From f5c9d355a30e6c5dd820a7ecbe39277e6531bd26 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 4 Feb 2025 17:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-02-04T17:00:32.909910+00:00 --- CVE-2015/CVE-2015-20xx/CVE-2015-2051.json | 9 +- CVE-2017/CVE-2017-01xx/CVE-2017-0146.json | 22 +- CVE-2017/CVE-2017-66xx/CVE-2017-6627.json | 24 +- CVE-2017/CVE-2017-66xx/CVE-2017-6663.json | 24 +- CVE-2017/CVE-2017-68xx/CVE-2017-6884.json | 22 +- CVE-2018/CVE-2018-105xx/CVE-2018-10562.json | 34 +- CVE-2018/CVE-2018-159xx/CVE-2018-15961.json | 34 +- CVE-2018/CVE-2018-194xx/CVE-2018-19410.json | 24 +- CVE-2018/CVE-2018-49xx/CVE-2018-4939.json | 34 +- CVE-2018/CVE-2018-85xx/CVE-2018-8581.json | 22 +- CVE-2018/CVE-2018-92xx/CVE-2018-9276.json | 32 +- CVE-2019/CVE-2019-05xx/CVE-2019-0543.json | 12 +- CVE-2019/CVE-2019-13xx/CVE-2019-1322.json | 22 +- CVE-2020/CVE-2020-07xx/CVE-2020-0796.json | 32 +- CVE-2020/CVE-2020-159xx/CVE-2020-15999.json | 18 +- CVE-2020/CVE-2020-40xx/CVE-2020-4006.json | 32 +- CVE-2020/CVE-2020-65xx/CVE-2020-6572.json | 12 +- CVE-2021/CVE-2021-200xx/CVE-2021-20028.json | 22 +- CVE-2021/CVE-2021-200xx/CVE-2021-20038.json | 34 +- CVE-2021/CVE-2021-219xx/CVE-2021-21972.json | 32 +- CVE-2021/CVE-2021-228xx/CVE-2021-22894.json | 22 +- CVE-2021/CVE-2021-229xx/CVE-2021-22941.json | 22 +- CVE-2021/CVE-2021-260xx/CVE-2021-26084.json | 32 +- CVE-2021/CVE-2021-305xx/CVE-2021-30551.json | 4 +- CVE-2021/CVE-2021-305xx/CVE-2021-30554.json | 4 +- CVE-2021/CVE-2021-344xx/CVE-2021-34473.json | 12 +- CVE-2021/CVE-2021-344xx/CVE-2021-34486.json | 12 +- CVE-2021/CVE-2021-404xx/CVE-2021-40444.json | 12 +- CVE-2021/CVE-2021-417xx/CVE-2021-41773.json | 22 +- CVE-2021/CVE-2021-420xx/CVE-2021-42013.json | 22 +- CVE-2021/CVE-2021-442xx/CVE-2021-44228.json | 108 ++++- CVE-2022/CVE-2022-220xx/CVE-2022-22071.json | 12 +- CVE-2022/CVE-2022-229xx/CVE-2022-22954.json | 32 +- CVE-2022/CVE-2022-245xx/CVE-2022-24521.json | 12 +- CVE-2022/CVE-2022-261xx/CVE-2022-26134.json | 32 +- CVE-2022/CVE-2022-338xx/CVE-2022-33891.json | 32 +- CVE-2022/CVE-2022-410xx/CVE-2022-41073.json | 14 +- CVE-2022/CVE-2022-411xx/CVE-2022-41125.json | 14 +- CVE-2023/CVE-2023-06xx/CVE-2023-0669.json | 32 +- CVE-2023/CVE-2023-14xx/CVE-2023-1414.json | 22 +- CVE-2023/CVE-2023-22xx/CVE-2023-2257.json | 32 +- CVE-2023/CVE-2023-22xx/CVE-2023-2282.json | 22 +- CVE-2023/CVE-2023-248xx/CVE-2023-24880.json | 14 +- CVE-2023/CVE-2023-253xx/CVE-2023-25348.json | 32 +- CVE-2023/CVE-2023-260xx/CVE-2023-26057.json | 12 +- CVE-2023/CVE-2023-260xx/CVE-2023-26058.json | 12 +- CVE-2023/CVE-2023-260xx/CVE-2023-26098.json | 12 +- CVE-2023/CVE-2023-265xx/CVE-2023-26560.json | 32 +- CVE-2023/CVE-2023-267xx/CVE-2023-26735.json | 39 +- CVE-2023/CVE-2023-268xx/CVE-2023-26839.json | 32 +- CVE-2023/CVE-2023-268xx/CVE-2023-26843.json | 32 +- CVE-2023/CVE-2023-298xx/CVE-2023-29849.json | 32 +- CVE-2023/CVE-2023-34xx/CVE-2023-3454.json | 73 +++- CVE-2023/CVE-2023-42xx/CVE-2023-4211.json | 24 +- CVE-2023/CVE-2023-498xx/CVE-2023-49831.json | 47 ++- CVE-2023/CVE-2023-59xx/CVE-2023-5973.json | 73 +++- CVE-2024/CVE-2024-104xx/CVE-2024-10403.json | 66 ++- CVE-2024/CVE-2024-110xx/CVE-2024-11036.json | 67 ++- CVE-2024/CVE-2024-112xx/CVE-2024-11291.json | 32 +- CVE-2024/CVE-2024-125xx/CVE-2024-12539.json | 60 ++- CVE-2024/CVE-2024-134xx/CVE-2024-13457.json | 44 +- CVE-2024/CVE-2024-136xx/CVE-2024-13642.json | 54 ++- CVE-2024/CVE-2024-17xx/CVE-2024-1760.json | 84 +++- CVE-2024/CVE-2024-17xx/CVE-2024-1767.json | 74 +++- CVE-2024/CVE-2024-224xx/CVE-2024-22461.json | 63 ++- CVE-2024/CVE-2024-234xx/CVE-2024-23444.json | 65 ++- CVE-2024/CVE-2024-234xx/CVE-2024-23449.json | 63 ++- CVE-2024/CVE-2024-234xx/CVE-2024-23451.json | 63 ++- CVE-2024/CVE-2024-236xx/CVE-2024-23690.json | 63 +++ CVE-2024/CVE-2024-249xx/CVE-2024-24902.json | 63 ++- CVE-2024/CVE-2024-261xx/CVE-2024-26133.json | 134 +++++- CVE-2024/CVE-2024-289xx/CVE-2024-28980.json | 51 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29950.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29951.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29952.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29953.json | 75 +++- CVE-2024/CVE-2024-299xx/CVE-2024-29955.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29956.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29957.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29958.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29959.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29960.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29961.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29962.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29963.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29964.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29965.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29966.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29967.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29968.json | 62 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29969.json | 65 ++- CVE-2024/CVE-2024-301xx/CVE-2024-30186.json | 52 ++- CVE-2024/CVE-2024-326xx/CVE-2024-32681.json | 52 ++- CVE-2024/CVE-2024-326xx/CVE-2024-32682.json | 52 ++- CVE-2024/CVE-2024-327xx/CVE-2024-32772.json | 52 ++- CVE-2024/CVE-2024-328xx/CVE-2024-32808.json | 52 ++- CVE-2024/CVE-2024-348xx/CVE-2024-34896.json | 31 +- CVE-2024/CVE-2024-348xx/CVE-2024-34897.json | 43 +- CVE-2024/CVE-2024-37xx/CVE-2024-3747.json | 74 +++- CVE-2024/CVE-2024-382xx/CVE-2024-38296.json | 99 ++++- CVE-2024/CVE-2024-384xx/CVE-2024-38485.json | 47 ++- CVE-2024/CVE-2024-384xx/CVE-2024-38488.json | 51 ++- CVE-2024/CVE-2024-433xx/CVE-2024-43317.json | 47 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4333.json | 94 ++++- CVE-2024/CVE-2024-43xx/CVE-2024-4373.json | 74 +++- CVE-2024/CVE-2024-444xx/CVE-2024-44449.json | 43 +- CVE-2024/CVE-2024-472xx/CVE-2024-47238.json | 267 +++++++++++- CVE-2024/CVE-2024-472xx/CVE-2024-47239.json | 81 +++- CVE-2024/CVE-2024-474xx/CVE-2024-47480.json | 59 ++- CVE-2024/CVE-2024-474xx/CVE-2024-47484.json | 88 +++- CVE-2024/CVE-2024-479xx/CVE-2024-47977.json | 88 +++- CVE-2024/CVE-2024-479xx/CVE-2024-47984.json | 63 ++- CVE-2024/CVE-2024-480xx/CVE-2024-48007.json | 63 ++- CVE-2024/CVE-2024-480xx/CVE-2024-48008.json | 63 ++- CVE-2024/CVE-2024-496xx/CVE-2024-49600.json | 59 ++- CVE-2024/CVE-2024-506xx/CVE-2024-50656.json | 45 +- CVE-2024/CVE-2024-509xx/CVE-2024-50967.json | 39 +- CVE-2024/CVE-2024-514xx/CVE-2024-51417.json | 39 +- CVE-2024/CVE-2024-525xx/CVE-2024-52537.json | 271 +++++++++++- CVE-2024/CVE-2024-525xx/CVE-2024-52538.json | 88 +++- CVE-2024/CVE-2024-525xx/CVE-2024-52542.json | 60 ++- CVE-2024/CVE-2024-52xx/CVE-2024-5260.json | 104 ++++- CVE-2024/CVE-2024-532xx/CVE-2024-53289.json | 46 +- CVE-2024/CVE-2024-532xx/CVE-2024-53290.json | 46 +- CVE-2024/CVE-2024-532xx/CVE-2024-53292.json | 59 ++- CVE-2024/CVE-2024-54xx/CVE-2024-5460.json | 62 ++- CVE-2024/CVE-2024-554xx/CVE-2024-55456.json | 33 +- CVE-2024/CVE-2024-555xx/CVE-2024-55504.json | 39 +- CVE-2024/CVE-2024-568xx/CVE-2024-56898.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56901.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56902.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56903.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56921.json | 45 +- CVE-2024/CVE-2024-569xx/CVE-2024-56990.json | 39 +- CVE-2024/CVE-2024-570xx/CVE-2024-57036.json | 39 +- CVE-2024/CVE-2024-570xx/CVE-2024-57098.json | 45 +- CVE-2024/CVE-2024-570xx/CVE-2024-57099.json | 45 +- CVE-2024/CVE-2024-574xx/CVE-2024-57450.json | 45 +- CVE-2024/CVE-2024-574xx/CVE-2024-57451.json | 43 +- CVE-2024/CVE-2024-575xx/CVE-2024-57538.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57539.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57540.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57583.json | 34 +- CVE-2024/CVE-2024-576xx/CVE-2024-57669.json | 45 +- CVE-2024/CVE-2024-577xx/CVE-2024-57703.json | 39 +- CVE-2024/CVE-2024-577xx/CVE-2024-57785.json | 39 +- CVE-2024/CVE-2024-75xx/CVE-2024-7516.json | 59 ++- CVE-2024/CVE-2024-96xx/CVE-2024-9643.json | 68 +++ CVE-2024/CVE-2024-96xx/CVE-2024-9644.json | 60 +++ CVE-2025/CVE-2025-08xx/CVE-2025-0825.json | 78 ++++ CVE-2025/CVE-2025-08xx/CVE-2025-0844.json | 79 +++- CVE-2025/CVE-2025-08xx/CVE-2025-0846.json | 83 +++- CVE-2025/CVE-2025-08xx/CVE-2025-0847.json | 85 +++- CVE-2025/CVE-2025-08xx/CVE-2025-0849.json | 83 +++- CVE-2025/CVE-2025-206xx/CVE-2025-20639.json | 297 ++++++++++++- CVE-2025/CVE-2025-206xx/CVE-2025-20640.json | 297 ++++++++++++- CVE-2025/CVE-2025-206xx/CVE-2025-20641.json | 297 ++++++++++++- CVE-2025/CVE-2025-206xx/CVE-2025-20642.json | 297 ++++++++++++- CVE-2025/CVE-2025-206xx/CVE-2025-20643.json | 297 ++++++++++++- CVE-2025/CVE-2025-211xx/CVE-2025-21101.json | 47 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21526.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21527.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21528.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21553.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21554.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21555.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21556.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21558.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21559.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21561.json | 16 +- CVE-2025/CVE-2025-215xx/CVE-2025-21562.json | 16 +- CVE-2025/CVE-2025-216xx/CVE-2025-21669.json | 150 ++++++- CVE-2025/CVE-2025-216xx/CVE-2025-21670.json | 121 +++++- CVE-2025/CVE-2025-216xx/CVE-2025-21671.json | 98 ++++- CVE-2025/CVE-2025-216xx/CVE-2025-21673.json | 128 +++++- CVE-2025/CVE-2025-216xx/CVE-2025-21674.json | 121 +++++- CVE-2025/CVE-2025-216xx/CVE-2025-21675.json | 133 +++++- CVE-2025/CVE-2025-216xx/CVE-2025-21676.json | 121 +++++- CVE-2025/CVE-2025-216xx/CVE-2025-21680.json | 145 ++++++- CVE-2025/CVE-2025-216xx/CVE-2025-21682.json | 109 ++++- CVE-2025/CVE-2025-222xx/CVE-2025-22206.json | 33 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22394.json | 47 ++- CVE-2025/CVE-2025-223xx/CVE-2025-22395.json | 59 ++- CVE-2025/CVE-2025-226xx/CVE-2025-22641.json | 56 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22642.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22643.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22653.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22662.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22664.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22674.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22675.json | 86 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22696.json | 56 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22697.json | 56 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22699.json | 86 ++++ CVE-2025/CVE-2025-227xx/CVE-2025-22700.json | 56 +++ CVE-2025/CVE-2025-227xx/CVE-2025-22730.json | 86 ++++ CVE-2025/CVE-2025-227xx/CVE-2025-22794.json | 86 ++++ CVE-2025/CVE-2025-229xx/CVE-2025-22918.json | 43 +- CVE-2025/CVE-2025-229xx/CVE-2025-22978.json | 45 +- CVE-2025/CVE-2025-236xx/CVE-2025-23645.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24598.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24599.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24602.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24648.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24677.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24686.json | 51 ++- CVE-2025/CVE-2025-250xx/CVE-2025-25064.json | 45 +- CVE-2025/CVE-2025-250xx/CVE-2025-25065.json | 45 +- CVE-2025/CVE-2025-251xx/CVE-2025-25181.json | 38 +- README.md | 84 ++-- _state.csv | 441 +++++++++++--------- 211 files changed, 12047 insertions(+), 836 deletions(-) create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23690.json create mode 100644 CVE-2024/CVE-2024-96xx/CVE-2024-9643.json create mode 100644 CVE-2024/CVE-2024-96xx/CVE-2024-9644.json create mode 100644 CVE-2025/CVE-2025-08xx/CVE-2025-0825.