diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json new file mode 100644 index 00000000000..271b27ba952 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12802.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-12802", + "sourceIdentifier": "PSIRT@sonicwall.com", + "published": "2025-01-09T09:15:06.587", + "lastModified": "2025-01-09T09:15:06.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "PSIRT@sonicwall.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0001", + "source": "PSIRT@sonicwall.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json new file mode 100644 index 00000000000..1cda5908cf7 --- /dev/null +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13153.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13153", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-09T09:15:07.243", + "lastModified": "2025-01-09T09:15:07.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.5.135 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: Since the widget code isn't part of the code, to apply the patch, the affected widgets: Image Tooltip, Notification, Simple Popup, Video Play Button, and Card Carousel, must be deleted and reinstalled manually." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://unlimited-elements.com/change-log/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/unlimited-elements-for-elementor/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99625a3e-b8a4-42f8-8996-f7c5c0ff2d5f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json index 199788335e9..9bbf2eab40c 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13205.json @@ -2,13 +2,13 @@ "id": "CVE-2024-13205", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.800", - "lastModified": "2025-01-09T03:15:24.800", + "lastModified": "2025-01-09T09:15:07.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": { @@ -18,7 +18,7 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", @@ -26,9 +26,9 @@ "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", + "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", @@ -62,20 +62,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "availabilityImpact": "NONE" }, "exploitabilityScore": 0.9, - "impactScore": 3.4 + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -84,18 +84,18 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", - "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", - "confidentialityImpact": "PARTIAL", + "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL" + "availabilityImpact": "NONE" }, - "baseSeverity": "MEDIUM", + "baseSeverity": "LOW", "exploitabilityScore": 6.4, - "impactScore": 6.4, + "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -111,11 +111,11 @@ "description": [ { "lang": "en", - "value": "CWE-74" + "value": "CWE-79" }, { "lang": "en", - "value": "CWE-89" + "value": "CWE-94" } ] } diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json index f050bc9cf08..e51c8f6bd32 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45496", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-17T00:15:52.433", - "lastModified": "2024-09-20T12:31:20.110", + "lastModified": "2025-01-09T09:15:07.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:3718", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:6685", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json index 22561fecd6f..cfef42b7791 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6508", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-21T06:15:08.120", - "lastModified": "2024-12-12T04:15:08.007", + "lastModified": "2025-01-09T09:15:07.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:9620", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0014", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6508", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json index 231aa65d513..baeabaec1dd 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-17T00:15:52.757", - "lastModified": "2024-10-03T21:15:08.593", + "lastModified": "2025-01-09T09:15:07.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:3718", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:6685", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0237.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0237.json index 4a1d229b393..98baa414623 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0237.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0237.