109b09e2137..93e61947d86 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29109.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29109.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29109", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.507", - "lastModified": "2024-11-21T06:58:29.950", + "lastModified": "2025-01-02T19:16:08.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,12 +145,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29109", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29109", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29109", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29110.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29110.json index 39dd46391d0..fda513eb59c 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29110.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29110.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29110", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.557", - "lastModified": "2024-11-21T06:58:30.077", + "lastModified": "2025-01-02T19:16:08.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29110", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29110", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29110", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29111.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29111.json index 4036d7ecc1c..e96415651a8 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29111.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29111.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29111", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.063", - "lastModified": "2024-11-21T06:58:30.203", + "lastModified": "2025-01-02T19:16:08.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29111", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29111", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29111", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29112.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29112.json index 0aeb7d18c33..f96394dd7aa 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29112.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29112.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29112", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.610", - "lastModified": "2024-11-21T06:58:30.333", + "lastModified": "2025-01-02T19:16:08.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29112", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29112", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29112", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29113.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29113.json index a4520eeda16..0d88be3c768 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29113.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29113.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29113", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.663", - "lastModified": "2024-11-21T06:58:30.493", + "lastModified": "2025-01-02T19:16:08.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29113", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29113", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29113", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29114.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29114.json index f4b5ec5dbd0..c98bccd3434 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29114.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29114.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29114", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.717", - "lastModified": "2024-11-21T06:58:30.630", + "lastModified": "2025-01-02T19:16:08.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -240,12 +240,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29114", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29114", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29114", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29115.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29115.json index a86816b7aa5..cd8135c72d0 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29115.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29115.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29115", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.777", - "lastModified": "2024-11-21T06:58:30.780", + "lastModified": "2025-01-02T19:16:09.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -270,12 +270,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29115", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29115", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29115", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29116.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29116.json index bb84311944b..7f01c173cc1 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29116.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29116.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29116", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.827", - "lastModified": "2024-11-21T06:58:30.930", + "lastModified": "2025-01-02T19:16:09.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -100,12 +100,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29116", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29116", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29116", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29117.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29117.json index a8de87cfb85..a3d8943baef 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29117.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29117.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29117", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.877", - "lastModified": "2024-11-21T06:58:31.047", + "lastModified": "2025-01-02T19:16:09.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -147,25 +147,9 @@ ], "references": [ { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117", "source": "secure@microsoft.com" }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/", - "source": "secure@microsoft.com" - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29119.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29119.json index d3736c28b6e..0033b342f74 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29119.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29119.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29119", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.113", - "lastModified": "2024-11-21T06:58:31.180", + "lastModified": "2025-01-02T19:16:09.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29119", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29119", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29119", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29120.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29120.json index 5e071bb7457..3c0c23a0bae 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29120.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29120.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29120", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.933", - "lastModified": "2024-11-21T06:58:31.297", + "lastModified": "2025-01-02T19:16:09.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29120", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29120", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29120", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29121.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29121.json index 15dc996a556..1d6e29634b9 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29121.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29121.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29121", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:11.987", - "lastModified": "2024-11-21T06:58:31.430", + "lastModified": "2025-01-02T19:16:09.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -270,12 +270,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29121", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29121", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29121", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29122.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29122.json index 9917e5036bd..0e11fb0dafb 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29122.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29122.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29122", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.040", - "lastModified": "2024-11-21T06:58:31.593", + "lastModified": "2025-01-02T19:16:09.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29122", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29122", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29122", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29123.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29123.json index 8312a52c787..55615acab26 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29123.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29123.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29123", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.093", - "lastModified": "2024-11-21T06:58:31.753", + "lastModified": "2025-01-02T19:16:10.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29123", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29123", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29123", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29125.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29125.json index f4310f0e44d..2b830896e35 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29125.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29125", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.143", - "lastModified": "2024-11-21T06:58:31.900", + "lastModified": "2025-01-02T19:16:10.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -240,12 +240,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29125", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29125", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29125", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29126.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29126.json index 677200fa932..71c4a97c8c0 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29126.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29126.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29126", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.193", - "lastModified": "2024-11-21T06:58:32.073", + "lastModified": "2025-01-02T19:16:10.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29126", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29126", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29126", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29127.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29127.json index 351ca726b69..e7d08b62036 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29127.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29127", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.247", - "lastModified": "2024-11-21T06:58:32.230", + "lastModified": "2025-01-02T19:16:10.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29127", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29127", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29127", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29128.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29128.json index 93c512826a2..f24d476292d 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29128.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29128.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29128", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.300", - "lastModified": "2024-11-21T06:58:32.387", + "lastModified": "2025-01-02T19:16:10.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29128", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29128", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29128", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29129.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29129.json index 0f6e23a2aaf..5a058b5a53f 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29129.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29129.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29129", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.353", - "lastModified": "2024-11-21T06:58:32.540", + "lastModified": "2025-01-02T19:16:10.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29129", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29129", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29129", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29130.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29130.json index ec004eb3d15..68bc292ed00 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29130.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29130.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29130", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.403", - "lastModified": "2024-11-21T06:58:32.770", + "lastModified": "2025-01-02T19:16:10.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29130", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29130", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29130", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29131.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29131.json index cc83623e57c..629ca06fa64 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29131.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29131.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29131", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.460", - "lastModified": "2024-11-21T06:58:32.930", + "lastModified": "2025-01-02T19:16:10.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29131", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29131", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29131", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29132.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29132.json index 275b8eba66e..e9ab2418152 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29132.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29132.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29132", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.510", - "lastModified": "2024-11-21T06:58:33.057", + "lastModified": "2025-01-02T19:16:11.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29132", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29132", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29132", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29133.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29133.json index cdd77948db2..52de91b29fa 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29133.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29133.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29133", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.560", - "lastModified": "2024-11-21T06:58:33.203", + "lastModified": "2025-01-02T19:16:11.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -100,12 +100,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29133", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29133", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29133", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29134.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29134.json index f1589995dd4..0b58a5e6e4a 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29134.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29134.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29134", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.617", - "lastModified": "2024-11-21T06:58:33.310", + "lastModified": "2025-01-02T19:16:11.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29134", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29134", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29134", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29135.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29135.json index 60f5d3886b7..13f09a19e6a 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29135.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29135.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29135", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.667", - "lastModified": "2024-11-21T06:58:33.423", + "lastModified": "2025-01-02T19:16:11.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29135", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29135", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29135", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29137.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29137.json index 30401e8b46c..73afdfb9379 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29137.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29137.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29137", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.720", - "lastModified": "2024-11-21T06:58:33.573", + "lastModified": "2025-01-02T19:16:11.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29137", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29137", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29137", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29138.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29138.json index 3db1d7ad1b7..51378b6cb25 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29138.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29138.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29138", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.773", - "lastModified": "2024-11-21T06:58:33.747", + "lastModified": "2025-01-02T19:16:11.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29138", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29138", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29138", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29139.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29139.json index f4fa9b7120e..53e0da7e699 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29139.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29139.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29139", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.850", - "lastModified": "2024-11-21T06:58:33.877", + "lastModified": "2025-01-02T19:16:11.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29139", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29139", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29139", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29140.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29140.json index 08cff9ec5ba..09127d34f5b 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29140.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29140.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29140", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.913", - "lastModified": "2024-11-21T06:58:34.030", + "lastModified": "2025-01-02T19:16:12.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -150,12 +150,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29140", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29140", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29140", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29141.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29141.json index c067ccdb03d..4cc7d654f6c 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29141.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29141.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29141", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:12.967", - "lastModified": "2024-11-21T06:58:34.163", + "lastModified": "2025-01-02T19:16:12.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29141", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29141", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29141", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29142.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29142.json index 0aa958a4a29..e67e00c784d 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29142.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29142.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29142", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.020", - "lastModified": "2024-11-21T06:58:34.320", + "lastModified": "2025-01-02T19:16:12.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29142", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29142", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29142", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29143.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29143.json index 0622947a98e..b1f1968cd31 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29143.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29143.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29143", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.167", - "lastModified": "2024-11-21T06:58:34.457", + "lastModified": "2025-01-02T19:16:12.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29143", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29145.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29145.json index 3910e359873..7db90295b77 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29145.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29145.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29145", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.077", - "lastModified": "2024-11-21T06:58:34.720", + "lastModified": "2025-01-02T19:16:12.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -151,25 +151,9 @@ ], "references": [ { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145", "source": "secure@microsoft.com" }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/", - "source": "secure@microsoft.com" - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29148.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29148.json index 15ba4a29477..a9b41e792dd 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29148.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29148.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29148", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.130", - "lastModified": "2024-11-21T06:58:35.087", + "lastModified": "2025-01-02T19:16:13.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -117,12 +117,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29148", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29148", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29148", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29149.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29149.json index c89cdaf90ee..bd367fab290 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29149.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29149.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29149", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.220", - "lastModified": "2024-11-21T06:58:35.203", + "lastModified": "2025-01-02T19:16:13.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -163,12 +163,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29149", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29149", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29149", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29150.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29150.json index a3d507d8c72..d12d16abcd0 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29150.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29150.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29150", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.183", - "lastModified": "2024-11-21T06:58:35.350", + "lastModified": "2025-01-02T19:16:13.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29150", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29150", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29150", diff --git a/CVE-2022/CVE-2022-291xx/CVE-2022-29151.json b/CVE-2022/CVE-2022-291xx/CVE-2022-29151.json index 683dae5340a..a9386fb2d0c 100644 --- a/CVE-2022/CVE-2022-291xx/CVE-2022-29151.json +++ b/CVE-2022/CVE-2022-291xx/CVE-2022-29151.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29151", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.237", - "lastModified": "2024-11-21T06:58:35.470", + "lastModified": "2025-01-02T19:16:13.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29151", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29151", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29151", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30127.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30127.json index 2933db8bff1..f31a3adc335 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30127.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30127", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.877", - "lastModified": "2024-11-21T07:02:12.677", + "lastModified": "2025-01-02T19:16:13.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30127", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30127", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30127", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30128.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30128.json index 75cf93692c0..054441d0020 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30128.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30128.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30128", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.933", - "lastModified": "2024-11-21T07:02:12.800", + "lastModified": "2025-01-02T19:16:13.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30128", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30128", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30128", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30129.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30129.json index 6397c2d1815..ba9ea695f39 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30129.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30129.