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22206.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22641.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22642.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22643.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22653.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22662.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22664.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22674.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22675.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22696.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22697.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22699.json create mode 100644 CVE-2025/CVE-2025-227xx/CVE-2025-22700.json create mode 100644 CVE-2025/CVE-2025-227xx/CVE-2025-22730.json create mode 100644 CVE-2025/CVE-2025-227xx/CVE-2025-22794.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23645.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24598.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24599.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24602.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24648.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24677.json diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json index c2f7b97a62c..21de2bad85f 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2051", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:08.320", - "lastModified": "2025-01-06T15:15:08.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:40:56.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -169,7 +169,10 @@ }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/37171/", diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json index eb3e69509b3..68dd72bd1ae 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json @@ -2,7 +2,7 @@ "id": "CVE-2017-0146", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:04.070", - "lastModified": "2024-11-21T03:02:25.847", + "lastModified": "2025-02-04T15:15:09.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json index 9b4df69a2b6..a0a3ef5ba4a 100644 --- a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json +++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6627", "sourceIdentifier": "psirt@cisco.com", "published": "2017-09-07T21:29:00.660", - "lastModified": "2025-01-27T19:38:29.867", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T16:15:29.117", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json index 8d964096dfe..5d887528983 100644 --- a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json +++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6663", "sourceIdentifier": "psirt@cisco.com", "published": "2017-08-07T06:29:00.230", - "lastModified": "2025-01-27T20:19:13.787", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T16:15:30.210", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json index 29ca7928f66..1cf1c22133b 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json @@ -2,7 +2,7 @@ "id": "CVE-2017-6884", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-06T17:59:00.163", - "lastModified": "2025-02-03T17:15:11.053", + "lastModified": "2025-02-04T16:15:30.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json index 90d6383f818..a03d6accc00 100644 --- a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json +++ b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json @@ -2,8 +2,8 @@ "id": "CVE-2018-10562", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T03:29:00.287", - "lastModified": "2025-01-23T17:23:16.207", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T15:15:10.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json b/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json index f82bbb22731..803ad81d758 100644 --- a/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json +++ b/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json @@ -2,8 +2,8 @@ "id": "CVE-2018-15961", "sourceIdentifier": "psirt@adobe.com", "published": "2018-09-25T13:29:01.567", - "lastModified": "2025-01-23T17:53:22.733", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T16:15:30.740", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json b/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json index 1a2a7e1ba4f..0c8df50a1a2 100644 --- a/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json +++ b/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json @@ -2,7 +2,7 @@ "id": "CVE-2018-19410", "sourceIdentifier": "cve@mitre.org", "published": "2018-11-21T16:29:00.347", - "lastModified": "2024-11-21T03:57:52.247", + "lastModified": "2025-02-04T16:15:30.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json index 103b6283a19..7a582e18c24 100644 --- a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json +++ b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4939", "sourceIdentifier": "psirt@adobe.com", "published": "2018-05-19T17:29:01.480", - "lastModified": "2025-01-23T15:36:22.337", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T16:15:31.183", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json index 9624ab1ad74..1b59d09702a 100644 --- a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json +++ b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8581", "sourceIdentifier": "secure@microsoft.com", "published": "2018-11-14T01:29:01.927", - "lastModified": "2024-11-21T04:14:04.793", + "lastModified": "2025-02-04T16:15:31.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ], "cvssMetricV2": [ diff --git a/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json b/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json index bf7b8bec6ea..0ba9b7412f7 100644 --- a/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json +++ b/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9276", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-02T16:29:00.600", - "lastModified": "2024-11-21T04:15:16.670", + "lastModified": "2025-02-04T16:15:31.