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0237", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.323", - "lastModified": "2025-01-08T16:15:37.330", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.027", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + "value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -63,6 +63,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json index 9a767e472e3..233a311e46e 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0238", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.470", - "lastModified": "2025-01-08T17:15:16.070", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.197", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19." + "value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -67,6 +67,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-03/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json index 534ef24e138..898d285dbcb 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0239", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.563", - "lastModified": "2025-01-08T17:15:16.240", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.357", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + "value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -63,6 +63,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json index 4ec4cfa53da..a8123ea0093 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0240", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.663", - "lastModified": "2025-01-08T17:15:16.403", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.513", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + "value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -63,6 +63,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json index 103b5ee832e..4a62800e3e9 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0241", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.767", - "lastModified": "2025-01-07T16:15:38.767", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.667", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + "value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." + }, + { + "lang": "es", + "value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." } ], "metrics": {}, @@ -24,6 +28,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json index 4adfbf6288b..d01766ec1e0 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0242", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.860", - "lastModified": "2025-01-08T17:15:16.563", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.763", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19." + "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -67,6 +67,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-03/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json index 9d2c423df65..5a1da0ca656 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0243", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.973", - "lastModified": "2025-01-08T17:15:16.723", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:08.917", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6." }, { "lang": "es", @@ -51,6 +51,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0247.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0247.json index bac1d3202ab..66e7a77de9e 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0247.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0247.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0247", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:39.357", - "lastModified": "2025-01-08T15:15:21.033", - "vulnStatus": "Received", + "lastModified": "2025-01-09T09:15:09.067", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134." + "value": "Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Thunderbird < 134." }, { "lang": "es", @@ -47,6 +47,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json new file mode 100644 index 00000000000..9dadbc08523 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0345.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0345", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-09T09:15:09.220", + "lastModified": "2025-01-09T09:15:09.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this issue is the function listData of the file /sys/menu/listData. The manipulation of the argument order leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290858", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290858", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475748", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json new file mode 100644 index 00000000000..d269e9562ad --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0346", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-09T09:15:09.393", + "lastModified": "2025-01-09T09:15:09.