diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json index 9a0c13913f1..7e022dac375 100644 --- a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json +++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42307", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:55.703", - "lastModified": "2024-11-21T08:22:25.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T14:54:38.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Code-Projects Exam Form Submission 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la secci\u00f3n \"Nombre del sujeto\" y \"C\u00f3digo del asunto\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:exam_form_submission:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "57FA1715-F94F-4997-83B1-128C0283E460" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-42307/blob/main/CVE-6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2023-42307/blob/main/CVE-6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23606.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23606.json index aece085a2b7..e32369ac055 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23606.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23606", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T16:15:09.737", - "lastModified": "2024-11-21T08:57:59.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:58:56.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,82 @@ "value": "CWE-131" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libbiosig_project:libbiosig:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A824B3CA-4F02-432F-898F-BCD206C29468" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23809.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23809.json index 5f2de568f70..f1aa4b0b18c 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23809.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23809", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T16:15:10.003", - "lastModified": "2024-11-21T08:58:28.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:43:30.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libbiosig_project:libbiosig:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A824B3CA-4F02-432F-898F-BCD206C29468" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1919", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1919", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27132.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27132.json index 79472780915..7339d7c94d9 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27132.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27132", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-02-23T22:15:55.077", - "lastModified": "2024-11-21T09:03:55.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:15:26.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -51,22 +71,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.9.2", + "matchCriteriaId": "0A9D223B-CF17-45F3-9C5E-BB31DA6C658F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mlflow/mlflow/pull/10873", - "source": "reefs@jfrog.com" + "source": "reefs@jfrog.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/", - "source": "reefs@jfrog.com" + "source": "reefs@jfrog.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/mlflow/mlflow/pull/10873", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27133.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27133.json index 63ec965ebaf..095039c3889 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27133.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27133", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-02-23T22:15:55.287", - "lastModified": "2024-11-21T09:03:55.