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json index 355635adea7..834e00b4ba0 100644 --- a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json +++ b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json @@ -2,7 +2,7 @@ "id": "CVE-2019-0543", "sourceIdentifier": "secure@microsoft.com", "published": "2019-01-08T21:29:00.517", - "lastModified": "2024-11-21T04:16:49.550", + "lastModified": "2025-02-04T16:15:31.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -78,6 +78,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json index 5f6931b2cae..37da7370763 100644 --- a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json +++ b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1322", "sourceIdentifier": "secure@microsoft.com", "published": "2019-10-10T14:15:16.190", - "lastModified": "2024-11-21T04:36:28.590", + "lastModified": "2025-02-04T16:15:31.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json index 71129d0b7e0..2ac4ee7c8a6 100644 --- a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json +++ b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json @@ -2,7 +2,7 @@ "id": "CVE-2020-0796", "sourceIdentifier": "secure@microsoft.com", "published": "2020-03-12T16:15:15.627", - "lastModified": "2024-11-21T04:54:13.983", + "lastModified": "2025-02-04T16:15:32.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json index 72e49cbd885..98c2fa13096 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15999", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2020-11-03T03:15:14.853", - "lastModified": "2025-02-03T15:15:11.433", + "lastModified": "2025-02-04T15:15:10.580", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -105,7 +105,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-120" } ] } diff --git a/CVE-2020/CVE-2020-40xx/CVE-2020-4006.json b/CVE-2020/CVE-2020-40xx/CVE-2020-4006.json index 8e58cf5c542..022f4e14422 100644 --- a/CVE-2020/CVE-2020-40xx/CVE-2020-4006.json +++ b/CVE-2020/CVE-2020-40xx/CVE-2020-4006.json @@ -2,7 +2,7 @@ "id": "CVE-2020-4006", "sourceIdentifier": "security@vmware.com", "published": "2020-11-23T22:15:12.663", - "lastModified": "2024-11-21T05:32:09.153", + "lastModified": "2025-02-04T16:15:32.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-65xx/CVE-2020-6572.json b/CVE-2020/CVE-2020-65xx/CVE-2020-6572.json index 84e90c07615..09c7453fea6 100644 --- a/CVE-2020/CVE-2020-65xx/CVE-2020-6572.json +++ b/CVE-2020/CVE-2020-65xx/CVE-2020-6572.json @@ -2,7 +2,7 @@ "id": "CVE-2020-6572", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-01-14T21:15:13.693", - "lastModified": "2025-02-03T15:15:12.520", + "lastModified": "2025-02-04T15:15:10.900", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -98,16 +98,6 @@ "value": "CWE-416" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-416" - } - ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20028.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20028.json index 0d6a1605ce9..5d8e3ee77cf 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20028.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20028.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20028", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-08-04T19:15:08.247", - "lastModified": "2024-11-21T05:45:48.813", + "lastModified": "2025-02-04T15:15:11.157", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json index d8a63eb39e0..4864abc150d 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20038.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20038", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-12-08T10:15:07.750", - "lastModified": "2024-11-21T05:45:49.880", + "lastModified": "2025-02-04T15:15:11.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -71,7 +91,7 @@ "weaknesses": [ { "source": "PSIRT@sonicwall.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -81,6 +101,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2021/CVE-2021-219xx/CVE-2021-21972.json b/CVE-2021/CVE-2021-219xx/CVE-2021-21972.json index cbc05fec3d1..7d22d7a73d1 100644 --- a/CVE-2021/CVE-2021-219xx/CVE-2021-21972.json +++ b/CVE-2021/CVE-2021-219xx/CVE-2021-21972.json @@ -2,7 +2,7 @@ "id": "CVE-2021-21972", "sourceIdentifier": "security@vmware.com", "published": "2021-02-24T17:15:15.833", - "lastModified": "2024-11-21T05:49:20.893", + "lastModified": "2025-02-04T16:15:32.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-228xx/CVE-2021-22894.json b/CVE-2021/CVE-2021-228xx/CVE-2021-22894.json index 6460608bd87..d67c81db81d 100644 --- a/CVE-2021/CVE-2021-228xx/CVE-2021-22894.json +++ b/CVE-2021/CVE-2021-228xx/CVE-2021-22894.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22894", "sourceIdentifier": "support@hackerone.com", "published": "2021-05-27T12:15:07.923", - "lastModified": "2024-11-21T05:50:51.567", + "lastModified": "2025-02-04T16:15:32.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-229xx/CVE-2021-22941.json b/CVE-2021/CVE-2021-229xx/CVE-2021-22941.json index eaf5a5152b1..d120cc6e86f 100644 --- a/CVE-2021/CVE-2021-229xx/CVE-2021-22941.json +++ b/CVE-2021/CVE-2021-229xx/CVE-2021-22941.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22941", "sourceIdentifier": "support@hackerone.com", "published": "2021-09-23T13:15:08.620", - "lastModified": "2024-11-21T05:50:58.987", + "lastModified": "2025-02-04T15:15:11.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26084.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26084.json index 4d402e99f22..0c67174eaee 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26084.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26084.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26084", "sourceIdentifier": "security@atlassian.com", "published": "2021-08-30T07:15:06.587", - "lastModified": "2024-11-21T05:55:50.450", + "lastModified": "2025-02-04T15:15:12.