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30129", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:13.297", - "lastModified": "2024-11-21T07:02:12.923", + "lastModified": "2025-01-02T19:16:13.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,20 +96,8 @@ ], "references": [ { - "url": "https://blog.sonarsource.com/securing-developer-tools-argument-injection-in-vscode/", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30129", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30129", + "source": "secure@microsoft.com" }, { "url": "https://blog.sonarsource.com/securing-developer-tools-argument-injection-in-vscode/", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30131.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30131.json index 68bb8485f29..cfe9572fed6 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30131.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30131.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30131", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.273", - "lastModified": "2024-11-21T07:02:13.210", + "lastModified": "2025-01-02T19:16:14.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30131", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30131", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30131", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30132.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30132.json index ebd87abe877..b0881cb7199 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30132.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30132.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30132", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.323", - "lastModified": "2024-11-21T07:02:13.350", + "lastModified": "2025-01-02T19:16:14.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30132", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30132", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30132", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30135.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30135.json index 6d95c095284..05f4fc50e4f 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30135.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30135.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30135", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.373", - "lastModified": "2024-11-21T07:02:13.730", + "lastModified": "2025-01-02T19:16:14.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30135", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30135", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30135", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30136.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30136.json index 830e92e26db..1e78ce95a57 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30136.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30136.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30136", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.423", - "lastModified": "2024-11-21T07:02:13.857", + "lastModified": "2025-01-02T19:16:14.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,13 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30136", - "source": "secure@microsoft.com", - "tags": [ - "Mitigation", - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30136", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30136", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30137.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30137.json index 5d294fd6f24..33b9cd9c375 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30137.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30137.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30137", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.473", - "lastModified": "2024-11-21T07:02:13.967", + "lastModified": "2025-01-02T19:16:14.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30137", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30137", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30137", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30138.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30138.json index de76d6f1f5a..21184b7a066 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30138.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30138.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30138", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-18T23:15:07.730", - "lastModified": "2024-11-21T07:02:14.087", + "lastModified": "2025-01-02T19:16:16.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30138", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30138", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30138", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30139.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30139.json index a47d0025eb4..27239594e19 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30139.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30139.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30139", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.527", - "lastModified": "2024-11-21T07:02:14.220", + "lastModified": "2025-01-02T19:16:16.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -220,12 +220,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30139", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30139", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30139", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30140.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30140.json index f393a9ec078..760637cfbb0 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30140.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30140.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30140", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.577", - "lastModified": "2024-11-21T07:02:14.353", + "lastModified": "2025-01-02T19:16:17.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -275,12 +275,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30140", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30140", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30140", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30141.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30141.json index f725d0a0874..cae0c90a0c3 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30141.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30141.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30141", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.630", - "lastModified": "2024-11-21T07:02:14.503", + "lastModified": "2025-01-02T19:16:17.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30141", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30141", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30142.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30142.json index c9bbe48af63..ae6f8f7f280 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30142.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30142.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30142", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.680", - "lastModified": "2024-11-21T07:02:14.643", + "lastModified": "2025-01-02T19:16:17.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30142", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30142", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30143.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30143.json index 92162a15d0e..c9773730553 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30143.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30143.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30143", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.730", - "lastModified": "2024-11-21T07:02:14.787", + "lastModified": "2025-01-02T19:16:17.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30143", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30143", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30143", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30145.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30145.json index aeee0660ff3..aa80e26f519 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30145.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30145.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30145", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.783", - "lastModified": "2024-11-21T07:02:15.043", + "lastModified": "2025-01-02T19:16:17.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30145", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30145", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30145", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30146.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30146.json index 06fb42650b0..e74d407f868 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30146.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30146.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30146", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.833", - "lastModified": "2024-11-21T07:02:15.177", + "lastModified": "2025-01-02T19:16:17.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30146", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30146", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30146", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30147.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30147.json index 55f4a811404..6ff1c11d9d3 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30147.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30147.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30147", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.887", - "lastModified": "2024-11-21T07:02:15.327", + "lastModified": "2025-01-02T19:16:17.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30147", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30147", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30147", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30148.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30148.json index 3b23a4832f2..3cce93e8c84 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30148.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30148.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30148", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.940", - "lastModified": "2024-11-21T07:02:15.477", + "lastModified": "2025-01-02T19:16:18.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30148", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30148", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30148", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30149.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30149.json index 1864968d696..3b2183b211a 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30149.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30149.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30149", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:13.990", - "lastModified": "2024-11-21T07:02:15.603", + "lastModified": "2025-01-02T19:16:18.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30149", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30150.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30150.json index e1625f9a95e..8ac420b9225 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30150.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30150.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30150", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.047", - "lastModified": "2024-11-21T07:02:15.770", + "lastModified": "2025-01-02T19:16:18.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,20 +210,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30150", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30151.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30151.json index 5202eee9a5d..2502dc81f26 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30151.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30151.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30151", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.110", - "lastModified": "2024-11-21T07:02:15.940", + "lastModified": "2025-01-02T19:16:18.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30151", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30151", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30151", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30152.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30152.json index 8f86189e3af..e0692cc8475 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30152.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30152.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30152", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.163", - "lastModified": "2024-11-21T07:02:16.087", + "lastModified": "2025-01-02T19:16:18.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30152", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30152", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30152", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30153.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30153.json index ba3304609d4..0fca7da2bfa 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30153.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30153.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30153", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.213", - "lastModified": "2024-11-21T07:02:16.237", + "lastModified": "2025-01-02T19:16:18.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30153", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30153", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30153", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30154.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30154.json index 355ba6e97bd..d5740ab600a 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30154.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30154.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30154", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.267", - "lastModified": "2024-11-21T07:02:16.387", + "lastModified": "2025-01-02T19:16:19.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,12 +125,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30154", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30154", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30154", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30155.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30155.json index 724a2dc3062..49b8704b3ad 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30155.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30155.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30155", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.317", - "lastModified": "2024-11-21T07:02:16.520", + "lastModified": "2025-01-02T19:16:19.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,20 +255,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30155", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30155", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30157.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30157.json index ab8f176bf88..3afd57c6f8b 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30157.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30157.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30157", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.367", - "lastModified": "2024-11-21T07:02:16.677", + "lastModified": "2025-01-02T19:16:19.417", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30157", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30157", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30157", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30158.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30158.json index bf0a34f69f1..06e6a0c598a 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30158.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30158.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30158", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.420", - "lastModified": "2024-11-21T07:02:16.797", + "lastModified": "2025-01-02T19:16:19.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30158", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30158", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30158", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30159.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30159.json index f8cdb7c3920..522ec82df94 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30159.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30159.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30159", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.470", - "lastModified": "2024-11-21T07:02:16.913", + "lastModified": "2025-01-02T19:16:19.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30159", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30159", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30159", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30160.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30160.json index 4dff56d2980..8bbfc15eddc 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30160.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30160.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30160", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.520", - "lastModified": "2024-11-21T07:02:17.030", + "lastModified": "2025-01-02T19:16:19.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30160", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30160", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30160", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30161.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30161.json index cc355c73922..9baba0e0a60 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30161.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30161.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30161", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.570", - "lastModified": "2024-11-21T07:02:17.180", + "lastModified": "2025-01-02T19:16:19.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30161", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30161", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30162.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30162.json index c2f879490d1..52a4ac4823d 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30162.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30162.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30162", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.617", - "lastModified": "2024-11-21T07:02:17.330", + "lastModified": "2025-01-02T19:16:20.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -170,12 +170,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30162", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30162", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30162", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30163.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30163.json index e7d84cda5c7..38e65be3bce 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30163.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30163.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30163", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.670", - "lastModified": "2024-11-21T07:02:17.463", + "lastModified": "2025-01-02T19:16:20.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30163", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30163", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30163", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30164.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30164.json index e65819aa388..eddb668a068 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30164.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30164.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30164", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.720", - "lastModified": "2024-11-21T07:02:17.597", + "lastModified": "2025-01-02T19:16:20.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30164", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30164", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30164", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30165.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30165.json index c3875944461..cdc4108a3e2 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30165.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30165.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30165", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.777", - "lastModified": "2024-11-21T07:02:17.730", + "lastModified": "2025-01-02T19:16:20.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -150,20 +150,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30165", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30165", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30166.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30166.json index 9e27b78618b..7c05a3ac7b9 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30166.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30166.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30166", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.827", - "lastModified": "2024-11-21T07:02:17.860", + "lastModified": "2025-01-02T19:16:20.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,20 +190,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30166", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30166", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30167.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30167.json index fa492dd4aa7..1c866419d27 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30167.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30167.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30167", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.877", - "lastModified": "2024-11-21T07:02:18.010", + "lastModified": "2025-01-02T19:16:20.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30167", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30167", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30167", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30168.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30168.json index 315d0df8bfa..9a303b45e62 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30168.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30168.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30168", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.923", - "lastModified": "2024-11-21T07:02:18.120", + "lastModified": "2025-01-02T19:16:20.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30168", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30168", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30168", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30171.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30171.json index 9d1418bd567..4a52a6829a8 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30171.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30171.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30171", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:14.973", - "lastModified": "2024-11-21T07:02:18.397", + "lastModified": "2025-01-02T19:16:21.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30171", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30171", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30171", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30172.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30172.json index fba4c9e4b4d..8378e03d79e 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30172.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30172.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30172", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.023", - "lastModified": "2024-11-21T07:02:18.523", + "lastModified": "2025-01-02T19:16:21.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30172", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30172", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30172", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30173.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30173.json index 73eb1355520..208804c0d27 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30173.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30173.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30173", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.073", - "lastModified": "2024-11-21T07:02:18.643", + "lastModified": "2025-01-02T19:16:21.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30173", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30173", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30173", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30174.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30174.json index 94e68b4814e..c082e5c369b 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30174.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30174.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30174", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.127", - "lastModified": "2024-11-21T07:02:18.770", + "lastModified": "2025-01-02T19:16:21.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30174", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30174", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30174", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30177.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30177.json index 1a3d2393159..7902b8fc242 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30177.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30177.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30177", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.177", - "lastModified": "2024-11-21T07:02:19.117", + "lastModified": "2025-01-02T19:16:21.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30177", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30177", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30177", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30178.