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T13:46:56.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -51,22 +71,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.9.2", + "matchCriteriaId": "0A9D223B-CF17-45F3-9C5E-BB31DA6C658F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mlflow/mlflow/pull/10893", - "source": "reefs@jfrog.com" + "source": "reefs@jfrog.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/", - "source": "reefs@jfrog.com" + "source": "reefs@jfrog.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/mlflow/mlflow/pull/10893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27318.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27318.json index 34975d7e39b..1e55b517c04 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27318.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27318", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-02-23T18:15:50.767", - "lastModified": "2024-11-21T09:04:19.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:44:50.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,40 +69,112 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "CB5DEE14-818A-4A39-9E14-E22F8E304016" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Product" + ] }, { "url": "https://github.com/onnx/onnx/commit/66b7fb630903fdcf3e83b6b6d56d82e904264a20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27319.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27319.json index 67e8488e82b..d022426df8f 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27319.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27319.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27319", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-02-23T18:15:50.960", - "lastModified": "2024-11-21T09:04:19.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:26:49.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,32 +69,98 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "CB5DEE14-818A-4A39-9E14-E22F8E304016" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/onnx/onnx/commit/08a399ba75a805b7813ab8936b91d0e274b08287", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/onnx/onnx/commit/08a399ba75a805b7813ab8936b91d0e274b08287", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGTBH5ZYL2LGYHIJDHN2MAUURIR5E7PY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFJJID2IZDOLFDMWVYTBDI75ZJQC6JOL/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57937.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57937.json index 32636e65977..fbc6bb149e2 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57937.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57937.json @@ -2,24 +2,15 @@ "id": "CVE-2024-57937", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-21T12:15:27.360", - "lastModified": "2025-01-21T12:15:27.360", - "vulnStatus": "Received", + "lastModified": "2025-01-22T13:15:20.400", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: reinstate ability to map write-sealed memfd mappings read-only\n\nPatch series \"mm: reinstate ability to map write-sealed memfd mappings\nread-only\".\n\nIn commit 158978945f31 (\"mm: perform the mapping_map_writable() check\nafter call_mmap()\") (and preceding changes in the same series) it became\npossible to mmap() F_SEAL_WRITE sealed memfd mappings read-only.\n\nCommit 5de195060b2e (\"mm: resolve faulty mmap_region() error path\nbehaviour\") unintentionally undid this logic by moving the\nmapping_map_writable() check before the shmem_mmap() hook is invoked,\nthereby regressing this change.