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Content Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/publishnews.php of the component Publish News Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/Lytes/266e5fa6eb4506fe2c7e35166664249a", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290859", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290859", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.476728", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json new file mode 100644 index 00000000000..1b5d2c6a86b --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0347", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-09T10:15:07.170", + "lastModified": "2025-01-09T10:15:07.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Curious-L/-/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290860", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290860", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.476898", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json new file mode 100644 index 00000000000..c303c8c8800 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0348.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0348", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-09T10:15:07.700", + "lastModified": "2025-01-09T10:15:07.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CampCodes DepEd Equipment Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /data/add_employee.php. The manipulation of the argument data leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20DepEd%20Equipment%20Inventory%20System.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290861", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290861", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.476908", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7e67574c66a..8c203dd6fcf 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-09T09:00:22.531137+00:00 +2025-01-09T11:00:22.223054+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-09T08:15:30.517000+00:00 +2025-01-09T10:15:07.700000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276421 +276427 ``` ### CVEs added in the last Commit -Recently added CVEs: `35` +Recently added CVEs: `6` -- [CVE-2024-43651](CVE-2024/CVE-2024-436xx/CVE-2024-43651.json) (`2025-01-09T08:15:27.590`) -- [CVE-2024-43652](CVE-2024/CVE-2024-436xx/CVE-2024-43652.json) (`2025-01-09T08:15:27.757`) -- [CVE-2024-43653](CVE-2024/CVE-2024-436xx/CVE-2024-43653.json) (`2025-01-09T08:15:27.950`) -- [CVE-2024-43654](CVE-2024/CVE-2024-436xx/CVE-2024-43654.json) (`2025-01-09T08:15:28.127`) -- [CVE-2024-43655](CVE-2024/CVE-2024-436xx/CVE-2024-43655.json) (`2025-01-09T08:15:28.300`) -- [CVE-2024-43656](CVE-2024/CVE-2024-436xx/CVE-2024-43656.json) (`2025-01-09T08:15:28.487`) -- [CVE-2024-43657](CVE-2024/CVE-2024-436xx/CVE-2024-43657.json) (`2025-01-09T08:15:28.680`) -- [CVE-2024-43658](CVE-2024/CVE-2024-436xx/CVE-2024-43658.json) (`2025-01-09T08:15:28.867`) -- [CVE-2024-43659](CVE-2024/CVE-2024-436xx/CVE-2024-43659.json) (`2025-01-09T08:15:29.060`) -- [CVE-2024-43660](CVE-2024/CVE-2024-436xx/CVE-2024-43660.json) (`2025-01-09T08:15:29.267`) -- [CVE-2024-43661](CVE-2024/CVE-2024-436xx/CVE-2024-43661.json) (`2025-01-09T08:15:29.450`) -- [CVE-2024-43662](CVE-2024/CVE-2024-436xx/CVE-2024-43662.json) (`2025-01-09T08:15:29.637`) -- [CVE-2024-43663](CVE-2024/CVE-2024-436xx/CVE-2024-43663.json) (`2025-01-09T08:15:29.810`) -- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-01-09T07:15:27.203`) -- [CVE-2024-53705](CVE-2024/CVE-2024-537xx/CVE-2024-53705.json) (`2025-01-09T07:15:27.363`) -- [CVE-2024-53706](CVE-2024/CVE-2024-537xx/CVE-2024-53706.json) (`2025-01-09T07:15:27.520`) -- [CVE-2025-0336](CVE-2025/CVE-2025-03xx/CVE-2025-0336.json) (`2025-01-09T07:15:27.860`) -- [CVE-2025-0339](CVE-2025/CVE-2025-03xx/CVE-2025-0339.json) (`2025-01-09T07:15:28.080`) -- [CVE-2025-0340](CVE-2025/CVE-2025-03xx/CVE-2025-0340.json) (`2025-01-09T07:15:28.260`) -- [CVE-2025-0341](CVE-2025/CVE-2025-03xx/CVE-2025-0341.json) (`2025-01-09T08:15:30.060`) -- [CVE-2025-0342](CVE-2025/CVE-2025-03xx/CVE-2025-0342.json) (`2025-01-09T08:15:30.310`) -- [CVE-2025-0344](CVE-2025/CVE-2025-03xx/CVE-2025-0344.json) (`2025-01-09T08:15:30.517`) -- [CVE-2025-20033](CVE-2025/CVE-2025-200xx/CVE-2025-20033.json) (`2025-01-09T07:15:28.450`) -- [CVE-2025-22445](CVE-2025/CVE-2025-224xx/CVE-2025-22445.json) (`2025-01-09T07:15:28.617`) -- [CVE-2025-22449](CVE-2025/CVE-2025-224xx/CVE-2025-22449.json) (`2025-01-09T07:15:28.777`) +- [CVE-2024-12802](CVE-2024/CVE-2024-128xx/CVE-2024-12802.json) (`2025-01-09T09:15:06.587`) +- [CVE-2024-13153](CVE-2024/CVE-2024-131xx/CVE-2024-13153.json) (`2025-01-09T09:15:07.243`) +- [CVE-2025-0345](CVE-2025/CVE-2025-03xx/CVE-2025-0345.json) (`2025-01-09T09:15:09.220`) +- [CVE-2025-0346](CVE-2025/CVE-2025-03xx/CVE-2025-0346.json) (`2025-01-09T09:15:09.393`) +- [CVE-2025-0347](CVE-2025/CVE-2025-03xx/CVE-2025-0347.json) (`2025-01-09T10:15:07.170`) +- [CVE-2025-0348](CVE-2025/CVE-2025-03xx/CVE-2025-0348.json) (`2025-01-09T10:15:07.700`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `12` -- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2025-01-09T07:15:26.893`) -- [CVE-2025-0194](CVE-2025/CVE-2025-01xx/CVE-2025-0194.json) (`2025-01-09T07:15:27.667`) +- [CVE-2024-13205](CVE-2024/CVE-2024-132xx/CVE-2024-13205.json) (`2025-01-09T09:15:07.417`) +- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2025-01-09T09:15:07.600`) +- [CVE-2024-6508](CVE-2024/CVE-2024-65xx/CVE-2024-6508.json) (`2025-01-09T09:15:07.767`) +- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2025-01-09T09:15:07.903`) +- [CVE-2025-0237](CVE-2025/CVE-2025-02xx/CVE-2025-0237.json) (`2025-01-09T09:15:08.027`) +- [CVE-2025-0238](CVE-2025/CVE-2025-02xx/CVE-2025-0238.json) (`2025-01-09T09:15:08.197`) +- [CVE-2025-0239](CVE-2025/CVE-2025-02xx/CVE-2025-0239.json) (`2025-01-09T09:15:08.357`) +- [CVE-2025-0240](CVE-2025/CVE-2025-02xx/CVE-2025-0240.json) (`2025-01-09T09:15:08.513`) +- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-01-09T09:15:08.667`) +- [CVE-2025-0242](CVE-2025/CVE-2025-02xx/CVE-2025-0242.json) (`2025-01-09T09:15:08.763`) +- [CVE-2025-0243](CVE-2025/CVE-2025-02xx/CVE-2025-0243.json) (`2025-01-09T09:15:08.917`) +- [CVE-2025-0247](CVE-2025/CVE-2025-02xx/CVE-2025-0247.json) (`2025-01-09T09:15:09.067`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bd715362ec7..1444f189211 100644 --- a/_state.csv +++ b/_state.csv @@ -214936,7 +214936,7 @@ CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb11607 CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000 CVE-2023-1905,0,0,1c8e69e154302dafb57f6191602005d1fb9f553d13ff7fd58cbba47c267631e4,2024-11-21T07:40:07.103000 CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000 -CVE-2023-1907,1,1,1461563d5ed7ef4393202a489273cc6851e080eaa8c7088b7a3a013e6476b08a,2025-01-09T08:15:24.477000 +CVE-2023-1907,0,0,1461563d5ed7ef4393202a489273cc6851e080eaa8c7088b7a3a013e6476b08a,2025-01-09T08:15:24.477000 CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000 CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000 CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000 @@ -245400,9 +245400,10 @@ CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 -CVE-2024-12803,1,1,39b13515bd90582cf33d0ed4f88d02f6b7dfc604d3edbbab329fd26f0ea79caa,2025-01-09T08:15:26.007000 -CVE-2024-12805,1,1,88244c73e27c67bc8006e84c4e0b60b1c6b6d146df3eb2fafe424e792ef9edfa,2025-01-09T08:15:26.247000 -CVE-2024-12806,1,1,9ca03f14d28b1eb09c39d6105bff209df4089157e217b8603b11751d7e40ad7a,2025-01-09T08:15:26.417000 +CVE-2024-12802,1,1,02e0d4499664dae94f894abf5b14a3696a760858576f720ade3983b2933a550f,2025-01-09T09:15:06.587000 +CVE-2024-12803,0,0,39b13515bd90582cf33d0ed4f88d02f6b7dfc604d3edbbab329fd26f0ea79caa,2025-01-09T08:15:26.007000 +CVE-2024-12805,0,0,88244c73e27c67bc8006e84c4e0b60b1c6b6d146df3eb2fafe424e792ef9edfa,2025-01-09T08:15:26.247000 +CVE-2024-12806,0,0,9ca03f14d28b1eb09c39d6105bff209df4089157e217b8603b11751d7e40ad7a,2025-01-09T08:15:26.417000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 @@ -245577,7 +245578,7 @@ CVE-2024-13038,0,0,07021c3f3e4e5ad8d59084daa2472f76a36a62f583200e4e988b2985299ac CVE-2024-13039,0,0,2ff048e2898a94c89e2fe46d15a6b69b7d24fd911b280e248c70b61bbb5acce0,2024-12-30T17:15:08.597000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-13040,0,0,48eac60daed7d09b05d10239614a9afabab092e37582ba3e02178f3736c64fc0,2024-12-31T02:15:06.303000 -CVE-2024-13041,1,1,49054a6a33743c1e6ab55e3ca334f47a3844e5906bbaad1d3a49a9cb1e9a2e09,2025-01-09T07:15:26.497000 +CVE-2024-13041,0,0,49054a6a33743c1e6ab55e3ca334f47a3844e5906bbaad1d3a49a9cb1e9a2e09,2025-01-09T07:15:26.497000 CVE-2024-13042,0,0,1f81fc2eec05a9223456735091886113e5fb919c6582ca39f0497333c1ba2b59,2025-01-04T13:15:06.483000 CVE-2024-13043,0,0,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000 CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000 @@ -245646,6 +245647,7 @@ CVE-2024-13143,0,0,c2afc4876e46cd380fd1d10a980312da4d2e603db0d42920d20cd1d81d1bf