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-917" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-917" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30551.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30551.json index e8de41ef9db..e2201f73123 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30551.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30551.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30551", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-06-15T22:15:09.067", - "lastModified": "2025-01-29T17:15:13.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:44:35.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json index 5ddb610ff26..04d8b311f2f 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30554", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-07-02T19:15:07.893", - "lastModified": "2025-02-03T14:15:31.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:43:43.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json index f753e40eebd..98477534b5b 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34473", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:11.163", - "lastModified": "2024-11-21T06:10:29.203", + "lastModified": "2025-02-04T16:15:33.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json index 71dc57cad5c..1826a408636 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34486", "sourceIdentifier": "secure@microsoft.com", "published": "2021-08-12T18:15:09.190", - "lastModified": "2024-11-21T06:10:30.910", + "lastModified": "2025-02-04T16:15:33.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json index 5d67581af2f..bf9dcb81760 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40444", "sourceIdentifier": "secure@microsoft.com", "published": "2021-09-15T12:15:16.467", - "lastModified": "2024-11-21T06:24:07.883", + "lastModified": "2025-02-04T15:15:12.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-417xx/CVE-2021-41773.json b/CVE-2021/CVE-2021-417xx/CVE-2021-41773.json index 3305aff59d2..2f77a058511 100644 --- a/CVE-2021/CVE-2021-417xx/CVE-2021-41773.json +++ b/CVE-2021/CVE-2021-417xx/CVE-2021-41773.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41773", "sourceIdentifier": "security@apache.org", "published": "2021-10-05T09:15:07.593", - "lastModified": "2024-11-21T06:26:44.420", + "lastModified": "2025-02-04T15:15:13.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42013.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42013.json index bc4431df3e1..572b554b76b 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42013.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42013.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42013", "sourceIdentifier": "security@apache.org", "published": "2021-10-07T16:15:09.270", - "lastModified": "2024-11-21T06:27:04.317", + "lastModified": "2025-02-04T15:15:13.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json b/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json index 0c1f2d4b4e6..57ce1292bf1 100644 --- a/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json +++ b/CVE-2021/CVE-2021-442xx/CVE-2021-44228.json @@ -2,7 +2,7 @@ "id": "CVE-2021-44228", "sourceIdentifier": "security@apache.org", "published": "2021-12-10T10:15:09.143", - "lastModified": "2024-11-21T06:30:38.047", + "lastModified": "2025-02-04T15:15:13.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -71,7 +91,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -2716,6 +2736,48 @@ "Third Party Advisory" ] }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "https://twitter.com/kurtseifried/status/1469345530182455296", "source": "security@apache.org", @@ -3137,6 +3199,48 @@ "Third Party Advisory" ] }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "https://twitter.com/kurtseifried/status/1469345530182455296", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22071.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22071.json index 2c959e4c877..2cc42c7fdc9 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22071.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22071.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22071", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-06-14T10:15:19.003", - "lastModified": "2024-11-21T06:46:03.520", + "lastModified": "2025-02-04T15:15:14.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22954.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22954.json index f3d4415a360..d1386b79c78 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22954.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22954.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22954", "sourceIdentifier": "security@vmware.com", "published": "2022-04-11T20:15:19.890", - "lastModified": "2024-11-21T06:47:40.637", + "lastModified": "2025-02-04T15:15:14.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json index 150501900e8..9586a35e60b 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24521", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:11.107", - "lastModified": "2024-11-21T06:50:35.670", + "lastModified": "2025-02-04T15:15:15.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -78,6 +78,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json index 12620ef3235..0cb6908bbb8 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26134", "sourceIdentifier": "security@atlassian.com", "published": "2022-06-03T22:15:07.717", - "lastModified": "2024-11-21T06:53:29.950", + "lastModified": "2025-02-04T15:15:15.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-917" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-917" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json b/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json index 7be3c81cb16..0ed71026d6a 100644 --- a/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json +++ b/CVE-2022/CVE-2022-338xx/CVE-2022-33891.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33891", "sourceIdentifier": "security@apache.org", "published": "2022-07-18T07:15:07.600", - "lastModified": "2024-11-21T07:08:32.510", + "lastModified": "2025-02-04T15:15:15.