\n\nThis series reworks how we both permit write-sealed mappings being mapped\nread-only and disallow mprotect() from undoing the write-seal, fixing this\nregression.\n\nWe also add a regression test to ensure that we do not accidentally\nregress this in future.\n\nThanks to Julian Orth for reporting this regression.\n\n\nThis patch (of 2):\n\nIn commit 158978945f31 (\"mm: perform the mapping_map_writable() check\nafter call_mmap()\") (and preceding changes in the same series) it became\npossible to mmap() F_SEAL_WRITE sealed memfd mappings read-only.\n\nThis was previously unnecessarily disallowed, despite the man page\ndocumentation indicating that it would be, thereby limiting the usefulness\nof F_SEAL_WRITE logic.\n\nWe fixed this by adapting logic that existed for the F_SEAL_FUTURE_WRITE\nseal (one which disallows future writes to the memfd) to also be used for\nF_SEAL_WRITE.\n\nFor background - the F_SEAL_FUTURE_WRITE seal clears VM_MAYWRITE for a\nread-only mapping to disallow mprotect() from overriding the seal - an\noperation performed by seal_check_write(), invoked from shmem_mmap(), the\nf_op->mmap() hook used by shmem mappings.\n\nBy extending this to F_SEAL_WRITE and critically - checking\nmapping_map_writable() to determine if we may map the memfd AFTER we\ninvoke shmem_mmap() - the desired logic becomes possible. This is because\nmapping_map_writable() explicitly checks for VM_MAYWRITE, which we will\nhave cleared.\n\nCommit 5de195060b2e (\"mm: resolve faulty mmap_region() error path\nbehaviour\") unintentionally undid this logic by moving the\nmapping_map_writable() check before the shmem_mmap() hook is invoked,\nthereby regressing this change.\n\nWe reinstate this functionality by moving the check out of shmem_mmap()\nand instead performing it in do_mmap() at the point at which VMA flags are\nbeing determined, which seems in any case to be a more appropriate place\nin which to make this determination.\n\nIn order to achieve this we rework memfd seal logic to allow us access to\nthis information using existing logic and eliminate the clearing of\nVM_MAYWRITE from seal_check_write() which we are performing in do_mmap()\ninstead." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/464770df46095e6967334d77113972960f7ef1fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8ec396d05d1b737c87311fb7311f753b02c2a6b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json new file mode 100644 index 00000000000..9e73a26f216 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-0395", + "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", + "published": "2025-01-22T13:15:20.933", + "lastModified": "2025-01-22T13:15:20.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], + "references": [ + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582", + "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json index 24b41c0863b..10f9f2bbecb 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21315", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.343", - "lastModified": "2025-01-14T18:15:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:40:33.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,63 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json index 55cc4e0986a..094b69108de 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21316", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.510", - "lastModified": "2025-01-14T18:15:55.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:41:48.