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30178.json index e51bd289ea6..eea65f5b349 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30178.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30178.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30178", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.223", - "lastModified": "2024-11-21T07:02:19.233", + "lastModified": "2025-01-02T19:16:21.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30178", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30178", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30178", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30179.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30179.json index 9bb4b5aa4d0..987e52dfc4f 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30179.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30179.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30179", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.273", - "lastModified": "2024-11-21T07:02:19.347", + "lastModified": "2025-01-02T19:16:21.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30179", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30179", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30179", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30180.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30180.json index 7c7d1bd8afd..12bfee2376e 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30180.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30180.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30180", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.320", - "lastModified": "2024-11-21T07:02:19.470", + "lastModified": "2025-01-02T19:16:21.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,12 +95,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30180", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30180", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30180", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json index c559d403eb9..7f98779f6e0 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30184", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.370", - "lastModified": "2024-11-21T07:02:19.700", + "lastModified": "2025-01-02T19:16:21.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -188,21 +188,9 @@ ], "references": [ { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184", "source": "secure@microsoft.com" }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/", - "source": "secure@microsoft.com" - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30188.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30188.json index 7b64ae28857..9d33a7a5037 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30188.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30188.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30188", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.417", - "lastModified": "2024-11-21T07:02:19.963", + "lastModified": "2025-01-02T19:16:22.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30188", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30188", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30188", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30189.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30189.json index a7e1d049f86..dfc37033b3f 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30189.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30189.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30189", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.467", - "lastModified": "2024-11-21T07:02:20.080", + "lastModified": "2025-01-02T19:16:22.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,12 +105,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json index e451217bcc0..f16290879b8 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json @@ -2,13 +2,13 @@ "id": "CVE-2022-30190", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.983", - "lastModified": "2024-11-21T07:02:20.193", + "lastModified": "2025-01-02T19:16:22.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user\u2019s rights.\nPlease see the\u00a0MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.\n" + "value": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user\u2019s rights.\nPlease see the\u00a0MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability." }, { "lang": "es", @@ -215,21 +215,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30190", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30192.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30192.json index 10d1da8d624..c160254cb0b 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30192.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30192.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30192", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-29T17:15:08.310", - "lastModified": "2024-11-21T07:02:20.337", + "lastModified": "2025-01-02T19:16:22.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30192", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30192", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30192", diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30193.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30193.json index fb21b14ff0e..411c0c73a64 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30193.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30193.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30193", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.513", - "lastModified": "2024-11-21T07:02:20.467", + "lastModified": "2025-01-02T19:16:22.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30193", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30193", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30193", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33638.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33638.json index 7ca23e2505d..3f4f512955e 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33638.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33638.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33638", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-29T17:15:08.410", - "lastModified": "2024-11-21T07:08:13.680", + "lastModified": "2025-01-02T19:16:22.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,19 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33638", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33638", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33638", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33639.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33639.json index c5689314048..e1ae87d9751 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33639.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33639.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33639", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-29T17:15:08.460", - "lastModified": "2024-11-21T07:08:13.803", + "lastModified": "2025-01-02T19:16:22.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,19 +116,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33639", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33639", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33639", diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33680.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33680.json index a376d2212b1..1f53924d431 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33680.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33680.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33680", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-07T20:15:08.277", - "lastModified": "2024-11-21T07:08:18.900", + "lastModified": "2025-01-02T19:16:22.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33680", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33680", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33680", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json index 4c9ae6ab498..3005320feca 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35828.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35828", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:11.137", - "lastModified": "2024-11-21T07:11:46.190", + "lastModified": "2025-01-02T20:15:49.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -70,12 +70,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json index 260652b14fd..413dee81104 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37972.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37972", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-20T19:15:09.930", - "lastModified": "2024-11-21T07:15:28.423", + "lastModified": "2025-01-02T20:15:55.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", @@ -92,12 +92,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37972", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37972", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37972", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json index 289777a9c23..497e6b390a0 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38007.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38007", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.543", - "lastModified": "2024-11-21T07:15:33.697", + "lastModified": "2025-01-02T20:15:57.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -75,12 +75,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38007", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38007", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38007", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json index 6257082ce66..c9c42ddccb9 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38011.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38011", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.757", - "lastModified": "2024-11-21T07:15:34.207", + "lastModified": "2025-01-02T20:15:58.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -167,12 +167,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38011", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38011", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38011", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json index d6a8bf21a85..767845f4e77 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38013.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38013", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.867", - "lastModified": "2024-11-21T07:15:34.457", + "lastModified": "2025-01-02T20:15:59.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -130,33 +130,9 @@ ], "references": [ { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013", "source": "secure@microsoft.com" }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/", - "source": "secure@microsoft.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/", - "source": "secure@microsoft.com" - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json index e1c8e6c5594..716a0fcfe32 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38019.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38019", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.920", - "lastModified": "2024-11-21T07:15:35.173", + "lastModified": "2025-01-02T20:15:59.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -71,12 +71,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38019", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38019", + "source": "secure@microsoft.com" }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38019", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json index ee5bd00bc90..73d2cc62545 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41040", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.753", - "lastModified": "2024-11-21T07:22:30.187", + "lastModified": "2025-01-02T20:16:00.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -94,37 +94,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41040", - "source": "secure@microsoft.com", - "tags": [ - "Mitigation", - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.kb.cert.org/vuls/id/915563", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - }, - { - "url": "https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41040", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index 1308ad6a1b3..846b5bce5df 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41082", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.843", - "lastModified": "2024-11-21T07:22:34.637", + "lastModified": "2025-01-02T20:16:00.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -94,36 +94,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41082", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.kb.cert.org/vuls/id/915563", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - }, - { - "url": "https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41082", + "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34750.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34750.json index 99fc237db40..72eb77b2580 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34750.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34750.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34750", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.447", - "lastModified": "2024-11-21T08:07:33.230", + "lastModified": "2025-01-02T20:16:02.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34751.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34751.json index 21ec9cad02b..afc9db8bcc3 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34751.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34751.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34751", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.490", - "lastModified": "2024-11-21T08:07:33.410", + "lastModified": "2025-01-02T20:16:02.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34752.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34752.json index 5b0ccc54572..9142d01b0bf 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34752.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34752.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34752", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.533", - "lastModified": "2024-11-21T08:07:33.580", + "lastModified": "2025-01-02T20:16:02.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34753.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34753.json index 54f4b49eaa5..88746e6ee8c 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34753.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34753.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34753", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.573", - "lastModified": "2024-11-21T08:07:33.740", + "lastModified": "2025-01-02T20:16:03.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34754.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34754.json index 51a3d948057..52b7f9db17f 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34754.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34754.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34754", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.617", - "lastModified": "2024-11-21T08:07:33.907", + "lastModified": "2025-01-02T20:16:03.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35141.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35141.json index 25d4a5c6fe2..f77ab6f011a 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35141.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35141.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35141", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-14T13:15:11.823", - "lastModified": "2024-11-21T08:08:01.197", + "lastModified": "2025-01-02T20:16:03.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35143.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35143.json index 776538ad379..2688c1755ac 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35143.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35143.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35143", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-14T13:15:11.957", - "lastModified": "2024-11-21T08:08:01.440", + "lastModified": "2025-01-02T20:16:03.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35144.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35144.json index 4af1185d463..12514e1c20c 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35144.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35144.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35144", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-14T13:15:12.013", - "lastModified": "2024-11-21T08:08:01.563", + "lastModified": "2025-01-02T20:16:03.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35145.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35145.json index ca4310a94f3..34ab1e81170 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35145.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35145.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35145", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-14T13:15:12.067", - "lastModified": "2024-11-21T08:08:01.683", + "lastModified": "2025-01-02T19:16:23.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json index 4ef93b12f14..c094747ce04 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13075", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T18:15:26.570", - "lastModified": "2024-12-31T18:15:26.570", - "vulnStatus": "Received", + "lastModified": "2025-01-02T20:16:04.217", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.472183", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.472183", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json index 6d5afbf1c53..ebb0a6dbc44 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13076", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T18:15:27.293", - "lastModified": "2024-12-31T18:15:27.293", - "vulnStatus": "Received", + "lastModified": "2025-01-02T20:16:04.437", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.472185", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.472185", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json index 3a60066bad5..840d628855c 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13078", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T19:15:08.067", - "lastModified": "2024-12-31T19:15:08.067", - "vulnStatus": "Received", + "lastModified": "2025-01-02T20:16:04.620", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.472187", "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/land-record-system-using-php-and-mysql/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json index ce5f1327f4c..717750f6843 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2072", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T17:15:07.940", - "lastModified": "2024-11-21T09:08:58.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:21:25.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:flashcard_quiz_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "93AB232E-84F9-451B-91DE-CABCE5D4E654" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFlashcard%20Quiz%20App%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20update-flashcard.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255387", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255387", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFlashcard%20Quiz%20App%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20update-flashcard.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json index 82a478627e1..4c5c0a198c2 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2073", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T17:15:08.167", - "lastModified": "2024-11-21T09:08:59.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:16:45.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:block_inserter_for_dynamic_content:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B3A8040-B400-4C5E-A000-6C675BF587F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21834.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21834.json index d5d985e470f..59707c8f370 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21834.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21834", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:41.410", - "lastModified": "2024-11-21T08:55:05.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:13:29.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-843" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json index 90d180537dc..f7a597486b3 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2147.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2147", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-03T17:15:07.123", - "lastModified": "2024-11-21T09:09:07.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:16:00.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255500", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255500", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255500", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255500", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json index 0beb203d65d..a9f5e8795d5 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2148", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-03T17:15:07.353", - "lastModified": "2024-11-21T09:09:08.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:15:02.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255501", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255501", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255501", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255501", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2150.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2150.json index e1ea86b76eb..b8e6987020d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2150.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2150", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-03T18:15:10.967", - "lastModified": "2024-11-21T09:09:08.373", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:11:35.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -74,32 +94,81 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "826B7388-F683-45AE-908E-A26D1D12CCAD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL/Insurance%20Management%20System%20PHP%20and%20MySQL%20v1.0%20-%20File%20Inclusion.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL/Insurance%20Management%20System%20PHP%20and%20MySQL%20v1.0%20-%20File%20Inclusion.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255503", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255503", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22098.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22098.json index 0bce54da568..f7d8e2edd1c 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22098.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22098", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:41.927", - "lastModified": "2024-11-21T08:55:34.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:12:54.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22177.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22177.json index eee6ae595b1..2304ca2c203 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22177.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22177.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22177", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:42.130", - "lastModified": "2024-11-21T08:55:43.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:12:43.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-281" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json index 923cd36ab05..861e9bb6266 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23808", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:48.243", - "lastModified": "2024-11-21T08:58:28.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:07:39.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,16 +73,54 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json index 80fa9245b26..4c5307418fb 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27217", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:48.660", - "lastModified": "2024-11-21T09:04:07.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:06:49.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29029.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29029.json index 5d7f3bb1393..94827c5a83f 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29029.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29029.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29029", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T16:15:09.853", - "lastModified": "2024-11-21T09:07:24.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T20:46:24.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -53,32 +73,84 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.22.0", + "matchCriteriaId": "E8EB3231-6B7C-45F5-80C6-F71A853130C2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29074.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29074.json index a5fc584c2fb..532c4aa133b 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29074.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29074", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:45.207", - "lastModified": "2024-11-21T09:07:30.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:12:32.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29086.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29086.json index 716e516fc6e..334246872ba 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29086.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29086", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:45.397", - "lastModified": "2024-11-21T09:07:31.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-02T19:12:16.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json index d720669433c..8d999f5dff7 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31078", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:48.943", - "lastModified": "2024-11-21T09:12:48.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:04:58.