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -63,6 +83,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json index 807c92366ef..8c318088be0 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41073", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:21.207", - "lastModified": "2025-01-02T22:15:22.443", + "lastModified": "2025-02-04T15:15:16.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -53,6 +53,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json index 3480acc8cda..943490d1528 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41125", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:25.307", - "lastModified": "2024-11-21T07:22:40.080", + "lastModified": "2025-02-04T16:15:34.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -53,6 +53,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json index ba95dd2e0ee..b99289f6060 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0669", "sourceIdentifier": "cve@rapid7.com", "published": "2023-02-06T20:15:14.300", - "lastModified": "2024-11-21T07:37:35.710", + "lastModified": "2025-02-04T15:15:16.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1414.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1414.json index 5495153ae73..6a5587be856 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1414.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1414.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1414", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-24T19:15:09.410", - "lastModified": "2024-11-21T07:39:08.613", + "lastModified": "2025-02-04T16:15:34.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2257.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2257.json index 0aa5356d102..37113d3d1e3 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2257.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2257.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2257", "sourceIdentifier": "security@devolutions.net", "published": "2023-04-24T19:15:09.820", - "lastModified": "2024-11-21T07:58:15.187", + "lastModified": "2025-02-04T16:15:36.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2282.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2282.json index bec5a3b5e42..3032cfcb7b5 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2282.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2282.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2282", "sourceIdentifier": "security@devolutions.net", "published": "2023-04-25T19:15:11.100", - "lastModified": "2024-11-21T07:58:18.240", + "lastModified": "2025-02-04T15:15:17.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json index 0ac7842737b..3e199fd1402 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24880", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:17.683", - "lastModified": "2024-11-21T07:48:42.067", + "lastModified": "2025-02-04T15:15:16.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", @@ -69,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25348.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25348.json index 7add4a0860f..bc6cd7e86e0 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25348.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25348.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25348", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T13:15:09.800", - "lastModified": "2024-11-21T07:49:25.803", + "lastModified": "2025-02-04T16:15:34.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-1236" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26057.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26057.json index 96ebafac51d..bd46546601f 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26057.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26057", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T13:15:09.847", - "lastModified": "2024-11-21T07:50:40.580", + "lastModified": "2025-02-04T16:15:35.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26058.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26058.json index 03e8fdc88e2..0b8f70f5702 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26058.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26058.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26058", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T13:15:09.900", - "lastModified": "2024-11-21T07:50:40.727", + "lastModified": "2025-02-04T16:15:35.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26098.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26098.json index 3609596bbdd..5c4a05529d7 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26098.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26098.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26098", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T12:15:09.427", - "lastModified": "2024-11-21T07:50:46.180", + "lastModified": "2025-02-04T16:15:35.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26560.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26560.json index 8d33ad6ccf1..904be332bec 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26560.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26560.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26560", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T00:15:09.187", - "lastModified": "2024-11-21T07:51:45.070", + "lastModified": "2025-02-04T16:15:35.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26735.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26735.json index b752eb54de1..a1b349e790f 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26735.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26735.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26735", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T00:15:09.227", - "lastModified": "2024-11-21T07:51:53.550", + "lastModified": "2025-02-04T16:15:35.973", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ @@ -155,6 +185,13 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "https://github.com/prometheus/blackbox_exporter#tls-and-basic-authentication", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26839.