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,139 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json index 6ec95b4b5cb..e1cbdc9bb15 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21317", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.697", - "lastModified": "2025-01-14T18:15:55.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:42:50.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,86 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json index 0445379b02b..81ae7861f17 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21318", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.880", - "lastModified": "2025-01-14T18:15:55.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:43:57.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json index 7c916f1ab35..dbd1c503a10 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21319", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.090", - "lastModified": "2025-01-14T18:15:56.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:44:50.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,149 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json index ffc47f587cb..9a6b6bf3f49 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21320", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.297", - "lastModified": "2025-01-14T18:15:56.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:45:53.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json index 12834e66538..d33310a7eda 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21321", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.533", - "lastModified": "2025-01-14T18:15:56.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:46:12.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json index 844c6e44356..4dfdc16b296 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21323", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.760", - "lastModified": "2025-01-14T18:15:56.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:47:11.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,134 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json index ce715ea7f89..712110c7db3 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21324", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.970", - "lastModified": "2025-01-14T18:15:56.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:46:51.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json index 75680a19173..aace8640e3d 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21326", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.170", - "lastModified": "2025-01-14T18:15:57.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:48:07.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,57 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-843" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json index adcc070e0b0..1b467daceb2 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21327", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.340", - "lastModified": "2025-01-14T18:15:57.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:59:37.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json index c87c8c95f3d..dea1a1e6e9e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21328", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.530", - "lastModified": "2025-01-14T18:15:57.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T14:59:12.