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json index be5b793b5ab..27253221800 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3757", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:49.223", - "lastModified": "2024-11-21T09:30:20.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:05:19.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json index f313e3e79b9..26ac86638b5 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3758", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:49.497", - "lastModified": "2024-11-21T09:30:20.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:04:15.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json index 74d8e26b12e..39598249af1 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3759", "sourceIdentifier": "scy@openharmony.io", "published": "2024-05-07T07:15:50.023", - "lastModified": "2024-11-21T09:30:20.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-02T19:03:20.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json index 0acbfb011a7..ec0b7ae003a 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45401", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-05T18:15:06.227", - "lastModified": "2024-12-19T22:15:05.770", - "vulnStatus": "Modified", + "lastModified": "2025-01-02T20:16:12.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:stripe:stripe-cli:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:stripe:stripe_cli:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.11.1", "versionEndExcluding": "1.21.3", - "matchCriteriaId": "F43365D4-FD7D-470A-9948-88FC4B3DE261" + "matchCriteriaId": "FBE2DD29-3585-4A0D-9009-D804A564327C" } ] } diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48197.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48197.json new file mode 100644 index 00000000000..5582727ea92 --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48197.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-48197", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-02T19:16:23.390", + "lastModified": "2025-01-02T20:16:04.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Audiocodes MP-202b v.4.4.3 allows a remote attacker to escalate privileges via the login page of the web interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "http://audiocodes.com", + "source": "cve@mitre.org" + }, + { + "url": "http://mp-202b.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/GCatt-AS/CVE-2024-48197", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json index 09fd3d9b1ad..f3a4f19e764 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52047", "sourceIdentifier": "security@trendmicro.com", "published": "2024-12-31T16:15:25.923", - "lastModified": "2024-12-31T16:15:25.923", - "vulnStatus": "Received", + "lastModified": "2025-01-02T20:16:05.163", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0016669", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json index 5efc3143607..f09032cb398 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55081", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-19T17:15:09.950", - "lastModified": "2024-12-19T17:15:09.950", + "lastModified": "2025-01-02T20:16:05.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de entidad externa XML (XXE) en el componente /datagrip/upload de Chat2DB v0.3.5 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el suministro de una entrada XML manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/summerxxoo/18b3ccc91aacd606aa4d48a02029e9e7", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55082.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55082.json index aa64bc838ec..d9013895fbd 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55082.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55082.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55082", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-19T16:15:09.127", - "lastModified": "2024-12-19T16:15:09.127", + "lastModified": "2025-01-02T20:16:05.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Server-Side Request Forgery (SSRF) en el endpoint http://{your-server}/url-to-pdf de Stirling-PDF 0.35.1 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada espec\u00edficamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/summerxxoo/f98033dbf1ab81a045c1196c3a1ab3ef", diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55196.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55196.json index 482cfbd4a2a..2b535692ba1 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55196.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55196.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55196", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-19T19:15:07.947", - "lastModified": "2024-12-19T19:15:07.947", + "lastModified": "2025-01-02T20:16:06.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las credenciales insuficientemente protegidas en Mail Server Configuration en GoPhish v0.12.1 permiten a un atacante acceder a las contrase\u00f1as de texto plano de los servidores IMAP y SMTP configurados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://github.com/hexkaster/SecurityResearch/blob/main/CVE-2024-55196.md", diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json index b354b4e5029..7a063453706 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56317", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T23:15:18.023", - "lastModified": "2024-12-18T23:15:18.023", + "lastModified": "2025-01-02T20:16:06.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En Matter (tambi\u00e9n conocido como connectedhomeip o Project CHIP) hasta la versi\u00f3n 1.4.0.0, la funci\u00f3n WriteAcl elimina primero todas las entradas de ACL existentes y luego intenta volver a crearlas en funci\u00f3n de la entrada del usuario. Si la validaci\u00f3n de la entrada falla durante la decodificaci\u00f3n, el proceso se detiene y access-control-server.cpp no restaura ninguna entrada, es decir, se produce una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json index 962380a1afd..66c5e2b10f2 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56318", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T23:15:18.213", - "lastModified": "2024-12-19T00:15:06.897", + "lastModified": "2025-01-02T20:16:06.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En raw_TCP.cpp en Matter (tambi\u00e9n conocido como connectedhomeip o Project CHIP) hasta 1.4.0.0 antes de 27ca6ec, hay una desreferencia de puntero NULL en TCPBase::ProcessSingleMessage a trav\u00e9s de paquetes TCP con messageSize cero, lo que lleva a una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56519.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56519.json index fdf3f8fb232..8c18f436ff4 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56519.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56519.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56519", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-27T05:15:07.677", - "lastModified": "2024-12-27T05:15:07.677", + "lastModified": "2025-01-02T20:16:07.080", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en TCPDF anterior a 6.8.0. setSVGStyles no desinfecta el atributo font-family SVG." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/tecnickcom/TCPDF/commit/c9f41cbb84880bdb4fc3e0a9d287214d1ac4d7f4", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56520.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56520.json index d46da701a71..3bc16db37bc 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56520.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56520.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56520", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-27T05:15:07.837", - "lastModified": "2024-12-27T05:15:07.837", + "lastModified": "2025-01-02T20:16:07.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en tc-lib-pdf-font anterior a la versi\u00f3n 2.6.4, tal como se utiliza en TCPDF anterior a la versi\u00f3n 6.8.0 y otros productos. Las fuentes se gestionan de forma incorrecta, por ejemplo, FontBBox para fuentes Type 1 y TrueType se analiza incorrectamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/tecnickcom/TCPDF/commit/a0a02efe487cc39bd5223359e916dbeafb5cd6fe", diff --git a/README.md b/README.md index 5ab2f46767e..2001f47f450 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-02T19:00:20.487581+00:00 +2025-01-02T21:00:20.607403+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-02T18:51:41.037000+00:00 +2025-01-02T20:46:24.867000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275616 +275617 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -- [CVE-2024-11716](CVE-2024/CVE-2024-117xx/CVE-2024-11716.json) (`2025-01-02T17:15:07.090`) -- [CVE-2024-11717](CVE-2024/CVE-2024-117xx/CVE-2024-11717.json) (`2025-01-02T17:15:07.600`) -- [CVE-2024-56199](CVE-2024/CVE-2024-561xx/CVE-2024-56199.json) (`2025-01-02T18:15:20.427`) -- [CVE-2025-0173](CVE-2025/CVE-2025-01xx/CVE-2025-0173.json) (`2025-01-02T18:15:21.630`) +- [CVE-2024-48197](CVE-2024/CVE-2024-481xx/CVE-2024-48197.json) (`2025-01-02T19:16:23.390`) ### CVEs modified in the last Commit -Recently modified CVEs: `64` +Recently modified CVEs: `186` -- [CVE-2024-53247](CVE-2024/CVE-2024-532xx/CVE-2024-53247.json) (`2025-01-02T18:15:19.887`) -- [CVE-2024-56137](CVE-2024/CVE-2024-561xx/CVE-2024-56137.json) (`2025-01-02T18:15:20.213`) -- [CVE-2024-56348](CVE-2024/CVE-2024-563xx/CVE-2024-56348.json) (`2025-01-02T18:51:41.037`) -- [CVE-2024-56349](CVE-2024/CVE-2024-563xx/CVE-2024-56349.json) (`2025-01-02T18:51:21.857`) -- [CVE-2024-56350](CVE-2024/CVE-2024-563xx/CVE-2024-56350.json) (`2025-01-02T18:50:57.893`) -- [CVE-2024-56351](CVE-2024/CVE-2024-563xx/CVE-2024-56351.json) (`2025-01-02T18:49:32.400`) -- [CVE-2024-56352](CVE-2024/CVE-2024-563xx/CVE-2024-56352.json) (`2025-01-02T18:49:03.290`) -- [CVE-2024-56353](CVE-2024/CVE-2024-563xx/CVE-2024-56353.json) (`2025-01-02T18:48:35.123`) -- [CVE-2024-56354](CVE-2024/CVE-2024-563xx/CVE-2024-56354.json) (`2025-01-02T18:47:14.893`) -- [CVE-2024-56355](CVE-2024/CVE-2024-563xx/CVE-2024-56355.json) (`2025-01-02T18:46:31.450`) -- [CVE-2024-56356](CVE-2024/CVE-2024-563xx/CVE-2024-56356.json) (`2025-01-02T18:46:14.517`) -- [CVE-2024-7018](CVE-2024/CVE-2024-70xx/CVE-2024-7018.json) (`2025-01-02T17:32:20.160`) -- [CVE-2024-7019](CVE-2024/CVE-2024-70xx/CVE-2024-7019.json) (`2025-01-02T17:31:56.323`) -- [CVE-2024-7022](CVE-2024/CVE-2024-70xx/CVE-2024-7022.json) (`2025-01-02T17:11:48.523`) -- [CVE-2024-7025](CVE-2024/CVE-2024-70xx/CVE-2024-7025.json) (`2025-01-02T17:56:31.057`) -- [CVE-2024-7256](CVE-2024/CVE-2024-72xx/CVE-2024-7256.json) (`2025-01-02T17:41:48.610`) -- [CVE-2024-7970](CVE-2024/CVE-2024-79xx/CVE-2024-7970.json) (`2025-01-02T17:40:45.077`) -- [CVE-2024-8362](CVE-2024/CVE-2024-83xx/CVE-2024-8362.json) (`2025-01-02T17:37:05.167`) -- [CVE-2024-8904](CVE-2024/CVE-2024-89xx/CVE-2024-8904.json) (`2025-01-02T17:34:12.570`) -- [CVE-2024-8905](CVE-2024/CVE-2024-89xx/CVE-2024-8905.json) (`2025-01-02T17:33:01.020`) -- [CVE-2024-9369](CVE-2024/CVE-2024-93xx/CVE-2024-9369.json) (`2025-01-02T17:55:20.877`) -- [CVE-2024-9960](CVE-2024/CVE-2024-99xx/CVE-2024-9960.json) (`2025-01-02T18:12:58.973`) -- [CVE-2024-9961](CVE-2024/CVE-2024-99xx/CVE-2024-9961.json) (`2025-01-02T18:12:02.177`) -- [CVE-2025-0171](CVE-2025/CVE-2025-01xx/CVE-2025-0171.json) (`2025-01-02T18:15:21.173`) -- [CVE-2025-0172](CVE-2025/CVE-2025-01xx/CVE-2025-0172.json) (`2025-01-02T18:15:21.327`) +- [CVE-2024-2073](CVE-2024/CVE-2024-20xx/CVE-2024-2073.json) (`2025-01-02T20:16:45.603`) +- [CVE-2024-2147](CVE-2024/CVE-2024-21xx/CVE-2024-2147.json) (`2025-01-02T20:16:00.083`) +- [CVE-2024-2148](CVE-2024/CVE-2024-21xx/CVE-2024-2148.json) (`2025-01-02T20:15:02.697`) +- [CVE-2024-2150](CVE-2024/CVE-2024-21xx/CVE-2024-2150.json) (`2025-01-02T20:11:35.597`) +- [CVE-2024-21834](CVE-2024/CVE-2024-218xx/CVE-2024-21834.json) (`2025-01-02T19:13:29.017`) +- [CVE-2024-22098](CVE-2024/CVE-2024-220xx/CVE-2024-22098.json) (`2025-01-02T19:12:54.717`) +- [CVE-2024-22177](CVE-2024/CVE-2024-221xx/CVE-2024-22177.json) (`2025-01-02T19:12:43.827`) +- [CVE-2024-23808](CVE-2024/CVE-2024-238xx/CVE-2024-23808.json) (`2025-01-02T19:07:39.450`) +- [CVE-2024-27217](CVE-2024/CVE-2024-272xx/CVE-2024-27217.json) (`2025-01-02T19:06:49.003`) +- [CVE-2024-29029](CVE-2024/CVE-2024-290xx/CVE-2024-29029.json) (`2025-01-02T20:46:24.867`) +- [CVE-2024-29074](CVE-2024/CVE-2024-290xx/CVE-2024-29074.json) (`2025-01-02T19:12:32.683`) +- [CVE-2024-29086](CVE-2024/CVE-2024-290xx/CVE-2024-29086.json) (`2025-01-02T19:12:16.077`) +- [CVE-2024-31078](CVE-2024/CVE-2024-310xx/CVE-2024-31078.json) (`2025-01-02T19:04:58.017`) +- [CVE-2024-3757](CVE-2024/CVE-2024-37xx/CVE-2024-3757.json) (`2025-01-02T19:05:19.333`) +- [CVE-2024-3758](CVE-2024/CVE-2024-37xx/CVE-2024-3758.json) (`2025-01-02T19:04:15.777`) +- [CVE-2024-3759](CVE-2024/CVE-2024-37xx/CVE-2024-3759.json) (`2025-01-02T19:03:20.700`) +- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2025-01-02T20:16:12.107`) +- [CVE-2024-52047](CVE-2024/CVE-2024-520xx/CVE-2024-52047.json) (`2025-01-02T20:16:05.163`) +- [CVE-2024-55081](CVE-2024/CVE-2024-550xx/CVE-2024-55081.json) (`2025-01-02T20:16:05.530`) +- [CVE-2024-55082](CVE-2024/CVE-2024-550xx/CVE-2024-55082.json) (`2025-01-02T20:16:05.813`) +- [CVE-2024-55196](CVE-2024/CVE-2024-551xx/CVE-2024-55196.json) (`2025-01-02T20:16:06.017`) +- [CVE-2024-56317](CVE-2024/CVE-2024-563xx/CVE-2024-56317.json) (`2025-01-02T20:16:06.723`) +- [CVE-2024-56318](CVE-2024/CVE-2024-563xx/CVE-2024-56318.json) (`2025-01-02T20:16:06.917`) +- [CVE-2024-56519](CVE-2024/CVE-2024-565xx/CVE-2024-56519.json) (`2025-01-02T20:16:07.080`) +- [CVE-2024-56520](CVE-2024/CVE-2024-565xx/CVE-2024-56520.json) (`2025-01-02T20:16:07.280`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b6b37b7e32e..d4edc8f886f 100644 --- a/_state.csv +++ b/_state.csv @@ -61303,7 +61303,7 @@ CVE-2013-3896,0,0,131d1bc819a0dddf074011f6a8364ed74baee78c458449ff3b42f62d5d8f01 CVE-2013-3897,0,0,d2e4a3f9d646907fa4ad805d68901af6f57df38cb0c4377709d9c14d9f4513cc,2024-12-19T18:30:40.597000 CVE-2013-3898,0,0,4001bc12078e48316fd3702cc157dba0b5051507f95b6e3e7fc2523b40acf50d,2024-11-21T01:54:30.203000 CVE-2013-3899,0,0,b203fcb7b7f954c5c53f099033f3627c7f45bc118b6b43a856d83b3807c750b5,2024-11-21T01:54:30.323000 -CVE-2013-3900,0,0,5b9c41d9db22468a844fb6d1b6e3bb239a601008c11a3037cdfdfd591d1c8cd8,2024-11-21T01:54:30.420000 +CVE-2013-3900,0,1,6b2d9d59b2258f73285350bb3a1332370c322eff50e9b0e38a83228592ba6f7c,2025-01-02T19:15:09.323000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 CVE-2013-3902,0,0,afbb46c14a2a8e1d241a4e7e29c6adedd4b2b0b00cd005689dabdd1906c4b22c,2024-11-21T01:54:30.603000 CVE-2013-3903,0,0,e9d3a91ef46bd5f6620142601468a79651a22995de21afe2c8e9f924b37fb04c,2024-11-21T01:54:30.730000 @@ -180577,7 +180577,7 @@ CVE-2021-3802,0,0,17c1af577d789731e60b35f84a78f2af92595dc72d857a602d966fd7418603 CVE-2021-38020,0,0,291a8acde8cfe11f6d9d5857bb557521d3b5dc313eb7bd74013a410016be9eaa,2024-11-21T06:16:18.843000 CVE-2021-38021,0,0,63dee19ae12e55fbc680cbd85f8ebbc35b45228a09144f8dfc635f13173a260a,2024-11-21T06:16:19.037000 CVE-2021-38022,0,0,69e2ff317800f27f406df4ee916a58c609f174b4bfb705eeb9af7fbbabe39075,2024-11-21T06:16:19.240000 -CVE-2021-38023,0,1,4830fb5e044ba6fe31517581eb872702b3ee6b654e1ea6ac4390bbb86ea05304,2025-01-02T17:29:57.643000 +CVE-2021-38023,0,0,4830fb5e044ba6fe31517581eb872702b3ee6b654e1ea6ac4390bbb86ea05304,2025-01-02T17:29:57.643000 CVE-2021-3803,0,0,1e140bad67b9848959df5cf182399c54bfa3401eb0bd36bc3f8df5d3f66edbce,2024-11-21T06:22:28.873000 CVE-2021-3804,0,0,deec5b8a43605594e740f1f6bd3fdf2069c826d5618532c73fc1451d43750a80,2024-11-21T06:22:29.030000 CVE-2021-3805,0,0,2324f1cffea0ff6b3f6b6957e3a7f3f11b66bcf6ec08ba26afcf133bbbc8c0f9,2024-11-21T06:22:29.180000 @@ -191620,19 +191620,19 @@ CVE-2022-21961,0,0,ec7fd27b7eb3e0350188283fd3a3709efbc4e4ef1d8329dd6bafda22998c3 CVE-2022-21962,0,0,c493ad4fb0e7dc777909252298a66a65716b071026da6337f1a09b1bc32cc642,2024-11-21T06:45:47.360000 CVE-2022-21963,0,0,17237c61ff730ba411b960d2b42166b6f33c177de780b1d7e06077cd33e74a5e,2024-11-21T06:45:47.500000 CVE-2022-21964,0,0,6b0ead078369017f6bc241f1f559e7471955d933993196c55a6ca8102643afdc,2024-11-21T06:45:47.640000 -CVE-2022-21965,0,0,f503e67663fffa96268dc3c207b571be247e3757f475ca1a546e02d98edf30c2,2024-11-21T06:45:47.750000 +CVE-2022-21965,0,1,af19f4abc43dcb8535e46e705f788aef35b9bfbf85c90dca993aa4065c5976c1,2025-01-02T19:15:24.113000 CVE-2022-21967,0,0,7911c0f7a691a68db6ef27d1e7c89592e5fe0c7771aa8da8915b066e4c679699,2024-11-21T06:45:47.880000 CVE-2022-21968,0,0,d5062c4319463aa047b586fcc8dd27ce1a1a96281a11f435bc9a5830ddcbb39b,2024-11-21T06:45:48.010000 CVE-2022-21969,0,0,8297cf8698ba0ec8523c718667ba103d5f4d9d3cffbac396de7e805bba702625,2024-11-21T06:45:48.127000 CVE-2022-2197,0,0,a1b5748257df97d64a7d425871e6ed4b34d1c581d01bf2c50a03cfae6239d45c,2024-11-21T07:00:31.490000 CVE-2022-21970,0,0,6a09bb1b4395b2cca62a54d49b40bfb57b673996977ef86cd5eccc7b18fa0f21,2024-11-21T06:45:48.240000 CVE-2022-21971,0,0,2f514bb0084f56120a7efdc5e34f20731d377c7b25c452ff8453320c440285e2,2024-11-21T06:45:48.353000 -CVE-2022-21972,0,0,52a00409c40a92ed5fbea6d9c16cc1ca702538ec093d44f8f463ba97a5cb88f4,2024-11-21T06:45:48.497000 +CVE-2022-21972,0,1,4bf9b004004ff72a3f3b8d7c265daf7f2a0c3c01ed2b55984dfe69b8212107bd,2025-01-02T19:15:24.787000 CVE-2022-21973,0,0,52f60a4bfcbffaae1632fe3aa88ee32ebc87450d459cfb53d7df431926b2fc31,2024-11-21T06:45:48.643000 CVE-2022-21974,0,0,b4e71c0e1517ff1b577ad4adc1c21ecb2a5321f1fea1f0b5b913ec932a3bfe5b,2024-11-21T06:45:48.763000 CVE-2022-21975,0,0,a366707364cd3074e483aaf927cc298b6b5cfcf554bd674d442cbf0a16709983,2024-11-21T06:45:48.890000 CVE-2022-21977,0,0,522db4960bc321fa5487a8cc1f8057c06c009b4dca074bcad77d2e280cae65ef,2024-11-21T06:45:49.023000 -CVE-2022-21978,0,0,a7edf59f631ab934a8e58e72bfdb29703fadb2e62c0b1eb258bf2d7a22c6f891,2024-11-21T06:45:49.157000 +CVE-2022-21978,0,1,2b31e60364b2c225d0f0b134576e98ec3148bd8ddbc25df4a1a90a0aad9272f2,2025-01-02T19:15:25.517000 CVE-2022-21979,0,0,643849a64107cf4d03a124049a1146ab0c1ad3fc46599a1839710082f927eb9a,2024-11-21T06:45:49.273000 CVE-2022-2198,0,0,6d51012b349cfb222caf7c065c8ed955d1001714dc94c998a21fb1bf11124576,2024-11-21T07:00:31.623000 CVE-2022-21980,0,0,c6118e7af5db14ebea05209b5713689fb9db843fff0a8e8fec2ff7b252967c83,2024-11-21T06:45:49.400000 @@ -191667,16 +191667,16 @@ CVE-2022-22007,0,0,eeee2699f005ab5b533b3a2fbc342325a780314a2c256380290f7d0a16bbf CVE-2022-22008,0,0,beaf817bcb24ce9f5d6303cc4050a66a13bceba7a89710c09366045014fcbda8,2024-11-21T06:45:52.920000 CVE-2022-22009,0,0,d4c3943b3ee055aa369b65faa84ecede5e7d2b92d0211c233dd301027d3c2a07,2024-11-21T06:45:53.043000 CVE-2022-22010,0,0,3199558f38a97b41c9db4beaec56f77dfc7db6d2873ffd1446e98201d3a48bad,2024-11-21T06:45:53.170000 -CVE-2022-22011,0,0,796ac8c4334c40f38e230034aa0a9069b44bb38cd18414329d643755240763b9,2024-11-21T06:45:53.310000 -CVE-2022-22012,0,0,ab86ae43f2516df69a7b23edcd3d5532708fc0e241f3aad466ff7fb91a65eb81,2024-11-21T06:45:53.443000 -CVE-2022-22013,0,0,6ac1636766cd4b49d61039c410107f58111f9366d9e4815206f786a060cc03a4,2024-11-21T06:45:53.597000 -CVE-2022-22014,0,0,98b50c32a67942202dab33ed7354bc741da59d43372fedb2ef31881fc5ea20dd,2024-11-21T06:45:53.743000 -CVE-2022-22015,0,0,a99fcd53cf8b5d5d704fd0a40d928c8a66db7afaf91b9ba17c6e7a387366fc5f,2024-11-21T06:45:53.893000 -CVE-2022-22016,0,0,6b1d3013a3236db0b00fcf9065dbb2019f4a9e96f835564d9242e6a039bdb06f,2024-11-21T06:45:54.043000 -CVE-2022-22017,0,0,1aa445bc48550972901e0c2b92f59b98c106093865421c94f6063c210f4e68f3,2024-11-21T06:45:54.173000 -CVE-2022-22018,0,0,69a41e714ecf25fe567fe2770a1fa3dc7f9338037b6e88c2632adc766415a91f,2024-11-21T06:45:54.287000 -CVE-2022-22019,0,0,78928665791b6daea8bd96f8200534479521e2208b60f39503ed1d1da59b0401,2024-11-21T06:45:54.400000 -CVE-2022-22021,0,0,215379a4eda3c5273c246e469e4aba3a96f072efa0de35e63d4c36219fa1b13a,2024-11-21T06:45:54.553000 +CVE-2022-22011,0,1,9e094e22e66ac716c20c4749de3b0f13ed83b3ba2f5ab9f0f7d276348e559799,2025-01-02T19:15:32.763000 +CVE-2022-22012,0,1,db020cb361e86a2c855d7260733e48b305e021042f653a45c4466b6940cad8c3,2025-01-02T19:15:32.937000 +CVE-2022-22013,0,1,e278e2a56945366501d2a8d8e2a8294b57e5d21bd196b2ab83d8845d061451b0,2025-01-02T19:15:33.130000 +CVE-2022-22014,0,1,422256a4af64569bb5b9b8ace576b96df3861d8a49c25437cc0c3b59efa630a9,2025-01-02T19:15:33.310000 +CVE-2022-22015,0,1,84920a1bc0a900ef1e873be23eddbf213cea0807d56cae060daef5d9e7b41fac,2025-01-02T19:15:33.490000 +CVE-2022-22016,0,1,21aecad7dcfdd40820d8aef6d58231100b52d0d553b9b433085228a9b9e12cd7,2025-01-02T19:15:33.643000 +CVE-2022-22017,0,1,615185656f03678c83ff26038055c44ccc84241d91a9018a1108b276b8f60506,2025-01-02T19:15:33.777000 +CVE-2022-22018,0,1,5a898d0009d4d5770dfc0910b47b6a65608983ec7b9ee3247a8d1e731a2aaf3b,2025-01-02T19:15:33.897000 +CVE-2022-22019,0,1,d6f27e0984c0c6a6c2c3634e8c0e88e3889f119923a697ff49c52598878ffd05,2025-01-02T19:15:34.133000 +CVE-2022-22021,0,1,3d849b089956c731f498a72967552f7892e0c443bbfc002a6a29e4dd83a8a6f0,2025-01-02T19:15:34.317000 CVE-2022-22022,0,0,d43ccf84526b57e47f1a0e9d88f21cdffea2eadf82fc61bbf8052f2d717122f0,2024-11-21T06:45:54.673000 CVE-2022-22023,0,0,27e69e4248ed085ad203e6fe8eb33a286098ad79f3e206a5515bd5ba1b9bd643,2024-11-21T06:45:54.817000 CVE-2022-22024,0,0,53175c926c1ebdd2044cd6f979a1027138d9623fe05465019beb13c9ee30712d,2024-11-21T06:45:54.957000 @@ -192333,7 +192333,7 @@ CVE-2022-2271,0,0,0091defe3bbf6dc6e6f862b62ebc31cd05149b7ec734187f74e55337c0ed07 CVE-2022-22710,0,0,3c70728a01146d0faa21d771421f9a82829aba108875a2ee96f0e5629dedabe7,2024-11-21T06:47:17.680000 CVE-2022-22711,0,0,0669ab09e3381ef5e54f203a67b0c667976fcf80a4f113770b93f309f2abd007,2024-11-21T06:47:17.830000 CVE-2022-22712,0,0,bd5be7c8435024ff4ce8b03dad3a60fafb1ba5d6134934b4dc9e6f8362630e8e,2024-11-21T06:47:17.957000 -CVE-2022-22713,0,0,87530f3c782448cc127273696492fe3fda64442099762dfb048aa0409b9fdb42,2024-11-21T06:47:18.063000 +CVE-2022-22713,0,1,2b084c4c613af799bff5bd317b96fdf4482262c4edf17c96e5858ae2c67321fa,2025-01-02T19:15:34.910000 CVE-2022-22715,0,0,44bb8f628e787aee0b83663456668487f3f9f780ee27e3b8d87dcd78183733c7,2024-11-21T06:47:18.177000 CVE-2022-22716,0,0,e1d3946564c17630da5b293328f4dc38874352f4eeeb0bc77ca12d5d8adc02ab,2024-11-21T06:47:18.300000 CVE-2022-22717,0,0,8f8b7d05b1c3e69cf79e639a2543b02a6196050d70727f491fddb9643980ae88,2024-11-21T06:47:18.423000 @@ -192805,7 +192805,7 @@ CVE-2022-23252,0,0,c2de28552994835c6d3c2177a9437220b774ee1f586ed7893803a40d7f7cb CVE-2022-23253,0,0,f23835a149a33aa48a1d24fca91c5aefddbf4e1e0979a1cd79e276de3c159410,2024-11-21T06:48:15.613000 CVE-2022-23254,0,0,b3bdcdda379a65a9727da15c437260d3f090a5cb76358073cc666aa01976dac8,2024-11-21T06:48:15.813000 CVE-2022-23255,0,0,2cbbba8f53e33e765f8626b95b505f16bd423a56ed17ef73ab659890531c8b36,2024-11-21T06:48:15.947000 -CVE-2022-23256,0,0,4584fdaf9a4b3bca20a897d9468abf5129dc7523c56c94beba742c58d60a1272,2024-11-21T06:48:16.073000 +CVE-2022-23256,0,1,d2bb2f918134338c552c97344c82e0c2ab45bca51069b4ef955e44e2a3990b94,2025-01-02T19:15:37.807000 CVE-2022-23257,0,0,377d093b810a4c8568328183e6d9432fd24abd037864b6724b53562ed519a7df,2024-11-21T06:48:16.203000 CVE-2022-23258,0,0,473e7ffd75af9039bb1418ef4e014fb42941f5f103c14e9b49b5517f800474cd,2024-11-21T06:48:16.333000 CVE-2022-23259,0,0,6188d9a2581994ae4e77639e8d55e8b95a7d1bfac0b2606a99a0c7fcc812ad90,2024-11-21T06:48:16.463000 @@ -192816,11 +192816,11 @@ CVE-2022-23263,0,0,ed2220bb9872721a4a540bfeadd505b2fd7bad5e2b70dc78a92b9f1fbae7c CVE-2022-23264,0,0,3fb6b7ece52c922fa99d38a6db42dd69086f6b4fe267cda0eae8589e96735d62,2024-11-21T06:48:16.993000 CVE-2022-23265,0,0,2c154c3118da1ee4b1995237444e2cf42dc33d77994a9b442d578e691f5b6295,2024-11-21T06:48:17.130000 CVE-2022-23266,0,0,d2d90d04ddf716b3398e27dc090e6c33c0ffd1446f40d944b95ae22fc01d7e63,2024-11-21T06:48:17.257000 -CVE-2022-23267,0,0,e49b6884dc7fc8088635175444ffaf7d4e1b736116c90869f3f2a00c6af9dbc5,2024-11-21T06:48:17.387000 +CVE-2022-23267,0,1,176a8dd7851e5f76955ce16a1a3ee60a070b4ec1bfae09e79cc77c8a434aa5b8,2025-01-02T19:15:39.870000 CVE-2022-23268,0,0,00a1d064eeab2edfb9a92a332df5cdcd8e1a439a3c7e0338e9aa3749650fdafc,2024-11-21T06:48:17.540000 CVE-2022-23269,0,0,1c088e373ee530073549d5558e9c5c91c858989bce5137498bc3956d52ada2bf,2024-11-21T06:48:17.683000 CVE-2022-2327,0,0,ad9b493dc894e269e493ba0940d279d86c0256c0dcc14f3243aa85cb42ae859e,2024-11-21T07:00:46.610000 -CVE-2022-23270,0,0,72962516b8c609c278f64fd32d6c33fa8566727d4370b7f7e67e70eb64cd1d17,2024-11-21T06:48:17.817000 +CVE-2022-23270,0,1,244f9234e74f5b70e248e4f58e5a1aedae505d28cbda099a8ec2e896b1b3aefe,2025-01-02T19:15:40.270000 CVE-2022-23271,0,0,af9d4a0208f6cdf0f7f45fa42c379b079fb2a295db2388100ae286a676f3bf9d,2024-11-21T06:48:17.983000 CVE-2022-23272,0,0,013df1e2c9b668bc8bdb796825264a7bcab3ce0b51f0ae2c892bb5ca10b356de,2024-11-21T06:48:18.120000 CVE-2022-23273,0,0,d21a8698d94f402e45516a3d34cce5226aa9480643ac4910b630875e57262a38,2024-11-21T06:48:18.240000 @@ -192828,7 +192828,7 @@ CVE-2022-23274,0,0,37cd393cc64556e89f60334948319b1b97d5e73253acda214545a85027557 CVE-2022-23276,0,0,b813a82e5750b5e4ae807629930fbedb899c536c72e148b3035eca3afd2e178e,2024-11-21T06:48:18.490000 CVE-2022-23277,0,0,2eec512282bd1c8978bf8c6b989c83b59f86ef87b08c435dce17ebfac0443511,2024-11-21T06:48:18.613000 CVE-2022-23278,0,0,64a48cd14f91faaaa94e4a58376abdeefc5a5cd6a85cee8d8cfd1b76c90f877a,2024-11-21T06:48:18.743000 -CVE-2022-23279,0,0,cd3cf2e82d8cefae2461e6a81cef728168439f52cfacd6d6480e040bf9ad68ae,2024-11-21T06:48:18.880000 +CVE-2022-23279,0,1,911a3b6fceb15a976855def6dbf615c4cba6ba7649ec9bae81027cfcf7f4fd11,2025-01-02T19:15:41.163000 CVE-2022-2328,0,0,3a24f87ef2e9f7d8e7ec1c40341254c7f96f50195c178dc876927225015a2dff,2024-11-21T07:00:46.740000 CVE-2022-23280,0,0,8e9db309416ac3df0e4460772d14c2215e1f6970410c89f4959ce28c8d6b9d94,2024-11-21T06:48:19.010000 CVE-2022-23281,0,0,ca543116c2beb64b366d12b8b91aa6238ee6c2d586b9faec8eeaff62861d780b,2024-11-21T06:48:19.133000 @@ -193879,7 +193879,7 @@ CVE-2022-24462,0,0,844ec0003dd45f7b0c06a0e0a426ea1edbf67c59e263c3f9446970221eb32 CVE-2022-24463,0,0,98f6cb894b0f56dfc31b36694ec4b9aabd570227fde9a2f965d12bca20226d14,2024-11-21T06:50:28.290000 CVE-2022-24464,0,0,9d0cc1802a6ec20fb0d5f3cade2bf6feec7ae9bb03014801810367c67c2c8781,2024-11-21T06:50:28.410000 