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26839.json index 637995ccfff..f61cab91074 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26839.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26839.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26839", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T13:15:09.947", - "lastModified": "2024-11-21T07:51:59.153", + "lastModified": "2025-02-04T15:15:16.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26843.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26843.json index c87bc6dd944..76899970ff3 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26843.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26843.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26843", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T13:15:10.063", - "lastModified": "2024-11-21T07:51:59.693", + "lastModified": "2025-02-04T15:15:17.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29849.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29849.json index 4845a66f5ad..30c10f95ce6 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29849.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29849.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29849", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T15:15:08.853", - "lastModified": "2024-11-21T07:57:34.790", + "lastModified": "2025-02-04T16:15:36.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json index 1dbf2626c79..e87f49bb322 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3454", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-04T17:15:09.000", - "lastModified": "2024-11-21T08:17:18.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:29:56.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.1.1d1", + "matchCriteriaId": "2B028C8E-8910-4F2C-8029-CC8AAC644A15" + } + ] + } + ] } ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240628-0004/", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23215", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240628-0004/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23215", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json index 0bf67a8d5f3..23d85cb88b3 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4211", "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-01T18:15:09.927", - "lastModified": "2024-11-29T14:45:13.110", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T15:15:17.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json index d496cf4919a..bdc899d1497 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49831", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:36.463", - "lastModified": "2024-12-09T13:15:36.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:51:16.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.2.3.1", + "matchCriteriaId": "FEDA383C-C640-482E-9DF7-A92D90A8EAAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-5-2-3-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json index 558eb096ebf..d6736ac371c 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5973", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-05T03:15:07.770", - "lastModified": "2024-11-21T08:42:53.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:30:49.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-346" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.0", + "matchCriteriaId": "34B4DD91-794C-41EC-BA06-19BF0F91F188" + } + ] + } + ] } ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240628-0005/", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23214", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240628-0005/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23214", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json index 8dd058f4d2c..5a93a289f0c 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10403", "sourceIdentifier": "sirt@brocade.com", "published": "2024-11-21T11:15:16.533", - "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:28:04.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,50 @@ "value": "CWE-528" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.0c1", + "matchCriteriaId": "2327CB15-3F4E-4592-80CC-62BBC6FEBE6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.1", + "versionEndExcluding": "9.2.1a1", + "matchCriteriaId": "61A3FE2B-0DDF-4980-9B48-D8A33B9E3033" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25145", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json index 71f590fd06e..25994b7725c 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11036", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-19T11:15:04.343", - "lastModified": "2024-11-19T21:57:32.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:44:41.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.1.6", + "matchCriteriaId": "49CF7F0B-821E-4179-9722-884F94FDC76C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gamipress/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L693", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L702", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/gamipress/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bad0cd3f-88ea-4a1d-b400-0a450b07a546?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json index 0c944755032..913c01e2e08 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11291", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-18T12:15:08.710", - "lastModified": "2024-12-18T12:15:08.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:51:41.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.13.5", + "matchCriteriaId": "81E5DA49-96EC-42C7-BC92-9428992DAB49" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3206206/paid-member-subscriptions", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e207f1a3-2ca5-46d1-91a9-89652451266c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12539.