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-41" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 03435ab0c27..a4e311c79e9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-22T13:00:43.090446+00:00 +2025-01-22T15:00:37.663375+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-22T11:15:08.533000+00:00 +2025-01-22T14:59:37.587000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278470 +278471 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -- [CVE-2024-13447](CVE-2024/CVE-2024-134xx/CVE-2024-13447.json) (`2025-01-22T11:15:07.777`) -- [CVE-2024-13495](CVE-2024/CVE-2024-134xx/CVE-2024-13495.json) (`2025-01-22T11:15:08.193`) -- [CVE-2024-13496](CVE-2024/CVE-2024-134xx/CVE-2024-13496.json) (`2025-01-22T11:15:08.373`) -- [CVE-2024-13499](CVE-2024/CVE-2024-134xx/CVE-2024-13499.json) (`2025-01-22T11:15:08.533`) +- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-01-22T13:15:20.933`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `20` +- [CVE-2023-42307](CVE-2023/CVE-2023-423xx/CVE-2023-42307.json) (`2025-01-22T14:54:38.390`) +- [CVE-2024-23606](CVE-2024/CVE-2024-236xx/CVE-2024-23606.json) (`2025-01-22T14:58:56.600`) +- [CVE-2024-23809](CVE-2024/CVE-2024-238xx/CVE-2024-23809.json) (`2025-01-22T14:43:30.827`) +- [CVE-2024-27132](CVE-2024/CVE-2024-271xx/CVE-2024-27132.json) (`2025-01-22T14:15:26.130`) +- [CVE-2024-27133](CVE-2024/CVE-2024-271xx/CVE-2024-27133.json) (`2025-01-22T13:46:56.667`) +- [CVE-2024-27318](CVE-2024/CVE-2024-273xx/CVE-2024-27318.json) (`2025-01-22T14:44:50.917`) +- [CVE-2024-27319](CVE-2024/CVE-2024-273xx/CVE-2024-27319.json) (`2025-01-22T14:26:49.917`) +- [CVE-2024-57937](CVE-2024/CVE-2024-579xx/CVE-2024-57937.json) (`2025-01-22T13:15:20.400`) +- [CVE-2025-21315](CVE-2025/CVE-2025-213xx/CVE-2025-21315.json) (`2025-01-22T14:40:33.967`) +- [CVE-2025-21316](CVE-2025/CVE-2025-213xx/CVE-2025-21316.json) (`2025-01-22T14:41:48.963`) +- [CVE-2025-21317](CVE-2025/CVE-2025-213xx/CVE-2025-21317.json) (`2025-01-22T14:42:50.910`) +- [CVE-2025-21318](CVE-2025/CVE-2025-213xx/CVE-2025-21318.json) (`2025-01-22T14:43:57.630`) +- [CVE-2025-21319](CVE-2025/CVE-2025-213xx/CVE-2025-21319.json) (`2025-01-22T14:44:50.860`) +- [CVE-2025-21320](CVE-2025/CVE-2025-213xx/CVE-2025-21320.json) (`2025-01-22T14:45:53.317`) +- [CVE-2025-21321](CVE-2025/CVE-2025-213xx/CVE-2025-21321.json) (`2025-01-22T14:46:12.787`) +- [CVE-2025-21323](CVE-2025/CVE-2025-213xx/CVE-2025-21323.json) (`2025-01-22T14:47:11.963`) +- [CVE-2025-21324](CVE-2025/CVE-2025-213xx/CVE-2025-21324.json) (`2025-01-22T14:46:51.207`) +- [CVE-2025-21326](CVE-2025/CVE-2025-213xx/CVE-2025-21326.json) (`2025-01-22T14:48:07.620`) +- [CVE-2025-21327](CVE-2025/CVE-2025-213xx/CVE-2025-21327.json) (`2025-01-22T14:59:37.587`) +- [CVE-2025-21328](CVE-2025/CVE-2025-213xx/CVE-2025-21328.json) (`2025-01-22T14:59:12.047`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c46e9acb530..746c3c79de9 100644 --- a/_state.csv +++ b/_state.csv @@ -232878,7 +232878,7 @@ CVE-2023-42295,0,0,78fdaddf17673316050d94ecf48f4e22f5939229676b80860a38339eeb1c0 CVE-2023-42298,0,0,12a46d213e32df690be0aaadda6c8295bef1ce681653af4999fa64c565cfcc0b,2024-11-21T08:22:24.967000 CVE-2023-42299,0,0,42e6d0e90217ebd6897af35060870a789eeb3f84316d086cdc1d68c50431992c,2024-11-21T08:22:25.097000 CVE-2023-4230,0,0,9534782230cd0029822ce45f05cf5c34e400f785e0d37fc88e451b5d0ffb5aa0,2024-11-21T08:34:40.460000 -CVE-2023-42307,0,0,a7d1d42948429dc42aa7dbf2bfd47f321cadeea0dc32da05af7dc10c730c3cc4,2024-11-21T08:22:25.240000 +CVE-2023-42307,0,1,d7129d837cf9382d5da28d998ef01f5b491e48b1ec3a684e5e508fa934a38c43,2025-01-22T14:54:38.390000 CVE-2023-42308,0,0,5779b47b0b3c03d47a2d139bd688f9b5b10b3cfcfb042139000d5ced50d75bb1,2024-11-21T08:22:25.383000 CVE-2023-4231,0,0,d8a5cd6afa3860ab1c78883cf8bf20eccd0d6d00cd46736814e11d4097787654,2024-11-21T08:34:40.597000 CVE-2023-42319,0,0,80b696e6d91a3f59e80d731c4538ea95a74347144234efd042f13fab4e1d33a7,2024-11-21T08:22:25.583000 @@ -246067,16 +246067,16 @@ CVE-2024-13433,0,0,b744d44080e2e33c41984f231e71d8cc1252181c511f568444c5c86671c3e CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13444,0,0,2a82e7dc36beac803abf8c10509e1ae610559c76a3585d9c1850f27a1808797c,2025-01-21T11:15:09.450000 -CVE-2024-13447,1,1,a103ae61959293a726fdc47498052185ef8168ea4410b87b04821193eaac3ef9,2025-01-22T11:15:07.777000 +CVE-2024-13447,0,0,a103ae61959293a726fdc47498052185ef8168ea4410b87b04821193eaac3ef9,2025-01-22T11:15:07.777000 CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000 CVE-2024-13454,0,0,64bcb798150e96f58a909578ab30d46cff0e023968dc2b1dcc5267d8fae6c946,2025-01-21T20:15:30.793000 CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 -CVE-2024-13495,1,1,7ba82927e3930c2cb6a7d1f568fd7c246464ed5b3f7c9c4431055a5bec2ad448,2025-01-22T11:15:08.193000 -CVE-2024-13496,1,1,936618627f845ba9cc9798cf205c2bbd4e19d9aa7fe11bf69036c2a8cbae283c,2025-01-22T11:15:08.373000 -CVE-2024-13499,1,1,fdec2fa425d6a94422e0b6dd68749531fdda49fd494a43529909b244ec9a2cf7,2025-01-22T11:15:08.533000 +CVE-2024-13495,0,0,7ba82927e3930c2cb6a7d1f568fd7c246464ed5b3f7c9c4431055a5bec2ad448,2025-01-22T11:15:08.193000 +CVE-2024-13496,0,0,936618627f845ba9cc9798cf205c2bbd4e19d9aa7fe11bf69036c2a8cbae283c,2025-01-22T11:15:08.373000 +CVE-2024-13499,0,0,fdec2fa425d6a94422e0b6dd68749531fdda49fd494a43529909b244ec9a2cf7,2025-01-22T11:15:08.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 CVE-2024-13502,0,0,ac2a41b6cd26a4157041ef83a41fb1ca5fe4741530d1e5a7cb1a80b922fa6ce0,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,9a18f887782bddd42cf8f60b9b9da1ba6181ce424bb49fdf69f585a65e64cdd7,2025-01-17T14:15:31.317000 @@ -249646,7 +249646,7 @@ CVE-2024-23601,0,0,ca7f67f2eee0becf70f57a8dfe360cc7f33c9ee2f3cf65add8eac8273640f CVE-2024-23603,0,0,aea1f31cacccf724f0eb767dfc62b8f5f7cb80ced40ede6e78ddaf281fcb5ad2,2024-11-21T08:57:59.193000 CVE-2024-23604,0,0,dc5cd839af33b7b3dcb48b002d81e48ae97043185456c58e26e0040b5dd4ee1e,2024-11-21T08:57:59.313000 CVE-2024-23605,0,0,6feaaf8078973106d62b89fd77d8350c669a4c873ff6f3514aa9598da39c9a5e,2024-11-21T08:57:59.433000 -CVE-2024-23606,0,0,d1d105c065091d2fd26f3da5f7c25c121c9263ce8c9570e40b1ce0bf631d4d89,2024-11-21T08:57:59.550000 +CVE-2024-23606,0,1,bab8065b9d3fb9f309eec8177d382348fc7f7d5cfbe3e357e07d9b91afce2e37,2025-01-22T14:58:56.600000 CVE-2024-23607,0,0,1e3cde2a3bdd7f2b024b02a6b58595499e745787f58fee09de464f8683b42032,2024-11-21T08:57:59.680000 CVE-2024-23608,0,0,f4f0d3dc90613d42fc8485a3197c71394b07fbc0df27981f4d6ad3675d04a364,2024-11-21T08:57:59.797000 CVE-2024-23609,0,0,b90f833366370fe43c05814eb1526887e7cb7b82ee5ea7a039ba9de77d7a868d,2024-11-21T08:57:59.930000 @@ -249835,7 +249835,7 @@ CVE-2024-23805,0,0,bfc06a300b76d855656e499453de6a2febdd5e93279f95b30c9afdcca5e12 CVE-2024-23806,0,0,9d829fca3834f4b79580eb189255076ef10c6078bd0e056438230fee41d8a8e9,2024-11-21T08:58:27.657000 CVE-2024-23807,0,0,1b8575bc8a82d32cc06f5bea6ac8791009b0d290ab9e89fa4395ac86da1a6ad6,2025-01-16T17:51:40.503000 CVE-2024-23808,0,0,842f67d830d40bbdccbee3dceed160f694418bdd49df687322b2edab20d3eba0,2025-01-02T19:07:39.450000 -CVE-2024-23809,0,0,d62bad76e60bf7ba73d75b1fe72094d81e760aa89965413d1f01d3e0b442bc2b,2024-11-21T08:58:28.127000 +CVE-2024-23809,0,1,71a78e83cb34cae55fe1b6be6716acf43dd1548e52486039da1e509c6cb10ae5,2025-01-22T14:43:30.827000 CVE-2024-2381,0,0,f66ddad084efb65ff7bf956ee961f930c1176d8e9e8c0f951e63dbd6dfd2cc0e,2024-11-21T09:09:37.907000 CVE-2024-23810,0,0,f2f5fad1095108d3dacd61e6f85b7446124baa2350c0d88169d5c5b20a0468ab,2024-11-21T08:58:28.240000 