CVE-2022-24465,0,0,457e0beb65453384e3d90ed79a4ac66f3489c6ed132af89de107fbadf7d77e47,2024-11-21T06:50:28.543000 -CVE-2022-24466,0,0,2326643f5fe204315a280af49a1b350b40aa5321399e6dcaed23115a7b582404,2024-11-21T06:50:28.657000 +CVE-2022-24466,0,1,2f0c0f91a6916901f065d8d13963d5f714d5e68da3b77ff1f7c1771501340097,2025-01-02T19:15:45.857000 CVE-2022-24467,0,0,6c0b7a553460e61e60f7af9a474ab99c7abb4f50d8c0252d8e1ef29ff8efdcee,2024-11-21T06:50:28.797000 CVE-2022-24468,0,0,d96d2d93c158520c757cdf32a77bb4ed24f06a4ce2e78d37e71a4b9e61d45c36,2024-11-21T06:50:28.917000 CVE-2022-24469,0,0,d81beceaa1c655ca082c205137a38b0f91a72b69de49288c2103be58d92fe3b5,2024-11-21T06:50:29.020000 @@ -193900,7 +193900,7 @@ CVE-2022-24483,0,0,937cd667dc68edd7ff54ff9cf5aeb51e8f3be76c3b91e684b0167f0bbdf85 CVE-2022-24484,0,0,0157d37bf4aeb186dc8ad65ba84e6ca9eb9122dd10ea7779614b9d8e5cc91820,2024-11-21T06:50:30.637000 CVE-2022-24485,0,0,4577a65113d388492f1ca828cf347b2916007bb19725a01ca07baf22d92cb141,2024-11-21T06:50:30.760000 CVE-2022-24486,0,0,7a5320c6b6d04c0f930ce186a40309e8c16dee86b6450e4a4dc21f5083e97f77,2024-11-21T06:50:30.913000 -CVE-2022-24487,0,0,d326b777bebc617b91df65f8a4b4d6a401dbd894ad0f1c83be8b2fd29ba14ed7,2024-11-21T06:50:31.053000 +CVE-2022-24487,0,1,4af436aa1d3d73274bfea63f04b1b71f2ea6fa5f1884eb020b99cfd31d300cf9,2025-01-02T19:15:48.110000 CVE-2022-24488,0,0,35370c0aec4489aa580a1b7c009b07a1ac8d3504d508c51546f1b1c50ce843ce,2024-11-21T06:50:31.190000 CVE-2022-24489,0,0,040505480134d1787dc3f1f87d278a047c4f858f09b9e8aee4db9547b87a4401,2024-11-21T06:50:31.313000 CVE-2022-2449,0,0,b51bc5bdf0e53999905016efaea1be9a6ea3b938433105afcce8e852b72c28c2,2024-11-21T07:01:00.797000 @@ -193909,7 +193909,7 @@ CVE-2022-24491,0,0,be8abc8c9a8b128f24c4ad507adae9f14157ec5502502861d8e6cac7ff113 CVE-2022-24492,0,0,ea157c438536650007a3665d6de45d1dedb2337589ffd337734ba8f6c8530890,2024-11-21T06:50:31.730000 CVE-2022-24493,0,0,578fbc13316a8ff68da5a42ac07929498494df91ed6370794444fd0ce7d12cdb,2024-11-21T06:50:31.887000 CVE-2022-24494,0,0,6e5b0b281b6a9f596f1547ff2cf934087f5e7f38a86f378a1af323337a3487fa,2024-11-21T06:50:32.037000 -CVE-2022-24495,0,0,3a0a6eab61981cfe78679c0cd688eb1fe15e4a45e985748f1c25c6c4a9c8bd2a,2024-11-21T06:50:32.193000 +CVE-2022-24495,0,1,998587d23fd1c3dc3155d2c7191c9377ce8fe4e49da0596163789a5e913517a9,2025-01-02T19:15:49.107000 CVE-2022-24496,0,0,ddae4bf4d2022902d35a7741dfcfaff69d68657562450dae499426bbc5fd4784,2024-11-21T06:50:32.350000 CVE-2022-24497,0,0,7df414a93a45278e9d1a6c13f8eff40e76d3ac7667fffc1a59652c635bdcfb4e,2024-11-21T06:50:32.527000 CVE-2022-24498,0,0,f316ad52c0dbbab221ccec44ec60a4a22e0d9d6cd8e3b1b840ff0f30a5e970bc,2024-11-21T06:50:32.677000 @@ -193940,7 +193940,7 @@ CVE-2022-24522,0,0,953edbcb0ded95b09da79479905980eebddf7270b863f7d62fe23afee4ed2 CVE-2022-24523,0,0,2026211e64565ecb5aece6760ea77f91c7efb638bee1b889801a283f194a6570,2024-11-21T06:50:35.943000 CVE-2022-24525,0,0,0fa0b071bf9a5e89a3b6d122baca2672bd1f8c8a6e691b1d6d6d1a17c34bd011,2024-11-21T06:50:36.063000 CVE-2022-24526,0,0,d65973c37096b82d6f470000adb817e7e479b1f2abd7c587dd5983e89a3aa587,2024-11-21T06:50:36.197000 -CVE-2022-24527,0,0,695b59e6bd8699534852b410902efb1afc9086916e48ee6a279f42e2b2011200,2024-11-21T06:50:36.317000 +CVE-2022-24527,0,1,13bd238571668af1082decc6fe6e9fdbd20fbbf9d17a6de1ae9c0d24a43f52f7,2025-01-02T19:15:52.573000 CVE-2022-24528,0,0,c4eb2ff4868c4e2d63c0d35220e32d7f277ae2dc641da434224268b71740d461,2024-11-21T06:50:36.437000 CVE-2022-2453,0,0,7b010a98d1185ee5badaaac986b7e480391e6afbad5c765f5aa4f49058eaef7a,2024-11-21T07:01:01.023000 CVE-2022-24530,0,0,b0fc548aece4b05eace9722102b5a71bdafc3238ecf713e96207c6980838e1b5,2024-11-21T06:50:36.597000 @@ -195879,7 +195879,7 @@ CVE-2022-26829,0,0,26235668949679660b959d1e03d8a38c6058cc6c97bdd41e14e23dcd1fed8 CVE-2022-2683,0,0,b0a8996dbaf72d74c8424119920c7452ede7148dc0ee36c558ab5e886d7fcdad,2024-11-21T07:01:30.423000 CVE-2022-26830,0,0,101143d07c7d38e506386288c9f4b3590a102fa2f1c2002df8639bea0707675c,2024-11-21T06:54:35.993000 CVE-2022-26831,0,0,0c7869329711294f0732c0bfa3251201277ac1f11a6ad4e3a77ff5a6a857f9eb,2024-11-21T06:54:36.130000 -CVE-2022-26832,0,0,a9aba682d43b77ee521198e804cde790212f373af15efe5115ebc42696ac8a0b,2024-11-21T06:54:36.280000 +CVE-2022-26832,0,1,e73b79f3cccf43aef71d468b00fc5cacf5bbce173712b9a1b061d4ac82feb0e0,2025-01-02T19:16:01.210000 CVE-2022-26833,0,0,8abaa165e83ecbe17c40a459869c0c599f3dcca5c9f976d1c54e142981d50106,2024-11-21T06:54:36.470000 CVE-2022-26834,0,0,29a6f34e36b0f9451c60a822ca910417bc1cb5ed42cf3f0b12c84c140087f7d8,2024-11-21T06:54:36.587000 CVE-2022-26835,0,0,ba6d58dc947ecb66fe4ab11dba1c362e96111f78830e9c9565c43ab9effa4496,2024-11-21T06:54:36.710000 @@ -195946,7 +195946,7 @@ CVE-2022-26900,0,0,d880c889625626d3735b4784a462b5c460a9fd9f50c95ef0eff6086cf1b7e CVE-2022-26901,0,0,9d0e66becbcd26301eed9b1c25f2ca27dce1717e3bf42d1e96ec199cacec5e06,2024-11-21T06:54:45.673000 CVE-2022-26903,0,0,e12b41a9da78b986fdbc4a5ec5dae73e817265ef9e6b2c6c86350ac193933154,2024-11-21T06:54:45.797000 CVE-2022-26904,0,0,c4fea5ec01a6d99a7449bbff69ac042adf52bf6eb1f6f99a22f421e4dff4bac7,2024-11-21T06:54:45.937000 -CVE-2022-26905,0,0,1d709cd6021442775bb25b0a9e4ffb0b3f74f2fe809c81b89daffd441cb029af,2024-11-21T06:54:46.083000 +CVE-2022-26905,0,1,69a4dd48477000d78e135fac8d8376d75e941e147735b7ef075f39a5e9916a61,2025-01-02T19:16:02.740000 CVE-2022-26907,0,0,689c1992b75a581ae3d75db7f5722f9717a352fd1bf0567ba741426018d8f1a4,2024-11-21T06:54:46.207000 CVE-2022-26908,0,0,df4a80aa936d2011d9c2c07e6a76840f01e9b009d58a9da3ef4fc1ed167d3f67,2024-11-21T06:54:46.327000 CVE-2022-26909,0,0,c6d34cf879a62165bcaffeb036456758b7bda8bbc1b1d3c4ed06822262a7ce9e,2024-11-21T06:54:46.437000 @@ -195954,7 +195954,7 @@ CVE-2022-2691,0,0,cac366bdbc57d2705423c7c46b03be851aa54047c70bfc9648f25212ead591 CVE-2022-26910,0,0,6f4f19a5dd44244df38f33a5130fd01c074baf9643028b80a83b838a681739cf,2024-11-21T06:54:46.550000 CVE-2022-26911,0,0,3f38049f79d1478ee5cf2a9942e417f4d5973e99779825fe41e443dfe2521e74,2024-11-21T06:54:46.670000 CVE-2022-26912,0,0,4fb2ec9d8ba221b5282169691558a1f9e80e679ea648b04f3e9fc0586c035762,2024-11-21T06:54:46.787000 -CVE-2022-26913,0,0,e2137f507bf8ac16fcc58e1caa1cd8c8da31f75f98f42ca4e90f742902f7ac9e,2024-11-21T06:54:46.893000 +CVE-2022-26913,0,1,9527eed8dd09ac4c0ff7b35d95f03db915b276309245420e1319d7d841048ab0,2025-01-02T19:16:03.723000 CVE-2022-26914,0,0,7be5fb37945072e248ea3a7a73439516e1111a01f8f5201e460ec459f187fe7e,2024-11-21T06:54:47.050000 CVE-2022-26915,0,0,e251df6eae437797f216e1dc5760169c40e56e3e7ebc7eaafd7850ee77ba4ca6,2024-11-21T06:54:47.183000 CVE-2022-26916,0,0,8f2e0bd5f1047e3f42662b53fd86f1e80b5d647da179c9368f27b09c00efe766,2024-11-21T06:54:47.360000 @@ -195964,26 +195964,26 @@ CVE-2022-26919,0,0,2be6fa85d2f1f820a10e2f8f382ec9aa51e76b0f6c58d833c9e1d6489267d CVE-2022-2692,0,0,cea1f2233bd80b5e90d929904d7a402ffd8d37bc63addea2cb69a7aee1781bd5,2024-11-21T07:01:31.613000 CVE-2022-26920,0,0,f19a1827b2342d4268ac1948c6d01ea2da57501ff06111f56ca13e62f1589347,2024-11-21T06:54:47.973000 CVE-2022-26921,0,0,f7f5e97455309a1d12f9e641384b7efb70e8a194c09972863e5da3e9b9de59a1,2024-11-21T06:54:48.090000 -CVE-2022-26923,0,0,a191cb4bf9aa9bb695a933e359fab6cef1406b67d42e547b444fb123a358bdcd,2024-11-21T06:54:48.193000 +CVE-2022-26923,0,1,a1e85a51bf2bf523b3764ba65016741274411625b8f8041cd5e4173fb092b573,2025-01-02T19:16:04.860000 CVE-2022-26924,0,0,88a880ef73d10c778e003f2b302cf4b2bbf71c2545921c162b8a20045f08b714,2024-11-21T06:54:48.347000 -CVE-2022-26925,0,0,ec8dc4d8d3441f5a8639df0ec50670c4e996552f50aba69295f24fb46fbd1ea3,2024-11-21T06:54:48.460000 -CVE-2022-26926,0,0,1971148722b7f46bf8c2168e1a66e782f8b30bbcbad91effb0c6f552cd8cabb3,2024-11-21T06:54:48.597000 -CVE-2022-26927,0,0,af48138f29255817ab7502b003fa6242d7561ea96140b1ea00f7bcc981542b56,2024-11-21T06:54:48.740000 +CVE-2022-26925,0,1,678a4ff9ffb757aff803974d75e8acfbef39aaa0eb958d8f9132923ed861ab02,2025-01-02T19:16:05.153000 +CVE-2022-26926,0,1,12e459ca497e8e9c1fc9512c8e135fc9eace00b6b68dc32a7687e47916fc5c00,2025-01-02T19:16:05.313000 +CVE-2022-26927,0,1,2afeff873aba1802ddfafb1bce4dc5043958167ff653fe98f58dae867bba9294,2025-01-02T19:16:05.490000 CVE-2022-26928,0,0,678ccb6dc79c21bc2d956d0c5c459704bbf3ca96625fb3b98792ae1399c41543,2024-11-21T06:54:48.860000 -CVE-2022-26929,0,0,2776e0c27008bb76094fc2afdc28e0975838b45f9ffab859c5275707883839f2,2024-11-21T06:54:48.980000 +CVE-2022-26929,0,1,37a0bc7bb1a5230d7a3cae9eb08bab79069298bcf310586a8cd278a964291ce4,2025-01-02T20:15:14.593000 CVE-2022-2693,0,0,9116b8a76ac89faded93eab0e304daecf551978a1f49dd3a525a0130c575dafa,2024-11-21T07:01:31.780000 -CVE-2022-26930,0,0,dc2f16380a90e8204e52cebf2e8cede206fb29075d70fa60db1e769578a408fc,2024-11-21T06:54:49.113000 -CVE-2022-26931,0,0,d11589f4e2cd1ed87951a56da7e187e6606c47e9715e393b2659304dbbb0d794,2024-11-21T06:54:49.243000 -CVE-2022-26932,0,0,ed5c631cfa7d2fc292e7e5c0a561dac8606eec211c403aa2fc285d320fcee9b8,2024-11-21T06:54:49.387000 -CVE-2022-26933,0,0,a75e3472b288a68f93ad9c43f8d9ffa1690eb948852997087fc876e029864d6c,2024-11-21T06:54:49.497000 -CVE-2022-26934,0,0,a2835506cb76e2287a90d70a5b89029c887c73268c359defcec17ca9b3dcd72d,2024-11-21T06:54:49.623000 -CVE-2022-26935,0,0,61304d052a7748277334a37fad778845332d4102319a82722a4f988357a199ed,2024-11-21T06:54:49.777000 -CVE-2022-26936,0,0,4c4015202b64631da30735d6ab22494af66eb2bbd809e245f283a71b6f06885e,2024-11-21T06:54:49.920000 -CVE-2022-26937,0,0,b1bd5ccab387d898268efeecd6256e5114c86dc67e7f569c39d613c4852b2f84,2024-11-21T06:54:50.063000 -CVE-2022-26938,0,0,9dcf48de69c0756b31fe29ff5ab147732613517117da750ecdfafea3b59ed096,2024-11-21T06:54:50.190000 -CVE-2022-26939,0,0,b1206460a70d4c53b15d58d764fbe1e4047a2281c65be8174de0fb16cf4ca994,2024-11-21T06:54:50.310000 +CVE-2022-26930,0,1,a6d2d916bc583b4a67274ec014fc7aff7bc14bf207580642bb7445e48f778469,2025-01-02T19:16:05.627000 +CVE-2022-26931,0,1,280cefcfa5a36e398ab1fc2a68aa8ee71212f7fa22746e84dbc874dad82eeb9e,2025-01-02T19:16:05.770000 +CVE-2022-26932,0,1,f64ef7d90cfef4e2ad02c83db60ad767c203caa5230b91445ea8b5ad38947bbe,2025-01-02T19:16:05.910000 +CVE-2022-26933,0,1,c3a122f9010478097d6339c00448952c41a8d087ba4425496823c843cc0b91c7,2025-01-02T19:16:06.037000 +CVE-2022-26934,0,1,40447bcc97e195319462e94bb22866a5f42493588916a405229c42004437eced,2025-01-02T19:16:06.177000 +CVE-2022-26935,0,1,313fbc92679eb45edfc4960b197cd729e493d36905a53bc0de078d82606681bb,2025-01-02T19:16:06.333000 +CVE-2022-26936,0,1,ea0a69f4e25962ea5ce96849d73389b49f62c2017bc30cdb5d35d5e86ec569e5,2025-01-02T19:16:06.520000 +CVE-2022-26937,0,1,0b80fc12143d720905a49b0b270427cd9a40491b475a66800b2b9f78c3449383,2025-01-02T19:16:06.673000 +CVE-2022-26938,0,1,8a48de98e4e6bb4d44a30eb31505ec5b7c5cb0ec8b36be5fd5fd395d60f1e73d,2025-01-02T19:16:06.820000 +CVE-2022-26939,0,1,86cfc596950bc9384163e14460a7ca5d482e1871074044b7a8f30152a28c7bc7,2025-01-02T19:16:06.957000 CVE-2022-2694,0,0,b7069afa26cfbbce76e866ba48834912e3d8249130e4992b405438ac54349a34,2024-11-21T07:01:31.910000 -CVE-2022-26940,0,0,6f4413e6aac1e57d827f271a4d6a4a73fba75ca8d8f5dcc27ffc447493fd2657,2024-11-21T06:54:50.420000 +CVE-2022-26940,0,1,96c18d90050d0bc2962008009c1c88cb0e8c64846cf9b38d37d34ff99bb2647e,2025-01-02T19:16:07.083000 CVE-2022-26941,0,0,531c47f88d0425d2464cc46bb6b36e34e2b01dc933fd2dab232441af04b38b81,2024-11-21T06:54:50.533000 CVE-2022-26942,0,0,9a763229d7e8ebadcbb5534368882376d7406c6148d52e33e4ef71aec39f7d70,2024-11-21T06:54:50.667000 CVE-2022-26943,0,0,1b6eb26a24fadb356ed1842cf8598fa1237112b1d5e9bd123edd591e513db422,2024-11-21T06:54:50.800000 @@ -197683,56 +197683,56 @@ CVE-2022-29098,0,0,9b28f2d39400fcb948e205ce62fdb05dcc1a4959c3871043713f0c44df27a CVE-2022-29099,0,0,fc25074c720339bc9f7ce8320bb690059f429c91fe9b4bab8e09f5f79c62deec,2023-11-07T03:45:54.710000 CVE-2022-29100,0,0,4caa750db12fafab5ae3f90e979aff3f5e2dc0eba9f114180c24b012025bbf7f,2023-11-07T03:45:54.970000 CVE-2022-29101,0,0,2bbaacc378003d338a9f2357aa0d838cd2ffd40969b35b4519de7d9ef00e66dc,2023-11-07T03:45:55.227000 -CVE-2022-29102,0,0,7a925fa6754fb9b49508fa70454c918d6fd80122a436eba6d327647d346ca4f2,2024-11-21T06:58:29 -CVE-2022-29103,0,0,a598c3dd4c12e68a4c6d51236796e387a0fa1043eb776c33fecf9bed3dc3d9aa,2024-11-21T06:58:29.127000 -CVE-2022-29104,0,0,a6cd8777d4bfca22d68cfcd2837e3adb29658c23501c07f4e8a187da0f85165c,2024-11-21T06:58:29.280000 -CVE-2022-29105,0,0,dc95c7146fafa4dafdddbd6589486e3d9b4cb7e27095ad688f5bf0d8f091b12b,2024-11-21T06:58:29.423000 -CVE-2022-29106,0,0,6faf80b33ce2031785ad30b5f74a356f1aceece3f1d28ceb1c7578c3be5f7217,2024-11-21T06:58:29.577000 -CVE-2022-29107,0,0,939d71a97ff4daf06552770e0f9d44f31806f4f33acc5483f1fa281a7960573e,2024-11-21T06:58:29.703000 -CVE-2022-29108,0,0,6b6f3885fc744d0b0d62a918599827a9c13c5d85325963ae43d9e2beb717bf5f,2024-11-21T06:58:29.833000 -CVE-2022-29109,0,0,71c960f24b967b24903e6ffb86b0b9eb8ba6f4ac21d239d8538c272baeb99ddf,2024-11-21T06:58:29.950000 -CVE-2022-29110,0,0,6956678996a3b439028489a12fa3fc988eed4754501a06cf6a74551708bbf153,2024-11-21T06:58:30.077000 -CVE-2022-29111,0,0,2c0f26403366f663d01459a45f96e1c4b9f75a9124978ffd4600970dc5f9c732,2024-11-21T06:58:30.203000 -CVE-2022-29112,0,0,893e100a361da73b30a7a4b5e2bc2662172d677a0d70a714f4a3595301ec6216,2024-11-21T06:58:30.333000 -CVE-2022-29113,0,0,0c2436c8e6fad47d6ab9dcfdc1de6026edf21b4e59aa92d553a50fdf7b5903cf,2024-11-21T06:58:30.493000 -CVE-2022-29114,0,0,f71fd14e5da09a393955dc28cb95db691c0804c4f50e50ddbd5888e378cd63da,2024-11-21T06:58:30.630000 -CVE-2022-29115,0,0,711a1be73ae33299fb97ffa7aab791d9227526c16a9ac07fe374d5b7941f0118,2024-11-21T06:58:30.780000 -CVE-2022-29116,0,0,c05009c61c40613affa00edf901805a29e5d7f473bca8ea4aa2d23c47c3ede86,2024-11-21T06:58:30.930000 -CVE-2022-29117,0,0,20553e7a1471a1fb27aefd491a92beda897dccc888bdf4f1a10b553d0a5228b5,2024-11-21T06:58:31.047000 -CVE-2022-29119,0,0,9c543be105bb368e1fa5f2776c995848cce22d8bf979b26aa543662d4a5af4eb,2024-11-21T06:58:31.180000 +CVE-2022-29102,0,1,161d25244e2c62f34b0baa70c70d8dccc054e28c451ec8b3d8cf1f68247d2144,2025-01-02T19:16:07.207000 +CVE-2022-29103,0,1,cc4fa2beca8c91988a465ad6da88850a28cfabb9495bceca430ce6a8637ecc8f,2025-01-02T19:16:07.347000 +CVE-2022-29104,0,1,f64b4469780fcce9139520f4187d808178f2803539d41698dc53e5dec63f8650,2025-01-02T19:16:07.500000 +CVE-2022-29105,0,1,680bee5d75e31df11c7e0fceb61cfb016226dadd42b3cfdb7e2685cbea6fbc94,2025-01-02T19:16:07.660000 +CVE-2022-29106,0,1,841f02eef15305fc21ab2fd35ab126a07c2c3aed310dcf8277c0c1e9f23722ec,2025-01-02T19:16:07.810000 +CVE-2022-29107,0,1,ec2a37398755813afc987666a403146425d57b99f4b48d790b4d8f9d14047e46,2025-01-02T19:16:07.960000 +CVE-2022-29108,0,1,2e875f5ee53d81b16ce4545c2678b25513f18cdf1675ef28d92abee82db058f7,2025-01-02T19:16:08.100000 +CVE-2022-29109,0,1,e7fdc10019b104d26365d1fd41a23970747ec2fbf8a3d1311becebda5839851a,2025-01-02T19:16:08.220000 +CVE-2022-29110,0,1,6fcc65c4b715d808bf6accb49741ccfdf0573e075c1e2bfccb5a1a7f8b3bc72f,2025-01-02T19:16:08.370000 +CVE-2022-29111,0,1,78877eb7e56141e5a58719d4fc6c113b91369939a8fe81b9e068889f63645ebc,2025-01-02T19:16:08.490000 +CVE-2022-29112,0,1,95e6c55c94ebca0a677d0030566669f1992f863a90c607276691cf64ee4f5753,2025-01-02T19:16:08.643000 +CVE-2022-29113,0,1,32d31593b03774d70b986bb9f9f9d52cd26a7fb1758bbd90bb24bdcd905ceecc,2025-01-02T19:16:08.817000 +CVE-2022-29114,0,1,cc986d0926835381b45a0f119130ce56e7b6c9f391a2d3a54320939ae0bdee3c,2025-01-02T19:16:08.940000 +CVE-2022-29115,0,1,9835f7040b1095bb60573dbc3ddd61e56aa149eb587280be60923cc1580f603c,2025-01-02T19:16:09.083000 +CVE-2022-29116,0,1,6925de48539b14c40a5d486188084cf8c6e724dde0eb352c5ae9d553712be8f8,2025-01-02T19:16:09.223000 +CVE-2022-29117,0,1,2dea004322e17a6857e664a0ccaa30a7dec544d17fcd161c6ebec7c571742ae4,2025-01-02T19:16:09.337000 +CVE-2022-29119,0,1,606cbb425d9b4ec833dcb7b32e4b509e232ce21a9cd2aca8bf30dcf4fbb3554d,2025-01-02T19:16:09.480000 CVE-2022-2912,0,0,e87a6b2e642c484e7ac0e3638914eb66ee685f582c62a475247b9c590841d3ba,2024-11-21T07:01:54.930000 -CVE-2022-29120,0,0,8a3cd3da8a646a9730089ba46a3d6fc5995cda361293a080c72898cd13ef8d14,2024-11-21T06:58:31.297000 -CVE-2022-29121,0,0,ec438177d56e045f47d2211b9c3adcb43e2da7dbd722cd91cc051f55ab5f5e4f,2024-11-21T06:58:31.430000 -CVE-2022-29122,0,0,a976e40f5142ec97d22becb23f2c80c941ccfcc8d29f21578678c79599f4455a,2024-11-21T06:58:31.593000 -CVE-2022-29123,0,0,2eda3c3675d64d883b9fae53a4847f737b791a3a490a435d79835f0fd4af2cc8,2024-11-21T06:58:31.753000 -CVE-2022-29125,0,0,f09aea3b0182a2b0670198778f126bb70208c6922cea24dad28493e70f2910e3,2024-11-21T06:58:31.900000 -CVE-2022-29126,0,0,e46ddcbab3128f5b44696edaec2dbeb22e11314a791715695f622d1d4e04ace6,2024-11-21T06:58:32.073000 -CVE-2022-29127,0,0,a005ea0d01ddc92ca0e18e5dad0dd91909d72b7c7879e183fb8f381375965a26,2024-11-21T06:58:32.230000 -CVE-2022-29128,0,0,736ee8d7cc83d7cfdaff45ee1e3a58f3c94f8f016eb20270876a78e0697acc71,2024-11-21T06:58:32.387000 -CVE-2022-29129,0,0,feb81785fb55180d1a0c3ce16a488efb6145445a5b945ae8eeff69c03e1b0791,2024-11-21T06:58:32.540000 +CVE-2022-29120,0,1,cc505a59559f5f0a0f8fe1f1265305830310dc65aa012f56e95f76c299b7e87a,2025-01-02T19:16:09.590000 +CVE-2022-29121,0,1,ca9a639345ac902bf37fca323df8be47a6217f9282fea5eed4f37dc17c7bc532,2025-01-02T19:16:09.717000 +CVE-2022-29122,0,1,1f46c2f297e02b7f96c1bcb4ded282a28500562d5fa5e76c4502d9bb79d60cbe,2025-01-02T19:16:09.867000 +CVE-2022-29123,0,1,5aaa725fff16281befb3b9fe73c05a0d2b9f9e7b5974a052e1330bcffdcddf15,2025-01-02T19:16:10.007000 +CVE-2022-29125,0,1,6c4c81e81cd533cc88d7ee29a95d9d82f90a87a6e84ab7626434d0570d6df4d1,2025-01-02T19:16:10.150000 +CVE-2022-29126,0,1,7c2c972e374163679adcb1e0f0add68fbd6a50f85910d0462a79cb6afdb0ffd3,2025-01-02T19:16:10.297000 +CVE-2022-29127,0,1,ab07753268eef7e82bbf5105aa66cbd60a9ae7e8ceca200f980c920ca8408316,2025-01-02T19:16:10.430000 +CVE-2022-29128,0,1,14e758b5b0ca1a9c9cc40fcc506749a328b9b46d288f24d8571c9d44f3c55bc5,2025-01-02T19:16:10.557000 +CVE-2022-29129,0,1,a0f508130e4a0b15b42d56d15fd272ca197b44b683007d922e4a4dd8ac68dc5a,2025-01-02T19:16:10.700000 CVE-2022-2913,0,0,4f8e00120d2fdede0f2834c0c16a60a8fcfcb777be1531636329ea91c4df5a22,2024-11-21T07:01:55.047000 -CVE-2022-29130,0,0,a87b11d4e9dbfe936a55cb8cc986bf3b014b505e07a29df661ff3316163bf392,2024-11-21T06:58:32.770000 -CVE-2022-29131,0,0,3295c950723aa5c1e8651ed62726ef004207d0f068f79eb836568ce38665ca0d,2024-11-21T06:58:32.930000 -CVE-2022-29132,0,0,2ee7a0e0c1a2325635143059004dfa949628b012cf647cb47b528f83ab7c2b59,2024-11-21T06:58:33.057000 -CVE-2022-29133,0,0,3c13ef10e3f2fd3d7395c3b2bbc5b35abf4710b73c71a035e569956ddac527ff,2024-11-21T06:58:33.203000 -CVE-2022-29134,0,0,3576ad23a2aafd7ae3d74d2dc4d6e612b73d83ea4638fb466518eb50d00d7b51,2024-11-21T06:58:33.310000 -CVE-2022-29135,0,0,c1cddec4cb434fffe6fab665e49eedc2c7ed6a19613c5dbfa953982f5005ccd7,2024-11-21T06:58:33.423000 -CVE-2022-29137,0,0,019fc0bf87c375b29a40c6dd262a346bce596803c6db48f79b061d8cb1aa7898,2024-11-21T06:58:33.573000 -CVE-2022-29138,0,0,1f53c474a6454ab997473c7c30a466e85e84a443a3ac1ab5816d0432abfccefa,2024-11-21T06:58:33.747000 -CVE-2022-29139,0,0,0718c7018ef3118c66cf60d3e12280331261a582046b40fa7cb2316d476b3826,2024-11-21T06:58:33.877000 -CVE-2022-29140,0,0,cc9a0ba5c65b138369780c07da608446b0b4029933d001f7c064ab723dd2e9bf,2024-11-21T06:58:34.030000 -CVE-2022-29141,0,0,79e1f4614bb14a37655f19107572c54075e6fab68aeb94e748cf5773c6668853,2024-11-21T06:58:34.163000 -CVE-2022-29142,0,0,0c415414ed4a8474386631518c07e653893178e19d064a4df20abe99052b65ed,2024-11-21T06:58:34.320000 -CVE-2022-29143,0,0,648666e013aa67ee7d144e224975d9c269fdee632d618029db36a4022140f6e4,2024-11-21T06:58:34.457000 +CVE-2022-29130,0,1,04701ad2e5b78889184f560296f96c63fa9ed76bb9ca4c4ba57ced5b6dbfed7c,2025-01-02T19:16:10.853000 +CVE-2022-29131,0,1,76c41186315431940341d4ee37af6783db4eb6c8d085b35176c1f9d56dc469ca,2025-01-02T19:16:10.993000 +CVE-2022-29132,0,1,21aeaf1fb6c2ba05538848544d1ccb3e871a7d2fc7783ab6e00b627b6d104790,2025-01-02T19:16:11.113000 +CVE-2022-29133,0,1,01d1ae3e4c7618e941d4bcc262cbfaa1b96d5364ae90cb77599b26e79131e00e,2025-01-02T19:16:11.257000 +CVE-2022-29134,0,1,4012dc26a30a26464b901f562494d2fa2d41a0ab6d87b5a6ca4074b9a002b505,2025-01-02T19:16:11.370000 +CVE-2022-29135,0,1,321e9c7921ce1f94db6e881097cb85f7d21b1548da1b762f6ff5284b7f1eca7e,2025-01-02T19:16:11.490000 +CVE-2022-29137,0,1,21697c7fc9b8fe7c83a2a45d53e2b1ba81a83eabe08c09846f841b7f0536ae2c,2025-01-02T19:16:11.623000 +CVE-2022-29138,0,1,282bc8d5425adb07c36355a4d20eadf43c8d9a2e9206a290dbdbaa18fd311b32,2025-01-02T19:16:11.760000 +CVE-2022-29139,0,1,41808307c172e2f8a2817857392528fd8746de92310bb26084ad60cb8eb6c232,2025-01-02T19:16:11.877000 +CVE-2022-29140,0,1,0cb619868cde4df05cfc782a106874f44876a6978a15c472fd04a39297086e4e,2025-01-02T19:16:12.017000 +CVE-2022-29141,0,1,d6c78b0c4c08150e00cad2bffae75d1ac62272dce3501a55d808dbf349b7d268,2025-01-02T19:16:12.153000 +CVE-2022-29142,0,1,c421ea2387c94c38daa4d0c7f8219d704d64b337956f599c1f038bab335ad969,2025-01-02T19:16:12.323000 +CVE-2022-29143,0,1,2b7a1c9f5c499b70d18377caa4de8aaffebb7262583af19f3420fccb2dc1cc4b,2025-01-02T19:16:12.467000 CVE-2022-29144,0,0,2172e537f22d1b877d04dedd8cce361841c4e49c2d340cdd64dc09eea8239d30,2024-11-21T06:58:34.593000 -CVE-2022-29145,0,0,df328ffff4a4b4abc69201c830cfc9a18735738d431e5e568cb263a73c6f4e54,2024-11-21T06:58:34.720000 +CVE-2022-29145,0,1,5c312ff9bea7f017b4383829ceff54b5c3c5550d35d0d93d5000ed4e185b3eb2,2025-01-02T19:16:12.750000 CVE-2022-29146,0,0,dc15e1bf0f68573d5d2c1ddc78f56dc20d745d3cd10c97f8c1b56249713b91b1,2024-11-21T06:58:34.853000 CVE-2022-29147,0,0,8e096898fff06038d124c4f71c0013b4d5874d022323768c280ff853d314cd6e,2024-11-21T06:58:34.967000 -CVE-2022-29148,0,0,7424db4f4bb5fce45a149778eb212b553b35a9d672481a50072ea3bd1b9593b4,2024-11-21T06:58:35.087000 -CVE-2022-29149,0,0,e25bd058a4266b7e7f1383168613a0e63ead667e4ace5c13ab7c3e3ae815a8d6,2024-11-21T06:58:35.203000 +CVE-2022-29148,0,1,eaddf9d7c54b17c3e93a673484a6b965ebadf1c56ba8a8dfb83a0645faf03874,2025-01-02T19:16:13.103000 +CVE-2022-29149,0,1,945d219293169a5574c090670a8d8979c2e5d822aae96058a70d5cc8e15dafbd,2025-01-02T19:16:13.227000 CVE-2022-2915,0,0,380d584316364d19cf56550570dfa8eefbe699d84f852fe8f42f15cd9ded2c47,2024-11-21T07:01:55.157000 -CVE-2022-29150,0,0,1efe41d1e73b847601d67a8ba7db9845c94d44ef96558270dacb58aa5814c1fb,2024-11-21T06:58:35.350000 -CVE-2022-29151,0,0,77ed491592907c73a15942b1fb2f159e16966a2b4b94859bfee83b1fb6353d7c,2024-11-21T06:58:35.470000 +CVE-2022-29150,0,1,37df812008323da5d78cd8770995c66372c685745b15357d258e5d78415a8d12,2025-01-02T19:16:13.350000 +CVE-2022-29151,0,1,0c1ce021ccc3c1f35be6765b7b7d356a04440c1b57ea4655c0e6507fdef7fd9e,2025-01-02T19:16:13.473000 CVE-2022-29152,0,0,6373d3adab29fb87c043a0179572deed98e4485a1ffbd9e7ad5f4422b4d4b04d,2024-11-21T06:58:35.597000 CVE-2022-29153,0,0,8f59b67f0250b7c5169cb8088fdbb193e9022eb568ececc305aec3bb0e4acc29,2024-11-21T06:58:35.740000 CVE-2022-29154,0,0,114dbe9af61d115abd99a0090dedfa1c64f2b48351b1d42bb1ba5c4cb5932bc5,2024-11-21T06:58:35.897000 @@ -198522,73 +198522,73 @@ CVE-2022-30122,0,0,489cbe78dab96777a573e10d410a8eac5b2f811d09e1f93e908a6f7dba032 CVE-2022-30123,0,0,f817e8f816c653efdd50670e7aa6b53f82fb4d64419a6e151145890e8ebf5c87,2024-11-21T07:02:12.290000 CVE-2022-30124,0,0,6960455844572981822cef6df768f05c53b718f937c000376f3850cd56075baa,2024-11-21T07:02:12.407000 CVE-2022-30126,0,0,4e72f92f060e97ae222faedcd8e32d5b51664112ff8c30f1c35ab4ad6727ac50,2024-11-21T07:02:12.520000 -CVE-2022-30127,0,0,b3e8d74695909b5cdc7afef6ea03d7d184978964894946abe7d4daeed514df18,2024-11-21T07:02:12.677000 -CVE-2022-30128,0,0,5bf209c535faf3815ce2db6965a4e6c770e6dcdac98244a3d83f11f96a22f19c,2024-11-21T07:02:12.800000 -CVE-2022-30129,0,0,1ff6d98d1fdd67142d73381644f34426c1834612887c4183c68fa8538c831f14,2024-11-21T07:02:12.923000 +CVE-2022-30127,0,1,c40de39d3286f434ac0a36990ed6b12b293890c1fdeb8474f7afefb782265374,2025-01-02T19:16:13.597000 +CVE-2022-30128,0,1,549ed8b06c95bdc05673c728461623e69104007175c3e1a8d7a247036778313b,2025-01-02T19:16:13.723000 +CVE-2022-30129,0,1,9a1bef39663f1caad0aed415f986bf5f34e53617277913009a2cab55521f251d,2025-01-02T19:16:13.870000 CVE-2022-3013,0,0,bb4a4348932baf173a3232a1c3b0ead0c4228ddfc1e60d46374682b53df44946,2024-11-21T07:18:38.193000 CVE-2022-30130,0,0,5c540d13502dcb1c87ffc0e4d13a14d34dba65580440eb277616f3237105eae2,2024-11-21T07:02:13.053000 -CVE-2022-30131,0,0,de45a14467ac27b061d9eee2792b1527e8fef6fbd6d4b354a6d161b45f26a625,2024-11-21T07:02:13.210000 -CVE-2022-30132,0,0,1eeafaaa587077e49036a71f72d1ddfbceefb39d9a070835afab89ec2ff63e69,2024-11-21T07:02:13.350000 +CVE-2022-30131,0,1,9119dd0753873b8a1feedeaa2b0fcf696b7719767104a70878b45495ac001f2b,2025-01-02T19:16:14.063000 +CVE-2022-30132,0,1,5aac6f4cc4546bc201694ffc7c37e7de80cc2e3e02a3b8d080aa8e776b78a228,2025-01-02T19:16:14.183000 CVE-2022-30133,0,0,8b5644e40862e5f0b688ad89b4c3f675598a23d4c2a841cb2156fdd1207b7ac7,2024-11-21T07:02:13.473000 CVE-2022-30134,0,0,2ef5ab1b84afee02ed5bf7f0821d49accfc189cb613a51b0299ef732a7f3f81e,2024-11-21T07:02:13.613000 -CVE-2022-30135,0,0,18bfaf21cff0ca87cf368d9dcdb76b2d16ae7c7a654ca0ac56b7d6ddf7de5a3d,2024-11-21T07:02:13.730000 -CVE-2022-30136,0,0,8f793c6c97f8d89463316c61e5f9da8d74bd214ef5b8d9014a6fc5314e3ffb57,2024-11-21T07:02:13.857000 -CVE-2022-30137,0,0,49585aae563ce8d995c040b4f0e00f336641cb3ef2095b8241abeaa9e913d703,2024-11-21T07:02:13.967000 -CVE-2022-30138,0,0,13afa86607f19b415f2ab7337765ff8d0d70d60b3fb9793d051d1e889a9faa38,2024-11-21T07:02:14.087000 -CVE-2022-30139,0,0,e5dcc2fd268c281112519e766e858fb9a831ef12d94ecd3f4e912b05fb43355a,2024-11-21T07:02:14.220000 +CVE-2022-30135,0,1,cf4abc249fcb2cf5a9c46359eaf5ca4d8dd6d1d1a83517efdd85c6b3d9126a6b,2025-01-02T19:16:14.307000 +CVE-2022-30136,0,1,c75b926bb6edf44e98fb35dd8006ed5e10c913a8727d651dab67752ea200a3b7,2025-01-02T19:16:14.440000 +CVE-2022-30137,0,1,a71e0995b35ae2e4b06d946249d7e80c337a8b732f6314c705826ce1f74bd8df,2025-01-02T19:16:14.573000 +CVE-2022-30138,0,1,e848ba4815f8dcd595cf1e629d5fe46ae553317374f413461cebe43e61d97f21,2025-01-02T19:16:16.400000 +CVE-2022-30139,0,1,424cc934a42da84b1c163caddcdd78547e6c5702ef1b9606a2b561b9b99b4dbd,2025-01-02T19:16:16.837000 CVE-2022-3014,0,0,6d4c0398ece8efd51f022ca3b900c1f7e570487883535690bf3c60d577d7c2e1,2024-11-21T07:18:38.317000 -CVE-2022-30140,0,0,4ff832d38132bff5225a9cc9ff7a4f73a7281f76e478cca967e09e6ff458d82c,2024-11-21T07:02:14.353000 -CVE-2022-30141,0,0,4b67c677fc73c99ae294edf953550d711499a442314cb78eaf02dcd3111221c7,2024-11-21T07:02:14.503000 -CVE-2022-30142,0,0,1138a3a738a76895beae01a1615ffe5c712ea5c07d8345575c77c211f6f7d8e0,2024-11-21T07:02:14.643000 -CVE-2022-30143,0,0,79d84e019bb93d57b2f3f1fed6611a266c9e8a89adba515ed3ea091a04e033eb,2024-11-21T07:02:14.787000 +CVE-2022-30140,0,1,d5f48ebefab60057abc4c0b55e84df31eba053f766d4cbcb104fe39bf6b09eb2,2025-01-02T19:16:17.013000 +CVE-2022-30141,0,1,c0b1d5423a7740a5b0e4ccef9596e55405d3d39b967ef0ed7c3d0e3936dff474,2025-01-02T19:16:17.180000 +CVE-2022-30142,0,1,a40380c7dd69d038aeb2c47dd40d7d807d19f93a515f54fab693510b7ba7ae9e,2025-01-02T19:16:17.330000 +CVE-2022-30143,0,1,96ff65a0d9d7ca78981b9ad9580f250c5470572c0477d3062e89f80fb2ccfa5d,2025-01-02T19:16:17.497000 CVE-2022-30144,0,0,24c9b23e212d0a86de7318a327c977397323c3531b4935d69f652569e22d0666,2024-11-21T07:02:14.930000 -CVE-2022-30145,0,0,2ea58ac86cd135da16b9c5be8b3a7edb955325e4443e6b8ea8777617db73b1ac,2024-11-21T07:02:15.043000 -CVE-2022-30146,0,0,db6106b6da45468464811cc1b39976801f0089bd80cc417b8f6410d260696ff4,2024-11-21T07:02:15.177000 -CVE-2022-30147,0,0,30542e450308de5abcc65352f1a246f94fa7b7060ea65d8e63cacab00aafe63f,2024-11-21T07:02:15.327000 -CVE-2022-30148,0,0,acd68380a7c309a4f057d3b131383e49375d3ee0cf07d11967ed906e7e0f1769,2024-11-21T07:02:15.477000 -CVE-2022-30149,0,0,78add7cee22e884f9ec177025fc2662c1c3286b32dcadf4ece03ace4558d1591,2024-11-21T07:02:15.603000 +CVE-2022-30145,0,1,5c7a2161d399f3cb268c832bb2bc8e69a480967d405d85667a9ddb46e676d781,2025-01-02T19:16:17.643000 +CVE-2022-30146,0,1,892293c8ac91fe622a27fbe6baf02ca2e2e3d5d050439955b17845c6d5208ea0,2025-01-02T19:16:17.800000 +CVE-2022-30147,0,1,649584d30d1aa717d4ec408fa45972059e5a3ca83273d39a56ce92fc5f5c1316,2025-01-02T19:16:17.963000 +CVE-2022-30148,0,1,36134d79596ded8bc32f358446ed4d7df2071b25db13f8041e9b2331959f59f7,2025-01-02T19:16:18.150000 +CVE-2022-30149,0,1,038c48bc3c8b9af8f69bcfbc4da0f7ae744a7524c1943e4c1a1f47db8b979f8b,2025-01-02T19:16:18.310000 CVE-2022-3015,0,0,88a0a473ed6e6835e41acbefaae98f93e71ee3fba69c696b61b40753517261cf,2024-11-21T07:18:38.433000 -CVE-2022-30150,0,0,1dd2401fc52d628bfe080f7ecff36c6abbdffa65458c795b466813ae1dc33e73,2024-11-21T07:02:15.770000 -CVE-2022-30151,0,0,124e535761692f98fe495ea373d7550de24b9fcd52b6e599cf3deca3125b4994,2024-11-21T07:02:15.940000 -CVE-2022-30152,0,0,3b555f18f8ee5930f817b3d6c2b8d4ce85aa392e6023c4c945a5fe08218179ef,2024-11-21T07:02:16.087000 -CVE-2022-30153,0,0,9a728f3bce217ae122419e7aa33bafd16871f30bc71774add911705f2ebe8674,2024-11-21T07:02:16.237000 -CVE-2022-30154,0,0,3f161939150ce3bcf06d35bc8ac1af2fd906e6a3aa5d82b282e03b5de8a2cc65,2024-11-21T07:02:16.387000 -CVE-2022-30155,0,0,a5dfdbfcf9fab4afb734bf941df15fa9ed35ca704294526c1a84188896d55759,2024-11-21T07:02:16.520000 -CVE-2022-30157,0,0,de0600bfb7a9439809ab745527cc60f873d1a7eca4a0380a7cfa8ad3d2d1533b,2024-11-21T07:02:16.677000 -CVE-2022-30158,0,0,8c4f583f4f8ab748d1c86ff8df890cc1e868c9b64494a59deb6dac0132cf7a83,2024-11-21T07:02:16.797000 -CVE-2022-30159,0,0,178fb6c3757c13e5ad7187744869abc7af80dcbff3ce35daf0f002d9945c0d47,2024-11-21T07:02:16.913000 +CVE-2022-30150,0,1,6a0523b04429b5a1d3aabb5bbf678c9ec72441099b1ab8d7c70e3907a020d6de,2025-01-02T19:16:18.463000 +CVE-2022-30151,0,1,db1e76eed9907abc3435874e09af94b8f5cb4371191e92cf46751f8efb7e3c79,2025-01-02T19:16:18.623000 +CVE-2022-30152,0,1,e21841d0289a7fe1c59397267a0e3bf987a105b2474bb9eb64c5b0e5a2034764,2025-01-02T19:16:18.807000 +CVE-2022-30153,0,1,bc17efec65bd54173f3ae62d8b315cc941f396ddebcef89b93383af2d21e40a5,2025-01-02T19:16:18.963000 +CVE-2022-30154,0,1,d4ab82d6efafc9e0b5ebd9f2242d8304736618335c04722db84d9b96f75ae8d6,2025-01-02T19:16:19.130000 +CVE-2022-30155,0,1,25d057c7678fd101faea76e7a4e1de3f8700a84dd460235636603e453cebcabf,2025-01-02T19:16:19.253000 +CVE-2022-30157,0,1,a03520ab1709630a35df998de418f38896ac148f74e9e16eb8c9c591ce20b1bb,2025-01-02T19:16:19.417000 +CVE-2022-30158,0,1,dd9691f971311a0b68595e2f5f09ce73a219dc6404d5bb1c13ef8b701c010c1f,2025-01-02T19:16:19.533000 +CVE-2022-30159,0,1,e73a48e0fd37eaf39ba57d970eef880abe3ce61446cc2856916a9c41c6763e8f,2025-01-02T19:16:19.650000 CVE-2022-3016,0,0,f49215ac34f7220306c2bf455d017d7817436f8d1fea9ee271b93a41d65006c5,2024-11-21T07:18:38.557000 -CVE-2022-30160,0,0,50589aad6fef59450c9d756d7d7d092c6b23cf9cf2dc92f641b3e3576f509197,2024-11-21T07:02:17.030000 -CVE-2022-30161,0,0,cd49df02b91514640d2fd6e4761dc32ac28ed466a1e5f5a88e82fa2046fcca37,2024-11-21T07:02:17.180000 -CVE-2022-30162,0,0,60f93a2fb70ab8bc8c3f9e75780bb3a8703ec5f7d70d96f7101da71f9fe7c506,2024-11-21T07:02:17.330000 -CVE-2022-30163,0,0,d2b625047abe70ae8e02de2bbc4018882f5c4686aa102f535ab0b0bf8621d218,2024-11-21T07:02:17.463000 -CVE-2022-30164,0,0,5cff9ff15d7c6747fcf45533fe556b32f8a92ff80ecf8925cf3aeb8a7f8521fd,2024-11-21T07:02:17.597000 -CVE-2022-30165,0,0,92ed40104f1b9c8f2e6fd9fcb7588838c8e8e6c75f71f5e3282a1e304229c45b,2024-11-21T07:02:17.730000 -CVE-2022-30166,0,0,fc816a948e93a940f356db8457bec20b34c129a986d09d86db55e7a360849e7d,2024-11-21T07:02:17.860000 -CVE-2022-30167,0,0,e6bb00cf1d5615f31d111f1ed256e50ad745387e1957a3e1c1b1be2bdbdd9605,2024-11-21T07:02:18.010000 -CVE-2022-30168,0,0,bd3aa3dc8effd427a111fcf773c03dbc5ddd2a99436ce9720bf8c75ddcf20aa6,2024-11-21T07:02:18.120000 +CVE-2022-30160,0,1,a87f73f6e9da61cbbcbe7b9d6a26cd41d5d334c94ea425b59884094f3994b66b,2025-01-02T19:16:19.773000 +CVE-2022-30161,0,1,67bde3549755eed0601b4bd685b0a974185d81f56a59469106158ddbc8706dd0,2025-01-02T19:16:19.910000 +CVE-2022-30162,0,1,748b2f06e660fdc1d09c4cedc34c10187f9044455507983f034fb3dcd4bcc69d,2025-01-02T19:16:20.043000 +CVE-2022-30163,0,1,2963c1fbd91aa8b953b5c44baeb6904c003197e549797fc6eddc5eb97d05b771,2025-01-02T19:16:20.193000 +CVE-2022-30164,0,1,5040ce9e4ea647a288175f4dc5ea2a780ebaf86a4084b5fa23cd642cd7f19971,2025-01-02T19:16:20.340000 +CVE-2022-30165,0,1,d777e95b3b69678bd1ec88140c823122c1e593ac3aedc504db32c7e5de6cb5cd,2025-01-02T19:16:20.487000 +CVE-2022-30166,0,1,42bb4e8b721ca3e21b8e8e1c9f6a4a6cdb21166453f71d4eaed365742517db18,2025-01-02T19:16:20.617000 +CVE-2022-30167,0,1,84d17e1a59e0fe63e997f4d8209c3a169059d67fe54acd658adc415643f1bf89,2025-01-02T19:16:20.770000 +CVE-2022-30168,0,1,e9a7110c6f7e9f2d33f7fb348642dcad6d49cd6be955e0ea227d514da098a810,2025-01-02T19:16:20.890000 CVE-2022-3017,0,0,0568d3e540be66821d72d792db7c53e2217975863c3c2b91e4fe4b5df028ac9d,2024-11-21T07:18:38.720000 CVE-2022-30170,0,0,173de204dee6103497470161cb2cb0708c54beaca7bf78b1ac9a4e270821a9b3,2024-11-21T07:02:18.230000 -CVE-2022-30171,0,0,9eed899579c413217e3ff6bc523dfce5cdf79ed4ccb295d486cb13b827c775e0,2024-11-21T07:02:18.397000 -CVE-2022-30172,0,0,89d98255060d8903f1d231e9cd33a2014af7ca7e781cbe2be50aa2685b32dfbe,2024-11-21T07:02:18.523000 -CVE-2022-30173,0,0,95aab3d475d99b5e0568db1795380dc50b8fa4e95135a65350eaac342af47fe4,2024-11-21T07:02:18.643000 -CVE-2022-30174,0,0,622d60549daf131fa6fba9448771e7421d5e2a7ed3b97e4e9046cb3851ad9aaa,2024-11-21T07:02:18.770000 +CVE-2022-30171,0,1,ccd765640e5dda39ae7d1ad214009223ca6f1eaf2e1bb1a754b573673e94f80f,2025-01-02T19:16:21.003000 +CVE-2022-30172,0,1,28fb04851f9fe4a26d9534eaea9ca784e3c380b0bb6bd862d59514fd996d2f36,2025-01-02T19:16:21.130000 +CVE-2022-30173,0,1,96c923acc0309d1ccc0a692e6296f3def0018c6e4c4cb8055662326ed0537491,2025-01-02T19:16:21.250000 +CVE-2022-30174,0,1,db7939baee4b160ca5f12e2340bfada994a7467371f87b34ad853d8a97827d00,2025-01-02T19:16:21.367000 CVE-2022-30175,0,0,76b07705c54858ceb3946ad97c933eab7e03d402e7bbd6e18507d8578aa1aa00,2024-11-21T07:02:18.887000 CVE-2022-30176,0,0,8e71888391c93aef1dbefbc06354f65a0860c682b45ea3d09f473623b2cca060,2024-11-21T07:02:18.993000 -CVE-2022-30177,0,0,98613c782b04536e055bb98590ececd00101f1f0fd5e4b7522a14389982a9d64,2024-11-21T07:02:19.117000 -CVE-2022-30178,0,0,cdeb3200ddda37e00604ed372baa1fa5202e5457f0c7eef9f638debc632a0d0a,2024-11-21T07:02:19.233000 -CVE-2022-30179,0,0,6ba2ddf9b07f6ae7e2dfcb589abffeb17e20b36a6ecc4a742306a4308244ee0f,2024-11-21T07:02:19.347000 +CVE-2022-30177,0,1,534c35369415b0ce21af47a33416afb945c385cc28aaa4ba2f29281327270d48,2025-01-02T19:16:21.490000 +CVE-2022-30178,0,1,0c1d9bb3a779ace7846976f666ad10e21e102a6ad9c7c7b3e020788afee30b16,2025-01-02T19:16:21.597000 +CVE-2022-30179,0,1,fd9668375b6bdc3bbfea5f72d745b1473aa042f289e2c883e8a137fd37d57926,2025-01-02T19:16:21.717000 CVE-2022-3018,0,0,fcc44e78c68b11dc92b17355841993dd0b2a77f1eba045ea9989392d732c7f26,2024-11-21T07:18:38.860000 -CVE-2022-30180,0,0,3717db90d046c193628a24b439e39dca36c2228e23640d467cf3ca4cb311098c,2024-11-21T07:02:19.470000 +CVE-2022-30180,0,1,ef416089ad2d88b702e949cca9ea6f4be67e8fa84bed56c547b187dfcad29d89,2025-01-02T19:16:21.833000 CVE-2022-30181,0,0,c9b0f146019b01be1080759318f36da7768f0728182545d48514b79e0ba4f88c,2024-11-21T07:02:19.587000 -CVE-2022-30184,0,0,bde2b73f95e566f16ffb916fabd7ab3f3ba1543ad45e90ccb4be70f78ed73a2f,2024-11-21T07:02:19.700000 +CVE-2022-30184,0,1,be446bb73e4c82066f7b19391d2395ea019095f5528720820f48c0606a602584,2025-01-02T19:16:21.950000 CVE-2022-30187,0,0,607501c778be3bc5fa6c061564ec771fb1c2e5b83fbd551538ed55c8ae29f7a3,2024-11-21T07:02:19.837000 -CVE-2022-30188,0,0,33481f0f22373a0a01cbc1235fe11c11409bcc9e790e6cffe14ae69cd45efd10,2024-11-21T07:02:19.963000 -CVE-2022-30189,0,0,4a9dd0e927ffd27ba1bb0b3748cd1478ce722c9d8ee138de74277cb334f8f2c7,2024-11-21T07:02:20.080000 +CVE-2022-30188,0,1,a0c743b3654516de00b971a72bafa2b41635bed46aff12fadc9168b8bf5de200,2025-01-02T19:16:22.083000 +CVE-2022-30189,0,1,be04064b3ad5b3a61777506296101d3f2b4c2ab93a2314c9119d43cc77b86c28,2025-01-02T19:16:22.197000 CVE-2022-3019,0,0,699aa72743ebef964bd50c3b949d73c946ed800706a74517bc948b67f928f914,2024-11-21T07:18:39 -CVE-2022-30190,0,0,ccdc6849cb7cc381d7e3429698309211dd0445e5afa5dffcd51c2663f515deda,2024-11-21T07:02:20.193000 -CVE-2022-30192,0,0,ec21a06aa8a905006338cf2a8f4e06df44fb16e067edf28291d1f39583820155,2024-11-21T07:02:20.337000 -CVE-2022-30193,0,0,9a7e41a3a91e7004466ae388802621b26c9e20366556e229f5f1dcde5addc315,2024-11-21T07:02:20.467000 +CVE-2022-30190,0,1,eeaa0f947b59033791abccb441b7941d66dec591b908eb5b9fd0bed1174b0b4f,2025-01-02T19:16:22.317000 +CVE-2022-30192,0,1,d0fa3f703c3532d2882a3ffa92d6ac8f74486d22b3b21d3b4689701d5ae7a39e,2025-01-02T19:16:22.460000 +CVE-2022-30193,0,1,e1012bdeb2f7d44c596c9dd5b6f2695bb91fc936b857957cfbe4a94cfcf3bd11,2025-01-02T19:16:22.607000 CVE-2022-30194,0,0,0f02841c3d18f663a3b092e71d1216fb48b288beb8580df1e48bd2877b0bf8cd,2024-11-21T07:02:20.577000 CVE-2022-30196,0,0,d630c91b74c1c4b7e0d754215ec8c1c4e2a34e03a540b6072253efbdfc10da93,2024-11-21T07:02:20.707000 CVE-2022-30197,0,0,cc5d64c80a8791896f091a97dfa020d7e434fb4e36acc8933f8555d86b27254e,2024-11-21T07:02:20.830000 @@ -201317,8 +201317,8 @@ CVE-2022-33634,0,0,3174c455a2f4f2a6a09ef2b0708bc345ec0d967cf6ecff33f2b5324db501b CVE-2022-33635,0,0,c01dc9a0bd1be283493047a667a0d0a0f28ffb0755b6b5fe72570215b59ad52c,2024-11-21T07:08:13.303000 CVE-2022-33636,0,0,46272dc1244163d4fa529df971ce814df71347d2629cb05e561f3f3753532581,2024-11-21T07:08:13.450000 CVE-2022-33637,0,0,779febcbab98162c76b6ec463230e5fc34868ff3a3dcc5a9fab77810e7d58010,2024-11-21T07:08:13.563000 -CVE-2022-33638,0,0,d6bcf9c67af6c945ca72920cd4115fa4be3f585d54b423a04c1de82c6683a317,2024-11-21T07:08:13.680000 -CVE-2022-33639,0,0,dd6609dbba1737d612c4991fb3c498b47ee289430b6d9e4e1cd40cca8d02dca6,2024-11-21T07:08:13.803000 +CVE-2022-33638,0,1,0eecdfb7405c847be7e8eda462ff1a2a6b3623c97651ac886a152f749e4ce916,2025-01-02T19:16:22.737000 +CVE-2022-33639,0,1,98b84b2f3cdaee0a8e1bd846d2c3f7c04234364254ddd88312755ea62747ebf8,2025-01-02T19:16:22.877000 CVE-2022-3364,0,0,dd4c407f031cb9b9c49d3371609695761320debb49469eb58b1198a34ae105ad,2024-11-21T07:19:22.757000 CVE-2022-33640,0,0,89a0d961ea376c9d193140978fd96f8908caf1f8aa80a9e0d9956f469674621f,2024-11-21T07:08:13.927000 CVE-2022-33641,0,0,318881ea1b50d7310c93c9ffdac2eaf18504877678fd8e052b56a3a1dceaa97e,2024-11-21T07:08:14.047000 @@ -201362,7 +201362,7 @@ CVE-2022-33677,0,0,9fd6a9fd0c121b020644ed4e20b8a4bdab167d826f5da8b42bb7c93abdc88 CVE-2022-33678,0,0,559d4d846e4df6cbc84ffe450a71bd1eb8413b850d97e5b7b69882091c58ba5f,2024-11-21T07:08:18.633000 CVE-2022-33679,0,0,4a0013ab79f4278dcf82dd8fc2009ee70a5deee8458934b79b5bf2c76e5a2a6c,2024-11-21T07:08:18.757000 CVE-2022-3368,0,0,e76e850221574c49ce0ab5a63bf8d19ac8eff46eb812e81ae8f6b2cfff3ad1bc,2024-11-21T07:19:22.987000 -CVE-2022-33680,0,0,8249e9cf009c13085f53b971519ae7a5ae03f5199ad90320a833cc57eb03d080,2024-11-21T07:08:18.900000 +CVE-2022-33680,0,1,cab75f00d36ff01e0d65f89bb58bfd6f2bb83f631128bf5b7d29cd3872a43928,2025-01-02T19:16:22.997000 CVE-2022-33681,0,0,a670409f702638afcce364bac262f6bce1d6a05da2109cbff1afdcb60c098ccf,2024-11-21T07:08:19.030000 CVE-2022-33682,0,0,762d3a6456343d3a1630556d2b16147fdfc7be5394461ce25b83fcc2ee4d61a3,2024-11-21T07:08:19.170000 CVE-2022-33683,0,0,302942d54342b8759e41d8d4e464b48f0c3d79a3e85d95d9bf73b92019b6c7f6,2024-11-21T07:08:19.320000 @@ -203138,7 +203138,7 @@ CVE-2022-35824,0,0,e6840a471f8d5cf48396dec528efe9bcd488015c76ec59a1825495f7e626a CVE-2022-35825,0,0,59153bcee653c9c7e7d6b2fa8d7b5f8dca734306d96986db476f69673454f142,2024-11-21T07:11:45.800000 CVE-2022-35826,0,0,718c7e061d3c80d8d6ab67a0ceb3be5e0fb0b0ccee8e21506edbe213b10c6a9e,2024-11-21T07:11:45.927000 CVE-2022-35827,0,0,e466bce0f448ecffb55fb2487c9d058c87f3e5f7b055f14e1c54797e97162f62,2024-11-21T07:11:46.063000 -CVE-2022-35828,0,0,1f05a2d832c642d59124ae3a9c189d9d04b7fa9decda9357f0f666fd4060fa51,2024-11-21T07:11:46.190000 +CVE-2022-35828,0,1,9c766dc0e9686caa5a2521e888be1d6aefb5372aa64edd7c797ebb278f24ce34,2025-01-02T20:15:49.700000 CVE-2022-35829,0,0,bf0f41c95a0f0239856293b12fbf765eab53f205d10acadf59c1a3985800647b,2024-11-21T07:11:46.310000 CVE-2022-3583,0,0,cad9c14b9ace1d5f6ec370fef348096bdbc3014ef19e44b78e8d4b29f4da497d,2024-11-21T07:19:49.097000 CVE-2022-35830,0,0,111c5deaa28309e9cbead2c1a7da9dbeb2942f80148228d0144f932460f3a6ae,2024-11-21T07:11:46.433000 @@ -204791,7 +204791,7 @@ CVE-2022-37969,0,0,730c88e6266ce922e60fc7a16119f2527fd7c0c5bd8ada716eb5a9782c859 CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000 CVE-2022-37970,0,0,3ac4615ceede1eab75516a215da9d3f5ce957233ec9e88da0d8b080c827843ed,2024-11-21T07:15:28.177000 CVE-2022-37971,0,0,eaf241152751641f4a0388176490ff502bf75449b25f9b9a2355b0af8b431405,2024-11-21T07:15:28.307000 -CVE-2022-37972,0,0,90f3d66d07379206c9187cc6fba5a7e5cd83b37d90a87356638bee7f1ca5114a,2024-11-21T07:15:28.423000 +CVE-2022-37972,0,1,ac9c9c3bdde84dc6d4927f45a3e1c4e98c3c239970562f2678c90bfc76d480ff,2025-01-02T20:15:55.460000 CVE-2022-37973,0,0,81dc48628b3adfc480c39ebebf3a29f79756013d2eb28269cbb58396c045c6f5,2024-11-21T07:15:28.533000 CVE-2022-37974,0,0,32fe645da0f94714cc9fa8c515145cb1ff7750dea9ace553a1d87e4f0f16450c,2024-11-21T07:15:28.657000 CVE-2022-37975,0,0,56283edc6e1674c681cdaad137e2db2709df954199873ecb67677c439173cfe9,2024-11-21T07:15:28.773000 @@ -204828,19 +204828,19 @@ CVE-2022-38003,0,0,62a6d1d4596d0d0d2d353d10281060c3ef703eeffbd9df74bc70ad3c71a0b CVE-2022-38004,0,0,606514e2e76bcc3b48872cc536b3becdad73f6fa8f776dff9ad8946383e36667,2024-11-21T07:15:33.220000 CVE-2022-38005,0,0,7f42316e087cd78164aa9a7768aa11685c61af0091ce3a4ea3e98435d3ecd484,2024-11-21T07:15:33.377000 CVE-2022-38006,0,0,6c1cc0c26635b19134df4d32b3603779308d209690617c33f69b94f586bf9f7a,2024-11-21T07:15:33.537000 -CVE-2022-38007,0,0,3b5d322c4ca8e03eb30d360690488bc231eb2652d4eb5258145dfa001a8b379e,2024-11-21T07:15:33.697000 +CVE-2022-38007,0,1,bc2e6bd3380421aac98bfde2f30a723a0aac3948c1fb1d6fc52e4bd3d3854359,2025-01-02T20:15:57.027000 CVE-2022-38008,0,0,5f62b007ae73d821f2beec0a3f687708555b0e5e5bdfc8182ae5ec0934624067,2024-11-21T07:15:33.823000 CVE-2022-38009,0,0,d36c17a90bc4ddb7b01cd6b002503e55b28fefbe4cf06230d94a5acb07a4eaef,2024-11-21T07:15:33.950000 CVE-2022-3801,0,0,6a2932edaa8c4457e880a47341f679a9f7181ef3d1cc58b672efd9a50fe4cd33,2024-11-21T07:20:15.657000 CVE-2022-38010,0,0,d8fce97ebe64cdd9f24a231887e1312957a33dfd18108b222e1d641a193b14b8,2024-11-21T07:15:34.063000 -CVE-2022-38011,0,0,fd44bc3446103af4d19f03e80bd0e6ca15d9afd2960b72c19d607dbbfbe0b09c,2024-11-21T07:15:34.207000 +CVE-2022-38011,0,1,4d425f3ebe231657258ec681deb8464a4b59f2eb4baf17ce6e229cba85627df9,2025-01-02T20:15:58.447000 CVE-2022-38012,0,0,1a1c9e068f1a2c75ebde1a3c1aae0c83b966e067ed02af01ca655fd4cd640bcf,2024-11-21T07:15:34.340000 -CVE-2022-38013,0,0,4051ea87319e95437711fb9b1619cde44060cf0098948c50d6428ca045303f3e,2024-11-21T07:15:34.457000 +CVE-2022-38013,0,1,f9a7a37c49a9aaef328b3e0a665231b4efcd94ba3dcd868e897162d97d7db814,2025-01-02T20:15:59.087000 CVE-2022-38014,0,0,84ebd5fabea6216797492cf809bb9a2161e8fc537dfdfdd606c8f251e1d78eff,2024-11-21T07:15:34.600000 CVE-2022-38015,0,0,56e641670ef386604ae45c37cdb48641c700784d9d0e522b893a764452f0535d,2024-11-21T07:15:34.737000 CVE-2022-38016,0,0,fd81cc76ab68bc7c102c8a33c7c6312ae0fecd536e7004b3bba9ce41ae5c57ae,2024-11-21T07:15:34.890000 CVE-2022-38017,0,0,1f5dc2da001101fcddc68b110bf53cf1e9cef1314c7f197ff412f00afb698c25,2024-11-21T07:15:35.040000 -CVE-2022-38019,0,0,64cff2f9f3537933461afb39f7eef885975a11abf376271f53df27e51f982e0a,2024-11-21T07:15:35.173000 +CVE-2022-38019,0,1,c666c747f426f7a2bd98d00f7c014e5028f382241bcfcb7023e36e944790bdb9,2025-01-02T20:15:59.590000 CVE-2022-3802,0,0,304bb009f5d5e2fdbddc8d316bd8865bbd97f82518e88a05a7ebc6159d11f242,2024-11-21T07:20:15.780000 CVE-2022-38020,0,0,ad24136fcd432b8862c6330e4dc0cf45d86f3080544a7cd36ee02a3ae8a4e931,2024-11-21T07:15:35.300000 CVE-2022-38021,0,0,889433fa6985291c90ef5aad9027e5f73e219051dff9848084a16bdedb28ede9,2024-11-21T07:15:35.443000 @@ -207105,7 +207105,7 @@ CVE-2022-41037,0,0,226dc4aff9fd4f3ed343943229ae5d9931786336845da4db9553ce7acf938 CVE-2022-41038,0,0,f1b3edc996823a187df312bece9cec730e336575e760763a3686867d00b76283,2024-11-21T07:22:29.900000 CVE-2022-41039,0,0,d301a8df2867f370f24c22b4f7dcb22e58d455c45934b727d390db5faf7449a6,2024-11-21T07:22:30.020000 CVE-2022-4104,0,0,c3f870f41b7e05a558f4ff2f68c6ab2edadddcec1c1e03e5ab7274cded1720e9,2024-11-21T07:34:35.460000 -CVE-2022-41040,0,0,2f95f1a19ca95f5654fe201fa921b7a01996a9524a4b43c24489088f9895c96a,2024-11-21T07:22:30.187000 +CVE-2022-41040,0,1,aacf829d1a0bf86df873904e042c60f997f2a87dafb4ea73c4762ed68078ab2d,2025-01-02T20:16:00.183000 CVE-2022-41042,0,0,12388533202524494b65a400bebe120d70e5e229c91b2a4146105d70d8fcaa51,2024-11-21T07:22:30.320000 CVE-2022-41043,0,0,2ff93567524c08c7b4066984f928e62bfc9c46fa85df0929e206e72fe3ea0ea7,2024-11-21T07:22:30.427000 CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb35f,2024-11-21T07:22:30.543000 @@ -207140,7 +207140,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 CVE-2022-41080,0,0,118ce96839b1c410d17219d24a9d8f3d5178ee213eae751c931efd6882bfa0af,2024-11-21T07:22:34.373000 CVE-2022-41081,0,0,dc154975f72b19a151d35c7c4996f019aaffd388bb5d49269c3c4675e3bfb55e,2024-11-21T07:22:34.490000 -CVE-2022-41082,0,0,91b378836d90804a569c994928be59d19fa050235eec9001370c22ee2e2287c4,2024-11-21T07:22:34.637000 +CVE-2022-41082,0,1,1298c38f9382c7988d18b0eea16073ba57c89cd6dfd538ed58e8b1a412820132,2025-01-02T20:16:00.767000 CVE-2022-41083,0,0,b17efcbaa29fdea17d116620e94ec193627ea3b006536125ccf2a13456e621e6,2024-11-21T07:22:34.760000 CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000 CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000 @@ -222767,7 +222767,7 @@ CVE-2023-29197,0,0,73a2483bbd41383b8dae9205e79a90b8922dc322372c6b37d49fe6ce381da CVE-2023-29198,0,0,a0280d5018821b9e1e51d4baf202520214bf914e65bd72fbefbd299810629f65,2024-11-21T07:56:41.947000 CVE-2023-29199,0,0,5be43204e2b2a7ba84e86b63cb9f4f682d111378475de1f180cb6f0261de4652,2024-11-21T07:56:42.080000 CVE-2023-2920,0,0,8e90cb931d2ab679397cbfcd44e8b4de240fd88eaf76c6bef0497e3319a7f47c,2024-08-16T18:15:08.110000 -CVE-2023-29200,0,1,b8fac41291a3f1cb2be971d804f43528f01a388ec7515c96b08812475861f509,2025-01-02T17:22:06.893000 +CVE-2023-29200,0,0,b8fac41291a3f1cb2be971d804f43528f01a388ec7515c96b08812475861f509,2025-01-02T17:22:06.893000 CVE-2023-29201,0,0,70aabfad4b34e3431e424b7849a1ac328e1804de9b0cff369514a0e7446b5ad4,2024-11-21T07:56:42.300000 CVE-2023-29202,0,0,ea4be9bd1b30557af43b3989c69264a0efb9c1bd18d7b3f1545e3c3ca002c207,2024-11-21T07:56:42.420000 CVE-2023-29203,0,0,389f87b94baf3bbd1240b0c1d4e71de44d63b5ab9d50802fc5844fe35eefc2cb,2024-11-21T07:56:42.527000 @@ -227002,11 +227002,11 @@ CVE-2023-34738,0,0,cc35b5b8c968b613821d25b8b85c62d3c3e7758a6004144ed786ce169c401 CVE-2023-3474,0,0,7cff0bc11951d26da7195406d76ed91a7c58ba15fd98b407b3dfc10b9357d277,2024-11-21T08:17:20.840000 CVE-2023-34747,0,0,9418c36eb9d9f14033f1536439860fb457fbe725e3179f4fd35567a177d72d33,2024-11-21T08:07:33.070000 CVE-2023-3475,0,0,8768d056b896056cc4daca627a70e6d845d65001378f94687ffe92d84de38034,2024-11-21T08:17:20.973000 -CVE-2023-34750,0,0,1f3e23ca255d81494c8b75263e255e3b9ff2f558cb7b9704aa08e1ad2f942da7,2024-11-21T08:07:33.230000 -CVE-2023-34751,0,0,1f785baf91a3c85c29c9f6674cfdcb1b23a6b21ba09969881be416b64f7b3a39,2024-11-21T08:07:33.410000 -CVE-2023-34752,0,0,4974905cf9e0249bd9b7ce9cf1f0fd08a14ab202e67f1001194c57a95fff7edd,2024-11-21T08:07:33.580000 -CVE-2023-34753,0,0,fd838f21f6ed10ffae468ef0f9cfcb83f46f3dfc0ea8ce8f713fa468a8240bd8,2024-11-21T08:07:33.740000 -CVE-2023-34754,0,0,f5d099302b8d9509264f3105f011af7d05d132591ea77b77f96159b532efe5f0,2024-11-21T08:07:33.907000 +CVE-2023-34750,0,1,9806255b9705a434bc6cc60c9e015fa575e8d0bf0661d8a56d578b432cafe742,2025-01-02T20:16:02.340000 +CVE-2023-34751,0,1,8682934644407bc06186deb0a81834cf5b8a5790b0dce10df459f9b510d0b7e1,2025-01-02T20:16:02.707000 +CVE-2023-34752,0,1,615bea58318106ba6ad4032c7d4aa234fe3427b6716a974f8b74ffb6f76a0dde,2025-01-02T20:16:02.933000 +CVE-2023-34753,0,1,b5cfd78eed4154500a7bc8867dbf749fd6af8b5c24d367aeff1fa2fc7eeeea27,2025-01-02T20:16:03.177000 +CVE-2023-34754,0,1,12d97e4f9a13202971d428941c83713e5b8a6fa712854e15428501cc4f423d61,2025-01-02T20:16:03.420000 CVE-2023-34755,0,0,ad9d976aebf6a13a4d8d5e030a5115982976ae2d5d58da0b6a7b2f2c1e146936,2024-11-21T08:07:34.057000 CVE-2023-34756,0,0,073e07a7dff5c7ec8f546bc2d03a122938a7c9838ebc4eee7cf13f8662c523cd,2024-11-21T08:07:34.217000 CVE-2023-34758,0,0,0f68d6687c3ddce1fe46cc75662a62eeb29c0ad98d09a62e8cfac50bfc6c2c85,2024-11-21T08:07:34.370000 @@ -227239,11 +227239,11 @@ CVE-2023-35138,0,0,686234710df17c7a574ef379ab4e62679d6a727c042c096d364444a9f2308 CVE-2023-35139,0,0,4e00976aebdec0da80340e9353f631fdbff2cd4b71a4e54e340a995a17850113,2024-11-21T08:08:00.870000 CVE-2023-3514,0,0,62ea7adb1d38cbd9152beff635693d5c3deea0bd5b3d096efff62652ba2f5076,2024-11-21T08:17:25.987000 CVE-2023-35140,0,0,c9fa92c8b9bcee482f03733f283a8d8260355edc579236120a58cf7ffb7b9d6e,2024-11-21T08:08:01.030000 -CVE-2023-35141,0,0,d49dbd80613fc6a09f3da4fb499a8a640233fb9d1ad230475a1a8c0bc7eaca93,2024-11-21T08:08:01.197000 +CVE-2023-35141,0,1,22ef42efd3e0d2e21e11ff1ce998fd5affc6295a88395589b2feb46ba5f4852a,2025-01-02T20:16:03.607000 CVE-2023-35142,0,0,108c3d4aaaad0d1a1094ee0fdfb7b18ef295f7d2b09e5f08527898d996b26626,2024-11-21T08:08:01.320000 -CVE-2023-35143,0,0,dda16ff49b2440dd2627f468a180a53e1a44f69accd2ba612c7f7e98d1eba56e,2024-11-21T08:08:01.440000 -CVE-2023-35144,0,0,70684259543a5a96520b1e98a2aa1c6b66695d2568bf9396df62c138eca1a346,2024-11-21T08:08:01.563000 -CVE-2023-35145,0,0,1a86cee39ac4e4407c4314d5b2e1552e4baaf436309a563e839ead9ccfcdab67,2024-11-21T08:08:01.683000 +CVE-2023-35143,0,1,d3598dc54f5e9d075a364301354de6a005504c22d9360fd175616c90cd04e0bf,2025-01-02T20:16:03.793000 +CVE-2023-35144,0,1,f21a64b950e4e2fe379ca1391c10e10e19e2ba857226be29fee31b11995df6f4,2025-01-02T20:16:03.957000 +CVE-2023-35145,0,1,10c138bd5818af60debb636cdbf0244210b5f4782e05873fded282771cdb15a7,2025-01-02T19:16:23.137000 CVE-2023-35146,0,0,44a63ad040fd2edfccf8b6f97433b38f373080f85f689126729db827ad535a71,2024-11-21T08:08:01.803000 CVE-2023-35147,0,0,0f0067ef18cb675b8de8ec8a8086e31a112f5bc67532096b8d54325bd1e11ea3,2024-12-31T18:15:24.223000 CVE-2023-35148,0,0,5dcf688df2d044626a61dcae0391cdc564529d0345a4908bc6ef8b839a788bb8,2024-12-31T18:15:24.980000 @@ -236424,7 +236424,7 @@ CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b0 CVE-2023-47540,0,0,025762b7fa86b2da8ebd726f3a759e53420a7764a2f77b0cf1ad81406a1004d8,2024-12-23T14:55:53.860000 CVE-2023-47541,0,0,478e59dd74ae519019737dd29ef738de30b84cce6196d665d0cc88db1f1700df,2024-12-23T14:57:00.153000 CVE-2023-47542,0,0,2c301ea3fc1923df3d1786b1c81f5d6312992d198827db876d7bcd4ba7084720,2024-11-21T08:30:25.520000 -CVE-2023-47543,0,1,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000 +CVE-2023-47543,0,0,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000 CVE-2023-47544,0,0,37c99d07aab35bc0bebf060938c609faefc3158817cf4b2a384b1ee52ef99508,2024-11-21T08:30:25.707000 CVE-2023-47545,0,0,4f687d84e6811695356b024af283b6469f1342f0a2079897109fb36bb91ed5d4,2024-11-21T08:30:25.830000 CVE-2023-47546,0,0,a1c1e8504067545ef253f8ca50f634ae627be476a608b1149a89a22d582c203a,2024-11-21T08:30:25.963000 @@ -237448,7 +237448,7 @@ CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382 CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000 CVE-2023-48784,0,0,fad171fd5c14eb35c1913cc0abf8a8b72cc534253e00f688d3b68ba966faf302,2024-11-21T08:32:26.347000 CVE-2023-48788,0,0,117cd7d9101610b085c354a97190a21e5f1fc93ca8e7af0fad52f3fe309ccf1e,2024-11-21T08:32:26.470000 -CVE-2023-48789,0,1,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 +CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000 CVE-2023-48791,0,0,31c96e4e1869546f12717fd141d38efd00e2ed04c54f4d96999394432c372674,2024-11-21T08:32:26.740000 CVE-2023-48792,0,0,de3a854106cd0cc670737f05a31c26ef1df7bbfc37a35ab06907ec52d7b8d166,2024-11-21T08:32:26.867000 @@ -242246,8 +242246,8 @@ CVE-2023-7271,0,0,d79e2d59a4abb3e53994f65b0f06b3e13e59b6da2f0fa9255e24901196c34c CVE-2023-7272,0,0,12bf49d1563ca67e7c01d5cdbecec0d47e971307fd339902014dae8d9f73841e,2024-11-21T08:45:38.900000 CVE-2023-7273,0,0,e5ba228f3b4566bef4f7cf912da390cc9652c6c8697993991cf9fef824e90d32,2024-10-04T13:51:25.567000 CVE-2023-7279,0,0,c6a086f465518f8fc20c776aeddccc8546478f7f16f61b270f15bebc0fca554d,2024-11-01T14:43:56.227000 -CVE-2023-7281,0,1,2aecb2754631e609ccd0b26f382d5be29afff0def0037bd48c20eff95afd31d0,2025-01-02T17:30:38.013000 -CVE-2023-7282,0,1,7ac4fe5e280e2a1e38d78cc87a8f55ddd64da6fa9f60ac5c0987fe7cdc4bc9c0,2025-01-02T17:31:43.230000 +CVE-2023-7281,0,0,2aecb2754631e609ccd0b26f382d5be29afff0def0037bd48c20eff95afd31d0,2025-01-02T17:30:38.013000 +CVE-2023-7282,0,0,7ac4fe5e280e2a1e38d78cc87a8f55ddd64da6fa9f60ac5c0987fe7cdc4bc9c0,2025-01-02T17:31:43.230000 CVE-2023-7286,0,0,f8f33b31a0a81b3405090993f6e47e6a9cc8335f5ddaf50f182981616ebe3a1f,2024-10-16T16:38:14.557000 CVE-2023-7287,0,0,646cd6dc118357befcd7f37b64b22387051e8c696edecf3636783ec4671c1113,2024-10-17T17:28:07.273000 