CVE-2024-13144,0,0,bc673dcb37833b727fc98157fce26807cef4c158cb3987428cbd5bd61bbe52b2,2025-01-06T00:15:05.633000 CVE-2024-13145,0,0,5293851792dc3cb6491b0cda78aca9c898b2b603a3534d53245e0430e746e1ed,2025-01-06T01:15:06.253000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 +CVE-2024-13153,1,1,de78f1f4efaeeb4981941c568d7dd7c0ad017670abfea047339f3d3542b071c5,2025-01-09T09:15:07.243000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 CVE-2024-1317,0,0,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000 CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad8f0,2025-01-08T15:15:16.577000 @@ -245672,7 +245674,7 @@ CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab2 CVE-2024-13202,0,0,fcc0d41315cbf872ad3f8ed3c4bf434e97528b65abb99250267aa9cd85514824,2025-01-09T03:15:24.220000 CVE-2024-13203,0,0,819c261d60fcd7e19a6b1cc262670172b97a373b3e5bcd2e58b29355523bf351,2025-01-09T03:15:24.410000 CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000 -CVE-2024-13205,0,0,d739c71f3d86131a746eaa4249d12b3ae719885126fa157fb0f7f8b183987902,2025-01-09T03:15:24.800000 +CVE-2024-13205,0,1,eab2280f118cc878917b605ffe82a4e3281effe9ad63660bef82b0a134012d58,2025-01-09T09:15:07.417000 CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000 CVE-2024-13209,0,0,ba59362766f93c6d18b5a8987b5e8a847432c789f656b7315b541fc0de12a958,2025-01-09T04:15:11.683000 CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000 @@ -261989,10 +261991,10 @@ CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000 CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000 -CVE-2024-40762,1,1,a7fbc3ec51883c7c1bf42de1c756299288a6532ae6ffd10d35fcdcaa53ac6fd3,2025-01-09T07:15:26.730000 +CVE-2024-40762,0,0,a7fbc3ec51883c7c1bf42de1c756299288a6532ae6ffd10d35fcdcaa53ac6fd3,2025-01-09T07:15:26.730000 CVE-2024-40763,0,0,03a98910bacc7a91881ba5927386bf799784ceed39e50818d2356358d82576a8,2024-12-05T17:15:11.720000 CVE-2024-40764,0,0,716c9029e61b77a0d9603bd5e4ce9d607d5f6a696fe7c8edc6ff51f3b795b731,2024-11-21T09:31:34.703000 -CVE-2024-40765,1,1,dcc858012082642755bee9045aabed3fc3e42f650b0a9b38d01bed6c6e1fa250,2025-01-09T08:15:26.797000 +CVE-2024-40765,0,0,dcc858012082642755bee9045aabed3fc3e42f650b0a9b38d01bed6c6e1fa250,2025-01-09T08:15:26.797000 CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a16a,2024-09-16T19:48:30.827000 CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 @@ -264214,24 +264216,24 @@ CVE-2024-43644,0,0,d7ae81dc39a8d80999b28a10bf2b9f4f3ec0b06b97a543b1aa4024a754a61 CVE-2024-43645,0,0,3483c2f4a4e8d8673a85c08c57279dcaf2dcabe54994c554778de6585015f0e0,2024-11-18T22:17:01.340000 CVE-2024-43646,0,0,e44ad8cceba821cb635623bea36106bdbc329e7b38ada87c67235302b176e252,2024-11-18T22:17:53.577000 CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d2442bb,2024-09-10T12:09:50.377000 -CVE-2024-43648,1,1,db6ea04d0fc888e720c30e379a5edb0c8ba3ee21c7a578727f855e026e9bf487,2025-01-09T08:15:26.980000 -CVE-2024-43649,1,1,47885ac52d06aa5d504a6dd1164814193364eba437843e14afe4f6408eff7e6a,2025-01-09T08:15:27.233000 +CVE-2024-43648,0,0,db6ea04d0fc888e720c30e379a5edb0c8ba3ee21c7a578727f855e026e9bf487,2025-01-09T08:15:26.980000 +CVE-2024-43649,0,0,47885ac52d06aa5d504a6dd1164814193364eba437843e14afe4f6408eff7e6a,2025-01-09T08:15:27.233000 CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000 -CVE-2024-43650,1,1,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000 -CVE-2024-43651,1,1,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000 -CVE-2024-43652,1,1,064bc45896f52884bfb57b8ac4a528d861f3663215ed752804908387abe214eb,2025-01-09T08:15:27.757000 -CVE-2024-43653,1,1,5029101dfeb3ba5aa623a600afd5003286f2ac5d03819c2b95d2abedf0fa9156,2025-01-09T08:15:27.950000 -CVE-2024-43654,1,1,b1ee7e11f8ffe5f22642934b4d66cee8a85a5924f3fed8d612532ca1852d2eeb,2025-01-09T08:15:28.127000 -CVE-2024-43655,1,1,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000 -CVE-2024-43656,1,1,38891d24c044c865af89153898249b840abf21f3098f2a8fd86ddeaf115986c1,2025-01-09T08:15:28.487000 -CVE-2024-43657,1,1,3295db8b0dee8c35f5bd2387c8725a66b364d28143f9cc9f0d93b969dca07d3b,2025-01-09T08:15:28.680000 -CVE-2024-43658,1,1,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000 -CVE-2024-43659,1,1,bea7bb2d7749d4469735f64b9092872757069300cf7bc686047ed1827782bd88,2025-01-09T08:15:29.060000 +CVE-2024-43650,0,0,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000 +CVE-2024-43651,0,0,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000 +CVE-2024-43652,0,0,064bc45896f52884bfb57b8ac4a528d861f3663215ed752804908387abe214eb,2025-01-09T08:15:27.757000 +CVE-2024-43653,0,0,5029101dfeb3ba5aa623a600afd5003286f2ac5d03819c2b95d2abedf0fa9156,2025-01-09T08:15:27.950000 +CVE-2024-43654,0,0,b1ee7e11f8ffe5f22642934b4d66cee8a85a5924f3fed8d612532ca1852d2eeb,2025-01-09T08:15:28.127000 +CVE-2024-43655,0,0,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000 +CVE-2024-43656,0,0,38891d24c044c865af89153898249b840abf21f3098f2a8fd86ddeaf115986c1,2025-01-09T08:15:28.487000 +CVE-2024-43657,0,0,3295db8b0dee8c35f5bd2387c8725a66b364d28143f9cc9f0d93b969dca07d3b,2025-01-09T08:15:28.680000 +CVE-2024-43658,0,0,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000 +CVE-2024-43659,0,0,bea7bb2d7749d4469735f64b9092872757069300cf7bc686047ed1827782bd88,2025-01-09T08:15:29.060000 CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000 -CVE-2024-43660,1,1,bae475130e762711eec58c15c2ac20517cbf8adec68dfd49174933e0fa6931d6,2025-01-09T08:15:29.267000 -CVE-2024-43661,1,1,7ca027929fc4dbab8ab4a545e9d872677d38cc79fa5c607e55919cb4f1e09ac8,2025-01-09T08:15:29.450000 -CVE-2024-43662,1,1,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000 -CVE-2024-43663,1,1,31b94a23f14faadaefc29b121a7d7589a03cd0af3a6f5d3b2eff56c034d6370f,2025-01-09T08:15:29.810000 +CVE-2024-43660,0,0,bae475130e762711eec58c15c2ac20517cbf8adec68dfd49174933e0fa6931d6,2025-01-09T08:15:29.267000 +CVE-2024-43661,0,0,7ca027929fc4dbab8ab4a545e9d872677d38cc79fa5c607e55919cb4f1e09ac8,2025-01-09T08:15:29.450000 +CVE-2024-43662,0,0,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000 +CVE-2024-43663,0,0,31b94a23f14faadaefc29b121a7d7589a03cd0af3a6f5d3b2eff56c034d6370f,2025-01-09T08:15:29.810000 CVE-2024-4367,0,0,06d0056dd66ff219c5446225478001d7ace4cdfa0f0e8d7454a5c61b93b71c50,2024-11-21T09:42:42.537000 CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000 @@ -265534,7 +265536,7 @@ CVE-2024-45492,0,0,6ab18bae2a19d3274e46d846526a2c9caf05018be54190e57425083d757a6 CVE-2024-45493,0,0,63ded12e1cce66753793ae82bef6c61efd91f10fe98a5bd1c054c3ddfbe0becc,2024-12-17T19:15:06.287000 CVE-2024-45494,0,0,e62b8176d74731dfdb1c9ebc3d4575fcabd14aac12deeb9776633eac1b50aecb,2024-12-17T19:15:06.497000 CVE-2024-45495,0,0,052cbd46ff58a2733b006c164c39180c42ff3c9c0f05edf173b6ee70b661cd18,2024-12-04T17:15:14.537000 -CVE-2024-45496,0,0,0a17ce5abed3bb6e6bd1207267280384036ed1f3c38b934c9b15f23fd0a10899,2024-09-20T12:31:20.110000 +CVE-2024-45496,0,1,f647c5447ed213c353caf91ddf707bc78331ddddcd98c233146cc0a0d9ee301a,2025-01-09T09:15:07.600000 CVE-2024-45497,0,0,8f10e5d1340565ce5f36ecaf4b2e6fa88136b7550ee676f0b4149fba415b5f50,2024-12-31T03:15:05.543000 CVE-2024-45498,0,0,ca7ab14623fe44aa59d843f355963b5b1f5525ef3bebc4a2486921426a009155,2024-11-21T09:37:51.613000 CVE-2024-4550,0,0,d020c2baa57a4c8c78c6437cdbbe1c555a0bddf99dab5627801ef1d8b20c6e80,2024-09-14T11:47:14.677000 @@ -268780,7 +268782,7 @@ CVE-2024-50307,0,0,effd6ec5b86bf22e86b034cf0d56aa80ef1054d58eddf4f4569fd5216a211 CVE-2024-5031,0,0,c308606af56c2c63972fb5c4124ab9d975213c17c216c9acc47e4e56bb8f8d42,2024-11-21T09:46:48.853000 CVE-2024-50310,0,0,0aa8bf92cb0c2ce72d2591b8a623d6ab248b2abe4cf7e33609877fe3cb7813d1,2024-11-13T23:15:38.657000 CVE-2024-50311,0,0,b0292ba610dd96aa55991ae2b3d8d9a3245ae7b245c406d2ccd4b978c4c63f18,2024-12-04T08:15:06.993000 -CVE-2024-50312,0,1,a7c4b05d3d3f339ecdf585e78123d67608338d22201a07dc1ab4fe90abd45688,2025-01-09T07:15:26.893000 +CVE-2024-50312,0,0,a7c4b05d3d3f339ecdf585e78123d67608338d22201a07dc1ab4fe90abd45688,2025-01-09T07:15:26.893000 CVE-2024-50313,0,0,64114bcba17ddbbd52304f776f5dd6f39dd07ae575272b42861ff4f8f52981bf,2024-11-15T17:12:44.410000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 CVE-2024-50317,0,0,bb18489d7989fbe06416c7902779e422cf61fac95f0d13f7e09c0b8e1bc37193,2024-11-18T15:06:49.627000 @@ -270858,9 +270860,9 @@ CVE-2024-5370,0,0,118bbc3bfc68a5a364fa8038fafc7682a10bb0308a5e5da229e35dbd880721 CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,1,1,a49d2f395c1a812543e55d6b39c0cc790fff1e2ba3cf7523efd6de51559acf7d,2025-01-09T07:15:27.203000 -CVE-2024-53705,1,1,3608df41c0b7eb34cc7682868591dc9a56ad97248d5876e65327a002d017398a,2025-01-09T07:15:27.363000 -CVE-2024-53706,1,1,258819dd0728d0f7679c29154005673ce3e612d4f8dde60dda77acce9370823c,2025-01-09T07:15:27.520000 +CVE-2024-53704,0,0,a49d2f395c1a812543e55d6b39c0cc790fff1e2ba3cf7523efd6de51559acf7d,2025-01-09T07:15:27.203000 +CVE-2024-53705,0,0,3608df41c0b7eb34cc7682868591dc9a56ad97248d5876e65327a002d017398a,2025-01-09T07:15:27.363000 +CVE-2024-53706,0,0,258819dd0728d0f7679c29154005673ce3e612d4f8dde60dda77acce9370823c,2025-01-09T07:15:27.520000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 CVE-2024-53708,0,0,cda0eccc0f844686702a234754606286df02f2b8e9c9d9d81e8fb2842526d6e1,2024-12-02T14:15:13.457000 