CVE-2024-23811,0,0,0403fc7b759c5031a0e3964d5cd968c4b8d98cfb4b93f144bb06accdee9c592b,2024-11-21T08:58:28.397000 @@ -252313,8 +252313,8 @@ CVE-2024-27128,0,0,25abf69fc83895a13784e9349a98139b1d75374ed7ab65f669ba6c5628c6f CVE-2024-27129,0,0,675d38ad59f656bb9de2a8532dded9ee79e6e9ec1860c1ad35fe28a7fec1161e,2024-11-21T09:03:54.740000 CVE-2024-2713,0,0,7c28d27f25ddda1c231ac9fe3977258c4de4e99af0cc5bcd61fd742e54970955,2024-11-21T09:10:21.290000 CVE-2024-27130,0,0,c9d6b28e2a18273de881a42f0dd25c4fe8494c26ad6475c525d0437de22d4449,2024-11-21T09:03:54.880000 -CVE-2024-27132,0,0,da7791e849fa4bdfb90720dfe9c2040ab21c79cdb9ec0c6e6db0e47979ac5457,2024-11-21T09:03:55.010000 -CVE-2024-27133,0,0,528b659e9485f935780afb7c055fea428bfd20bcfce58430300f60cb7faf138b,2024-11-21T09:03:55.143000 +CVE-2024-27132,0,1,97112c2430a1efdd24acd2d9a19461523930f5b80f33a45ebf983e3f77055e65,2025-01-22T14:15:26.130000 +CVE-2024-27133,0,1,0bc1efdc0e9ed092d39790d962760e4b53b0fb29de201e5b7a8c363318010504,2025-01-22T13:46:56.667000 CVE-2024-27134,0,0,10536f2c6cec2d014c78c98ff1034c300c2e1bbf125cdac8c205d1c9fa4af632,2024-11-25T14:15:06.867000 CVE-2024-27135,0,0,249bd83d6faa31f9be0c60ed0834bd7d41455f59453e7696691b7627646e8f7c,2024-11-21T09:03:55.270000 CVE-2024-27136,0,0,bb37721f8ed99b1ce670c8cc12d36d4a8ef9b3720f3c4a42663714f551f679da,2024-11-21T09:03:55.410000 @@ -252494,8 +252494,8 @@ CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5 CVE-2024-27315,0,0,d76b0fcdba6f7b4b207cb9b903ce70dcff45e546dcd16fd74a8323c6a63e3929,2024-12-31T16:16:15.510000 CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000 CVE-2024-27317,0,0,76b2a59ff51f548a5b920f9a9e5de4c3dbbbe200760563bdad4794a3fa9cb613,2025-01-19T03:23:26.087000 -CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000 -CVE-2024-27319,0,0,ba43b558a916cdc8ea2ffc9143a26e8f5c9b0fd690315b9a58ed0750f77418cb,2024-11-21T09:04:19.507000 +CVE-2024-27318,0,1,9f0c74c35c13b5ce49c8771ff1a0af97b9c149eedddd66adf6405f7b9a43397a,2025-01-22T14:44:50.917000 +CVE-2024-27319,0,1,ebbfc65a281e37322d6480be873d167aae6fd498287908f590776c027ddaf596,2025-01-22T14:26:49.917000 CVE-2024-2732,0,0,c53ca86f62810bb8d7151754be48472811994b863d082d4f89a0e05dc2c7c2e4,2024-11-21T09:10:23.810000 CVE-2024-27320,0,0,9bd432bffd8b92613cb510da17aad942a21d8d3e1a29df2e50a7d5d1126a5837,2024-09-23T13:56:48.353000 CVE-2024-27321,0,0,21cb175abd156e3dc500ea41f70806ccea3c2efdc89a895115ff1bfb44978981,2024-09-20T17:06:58.440000 @@ -273661,7 +273661,7 @@ CVE-2024-57933,0,0,a5f09101c1f266dd013e3ec124d1c1801c0703b5babe99bf295e942e95532 CVE-2024-57934,0,0,43034e503550b569256632c4502d946f08931a3530bd54d0ff9ea3c30d627029,2025-01-21T12:15:27.047000 CVE-2024-57935,0,0,e6daeb99554ae407cceaff9066c461bc5bc63d681f5adb174db5d16d19702a15,2025-01-21T12:15:27.153000 CVE-2024-57936,0,0,417d6b45a5c6544407230a177f750b81a6fb6c38ea6d13678499dd9c742ed051,2025-01-21T12:15:27.257000 -CVE-2024-57937,0,0,03a617ee4ad0e6f08a572fb737e71c79db0c97a6263c69fc32916d1331b02bf3,2025-01-21T12:15:27.360000 +CVE-2024-57937,0,1,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000 CVE-2024-57938,0,0,77ff62e982dad7ae42785578957ddb550a937967229142e5b9667c5d344b85c0,2025-01-21T12:15:27.463000 CVE-2024-57939,0,0,d2414769f2e217c395dc0f8aa10fa264b19bc4c515c6ed730880adaf71b9e812,2025-01-21T13:15:07.903000 CVE-2024-57940,0,0,0e01baa746fce3bed4ce967c293e4b2f4cc181fdcc444d5ee628bbc2a308ac51,2025-01-21T13:15:08.540000 @@ -277388,6 +277388,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559 CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 +CVE-2025-0395,1,1,cf87ba40103953bd3059e082ae74eceed6be7b1d8bcba1ca2600843f0faddaf7,2025-01-22T13:15:20.933000 CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000 @@ -277637,19 +277638,19 @@ CVE-2025-21311,0,0,b56c463e369aca2df31d59e80920fd6bff0c923b7be3f999d807397e5f54e CVE-2025-21312,0,0,db7e9adf484eecd8c9e33952b10670d4ab4a6c31412fb4f9d1d84b29a5796d2d,2025-01-14T18:15:54.770000 CVE-2025-21313,0,0,7ac3ef64e6b325e25b46611210f95c57375237478ee561be5061d04148cdca80,2025-01-14T18:15:55.007000 CVE-2025-21314,0,0,e10d4e44e3792ecb48788730063ade6b797b0fa3f6d495c19fac3cc1f4bb98a3,2025-01-14T18:15:55.163000 -CVE-2025-21315,0,0,c10b1a8b960b1e1181e85f178642ed914cdc07b76cd35a65a7f872286b68f0d6,2025-01-14T18:15:55.343000 -CVE-2025-21316,0,0,34d0eab5cdf1b36f845bb434575b40fcf2167204140b6ca1e15a855260047b02,2025-01-14T18:15:55.510000 -CVE-2025-21317,0,0,3956db2ab97702aa5dd1a057613b40a8fe9a2ea12ef238849dcf289482cafd56,2025-01-14T18:15:55.697000 -CVE-2025-21318,0,0,7952bba1cd36a9e8656b5c28ee43730397689855f442a0fa0983d59eea9e4f36,2025-01-14T18:15:55.880000 -CVE-2025-21319,0,0,09142b68118e06ca94d3e44390fe841d09059e69c90b98be26c8a4b158a90f9e,2025-01-14T18:15:56.090000 -CVE-2025-21320,0,0,9c6d60cc4485a32049e499abb2ddde2f14c58759394fb2cf8cd9709a16fea713,2025-01-14T18:15:56.297000 -CVE-2025-21321,0,0,c4f6754230df3fec09c799fffb941898179c11c46b515e6a08a9d6a56191920e,2025-01-14T18:15:56.533000 -CVE-2025-21323,0,0,05bff40e436d4fd964269ffcbe57d2664279f73cdd69d95fba97e498f129ce68,2025-01-14T18:15:56.760000 -CVE-2025-21324,0,0,29d9ff5cef8d73564a11ecda905c67d63b08d7e144d8c42ffc4c67485891bf2e,2025-01-14T18:15:56.970000 +CVE-2025-21315,0,1,5a13d39751996d646bad2814d5d374399878c40170b6fad35ea2f1b021fad591,2025-01-22T14:40:33.967000 +CVE-2025-21316,0,1,82452fd2c845ec85f7c6e5170cf3bd46a3abf2af010f9fecee630f5a318e9cab,2025-01-22T14:41:48.963000 +CVE-2025-21317,0,1,47a39641747b93c1cf8683236678f9f7006a6541e67da79b6f56e0f7a89aa8b4,2025-01-22T14:42:50.910000 +CVE-2025-21318,0,1,37c2f3629b3799d3d76873bcddcdbeb3ba8a23a22239f92eed8c11de9c5c7e31,2025-01-22T14:43:57.630000 +CVE-2025-21319,0,1,4ccb1b3d39c63ec552a98f81e04752d660c39a637ce839bcc3143fe54365d48d,2025-01-22T14:44:50.860000 +CVE-2025-21320,0,1,64568b0df3303426d11157001b49f37c41450f1b369fd6b5b01a06f29a8e600b,2025-01-22T14:45:53.317000 +CVE-2025-21321,0,1,8eaa5c182aa8b73985abafd66d823dd6012a7e80a091417b1719d0967da5e06a,2025-01-22T14:46:12.787000 +CVE-2025-21323,0,1,a73a1631a5186a151b017a313391a3761333ecb9ade0b752496092d793aa20bc,2025-01-22T14:47:11.963000 +CVE-2025-21324,0,1,4ce590d9aa9465948f8944282a6eb5f28a29dd0137b8686afe0b97b3d8cc8e88,2025-01-22T14:46:51.207000 CVE-2025-21325,0,0,31758d0cc76d6380f02d2304f83926081d1e932ac95a6eee2a71dc7102dbe268,2025-01-17T01:15:31.073000 -CVE-2025-21326,0,0,f128ebb17bc79761064ef5d2acf64a0e08818990a07f55762bbc372c7bbb5913,2025-01-14T18:15:57.170000 -CVE-2025-21327,0,0,fa4fa735c79dc182a158ea200faae71ac032ad71ea3bf6acc11860a598b172c9,2025-01-14T18:15:57.340000 -CVE-2025-21328,0,0,9ba8b624e0483dd931af8b35a715ec393157f6fb8e5851cbe7c501afae670330,2025-01-14T18:15:57.530000 +CVE-2025-21326,0,1,a5e6f1ef9b9a2944d2bea648da839845d2d7762f68463063bd25e92cfb364e2b,2025-01-22T14:48:07.620000 +CVE-2025-21327,0,1,7bac4461b88a40da2348ee4029e1707219f2df088efa12aa55c2e9580623a255,2025-01-22T14:59:37.587000 +CVE-2025-21328,0,1,dd919c7fd6a45815c6a0be9a54c809e84249c572d7c566b2907d17270baa8f75,2025-01-22T14:59:12.047000 CVE-2025-21329,0,0,a0895a1c387b8ff9b6c5a245a0e15ad298a5e72612aacc87cbc41ad0b6226729,2025-01-14T18:15:57.733000 CVE-2025-21330,0,0,e9596fdbe050e6b04292f06212bec1896e015b0111ce0ee99a206b6dc4f64682,2025-01-21T20:04:19.400000 CVE-2025-21331,0,0,082b98f28b869f075fe82528f0ac19a8ce6f77d17ae317e8556aad895fa48f1a,2025-01-21T19:58:20.833000