CVE-2023-7288,0,0,40db81d8afefea13daf322b551f0e89ee035c86169f299aadcd9ceda255f4835,2024-10-17T17:27:10.267000 @@ -243054,7 +243054,7 @@ CVE-2024-0867,0,0,52db5419be0dccbc4fcb881d40cec1da4645e98bb90ea08bba07e87daac2e0 CVE-2024-0868,0,0,7d7ecdcf8c305461a4e3471a2c2d7a33c9582d4f24e667b18c66c87e98eac031,2024-11-21T08:47:32.673000 CVE-2024-0869,0,0,8a4513540bf17733b1833d4a520077b6a8ad246c1bc873e6aaab883c3cdb276a,2024-11-21T08:47:33.713000 CVE-2024-0870,0,0,79bfeb4799dba456e2b3d218d051d3996916bcc2d73e30566ebfa2cf974b211e,2024-11-21T08:47:33.933000 -CVE-2024-0871,0,1,fde91a50cfcd461302eeb7b6cb295424cd80ef9e50d654766a02108e82cc01e3,2025-01-02T17:16:05.363000 +CVE-2024-0871,0,0,fde91a50cfcd461302eeb7b6cb295424cd80ef9e50d654766a02108e82cc01e3,2025-01-02T17:16:05.363000 CVE-2024-0872,0,0,f9337794ed6248d11c50c48564b9fbc77f63b1b10796c9e03f742c3c0cc193b5,2024-11-21T08:47:34.280000 CVE-2024-0873,0,0,f8c2cc3455594babfafaba94fb24b58836981aec56d2a02ce97d01c5aa0a99fd,2024-11-21T08:47:34.510000 CVE-2024-0874,0,0,e6d87c152aec691915c5cf09c2b73c5a2c04f12e41874d2021eb2146aca4e3a6,2024-11-21T08:47:34.687000 @@ -243075,8 +243075,8 @@ CVE-2024-0891,0,0,efa678123273b70afe03668459199c6345392b631b3f2738a2db9dcd1535a1 CVE-2024-0892,0,0,a2ee3a1ce7989ceb5331b2d8b81cc2caf3d1418527d55a134e003eb92efdf6d0,2024-11-21T08:47:38.033000 CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb9a,2024-11-21T08:47:38.243000 CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000 -CVE-2024-0896,0,1,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 -CVE-2024-0897,0,1,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 +CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 +CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 CVE-2024-0898,0,0,cc5980de47f10b53bd5ab17cc469f4926cabbd6d885b5faf4e6abc8509f3fbec,2024-11-21T08:47:38.930000 CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000 CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000 @@ -243472,7 +243472,7 @@ CVE-2024-10376,0,0,99f762aa932e04048d7a3f2bed30837794ab8d3d155c3295193f60f0b8514 CVE-2024-10377,0,0,0cd87d4284b52bf0f58a29e9f083611e38b4fd9bc6bb68e04e05bcda49a1376d,2024-11-05T19:41:20.677000 CVE-2024-10378,0,0,d86c1dd90c84c367a5c3abb156c4728038c1c86f259e66920dcac348e012f14f,2024-10-30T23:58:55.990000 CVE-2024-10379,0,0,c6d52b6b323eedb261823f225caf36a42c5db5dce1dbba705f361c64cfedeb8d,2024-10-30T18:54:15.323000 -CVE-2024-1038,0,1,3de9559590019b4d35d9d8fce70a2780968025f8adedf679d6859fd34e5dd127,2025-01-02T17:15:09.843000 +CVE-2024-1038,0,0,3de9559590019b4d35d9d8fce70a2780968025f8adedf679d6859fd34e5dd127,2025-01-02T17:15:09.843000 CVE-2024-10380,0,0,aef46b3de7d53b555c16faf90957b5795e7ff38edc57bb3987b023ae2ffcb5c0,2024-11-01T16:11:00.217000 CVE-2024-10381,0,0,487fc7c9d16cacf4d1afd228d87369ba897cce3ee6a5ff470497aebb255413ac,2024-11-14T21:44:53.280000 CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcbaa3,2024-11-26T11:21:57.823000 @@ -243571,8 +243571,8 @@ CVE-2024-10480,0,0,7894126f69863ebba896673129291ae9eff10c4fb83c9a1fac904578f4cb0 CVE-2024-10482,0,0,013e4e3e7c5efcb95927d9e3afa178ce62a1a2e48695c55ee7ee215f26d9fb38,2024-11-22T00:15:04.100000 CVE-2024-10484,0,0,cf23ebfa331ae05a5803b2e9a3f588f5a19532db66ee0c89a942c1851c46f021,2024-12-03T06:15:07.617000 CVE-2024-10486,0,0,a09948eabf8cf605227a081403b7e15d5d2e278cefd9b515ecda82689c86d786,2024-11-19T21:57:32.967000 -CVE-2024-10487,0,1,6432070ca0d8b9d5f61bfa9588afb65704f780affb8c7aeb91dd110781a88251,2025-01-02T18:08:38.297000 -CVE-2024-10488,0,1,3cd21bc0e615da49b058a3b6560ea6312bfaf84e4d5a4d9003e02eff4809baca,2025-01-02T18:08:10.997000 +CVE-2024-10487,0,0,6432070ca0d8b9d5f61bfa9588afb65704f780affb8c7aeb91dd110781a88251,2025-01-02T18:08:38.297000 +CVE-2024-10488,0,0,3cd21bc0e615da49b058a3b6560ea6312bfaf84e4d5a4d9003e02eff4809baca,2025-01-02T18:08:10.997000 CVE-2024-1049,0,0,dc6be6699277342a4e13c2e6716c81ea8d9d56a905f83092bd3c4d8585793ae3,2024-11-21T08:49:40.920000 CVE-2024-10490,0,0,f21b8c7becddbaa0ea56b7b67da3747213296c7bde0ad883c427ff856815557e,2024-12-02T09:15:04.613000 CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000 @@ -243780,7 +243780,7 @@ CVE-2024-10736,0,0,238f7da22400a0ca0fb81dda48ef600e0685ee338a6246394ff9678066566 CVE-2024-10737,0,0,18b7a5484888bcd78e509978027924e2e05d522e2863ef86fa31db1c1515ec90,2024-11-05T18:03:13.407000 CVE-2024-10738,0,0,d9abf42974135d0488cbc54f8893d23a303bac850a47b3b7012014b9299dc3b6,2024-11-05T20:16:42.973000 CVE-2024-10739,0,0,41c8938755d7eede18cf5657c74a45bdc04d225eed3c7495fe7868a18e046195,2024-11-05T20:16:17.330000 -CVE-2024-1074,0,1,c3aa70ca4cca9b86f4a3d07037f6672563dee816bd8f1c105328a1febc0f38a1,2025-01-02T17:10:07.187000 +CVE-2024-1074,0,0,c3aa70ca4cca9b86f4a3d07037f6672563dee816bd8f1c105328a1febc0f38a1,2025-01-02T17:10:07.187000 CVE-2024-10740,0,0,7c6b346442b08e593e40e6cbe3d43f48b1571d9aacbe0b5da093027c8830393e,2024-11-05T20:14:58.133000 CVE-2024-10741,0,0,5833f7e00845320c17f3c6508893084791da69e6e5c75369d17e4eb0a4a630aa,2024-11-05T20:14:42.127000 CVE-2024-10742,0,0,7613b7a5c9c98df414d9c31cfb7b031da5e325e70bc3a8fb2884d46df374d698,2024-11-05T20:14:20.470000 @@ -243858,8 +243858,8 @@ CVE-2024-1082,0,0,15848b2b0524454d542c04087dfa80d78199ba8d7edfbd0b12b87db452374b CVE-2024-10820,0,0,bf9d28b16e948ef83988df033dfb0ac82ff3713b45d4528e33ad22cd94422f74,2024-11-19T17:38:16.363000 CVE-2024-10824,0,0,9f7cdfd8e9f5f43bca97280d296438821d00456dcdf541ac098ccc041e3c8a87,2024-11-08T19:01:03.880000 CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb805,2024-11-20T15:01:19.507000 -CVE-2024-10826,0,1,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 -CVE-2024-10827,0,1,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000 +CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 +CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000 CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000 CVE-2024-1083,0,0,02d3e8f2ed4b6ae8468a8b61be1b5cf2101b027ce6de04f6b4f701c44dfe9c4b,2024-11-21T08:49:45.600000 CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000 @@ -244088,14 +244088,14 @@ CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000 CVE-2024-11108,0,0,9402f29be6cc0bbbb935e0868868012f4dfa12fb28073850a44ee7e6fedbdde2,2024-12-20T17:15:07.447000 CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000 -CVE-2024-11110,0,1,b44c6bb4ce96e271b00f6eff96582d056ba6ca6467863111e69ed26623116cd7,2025-01-02T18:07:22.943000 -CVE-2024-11111,0,1,7d3f9331aa86d060373e50c09d6297929d59610cea94a54b112dc9abce582be6,2025-01-02T18:21:25.403000 -CVE-2024-11112,0,1,c28412b9aa72db5cd4c95cb0b3e7d466ace8b6181f80f9977d1a5d11e7e08a07,2025-01-02T18:02:40.550000 -CVE-2024-11113,0,1,f3352a13c3c9f1f212b35d5c7564ead672411add4848d9679d121c8e52d27667,2025-01-02T18:02:23.347000 -CVE-2024-11114,0,1,f7c311fd611a7761dff172d2adea3c5082d594a7a477f586f82f3e80b4e14349,2025-01-02T18:02:03.263000 -CVE-2024-11115,0,1,407a1f0458da929aac12d59c2e1ab05201b12764324a144d136d540dba2802a1,2025-01-02T18:00:46.197000 -CVE-2024-11116,0,1,70844f58a52afe89b9d0c1e6aa9c53b9823395842bddee84a3c13e65e1bd4cb0,2025-01-02T17:58:57.333000 -CVE-2024-11117,0,1,489a23d40f759dcf0206ba8ad385188813c55f710c3689575ffeb044031516a9,2025-01-02T17:57:23.203000 +CVE-2024-11110,0,0,b44c6bb4ce96e271b00f6eff96582d056ba6ca6467863111e69ed26623116cd7,2025-01-02T18:07:22.943000 +CVE-2024-11111,0,0,7d3f9331aa86d060373e50c09d6297929d59610cea94a54b112dc9abce582be6,2025-01-02T18:21:25.403000 +CVE-2024-11112,0,0,c28412b9aa72db5cd4c95cb0b3e7d466ace8b6181f80f9977d1a5d11e7e08a07,2025-01-02T18:02:40.550000 +CVE-2024-11113,0,0,f3352a13c3c9f1f212b35d5c7564ead672411add4848d9679d121c8e52d27667,2025-01-02T18:02:23.347000 +CVE-2024-11114,0,0,f7c311fd611a7761dff172d2adea3c5082d594a7a477f586f82f3e80b4e14349,2025-01-02T18:02:03.263000 +CVE-2024-11115,0,0,407a1f0458da929aac12d59c2e1ab05201b12764324a144d136d540dba2802a1,2025-01-02T18:00:46.197000 +CVE-2024-11116,0,0,70844f58a52afe89b9d0c1e6aa9c53b9823395842bddee84a3c13e65e1bd4cb0,2025-01-02T17:58:57.333000 +CVE-2024-11117,0,0,489a23d40f759dcf0206ba8ad385188813c55f710c3689575ffeb044031516a9,2025-01-02T17:57:23.203000 CVE-2024-11118,0,0,7d63c237c3d5eb000c06ccbc5a0ee15f31fd9c158610d50910b9273c09bf5090,2024-11-18T17:11:17.393000 CVE-2024-11119,0,0,83c80abc4342530e419e76cc5efe8094f28db56dd51dbd7215a4e2bc9cd76996,2024-11-26T09:15:05.413000 CVE-2024-1112,0,0,1363653e8f269051ab1f65ec37a4883adc6c4dfefd35b4543dab93cccf32306d,2024-11-21T08:49:49.410000 @@ -244586,8 +244586,8 @@ CVE-2024-11712,0,0,d8eeffb57a7e2592152256c9eb6f1edc824d73d2b40e013aeae3b4e7ae128 CVE-2024-11713,0,0,4178482b5df99c0291e215f2545743c50197edb7179b5b0fd0118c8ead9b975f,2024-12-14T07:15:06.540000 CVE-2024-11714,0,0,c6471527e19f0ca60843e70cf630e8e5f2ae6981854a480677e1b01b2ada84f8,2024-12-14T07:15:06.713000 CVE-2024-11715,0,0,0815aaace33685f035482241a4ccb0b0e0d773cd3b4b8723c5ec1e7d7b552602,2024-12-14T07:15:06.880000 -CVE-2024-11716,1,1,925cfa278dec1802e328e8d0f573bc30a3f73cca9d753f505b339d3b955820c6,2025-01-02T18:15:15.367000 -CVE-2024-11717,1,1,911259a167ecfc5411de645b242ee871e96d0e50e6b0566822866dfb18a65f1f,2025-01-02T18:15:15.740000 +CVE-2024-11716,0,0,925cfa278dec1802e328e8d0f573bc30a3f73cca9d753f505b339d3b955820c6,2025-01-02T18:15:15.367000 +CVE-2024-11717,0,0,911259a167ecfc5411de645b242ee871e96d0e50e6b0566822866dfb18a65f1f,2025-01-02T18:15:15.740000 CVE-2024-1172,0,0,ab430c7827e21b365e63647ecdb13f518977ed8324330c869795f6d2a42c238e,2024-11-21T08:49:57.517000 CVE-2024-11720,0,0,29bcdc9d8ea7c52b0cf061a79d913eb830f398d7558309b58df85618930b04a5,2024-12-14T09:15:05.083000 CVE-2024-11721,0,0,476bad2ae1181a71ee1e909e9b2944d8737010e4d5a814100bd6b1844c536af1,2024-12-14T09:15:06.383000 @@ -244695,7 +244695,7 @@ CVE-2024-11840,0,0,4f72dc8e1aec5c10e4842e27b0438d261a566769857022259f6d9b1c51e88 CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a8032b7,2024-12-16T17:15:07.830000 CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 -CVE-2024-11846,0,1,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 +CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11852,0,0,fcae6a31251538fa21922d7f8a34f94ee6c6390a3a29cfb5a4e8903a4faa77f7,2024-12-22T02:15:16.510000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244837,7 +244837,7 @@ CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 CVE-2024-1205,0,0,7a555763b4ee56426377ab020ddc9dc79c7bd15b9be6f5edc39ecd5779b4ad33,2024-11-21T08:50:02.210000 -CVE-2024-12053,0,1,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 +CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000 CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043848,2024-12-09T19:15:12.750000 CVE-2024-12059,0,0,9c6b9e40ba3530efc99fd3b20a62c2d64e18bfab9b7e6210831ac824ade4b6d9,2024-12-12T06:15:23.167000 @@ -245401,11 +245401,11 @@ CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc7 CVE-2024-13070,0,0,1cf6b1571384c6cecb57fe9aaf4aa9da6835f5a35960878853e71f5290759cba,2024-12-31T15:15:07.853000 CVE-2024-13072,0,0,72b084e261b2ef9878198bf1cc32f04fdebebb613fd4a06e3be4b4d0925fd51d,2024-12-31T15:15:08.083000 CVE-2024-13074,0,0,be9d96ea009faf92c6baa623b8aa064f3efa5a66d4dd4b0e6b6c1f57d9909fb8,2024-12-31T18:15:25.917000 -CVE-2024-13075,0,0,f6a3befb1a37a443dfdf5d7cabf2b4ff467e6c1bfb48e6b0f4a34061e5591a0b,2024-12-31T18:15:26.570000 -CVE-2024-13076,0,0,c81bd92f45df8a29b22454e3158372510e9c7defbd1b61c9dd04ea4236036c35,2024-12-31T18:15:27.293000 +CVE-2024-13075,0,1,069caeadbfb965d0a42a74ce5fc6d1d57fc5498716dc4b17f2d7e23167846d07,2025-01-02T20:16:04.217000 +CVE-2024-13076,0,1,1436d6c6b4ee240b758efe3960fb5f373b6a24889e4ee9623b95508bece4c9d4,2025-01-02T20:16:04.437000 CVE-2024-13077,0,0,6fec2a9adaa69118aaac40377034c9d667b16b6a45f5caabe9ad1a0ad32a1bec,2024-12-31T19:15:07.880000 -CVE-2024-13078,0,0,9e028faec5365401f0cf9572afcae1b9e304d87dc89cd7ae1fcfa6308a238251,2024-12-31T19:15:08.067000 -CVE-2024-13079,0,1,5dc7b6f469c23c9d3a39237b8465d9375c971a8c079f9d666674ef2f7d967b9a,2025-01-02T18:15:16.243000 +CVE-2024-13078,0,1,6e54e1e3f63ae63aa99403cca0749510e88db5cd509ad67f17d18344b10a1371,2025-01-02T20:16:04.620000 +CVE-2024-13079,0,0,5dc7b6f469c23c9d3a39237b8465d9375c971a8c079f9d666674ef2f7d967b9a,2025-01-02T18:15:16.243000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 CVE-2024-13080,0,0,0509f1f522b9304178178b5ff53d51a2e0295a82c91bc35e1cf9e87ffe20c47a,2024-12-31T20:15:28.157000 CVE-2024-13081,0,0,ceca02acef2bbcbe3ed625923129b3882453a2ef359d25ef033989a46d74b94d,2024-12-31T21:15:07.670000 @@ -245417,17 +245417,17 @@ CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c CVE-2024-13092,0,0,fdc243cdef1525f395b7ef0f5264e50158df13076811b80aa3491ead2b5cd4ce,2025-01-02T09:15:17.790000 CVE-2024-13093,0,0,05b1dfdc9125d77f61b18740cb652279e4dc1ec2ccad0fdedc23eefcdc6b5424,2025-01-02T09:15:18.047000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 -CVE-2024-13102,0,1,2b3c51e550e0e3ae0feed858b8e9db25b6ba6af497f98896174a6e376c50dc7b,2025-01-02T18:15:16.517000 -CVE-2024-13103,0,1,c39bf73e6ec2cebc85583a67f9a2540764bad904165de34e6f27feb6bbbccbbf,2025-01-02T18:15:16.747000 -CVE-2024-13104,0,1,d9f251cb616308a07615da5d3de3f3686b150f86f710013d498e30a56d5803fb,2025-01-02T18:15:16.890000 -CVE-2024-13105,0,1,e680a35cca229af7af3e3d69168a8fcfdec4aa3683f3c2d32d6943b75bb3c29f,2025-01-02T18:15:17.027000 -CVE-2024-13106,0,1,5b4f9f60c542ab243080ad0af05f2c370a718025ee5354c975b9093703a236b2,2025-01-02T18:15:17.167000 -CVE-2024-13107,0,1,9dfb2d7fa85b3d602910af90375701350be638ace7d3955f90dfc0a3f6c86653,2025-01-02T18:15:17.310000 -CVE-2024-13108,0,1,434170f54d4bc0c609e68ee5511e77a6495d31ddd58cd4a36abeebbda842a971,2025-01-02T17:15:07.933000 -CVE-2024-13109,0,1,12eee2ebd85240ac01ef3d8cdede3882077a0578961c4dca6126fc1f470cc8b3,2025-01-02T17:15:08.073000 +CVE-2024-13102,0,0,2b3c51e550e0e3ae0feed858b8e9db25b6ba6af497f98896174a6e376c50dc7b,2025-01-02T18:15:16.517000 +CVE-2024-13103,0,0,c39bf73e6ec2cebc85583a67f9a2540764bad904165de34e6f27feb6bbbccbbf,2025-01-02T18:15:16.747000 +CVE-2024-13104,0,0,d9f251cb616308a07615da5d3de3f3686b150f86f710013d498e30a56d5803fb,2025-01-02T18:15:16.890000 +CVE-2024-13105,0,0,e680a35cca229af7af3e3d69168a8fcfdec4aa3683f3c2d32d6943b75bb3c29f,2025-01-02T18:15:17.027000 +CVE-2024-13106,0,0,5b4f9f60c542ab243080ad0af05f2c370a718025ee5354c975b9093703a236b2,2025-01-02T18:15:17.167000 +CVE-2024-13107,0,0,9dfb2d7fa85b3d602910af90375701350be638ace7d3955f90dfc0a3f6c86653,2025-01-02T18:15:17.310000 +CVE-2024-13108,0,0,434170f54d4bc0c609e68ee5511e77a6495d31ddd58cd4a36abeebbda842a971,2025-01-02T17:15:07.933000 +CVE-2024-13109,0,0,12eee2ebd85240ac01ef3d8cdede3882077a0578961c4dca6126fc1f470cc8b3,2025-01-02T17:15:08.073000 CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb1764821,2024-11-21T08:50:17.897000 CVE-2024-13110,0,0,e4c3d49099bb33bcc7fe964c1285248d09f034b160a163d3fe86517eab3248ea,2025-01-02T14:15:06.240000 -CVE-2024-13111,0,1,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000 +CVE-2024-13111,0,0,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 @@ -246615,7 +246615,7 @@ CVE-2024-20716,0,0,6726bdf454e1e4d180b6979a42b77b5ba45ea9b500e3773b075e6a2b1c087 CVE-2024-20717,0,0,e56cb45a33894c72dc5a203c8f0581f8e587bb3283d10ba1c33a69c8e9312e38,2024-11-21T08:52:59.233000 CVE-2024-20718,0,0,7eaabb11910435b32dcc3bc9462b5c72e64144a3902b651ae425d2bba4e8eb45,2024-11-21T08:53:00.647000 CVE-2024-20719,0,0,33639d48c3cf1584152568e09ec9ed9ddc3c229c5d088a7777726028f3d6b97f,2024-11-21T08:53:00.843000 -CVE-2024-2072,0,0,f03698b5a284417bd4c5a44c24c9f598fe85a9fb90804c405456617eeea1853b,2024-11-21T09:08:58.987000 +CVE-2024-2072,0,1,b13d35842c8f061f81e4e4ccb544ccde6b26d41f051adb312bd6d9c05dabcc34,2025-01-02T20:21:25.530000 CVE-2024-20720,0,0,c4e9a89d8460af13148244d9954e48b710a3e501d58cc00f93dedb7df3a0acb8,2024-11-21T08:53:01 CVE-2024-20721,0,0,0f31c36c71ba89fd57bd54eb97929bd4f850425e6d4b965c4cf751e7fa42e0a6,2024-11-21T08:53:01.130000 CVE-2024-20722,0,0,deefd55ced083836ffc59eb6cf8683d8000e9faa86307cdd5eded987b7df806c,2024-11-21T08:53:01.267000 @@ -246626,7 +246626,7 @@ CVE-2024-20726,0,0,c4a047acfc7d3ce5ced1b9cfe9f700e7508da7f6564366ad39bddfaaa12e2 CVE-2024-20727,0,0,2a0b4117fa3d1b3a7151c7e4d72f3ccd5b5b8c98420f7c4e2d6c06b4d2e9c132,2024-11-21T08:53:02.007000 CVE-2024-20728,0,0,62d338a5a60a6babd7654f76f4b058dd92d3739bfc4ff88d0ceb9721256cef1f,2024-11-21T08:53:02.143000 CVE-2024-20729,0,0,50764511588ee93a6328cec92b42905c05d2d0458306c46595d929d36f86e8a0,2024-11-21T08:53:02.290000 -CVE-2024-2073,0,0,4d0e49927b2545b76ff72966441c9630b16942b081f3264b0f71ac950fa2cee6,2024-11-21T09:08:59.123000 +CVE-2024-2073,0,1,12c1150ef6af8be5265fc46c368d31d4e23e69a2d638b6b33edd1de36b8a1759,2025-01-02T20:16:45.603000 CVE-2024-20730,0,0,32e25018376718c490b7f124c95aee38f32b578bef41c0b58378dfcecd44be8a,2024-11-21T08:53:02.427000 CVE-2024-20731,0,0,5b3be0063bac45b08c6832139ad4fc3f7550e683b416b99aa7bbdc7b329594d5,2024-11-21T08:53:02.570000 CVE-2024-20733,0,0,db26768c91b6974e0795b3d5809327cf4469a10e665d1530d12d368769dc18fb,2024-11-21T08:53:02.730000 @@ -247385,7 +247385,7 @@ CVE-2024-21466,0,0,df004bc4c4677aba92f60dd08ca0577dd1ffc9a32b586a3bd8893ce9e4ad2 CVE-2024-21467,0,0,63521bb6f92e531d4bfcb6b0eed69a9688a59d6e337966a6b7682d8bc9335a39,2024-11-26T15:46:26.137000 CVE-2024-21468,0,0,5e4626d731dfc5b66aaec8dc4466a73e6b5d03c8ef03dc778fe34b5c194e2f21,2024-11-21T08:54:28.523000 CVE-2024-21469,0,0,52bc7c51a4d7a1c6ed3db1e7bd4fc5486c5af4c114f59ac4b0108a76f84810c1,2024-11-21T08:54:28.830000 -CVE-2024-2147,0,0,d76185d9b316c87fc4395849a6b03cb582526d6bb93f81a2b629ee76e18c390d,2024-11-21T09:09:07.947000 +CVE-2024-2147,0,1,c3318004643078078c7a1caa68f414e2a2ce1909b815ad673e110d2d84372eb9,2025-01-02T20:16:00.083000 CVE-2024-21470,0,0,da967a9d24bc1a60ea30f79f887c386120e8cd3dbdfadbd0a824b703f4036ad2,2024-11-21T08:54:29.310000 CVE-2024-21471,0,0,0a0514ba03bccb34ab4e39be4a446d460c356541186c439529720f2206980055,2024-11-21T08:54:29.457000 CVE-2024-21472,0,0,7950206c8d0dd1a1fd81016593ee950307d783e1ba4332c1ca9c98513cb61530,2024-11-21T08:54:29.653000 @@ -247396,7 +247396,7 @@ CVE-2024-21476,0,0,99875725ffa5940ead4e2605fd9fa4d02cb760bb97aafa1c1a433906f86af CVE-2024-21477,0,0,6ef991243a50a831f44780c39bd500bbc7bb166b4aecf09f4670440bc6e4affd,2024-11-21T08:54:30.467000 CVE-2024-21478,0,0,7c16f83710294926e8234adf5749453ffadc56c3e854cfecb8fc954c24349210,2024-11-21T08:54:30.713000 CVE-2024-21479,0,0,7917a657bcc25ab15a194a0d5e758d5fcfd48d3848dcabd8e19234546501acfb,2024-11-26T15:47:07.733000 -CVE-2024-2148,0,0,28d9bb55abfd4a5ea15a64eedf5bd1ecda65e65cea262707631725a393a53125,2024-11-21T09:09:08.093000 +CVE-2024-2148,0,1,2a19ce7695cb1c2abc5aad25a44274f11fdc078f7185fbb528f0f6011a623c82,2025-01-02T20:15:02.697000 CVE-2024-21480,0,0,039aa237f7c6c046e5ccd36b41033433e4e139a67ddcfaad8e2e93c4428a8676,2024-11-21T08:54:31.030000 CVE-2024-21481,0,0,76a01d2f162c05d46ef14eeddaccd3d20332b0fe6fa63f472b41fe3cb370b542,2024-11-26T14:48:00.253000 CVE-2024-21482,0,0,4e1f1644181669b2f4edae4177ca286083aa7058fb52bd83f5c9303f26199ebe,2024-11-21T08:54:31.427000 @@ -247416,7 +247416,7 @@ CVE-2024-21496,0,0,3c2088157b50478155ad69015fff5cacecfc9e9b2edb3e8ee2b8e7bb0a0e7 CVE-2024-21497,0,0,51954e370adb307292f89f9bacf340ff5ab294db152bff5534def1062932dafc,2024-11-21T08:54:33.400000 CVE-2024-21498,0,0,2bf402b1559306f16ac8c8e66d84bb15b551ce6a438faa3500a7705f9ece2da0,2024-11-21T08:54:33.530000 CVE-2024-21499,0,0,0b2a2928a1766ee081957cde9c5876176f7f5e787eec3546dac1732f7c40b1f8,2024-11-21T08:54:33.677000 -CVE-2024-2150,0,0,f0965d5cece191794a6686fd1d4f777c35a9b8fd4b546bd290a159f443ec13e5,2024-11-21T09:09:08.373000 +CVE-2024-2150,0,1,11709d6f33f6feac5b4c76a551fdc402bc450d0a937559060df9be2ccc270565,2025-01-02T20:11:35.597000 CVE-2024-21500,0,0,6cd1594c4e223fc3885480361acdb48625b73f48d694e68856a788a09c0a91e8,2024-12-05T21:15:07.243000 CVE-2024-21501,0,0,199ffb3aa23fde5d8d3391df678cad4c6e4de0c519c1101051786020f9390c39,2024-11-21T08:54:33.967000 CVE-2024-21502,0,0,13bfb4dbba7e0f85019928e2b1f11fff2d1476f6b0fc329d71644535e762af38,2024-11-21T08:54:34.130000 @@ -247723,7 +247723,7 @@ CVE-2024-2183,0,0,b741820dca83053cb9b1332f763430220c317024d62d5a41ead850161797a4 CVE-2024-21831,0,0,ffab4fc0733292e4ab0051dfbbe5d66d4a29c6dfbff84c323978b1e919252979,2024-11-21T08:55:05.050000 CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdbee0,2024-11-21T08:55:05.190000 CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 -CVE-2024-21834,0,0,81228aefe129bc69bcac62bd5a8e65124f662cfe3afc93f3c3f65766a94b834b,2024-11-21T08:55:05.477000 +CVE-2024-21834,0,1,aba5ecdbe6fdbff707907f54f191da45860fa668c1ffa6152c0ea4e0ceacebca,2025-01-02T19:13:29.017000 CVE-2024-21835,0,0,5ca067d858621cfd38789265a3fcddae8684932d6a7c154737e5c2eccf5ad481,2024-11-21T08:55:05.610000 CVE-2024-21836,0,0,e88af3400ff3424f7f8c555ab05b9703c4631aecd39cbbe5cfd2b7581a0399cc,2024-11-21T08:55:05.760000 CVE-2024-21837,0,0,326c8816c92be17267dfe75ba1fc3e837d21bed5fb24b56423812fd195bf0bee,2024-11-21T08:55:05.893000 @@ -247924,7 +247924,7 @@ CVE-2024-22093,0,0,183d0642de7307bb3e538c8eb6a014a3c35704e95371fbb7615f50165b1c0 CVE-2024-22095,0,0,823722593447e76106cea3af54bb05d5ea050097c39ce1fa1632c4d0b2fc5ecb,2024-11-21T08:55:34.007000 CVE-2024-22096,0,0,c4602d88323b3424c44a18b3f76c72f6c73d14d53cf003d62bcccec494853469,2024-11-21T08:55:34.197000 CVE-2024-22097,0,0,188acca1f85864502cca0c058f95a3e474e93165d1a593b49266feb42cabcb9c,2024-11-21T08:55:34.367000 -CVE-2024-22098,0,0,100beb98b976caf9df530f375abc34115e5296e74791f7e3f8d58ffe304c9d4e,2024-11-21T08:55:34.520000 +CVE-2024-22098,0,1,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434f4a,2025-01-02T19:12:54.717000 CVE-2024-22099,0,0,2aab8d395d6a42ecb54cfd21d97687ce18aadc84db395b6c4859d28ef1982d01,2024-11-21T08:55:34.813000 CVE-2024-2210,0,0,0eb3eb165f7b003ae7265774a1eb47d82f1d8df2dab3f06c414468d48baa06fa,2024-11-21T09:09:15.777000 CVE-2024-22100,0,0,56f2af5bc1323d1c0ca1ddfc53290dc26ed685c2c5fdf820f38f4660cad65dae,2024-11-21T08:55:35.003000 @@ -247997,7 +247997,7 @@ CVE-2024-22168,0,0,8aaceddacbbc302468c8d712abeba94c8dd1e030d248d0cca80c475ece52d CVE-2024-22169,0,0,de568c5187e4439e032733baf97cd011aa44d0d4c7cfa131546dfba15b01a6b5,2024-08-05T12:41:45.957000 CVE-2024-2217,0,0,5dc223c9d9a2136491ccaacd0585d1ef948a98ff41661c78f7f5174ccdac6370,2024-11-21T09:09:16.820000 CVE-2024-22170,0,0,8e1ce414c6fe1076420bc567a162406861f0abdd3d9c27cefa227739efb97e1a,2024-09-30T12:45:57.823000 -CVE-2024-22177,0,0,5f11e236c055099239e5825721a2cb68f0665995ae8f0e119d63f0f3c79642c5,2024-11-21T08:55:43.827000 +CVE-2024-22177,0,1,763cc0fe9d4952aa804847af201c74da8244bc525a37db0e20ac1d192cc9880a,2025-01-02T19:12:43.827000 CVE-2024-22178,0,0,e765ceb58033517f1480b1fa39a7e3f034f044ee250041307adff844758847ad,2024-11-21T08:55:43.953000 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 @@ -249190,7 +249190,7 @@ CVE-2024-23804,0,0,5ed488c14b857970d2142f67c43d2b5530c65e868b95823f75a36dcdf2793 CVE-2024-23805,0,0,bfc06a300b76d855656e499453de6a2febdd5e93279f95b30c9afdcca5e12cdf,2024-11-21T08:58:27.523000 CVE-2024-23806,0,0,9d829fca3834f4b79580eb189255076ef10c6078bd0e056438230fee41d8a8e9,2024-11-21T08:58:27.657000 CVE-2024-23807,0,0,5f048cbee9c36e10d1b969d7bbfdc16af3dbf4149e8560676ffa0e65cc458ed1,2024-11-21T08:58:27.810000 -CVE-2024-23808,0,0,9a79073b724f6df507c7ec1caaf117273edbc1cd73253952b46373c61f6413b3,2024-11-21T08:58:28.010000 +CVE-2024-23808,0,1,842f67d830d40bbdccbee3dceed160f694418bdd49df687322b2edab20d3eba0,2025-01-02T19:07:39.450000 CVE-2024-23809,0,0,d62bad76e60bf7ba73d75b1fe72094d81e760aa89965413d1f01d3e0b442bc2b,2024-11-21T08:58:28.127000 CVE-2024-2381,0,0,f66ddad084efb65ff7bf956ee961f930c1176d8e9e8c0f951e63dbd6dfd2cc0e,2024-11-21T09:09:37.907000 CVE-2024-23810,0,0,f2f5fad1095108d3dacd61e6f85b7446124baa2350c0d88169d5c5b20a0468ab,2024-11-21T08:58:28.240000 @@ -251734,7 +251734,7 @@ CVE-2024-27211,0,0,c99683c1e2f4632ead51c7b305dabf29f20c87721c31daaca56b61843f5c2 CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfaed1,2024-11-21T09:04:07.040000 CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000 CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000 -CVE-2024-27217,0,0,c7c62fc049537213403dca1bacadb8df5f85308be48ca9aa79ccffe69dd695df,2024-11-21T09:04:07.450000 +CVE-2024-27217,0,1,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000 CVE-2024-27218,0,0,a6afd710b1815d5aade34dbd13f31bcc4ed06ca89b8c78421e6b3ddd9c0670f7,2024-11-21T09:04:07.573000 CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000 CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000 @@ -252552,7 +252552,7 @@ CVE-2024-28230,0,0,6ee006a554d642707dd81d0df925d8a02a1d248529abab0f06a8e2dc084c1 CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c752b1,2024-11-21T09:06:03.257000 CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000 CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000 -CVE-2024-28234,0,1,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 +CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 CVE-2024-28235,0,0,cdc7503ef9eef57590419e704ccd1f07cf4d641ea4c724f1352a9dd9c4d7e4be,2024-11-21T09:06:03.783000 CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 CVE-2024-28237,0,0,569dada874e3f7581ae75d30d37e9e64307f64b42ac921c76927978c59e7d5a6,2024-11-21T09:06:04.057000 @@ -253032,7 +253032,7 @@ CVE-2024-29025,0,0,826ab2dee9dbde3794adb211f664391825224c08f96b9e8c5616c8f0479d1 CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6adad1,2024-11-21T09:07:24.033000 CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 CVE-2024-29028,0,0,9c4c6ceae51e15abd24bea2f10c8a8287e79fbe320fdae0f3644ccb394d11342,2024-11-21T09:07:24.313000 -CVE-2024-29029,0,0,b8b52b7fbad2023a144dba394e16512b50d88749542bbb6c3960927e32c0f004,2024-11-21T09:07:24.447000 +CVE-2024-29029,0,1,79a14ecda4dc6dc09574b170d06c65a72f1bb1b8f0316fc9902a134d522b067a,2025-01-02T20:46:24.867000 CVE-2024-2903,0,0,162f14fedf523d37663ff386be667ca95e9daaef136c3132db7408197a7f73c9,2024-11-21T09:10:47.910000 CVE-2024-29030,0,0,4839b6e2f6738537338b92d9d9c426892d773e51c9de6dd341d7931249443992,2024-11-21T09:07:24.583000 CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50cac,2024-11-21T09:07:24.720000 @@ -253078,7 +253078,7 @@ CVE-2024-29070,0,0,21ffac6570edd10ecd5fff3a43896c471f489fa590118d73cfc78a627475d CVE-2024-29071,0,0,372c1c08eb5f1afdaa85b2ef8f1cb678c9eee2b9ac1ab8bac2f503acd32a6021,2024-11-21T09:07:29.693000 CVE-2024-29072,0,0,57f80ce7c236f332a7f5c114423b69d762766a5c42687b949a1667cb5c018eb1,2024-11-21T09:07:29.887000 