CVE-2024-53709,0,0,74fcfcd96364eb63a20fac2c34c511b47044ab19669bd7332461d3387afde300,2024-12-02T14:15:13.600000 @@ -273253,7 +273255,7 @@ CVE-2024-6504,0,0,fad0ade8c88ad6e8496cfe0d237856169f53f8a93210eadd259fe3abd75e2e CVE-2024-6505,0,0,21aa9ddf3ebc6b3515263ded9b2cee589115bfdb04b0eceea7d24129ed687c73,2024-11-21T09:49:46.400000 CVE-2024-6506,0,0,1a9cee5d897bff8909e0a3bb27604c626e57ed4bbd4bb54c8f2bd8e2e572b480,2024-11-21T09:49:46.537000 CVE-2024-6507,0,0,687ddf6520b599b09dc3a1d8aab83ca78b8392e14671ddde76f4a9814b88169c,2024-11-25T13:15:07.517000 -CVE-2024-6508,0,0,2b37d6ee7d49eb93da987149131aaf4c1acc126a1821ebcebf00349b3e483bcd,2024-12-12T04:15:08.007000 +CVE-2024-6508,0,1,52de2f9db1bae89555ac7f7a0971e5d71f1b68c7d83dedf5c4b0916b92a29272,2025-01-09T09:15:07.767000 CVE-2024-6509,0,0,90d894af5048ed3f0f64d638b676864ae566d58ef707a1e4890279c66c4ecf68,2024-11-29T06:15:07.640000 CVE-2024-6510,0,0,b5f4271053f188471e3e35f9aca13c4993fc4e8f43ff33784781597a6cac8f1f,2024-10-02T17:17:46.450000 CVE-2024-6511,0,0,d521b24465eff12b0c8151a58c6c8010152bbabe6c86ea5dd1a924fa2f64baf8,2024-11-21T09:49:47.060000 @@ -274017,7 +274019,7 @@ CVE-2024-7383,0,0,7beeface4302f9b7cabdff180768add34a64cc9c1a8e549a14d10aa1dc8f69 CVE-2024-7384,0,0,72665cefc9bc5e7a4bb167b33f41e91e76bc71ffdb470737af7a5454b0f8a7ba,2024-09-27T13:15:28.443000 CVE-2024-7385,0,0,101c941ce4234279ac93469f4d75a71718ff61f7f4f159a8cf136648a29532f0,2024-10-02T19:35:26.523000 CVE-2024-7386,0,0,623f13cd2bc79eb32d7c88560297357b78b3ef2e7abbbf45c8d9ab2e2aff0739,2024-09-26T13:32:02.803000 -CVE-2024-7387,0,0,d1f7bb15961ef674c8d1115014753264a86815b31c3c301159f4c35e8ee3a4b1,2024-10-03T21:15:08.593000 +CVE-2024-7387,0,1,c2f7dcf02cdd17901d7de24823d83c3c0d3eb2f86ae88f5e8ad91fb71d3849b1,2025-01-09T09:15:07.903000 CVE-2024-7388,0,0,832d23d5406547c0193a4b31c0fd589fd6f309473f42f5bd0b1b9a8f787e7450,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,cab381fcf4b9b71264f141b348bf1292afa8da6fe747dc8fe0784ecf6d792fc5,2024-11-21T09:51:25.673000 CVE-2024-7390,0,0,62257d50cfac87a87bf72bf184895cbf9edf65dcbcd5b500828f71bf6dd1b693,2024-09-27T17:45:05.590000 @@ -276186,7 +276188,7 @@ CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca336 CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000 CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000 CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000 -CVE-2025-0194,0,1,40ef7c79a60c06ceae761bdb13cd6a0f064d915b3409b67bcbee098c5513eee9,2025-01-09T07:15:27.667000 +CVE-2025-0194,0,0,40ef7c79a60c06ceae761bdb13cd6a0f064d915b3409b67bcbee098c5513eee9,2025-01-09T07:15:27.667000 CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000 CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000 CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000 @@ -276222,17 +276224,17 @@ CVE-2025-0230,0,0,da56c380fbd78e0c1f33c2e3a59c91c27f8ad01a46dc235a12db28093892ee CVE-2025-0231,0,0,73ba5b334ad5db7bd7f18e0277fa8cbe48a99916bc557dd1170e5fb52d78d868,2025-01-05T22:15:05.540000 CVE-2025-0232,0,0,bbb1f8dd03cca1cfde501a9cda5da15f541da213c05bfee0e291ed634d921d4c,2025-01-05T22:15:05.767000 CVE-2025-0233,0,0,5ed4a33582b9d256ec10fa7176aad6ab5c25b941c467fc43ba8899ab1d384b8a,2025-01-05T23:15:07.320000 -CVE-2025-0237,0,0,1becb30a5153a9f87c8dcd95591b69c5bf659833bca9d5c3abd04888a3e6e760,2025-01-08T16:15:37.330000 -CVE-2025-0238,0,0,50894038de77fb1ebf563c119d1e1fdce0d46105147c4aa7d615e648cd7db1d9,2025-01-08T17:15:16.070000 -CVE-2025-0239,0,0,dd98627a0fe231acbc4f67019979adafca5d0e8310c70ed72dddf97631304169,2025-01-08T17:15:16.240000 -CVE-2025-0240,0,0,3f146513e767102a40a759d24479305835c1d0f3abffd18a5a4fd7d8c408f270,2025-01-08T17:15:16.403000 -CVE-2025-0241,0,0,de4460d398e9a978698b951541d871507b0033d391ba8312f623449de07c64a9,2025-01-07T16:15:38.767000 -CVE-2025-0242,0,0,436b4010a0353e73e425adf71340fd210221fcb70ce54fa0e4ed498b8e2738c6,2025-01-08T17:15:16.563000 -CVE-2025-0243,0,0,3385f5f4417e520856a6aa95edf9231cc97628ab73cc02078d726b2e70d59e2e,2025-01-08T17:15:16.723000 +CVE-2025-0237,0,1,0b751bd6b34602b7f4016b4315ae89eb52ba9b85f7e29c77deaa4b8d978ed818,2025-01-09T09:15:08.027000 +CVE-2025-0238,0,1,d61e0c1ab93e15f75affeb2cd81f13435188b17e117fb24770ef3eba2003f283,2025-01-09T09:15:08.197000 +CVE-2025-0239,0,1,0f263f44b2da53877b60ef1934370203b8addac1a331dc64a04a2eff62174b0b,2025-01-09T09:15:08.357000 +CVE-2025-0240,0,1,c69bbfd2c6326ce3090e62e372d341b68729615a4388aff2a4b92f2c232fb7c1,2025-01-09T09:15:08.513000 +CVE-2025-0241,0,1,4c166f86574c263a185a4c3fecf418950105464db70810e33e44575c571c3963,2025-01-09T09:15:08.667000 +CVE-2025-0242,0,1,6e3ffe62eab5a260ad145f0774aa93a7590007f7e30a1b6b7fd39c7d565b3e01,2025-01-09T09:15:08.763000 +CVE-2025-0243,0,1,117a57037c84082e44064bbeb1055284d87eb96171b291191011e49dd59c7343,2025-01-09T09:15:08.917000 CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0ee,2025-01-08T16:15:37.520000 CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000 CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000 -CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000 +CVE-2025-0247,0,1,a4d940faacbcfb08843111a764fa700e1f1d7273a90fabf2269ce1d35477b80f,2025-01-09T09:15:09.067000 CVE-2025-0282,0,0,d61ebd3c832aef5272fa20364c759f17a80fd9cb0737dd97040687ac5893e46b,2025-01-09T02:00:01.633000 CVE-2025-0283,0,0,573fcb41d2dcbb5f422c0804f1f8b289f75a27c245f0e6d9cb198c03e2e8d415,2025-01-08T23:15:09.920000 CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000 @@ -276250,13 +276252,17 @@ CVE-2025-0331,0,0,9958f914d08798c9884ab9acadc5485c8bf3fa51831a1e1c33c7f651b24075 CVE-2025-0333,0,0,a8ab0819172da3f9274aae888663ae5efdae6b85957b7e6ef6d1d8934c8d1070,2025-01-09T05:15:08.453000 CVE-2025-0334,0,0,d7673bbf36f717e1769977669c1cac432662eda5ad40e6c872bcf27cf1dda6d8,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,d042e6fe1c6117fe3f290f44401326a621378ac168f8b7424ff902d7e887bcca,2025-01-09T06:15:15.850000 -CVE-2025-0336,1,1,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000 -CVE-2025-0339,1,1,448e19bb7bc365a2bf292fe61f3c734706db43a29b1ebde295ceec420afcd48b,2025-01-09T07:15:28.080000 -CVE-2025-0340,1,1,4f2990fc81137574b4912409b11904dee7e92cbd62c572bffa83a92d2b3d6728,2025-01-09T07:15:28.260000 -CVE-2025-0341,1,1,90d8993fb7474a58be910ed5ed3a12242101d69a099db0025c917dff8fc0565c,2025-01-09T08:15:30.060000 -CVE-2025-0342,1,1,6d3bd167a05490c5aa5dbc9a6d3538c596245238d57a65fa83ecac443971921f,2025-01-09T08:15:30.310000 -CVE-2025-0344,1,1,1715f04fd5095fb83a5a82a19a8fdfb8ee1ceb83adeb19a18037c35e0449a30c,2025-01-09T08:15:30.517000 -CVE-2025-20033,1,1,6018e09e60bc36da724018ac20bc63bc1922bb37746fdb9e10624cea7c137ebf,2025-01-09T07:15:28.450000 +CVE-2025-0336,0,0,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000 +CVE-2025-0339,0,0,448e19bb7bc365a2bf292fe61f3c734706db43a29b1ebde295ceec420afcd48b,2025-01-09T07:15:28.080000 +CVE-2025-0340,0,0,4f2990fc81137574b4912409b11904dee7e92cbd62c572bffa83a92d2b3d6728,2025-01-09T07:15:28.260000 +CVE-2025-0341,0,0,90d8993fb7474a58be910ed5ed3a12242101d69a099db0025c917dff8fc0565c,2025-01-09T08:15:30.060000 +CVE-2025-0342,0,0,6d3bd167a05490c5aa5dbc9a6d3538c596245238d57a65fa83ecac443971921f,2025-01-09T08:15:30.310000 +CVE-2025-0344,0,0,1715f04fd5095fb83a5a82a19a8fdfb8ee1ceb83adeb19a18037c35e0449a30c,2025-01-09T08:15:30.517000 +CVE-2025-0345,1,1,3f56e569c8daf7b06b0796fdfa20438b20d7fd91be6d3db3cb0cfe5e1b99fe14,2025-01-09T09:15:09.220000 +CVE-2025-0346,1,1,5ef713c51f5d66e23ba323fef83a836926d709bf8afa5794ad9246d5b98392a7,2025-01-09T09:15:09.393000 +CVE-2025-0347,1,1,6deecfeab5129f64e2a00007dc87253c44d21860263f71f54e4dc7b1cdd350f5,2025-01-09T10:15:07.170000 +CVE-2025-0348,1,1,331eb1ff4b382b4fa4cded2d4eff33d4e1224a2775f1380fa27191f50e86e003,2025-01-09T10:15:07.700000 +CVE-2025-20033,0,0,6018e09e60bc36da724018ac20bc63bc1922bb37746fdb9e10624cea7c137ebf,2025-01-09T07:15:28.450000 CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000 CVE-2025-20126,0,0,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000 CVE-2025-20166,0,0,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000 @@ -276356,8 +276362,8 @@ CVE-2025-22388,0,0,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d CVE-2025-22389,0,0,50d6eaab20c8259cde700c821ce2570def076c6cb2eb277d3379fa3f59f6550e,2025-01-04T03:15:07.580000 CVE-2025-22390,0,0,36805a833480d9f50dee34ab32e5ed9b2707017fd5287eb5a8abd68b1059bfbf,2025-01-06T17:15:48.170000 CVE-2025-22395,0,0,ac5db0ebc696fbb0c57e43b4ad48f0832ef7eb798546a738d8afe72cc61eda1e,2025-01-07T03:15:06.047000 -CVE-2025-22445,1,1,892a817c9171cfb6ff1f1eb222a873d1fada74594dfce5a6314b9a0b173fbc06,2025-01-09T07:15:28.617000 -CVE-2025-22449,1,1,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd0ee,2025-01-09T07:15:28.777000 +CVE-2025-22445,0,0,892a817c9171cfb6ff1f1eb222a873d1fada74594dfce5a6314b9a0b173fbc06,2025-01-09T07:15:28.617000 +CVE-2025-22449,0,0,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd0ee,2025-01-09T07:15:28.777000 CVE-2025-22500,0,0,8aa8d02f24b4f8f19adb445be3e34cd476c909361320155120249ca356361cc0,2025-01-07T17:15:33.657000 CVE-2025-22502,0,0,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000 CVE-2025-22503,0,0,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000