CVE-2024-29073,0,0,a97c1130a7ff47c79178263365495d696944009337b55c711a86468fd2e28d23,2024-11-21T09:07:30.007000 -CVE-2024-29074,0,0,0b2dc01fa1443818608dec0d0a578ab60f1c30dcc168700319c0a0d216722fed,2024-11-21T09:07:30.177000 +CVE-2024-29074,0,1,37fef7b70252074605b40dcd9b7a5a1b496283b8ab455c06a52e22d00ddd7f49,2025-01-02T19:12:32.683000 CVE-2024-29075,0,0,c54939fdf2711f44320d1fc65a243f37f96762abe83d15bb484ae46355a45987,2024-11-12T13:55:21.227000 CVE-2024-29076,0,0,aceaf5924f5112cd139c256c0c331c81afa5dab6653cde29a094ba16b17ee445,2024-11-15T14:00:09.720000 CVE-2024-29077,0,0,a3955425e12959b5c2bfbafdf5122757d880192fd75605a9a7392be574a8c2ac,2024-11-15T14:00:09.720000 @@ -253089,7 +253089,7 @@ CVE-2024-29080,0,0,82b257cc34f2d47570a26c77d23ec313af395c66d00eb161eb280d2ae50d1 CVE-2024-29082,0,0,d572229ccbc5ebd73a7a8fd040478d93324fddf75241443510a86df17d1b9f85,2024-08-20T17:11:31.787000 CVE-2024-29083,0,0,d14781cb300511cab958a70403148d7dfd000888b7b8c17b86dfbed0ff6b50ed,2024-11-15T14:00:09.720000 CVE-2024-29085,0,0,703cfc55a150684126c4b6f6442fadfc19e8b58a096bc09b73f95e1b4dbd1246,2024-11-15T14:00:09.720000 -CVE-2024-29086,0,0,31bcf101b1d4bf387d410a872618338f1ff5970d3a1d883c310a2cdb39316a2f,2024-11-21T09:07:31.690000 +CVE-2024-29086,0,1,f8386da3f0d52a7567801d019c815cf7bf90221d72c043ef9d5776f1b876a101,2025-01-02T19:12:16.077000 CVE-2024-29089,0,0,30aa9ca77c70df19d13f418cb49ccc92807a86af53902c3476abc26c74f9f9b1,2024-11-21T09:07:31.810000 CVE-2024-2909,0,0,212d6092864ea8ef0ce591560bd67457e3ce8a4501b23e595c5fa210644143e5,2024-11-21T09:10:48.840000 CVE-2024-29090,0,0,18da630c8fc560cb81e09348c0a6780804b346aca614de229d3765c560012f5b,2024-11-21T09:07:31.940000 @@ -254520,7 +254520,7 @@ CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f7 CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90dad,2024-11-15T14:00:09.720000 CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000 CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000 -CVE-2024-31078,0,0,97f1925e25774dd966981a27ad6cc4a715e26b2f8622f32c5dce3e6fb31f5c09,2024-11-21T09:12:48.470000 +CVE-2024-31078,0,1,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000 CVE-2024-31079,0,0,a7bf17abe5dd779f1e3abb78acf796ba0c38e4bbd6eab14dc7c7dfbbee442d74,2024-11-21T09:12:48.597000 CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000 CVE-2024-31080,0,0,7985776399695af271a70402c55211a3aadc068d82c4a7fe69b7a47377da62a8,2024-11-21T09:12:48.727000 @@ -254938,10 +254938,10 @@ CVE-2024-31488,0,0,cfcf599019007e4943692b70a719c6cb37a35d714337963740462890b05d2 CVE-2024-31489,0,0,3c09d689ae4b29e24aa7a9b618ee52fdfa1da44cc707200d5479123d988742c4,2024-09-20T19:41:19.447000 CVE-2024-3149,0,0,8a78140490bcf701e13d0c05549610bd9a1157605ed7c6cf66c461a13a6097ff,2024-11-21T09:29:00.367000 CVE-2024-31490,0,0,fd601ecb6ce1c2bf33547fbbfd274f52c7252a32d9509a829d05990a5e592b31,2024-09-20T19:48:42.507000 -CVE-2024-31491,0,1,eb8e9073235bb77415aa2949bd8dca7f0e2f76c335a1621addfa760485c0fdcc,2025-01-02T18:35:20.503000 +CVE-2024-31491,0,0,eb8e9073235bb77415aa2949bd8dca7f0e2f76c335a1621addfa760485c0fdcc,2025-01-02T18:35:20.503000 CVE-2024-31492,0,0,209860fc2b164f15f96abc0fb7ba6df99e9fd427b67254fd5c861805767efa72,2024-11-21T09:13:38.490000 CVE-2024-31493,0,0,9418664761e0b780d111161059e98ef3fd056c9e2ef27d90db3cbacd9d17d9ea,2024-11-21T09:13:38.620000 -CVE-2024-31495,0,1,77b3ad08513a942796daba4d151982a74f28806a6e9424900a4faa30b1652f35,2025-01-02T18:27:26.153000 +CVE-2024-31495,0,0,77b3ad08513a942796daba4d151982a74f28806a6e9424900a4faa30b1652f35,2025-01-02T18:27:26.153000 CVE-2024-31496,0,0,441349407eb47d7b15e75063141ce6cbfde8947a3ce6aa9eb5ef39471053a480,2024-11-13T17:01:16.850000 CVE-2024-31497,0,0,6de0a6e1630b9edbedd1fe7b42e0312690a0515831e8093c3ae9b84fca91dc04,2024-11-21T09:13:38.997000 CVE-2024-31498,0,0,b2e6276a70232623190c44e8fb464ed6a164bd12de239edf2266e9b650ae46d0,2024-11-21T09:13:39.247000 @@ -259539,14 +259539,14 @@ CVE-2024-37564,0,0,5e5d8deb79ce02d4743630e479447f7c70c69d56d6a449fdd936c029fbd20 CVE-2024-37565,0,0,bd3b0fed28622fea5585bed01c88dfdb2958196d65cd20b1a612d41bf69c1081,2024-11-21T09:24:05.300000 CVE-2024-37568,0,0,856c439c12dc3c079f8f1ff58d753340540c2c4d1ef54b75ce0508c5a8fc3e4b,2024-11-21T09:24:05.420000 CVE-2024-37569,0,0,8791820124a473aaae0983330573ab7c8bbd9a5bcb0565b37b2d1bf3d3a92c7e,2024-11-21T09:24:05.663000 -CVE-2024-3757,0,0,6db3adf00b2a28288e930bef31c29319c2678fc7875ec83e3e1f66d284937215,2024-11-21T09:30:20.037000 +CVE-2024-3757,0,1,3b15c3daf6ad6b887b44ee124913c1fe2d8b6654e23c894d9fab65c313615142,2025-01-02T19:05:19.333000 CVE-2024-37570,0,0,c4fbc4bc6652715bca1e79de02d7270384ff34a42fccaf687444a1714d338c8b,2024-11-21T09:24:05.917000 CVE-2024-37571,0,0,52e74e356b12dcf017ae7d0b704cf1fb285fbda3feee1b616a685a1d89eb4c10,2024-11-21T09:24:06.157000 CVE-2024-37573,0,0,f353399c191e8c518ed5f310bd3c1cf066d7a5cf32048e642438abac23137274,2024-11-01T12:57:03.417000 CVE-2024-37574,0,0,a96f1776635e51f2e34e77909e23c3f1220b90c1f2c84da46c09791232471edb,2024-12-12T01:55:28.117000 CVE-2024-37575,0,0,fb41a93cda92e423debc2a813128d4d353bf25b2fe44666c8d6cd43b5e9b3674,2024-12-11T16:15:10.327000 -CVE-2024-3758,0,0,ebf5799491c4d50327d301387a24bc8824b9b66932f3c9df6e38a156e61e4f83,2024-11-21T09:30:20.143000 -CVE-2024-3759,0,0,3d6dc0f4725aed5b6af7da3389ad5200afc9d6c0e264cf08ee0e0679922e0506,2024-11-21T09:30:20.260000 +CVE-2024-3758,0,1,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9b1,2025-01-02T19:04:15.777000 +CVE-2024-3759,0,1,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000 CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000 CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000 @@ -264166,7 +264166,7 @@ CVE-2024-43922,0,0,2317bfbf8d49e3b6386c28bed5c49ffb59528236f65ec34e2920bf1e64e03 CVE-2024-43923,0,0,fb391e1d8ef80bf3eb533a195b9b984054220925de0e18cd44209da03c058106,2024-11-13T01:24:18.850000 CVE-2024-43924,0,0,1590d11423e0809e2114f547264d5d87de5afccf03eb7a514c9f2e0091c79106,2024-11-06T17:03:52.480000 CVE-2024-43925,0,0,a182db0dcda627353f77f42897e620c96a437a7902a46919415d1796773e8a15,2024-11-13T01:23:41.317000 -CVE-2024-43926,0,1,ca324880c24fa22d5dc1cca041d144c110f09e455206cf794dc6ce540f30f66e,2025-01-02T17:28:40.893000 +CVE-2024-43926,0,0,ca324880c24fa22d5dc1cca041d144c110f09e455206cf794dc6ce540f30f66e,2025-01-02T17:28:40.893000 CVE-2024-43927,0,0,fb6fa97ba335d81cf1ef9ee56ac1fae1714b717bad062c87266bd2239b2b12c4,2025-01-02T12:15:23.887000 CVE-2024-43928,0,0,e1f48db03875aade417e10087177b1e061f4d088e61cfc8961cbdcc99afc8ece,2024-11-12T20:49:01.817000 CVE-2024-43929,0,0,ca8944c591dc1497c545c64a871b380d7941aa6c8b1681913f822086a3440491,2024-11-12T20:49:57.193000 @@ -265136,7 +265136,7 @@ CVE-2024-45398,0,0,d1cf4ae33441db8c1dc20bfa07359d0ad86679014a1387eb7388136d993ca CVE-2024-45399,0,0,6d23e1ce10353e83f3613c5d7539abca7f2483f8c9cf2b2fc58c02b0da3541d9,2024-09-24T16:48:10.083000 CVE-2024-4540,0,0,4594a5dca87e9a653449b3e282d7fff8b67d3a7f668a0834a0999eca1b9801ac,2024-11-21T09:43:04.063000 CVE-2024-45400,0,0,6b3de7c142ace12a32180145a837a3fee347d92bd8a9824f5e254ab172d0051a,2024-09-19T18:04:36.627000 -CVE-2024-45401,0,0,bc0526c17466be7f87ff16cf5e2c67e979c4cc56933dfb215cff6589dea0cf67,2024-12-19T22:15:05.770000 +CVE-2024-45401,0,1,9c0b73241091786f611ed1be560a927a7a686e37ab02ee236f63bcd6d833ab2d,2025-01-02T20:16:12.107000 CVE-2024-45402,0,0,588fcb958fbf0695a891407461fde3dc192d59f89a319baf5fd90bcdae5897e4,2024-11-12T20:02:56.167000 CVE-2024-45403,0,0,fc1a1ea22a1e5886fbc09e495c39b7c751253cbcd9bcd0da75746ed78c736397,2024-11-12T19:59:51.097000 CVE-2024-45404,0,0,6e5f1badf7bd96054410a91fc1484f8843186327a8ba97b1c757a5ca1413b00e,2024-12-12T17:15:10.350000 @@ -266980,6 +266980,7 @@ CVE-2024-48191,0,0,56ec2e0a18b5e8325d7def2b6a594f02e85c60e9c19e3ae6cfc636a431a82 CVE-2024-48192,0,0,a310388b880b5c2a74a62b31f30e0e2c6d3433813b6a8227dba77259ee50173f,2024-10-18T12:52:33.507000 CVE-2024-48195,0,0,3a0243d8ca14eea1c8868c96910904894da328ee0146c36695cb41bdc0787fd6,2024-10-30T18:35:14.433000 CVE-2024-48196,0,0,3a98d8d960e3f80fe27431ad222a8da5950f4a1b1bc96c7917878fa99a2d345a,2024-10-30T18:35:15.220000 +CVE-2024-48197,1,1,e3b7f85b739787383670c821201566f4c7be03fc5529a836429d0eb69f774395,2025-01-02T20:16:04.827000 CVE-2024-4820,0,0,6ff39fb1accdbebce461808d1fa689f3088ae08f16db455afb3117a8d46c774f,2024-11-21T09:43:41.320000 CVE-2024-48200,0,0,7bf92cdfd49bad04766767b16312ad97c9d7543f6ea58b67127a09f749d055e2,2024-11-01T16:35:27.710000 CVE-2024-48202,0,0,1a500ad5d9353b5719eaabdc57addd0000f15dcf6c558ed9742f108c5e225cc6,2024-11-01T12:57:03.417000 @@ -269552,7 +269553,7 @@ CVE-2024-52034,0,0,8072163119d29e3d7cc1af6d3ff22d184e9e2263ebc70094a6b8e6922599c CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000 CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000 CVE-2024-52046,0,0,226283db324e2d9b866e00b93c22fb02aa41377a5347123e63df9758cf7f6088,2024-12-25T11:15:05.293000 -CVE-2024-52047,0,0,e05cbf7f7684d528fa05d3d1e73490e32a72a3a9217677f0d70f0354095e58e7,2024-12-31T16:15:25.923000 +CVE-2024-52047,0,1,7883eba77121bff92e74ed7d23bffa8d8f8b47624cf42a725e1e1b6c3bf78d0a,2025-01-02T20:16:05.163000 CVE-2024-52048,0,0,f9102a06b7d67d9a10d4aa5f95dc0bd9007fd9888890ffe133800481335c4e30,2024-12-31T16:15:26.063000 CVE-2024-52049,0,0,31ef03240011d8abebb1ffeb24543c7eda748e4370012b7b8574e64ec5842205,2024-12-31T16:15:26.193000 CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000 @@ -270334,7 +270335,7 @@ CVE-2024-53243,0,0,0055f373ee76668c96d6bfcf8a6f00835a4bd98d186934410e0656653ee7c CVE-2024-53244,0,0,314d52ddee68b7d194db67c48301dcf21a10bd6aaea8b99e26bb6f18d015b1d7,2024-12-10T18:15:41.243000 CVE-2024-53245,0,0,04861bf86b12606e48c43727b40f901f810eef8f23a378e1dae51ade99580152,2024-12-10T18:15:41.397000 CVE-2024-53246,0,0,f508ff57ce46569426027f607ebd345d92cd707d202551709cada6e889f553d4,2024-12-10T18:15:41.553000 -CVE-2024-53247,0,1,bc83b9af87256557839cb9887ebc94d8027f3118f62d49387889799a0e85c9ce,2025-01-02T18:15:19.887000 +CVE-2024-53247,0,0,bc83b9af87256557839cb9887ebc94d8027f3118f62d49387889799a0e85c9ce,2025-01-02T18:15:19.887000 CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000 CVE-2024-53253,0,0,e465b741e355f1ce9ba45867c01a177432bba9be4e62dbf601e6676bd13fe6f1,2024-11-22T20:15:09.210000 CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000 @@ -271219,8 +271220,8 @@ CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328d CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 -CVE-2024-55081,0,0,eb69d493467f15d67739a98dc000c14b2ed344ef84d13805e4486292e1f62614,2024-12-19T17:15:09.950000 -CVE-2024-55082,0,0,6de099381a4712101b3766f04e3ee1deb7c4dfa900481eaafb4fde6e44ef71ea,2024-12-19T16:15:09.127000 +CVE-2024-55081,0,1,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 +CVE-2024-55082,0,1,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 CVE-2024-55085,0,0,faaa06e53cda1e2540d88c2d50b27f37259effe5d33f96991d0016c33297729f,2024-12-17T15:15:15.840000 CVE-2024-55086,0,0,10b4edaae4b8684cf038b872fbd71037a410456917dc842a4f22ace635122c5d,2024-12-18T19:15:11.613000 CVE-2024-55088,0,0,549322782860e827672de68984aac69441af19c0b367dff4381f3b99d312d264,2024-12-21T00:15:28.290000 @@ -271241,7 +271242,7 @@ CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced7 CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000 CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000 CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000 -CVE-2024-55196,0,0,64f1f22c3e7ca31ed7d294e00995b637d08265d5cafdbc83cb81fab95b8b0f72,2024-12-19T19:15:07.947000 +CVE-2024-55196,0,1,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 @@ -271524,7 +271525,7 @@ CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 -CVE-2024-56137,0,1,f7a93e037f38aa676d1c3d39231ab2364048fa444ea4b1aa34fc164694423c01,2025-01-02T18:15:20.213000 +CVE-2024-56137,0,0,f7a93e037f38aa676d1c3d39231ab2364048fa444ea4b1aa34fc164694423c01,2025-01-02T18:15:20.213000 CVE-2024-56139,0,0,3024c21b786c6ca0bdd0206dcd9c6c0aa19c59d867560c6433c6053807599e34,2024-12-20T21:15:09.787000 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 CVE-2024-56140,0,0,5e773e07d0eed57889259343301d38e685c0a1811e50189d4f1636233600aa01,2024-12-18T21:15:08.353000 @@ -271541,7 +271542,7 @@ CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f61 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56198,0,0,ac6612cbcb1f1d330025bdf013693d4c97ad1bd5a42a86f11eae0185ae408070,2024-12-31T16:15:27.247000 -CVE-2024-56199,1,1,8bc486302614b403e255fee3399c55ce3de8eeac655bd5192ba619287c511e91,2025-01-02T18:15:20.427000 +CVE-2024-56199,0,0,8bc486302614b403e255fee3399c55ce3de8eeac655bd5192ba619287c511e91,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,8a150a16c59122912c829dcd4ae74581ec42a93463074adfa3bf7e42e1708846,2024-12-24T02:15:06.580000 @@ -271626,8 +271627,8 @@ CVE-2024-56311,0,0,66e9c6fbb0050254b7557259672fd0233cf69bba8f8e828ea4035d56bf3a6 CVE-2024-56312,0,0,cb86205520ef5db7c914d1a75ac3f5ba74360f863545f19038e07f9bcdb0703c,2024-12-24T03:15:07.770000 CVE-2024-56313,0,0,77b550409f008b252773269f5c3c808c73df4beef9ebd650c5ec3a7771cae57b,2024-12-24T03:15:07.927000 CVE-2024-56314,0,0,6df7fe51a54001b033f35cf71e56a8c8648fba9702436f5b14cd4bfc37c84ea1,2024-12-24T03:15:08.083000 -CVE-2024-56317,0,0,6d87ed355839e56850e9a45f7c43123352e878c3a786369bae996366dc30ac76,2024-12-18T23:15:18.023000 -CVE-2024-56318,0,0,7a09902be02b76dee8965d1b4c5dc4107184aacb93ea0aa09ae8b7b2284e2913,2024-12-19T00:15:06.897000 +CVE-2024-56317,0,1,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 +CVE-2024-56318,0,1,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 @@ -271641,16 +271642,16 @@ CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 CVE-2024-56337,0,0,b3cadb8432e4f2288c1e8cc5ca248ae45f82b5396ae9a1777aafe7cfe81a1919,2024-12-31T19:15:47.673000 CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000 -CVE-2024-56348,0,1,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 -CVE-2024-56349,0,1,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000 +CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 +CVE-2024-56349,0,0,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000 CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000 -CVE-2024-56350,0,1,90d18290eef9e4f407159f5d0657847b89aa410a8f6c3e7e5502238c2667b61c,2025-01-02T18:50:57.893000 -CVE-2024-56351,0,1,ae70e94972a7a93ce2640ab954c1f8f93ac8ce9d7b4bea9d9230a8c67e027c8f,2025-01-02T18:49:32.400000 -CVE-2024-56352,0,1,81a9070eee772bd473869b24b1171a8dab2ac6cf39f29112f34c2cba06a1c17c,2025-01-02T18:49:03.290000 -CVE-2024-56353,0,1,0e560194cc5cf00da642ca2f47a85a7b063aa0501931c0226beea5fb305d7262,2025-01-02T18:48:35.123000 -CVE-2024-56354,0,1,2db630574221d7de58cd262fa4675958c496dd88deaf40008d352f13103c4644,2025-01-02T18:47:14.893000 -CVE-2024-56355,0,1,420486f6bf5aea68f2d63a7daf2afcded34d301f0b5820436667196682f2624b,2025-01-02T18:46:31.450000 -CVE-2024-56356,0,1,7fa591ed76a24e0f45d13258fea41c676fbd1898c6e1abc134cdbf1f1d6b2be1,2025-01-02T18:46:14.517000 +CVE-2024-56350,0,0,90d18290eef9e4f407159f5d0657847b89aa410a8f6c3e7e5502238c2667b61c,2025-01-02T18:50:57.893000 +CVE-2024-56351,0,0,ae70e94972a7a93ce2640ab954c1f8f93ac8ce9d7b4bea9d9230a8c67e027c8f,2025-01-02T18:49:32.400000 +CVE-2024-56352,0,0,81a9070eee772bd473869b24b1171a8dab2ac6cf39f29112f34c2cba06a1c17c,2025-01-02T18:49:03.290000 +CVE-2024-56353,0,0,0e560194cc5cf00da642ca2f47a85a7b063aa0501931c0226beea5fb305d7262,2025-01-02T18:48:35.123000 +CVE-2024-56354,0,0,2db630574221d7de58cd262fa4675958c496dd88deaf40008d352f13103c4644,2025-01-02T18:47:14.893000 +CVE-2024-56355,0,0,420486f6bf5aea68f2d63a7daf2afcded34d301f0b5820436667196682f2624b,2025-01-02T18:46:31.450000 +CVE-2024-56356,0,0,7fa591ed76a24e0f45d13258fea41c676fbd1898c6e1abc134cdbf1f1d6b2be1,2025-01-02T18:46:14.517000 CVE-2024-56357,0,0,ce104ddf8b62b6c617c328c1a570de212ee1c1e8b3bea3133e11de06510c3eab,2024-12-20T21:15:10.483000 CVE-2024-56358,0,0,6d2b7fccb7db251a017765f55dbddfc215343a6727145ad76e83385141b4d894,2024-12-20T21:15:10.673000 CVE-2024-56359,0,0,cf57a522972e0e31107a67036f760d6ba78d674ac0ac3e94fbb1fe0d91c2c2ad,2024-12-20T21:15:10.880000 @@ -271686,9 +271687,9 @@ CVE-2024-56510,0,0,455df6502629948cebf0de2208b49dba0ad1ef07f23a212f1e45f8c101d4f CVE-2024-56512,0,0,fb4379c8a390a1b759f4166891b605054b948310a82def3157334ebd2bad532f,2024-12-28T17:15:07.967000 CVE-2024-56516,0,0,e289a49884350d8e97e9919ccb1e372d3094ed3378a92522ef92eda6cf2f092f,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,65c6507911433d4cc6f529fa655b3eded381be11e52e2d7cbe5b07f95e44efda,2024-12-30T17:15:09.840000 -CVE-2024-56519,0,0,ba6a49ecaaf54f8458a0d69c5d70c7a58a8b2dfa4fff4d4173a1ded6a5dca02f,2024-12-27T05:15:07.677000 +CVE-2024-56519,0,1,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 CVE-2024-5652,0,0,1dda3b28a95a3027cca32754d8e2a9cb8bd181dca86e7b0a455abcf575817afc,2024-11-21T09:48:05.750000 -CVE-2024-56520,0,0,d5cf08096a86ee5091a69d63f922a02ae7d505f736e95f2dafa31155ab9b2521,2024-12-27T05:15:07.837000 +CVE-2024-56520,0,1,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66ddd5,2025-01-02T20:16:07.280000 CVE-2024-56521,0,0,5d4a5d0ca5e3c3bf7d88ebb212d4979e0d67251982c8b0fd19fb2eec1058ca1b,2024-12-31T19:15:48.020000 CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000 CVE-2024-56527,0,0,bc553a98c63c830a826f605f9380ce4cabbc6f74db77f93c30b7ece0efc5737f,2024-12-28T19:15:07.800000 @@ -273144,13 +273145,13 @@ CVE-2024-7013,0,0,fda92e94524c5fdb675c080a05843f1821b747032d3c867378b19c5cd5d7a8 CVE-2024-7014,0,0,7d2fa12c1e30aaa921a12cf50bb8b8d1050f5d9d654c2d6e992fc32bd0568c90,2024-11-21T09:50:45.550000 CVE-2024-7015,0,0,ab116060d750e6a9a8beeea583d0182fc1eebb586ce4d2ced61ebfad13abc299,2024-09-23T09:15:03.230000 CVE-2024-7016,0,0,210c64c89154a538ee0ffa94a25f3f6d102ae298b3ee12be84d9802ca07c367e,2024-11-21T15:16:23.443000 -CVE-2024-7018,0,1,fb485fbc237ee4e46769004d827f7c45d45cfce46fbd3424a7954aff5836017f,2025-01-02T17:32:20.160000 -CVE-2024-7019,0,1,396beef4690e7d5d0d5350f56449d169b7c08ec0c1daaea13c25e725556494f0,2025-01-02T17:31:56.323000 +CVE-2024-7018,0,0,fb485fbc237ee4e46769004d827f7c45d45cfce46fbd3424a7954aff5836017f,2025-01-02T17:32:20.160000 +CVE-2024-7019,0,0,396beef4690e7d5d0d5350f56449d169b7c08ec0c1daaea13c25e725556494f0,2025-01-02T17:31:56.323000 CVE-2024-7020,0,0,5a1355f5c1623c13682541eed4e1c11d298b24b5970efe63eafa41c645e860b1,2025-01-02T16:49:43.797000 -CVE-2024-7022,0,1,97cef42d6d4cc9f341b0c299285d3ef1d39840892e68987c42e86450b9d4507c,2025-01-02T17:11:48.523000 +CVE-2024-7022,0,0,97cef42d6d4cc9f341b0c299285d3ef1d39840892e68987c42e86450b9d4507c,2025-01-02T17:11:48.523000 CVE-2024-7023,0,0,ad2975e43813b3e5e6eab5a488f2f14f65ef6bf3fdb3557576a6e66a8141f997,2025-01-02T16:53:18.803000 CVE-2024-7024,0,0,a0465e322d3e843cdfa9ab7ee19c20548cddec446d6fd18a991b6ebf7a116861,2025-01-02T16:54:16.893000 -CVE-2024-7025,0,1,3573364518b6ebce451930ea49bb5e886715435408b5a9c21490713c1b31d60a,2025-01-02T17:56:31.057000 +CVE-2024-7025,0,0,3573364518b6ebce451930ea49bb5e886715435408b5a9c21490713c1b31d60a,2025-01-02T17:56:31.057000 CVE-2024-7026,0,0,e8918f0d23a1fa6bd26b495ad27a50d9d3a6c5a512c1d41c8e42badba6113296,2024-11-21T14:15:18.837000 CVE-2024-7027,0,0,617968f19ac9beb506c8b78bf99c797278f2c324ee96c64d6dd52fdc0a040385,2024-11-21T09:50:46.760000 CVE-2024-7029,0,0,1a81740470044e0ee7f4eadc478063b46d4e9870673228721be0e637fe0fe33a,2024-09-17T13:30:55.010000 @@ -273342,7 +273343,7 @@ CVE-2024-7252,0,0,24d74b26883cf8151f149bfa7deed5d8a63133a6167165e30cc462ead5fd45 CVE-2024-7253,0,0,c74d8b1443ed2599fa1a0e185c951c99d83cfd82e91633185a8d5e4170834865,2024-11-26T20:00:48.783000 CVE-2024-7254,0,0,e89eb3a1f139a1b7724c82049128b9101144d09303e1246e0c00754c9c13b027,2024-12-13T14:15:22.800000 CVE-2024-7255,0,0,ba60a86cf283a25cbf44d00829e275d7a0bb026ed551fecdfd5dd1e8d3ece898,2024-10-29T20:35:42.023000 -CVE-2024-7256,0,1,6943aac07a7fc5ab85c828a3f2feda9d7e5f422c60266753c20567487922742d,2025-01-02T17:41:48.610000 +CVE-2024-7256,0,0,6943aac07a7fc5ab85c828a3f2feda9d7e5f422c60266753c20567487922742d,2025-01-02T17:41:48.610000 CVE-2024-7257,0,0,e824d36e9091bce947d766daa6e3bb42f606d3c1749eb85a01f040d08b0b6e1f,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,8211618224ce65efbd4103dce5e1df47001d574abef7aea73a13fd90621d6f65,2024-09-27T13:05:06.930000 CVE-2024-7259,0,0,4556d37f0166a3ca8f27c990a2dba785ffb6169fd40505213d2237ff3a08580a,2024-09-30T12:46:20.237000 @@ -273975,7 +273976,7 @@ CVE-2024-7966,0,0,54a69d5d76ddba02de4ef56bdefa56549eef7089684edf8a8cb93d5aca7a0a CVE-2024-7967,0,0,0862728975ae07138d419922906301e86ca32bf8f0f5b6bf3d830d6ecb418894,2024-08-27T13:35:03.800000 CVE-2024-7968,0,0,c8ae0654c4852518a4b4b26d46428918e6a896dc4df2d02bf2b05416e098d419,2024-08-27T13:35:04.780000 CVE-2024-7969,0,0,df0425e2c8afa92cea17d6a7c308901b9f2aa9730959661a91bb505a1ab8888d,2024-08-28T23:15:05.320000 -CVE-2024-7970,0,1,65dd451c1edbcdd226d9027f456b77e1785aa0fa20bde4ad16184c696d224a23,2025-01-02T17:40:45.077000 +CVE-2024-7970,0,0,65dd451c1edbcdd226d9027f456b77e1785aa0fa20bde4ad16184c696d224a23,2025-01-02T17:40:45.077000 CVE-2024-7971,0,0,cbe2daa931187e1258dbe5911fe5622967ef34542556be9e6ad2a0b769c2720b,2024-11-27T17:21:35.077000 CVE-2024-7972,0,0,e046834a8c6cd3f2b72f3d7f61eb5f863b641d5ca124b733b481256c6229b63a,2024-08-26T15:11:35.017000 CVE-2024-7973,0,0,15d0c9d63211801347ebed9db5c78827e841609bd1672901b17ef57d9247996c,2024-10-24T20:35:14.967000 @@ -274284,7 +274285,7 @@ CVE-2024-8357,0,0,1d889408be1770076ad81711236c2a891b36406e9fc3a925e957f690d3e9af CVE-2024-8358,0,0,5fb394033ecc4990c585e13519c166d42fa3ff92798bd5136ede9dccb7b4708d,2024-12-11T04:00:11.233000 CVE-2024-8359,0,0,d54d10f5fe9164e60ec13d6bc33fcba551ad8ecc6982ba256a03e2194f9ccecf,2024-12-11T03:57:48.243000 CVE-2024-8360,0,0,ed6b27add01a92e9b19489ef7584e5d2cb3487d850b912f3eb15873fc81ef9c2,2024-12-04T19:32:21.703000 -CVE-2024-8362,0,1,6dbce73a6371abf2515922ae5bca256741ceef67962b22664e0b4f9994cda556,2025-01-02T17:37:05.167000 +CVE-2024-8362,0,0,6dbce73a6371abf2515922ae5bca256741ceef67962b22664e0b4f9994cda556,2025-01-02T17:37:05.167000 CVE-2024-8363,0,0,31dc15c8efef4d6babfe272b0bb3432c061f6d6e93807b938d15de08fc21d43f,2024-09-11T16:35:05.653000 CVE-2024-8364,0,0,627f8b2156971d2679081614445e8377234b8cf137137dc8007755116bce395c,2024-09-25T15:08:08.503000 CVE-2024-8365,0,0,e8fa85ee56ebaf0cc7e4c2e6ad37f7a7ccf035096e23a8867e3100d2394150a3,2024-09-04T14:37:03.543000 @@ -274735,8 +274736,8 @@ CVE-2024-8900,0,0,d3f4089befe66027b0f1c31c786919fba68b80f7363185072eb03d6b6da1b2 CVE-2024-8901,0,0,16179fb8da6b3691e42eb050c6acdbb5e9f1051b767f4e4a93bcfac530038965,2024-10-23T21:15:14.950000 CVE-2024-8902,0,0,562a2a8b6b19d45ced54e0584113549612b1e122270fd069c6c63552fab4593c,2024-10-15T12:57:46.880000 CVE-2024-8903,0,0,d77424f8f0e77666574fc785d3fa32d82e1fb3930db964a4acb479d703a0b410,2024-09-26T13:32:55.343000 -CVE-2024-8904,0,1,230a3c4bc4a2b98c5279b4e2562edca77461165447fdb40a76515a2bbde02e41,2025-01-02T17:34:12.570000 -CVE-2024-8905,0,1,9dd464b1263cb58eb9a04bacf3bec96ac31555806b4cfda8053df5a9abab713d,2025-01-02T17:33:01.020000 +CVE-2024-8904,0,0,230a3c4bc4a2b98c5279b4e2562edca77461165447fdb40a76515a2bbde02e41,2025-01-02T17:34:12.570000 +CVE-2024-8905,0,0,9dd464b1263cb58eb9a04bacf3bec96ac31555806b4cfda8053df5a9abab713d,2025-01-02T17:33:01.020000 CVE-2024-8906,0,0,33d6adfd5d22361ace69c19a03921b3eee65b888570501a28793e65ff627085e,2024-09-23T17:38:53.613000 CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf92597254,2024-09-23T18:23:57.697000 CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000 @@ -275093,7 +275094,7 @@ CVE-2024-9364,0,0,9ebd82b4859f157f79a8dcd16aa66e84da6e7858640c431e532bfbe4c36998 CVE-2024-9366,0,0,db84f6e2ff16ebff2d502f21f85e90095a4a755ba5e4941bffb7a9e2e4c31307,2024-10-22T15:09:48.177000 CVE-2024-9367,0,0,dd2d722c1b5c94f108dc6d2a9b2b655787a803b3cc431ded09b0b735326cfa01,2024-12-12T12:15:28.497000 CVE-2024-9368,0,0,6b310411ff00de8abfede8a1c8f49292bfd465b294d4fa7ea5baca1d5f7f7405,2024-10-10T20:30:51.240000 -CVE-2024-9369,0,1,db4304f809f2a84675a6f54ca3a66b9aecebbe3dec331461b634ea9b1d7152f9,2025-01-02T17:55:20.877000 +CVE-2024-9369,0,0,db4304f809f2a84675a6f54ca3a66b9aecebbe3dec331461b634ea9b1d7152f9,2025-01-02T17:55:20.877000 CVE-2024-9371,0,0,6b69a68b0411ce9f1a3873a71c65ed5e38b4a3301ee458433c180567bd1ea8c9,2024-11-21T13:57:24.187000 CVE-2024-9372,0,0,47c38539a001d789bd3a8f81e62698790222e24e108b5f4cf13a0c91792184c6,2024-10-10T20:36:28.020000 CVE-2024-9373,0,0,e94dc02302c82bfcf4d887e6137e98a0a5848ec0be40f176be36ef9530332f75,2024-10-22T15:07:23.907000 @@ -275574,8 +275575,8 @@ CVE-2024-9956,0,0,fa8754400e4844f610057364c55d9b66e055d42aa0e553c28cde7e153e59c2 CVE-2024-9957,0,0,2f97d231610384f6d8a463c761af414fa6abc7b32f5c5db6b3eb791ccff62e44,2025-01-02T16:02:27.247000 CVE-2024-9958,0,0,bc0f4a0a795882733ada5c0c29409cc17a7d5defc2da20484b0883b786372f9f,2024-10-17T20:00:41.427000 CVE-2024-9959,0,0,9c29f9ff11cc87998b91d5fc1670c4c53eabf26d8b303a76c729e3e2962017a7,2025-01-02T16:02:49.813000 -CVE-2024-9960,0,1,0a21e089af6f4a97eabad80fe0ebda1591a5952c77abee47a3839ff78b9320cf,2025-01-02T18:12:58.973000 -CVE-2024-9961,0,1,e7956de7954263bb95a8fe2418efb7857c2b91ab9d922c644c0bfdb1c894aea7,2025-01-02T18:12:02.177000 +CVE-2024-9960,0,0,0a21e089af6f4a97eabad80fe0ebda1591a5952c77abee47a3839ff78b9320cf,2025-01-02T18:12:58.973000 +CVE-2024-9961,0,0,e7956de7954263bb95a8fe2418efb7857c2b91ab9d922c644c0bfdb1c894aea7,2025-01-02T18:12:02.177000 CVE-2024-9962,0,0,e00b169a9e9de74ab12ca137fa6f3a26b7cc22d0e3ce1279ba34b4f69f199650,2024-10-17T20:01:33.647000 CVE-2024-9963,0,0,b1a11da50134438171184a3bcffbbbbf35a750611c1d3fc1148da0d0aa729ef7,2024-10-17T20:02:16.293000 CVE-2024-9964,0,0,9117ef0fff94056ecd43cb6559e46761470dbfce60fdc65059bcf10f7befdb7b,2024-10-17T20:30:09.627000 @@ -275611,7 +275612,7 @@ CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eb CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 CVE-2025-0168,0,0,fde79a3f95dbae8045d22c8e981cbdd84ae894d89db499f6872ba4edd67b57a4,2025-01-01T14:15:23.590000 -CVE-2025-0171,0,1,9df660d0bd85fd30ba70144d79c054c55f685c42b30cd4d4685cbaa76a79261d,2025-01-02T18:15:21.173000 -CVE-2025-0172,0,1,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c9d,2025-01-02T18:15:21.327000 -CVE-2025-0173,1,1,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000 +CVE-2025-0171,0,0,9df660d0bd85fd30ba70144d79c054c55f685c42b30cd4d4685cbaa76a79261d,2025-01-02T18:15:21.173000 +CVE-2025-0172,0,0,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c9d,2025-01-02T18:15:21.327000 +CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000