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12539.json index fbcb70a849c..16acd63708c 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12539.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12539", "sourceIdentifier": "bressers@elastic.co", "published": "2024-12-17T21:15:07.183", - "lastModified": "2024-12-17T21:15:07.183", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:16:44.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.16.0", + "versionEndExcluding": "8.16.2", + "matchCriteriaId": "81728261-58C5-43A2-9A8B-D16C2C3E7E6D" + } + ] + } + ] } ], "references": [ { "url": "https://discuss.elastic.co/t/elasticsearch-8-16-2-8-17-0-security-update/372091", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13457.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13457.json index f798c46cf38..e53637347d0 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13457.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13457.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13457", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-30T07:15:07.067", - "lastModified": "2025-01-30T07:15:07.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:06:15.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liquidweb:event_tickets_and_registration:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.18.1.1", + "matchCriteriaId": "14510990-9A21-4AC1-905D-54187A8ACB11" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3229935%40event-tickets%2Ftags%2F5.18.1.1&old=3227011%40event-tickets%2Ftags%2F5.18.1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cc2261a-889e-40ec-8382-48de65b91b34?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13642.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13642.json index 1d05754bd83..d377a793e46 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13642.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13642", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-30T07:15:08.700", - "lastModified": "2025-01-30T07:15:08.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:00:49.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:motopress:stratum:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.0", + "matchCriteriaId": "9CE5CF0F-085B-4CDF-AE06-1C1A2E084734" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3228058#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ccaee26-277e-4730-8242-9b5e6a281fcc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1760.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1760.json index f73e40f068d..aef89dba433 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1760.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1760.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1760", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-06T06:15:49.903", - "lastModified": "2024-11-21T08:51:15.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:36:46.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.6.24", + "matchCriteriaId": "47E5308D-0EB3-41A9-981E-3FE5D2693EF4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1767.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1767.json index 7a997900d4f..092eaee9b71 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1767.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1767", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:09.173", - "lastModified": "2024-11-21T08:51:16.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:37:30.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.27", + "matchCriteriaId": "8317F6A0-DE44-4DD5-BDE8-67B6F3BFEFB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=219324%40blocksy&new=219324%40blocksy&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdeab668-9094-485f-aa01-13ba5c10ea89?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=219324%40blocksy&new=219324%40blocksy&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdeab668-9094-485f-aa01-13ba5c10ea89?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json index 6b6b871d3a2..be25a87beec 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22461", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T14:15:21.383", - "lastModified": "2024-12-13T14:15:21.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:52:29.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,80 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-347" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json index 93d0fef357a..233016d4aa6 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23444", "sourceIdentifier": "bressers@elastic.co", "published": "2024-07-31T18:15:11.983", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:16:17.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,51 @@ "value": "CWE-311" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.17.23", + "matchCriteriaId": "6BEB91F2-7551-4E99-8960-AE85F82D8761" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.13.0", + "matchCriteriaId": "BA9FE739-3345-4D11-805C-D1A035D57CCE" + } + ] + } + ] } ], "references": [ { "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-23-security-update-esa-2024-12/364157", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23449.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23449.json index 77470374a5d..a9970df5735 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23449.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23449.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23449", "sourceIdentifier": "bressers@elastic.co", "published": "2024-03-29T12:15:08.177", - "lastModified": "2024-11-21T08:57:43.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:14:46.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-248" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndExcluding": "8.11.1", + "matchCriteriaId": "E6F8C95D-3F9C-49FA-901B-50EA226996CE" + } + ] + } + ] } ], "references": [ { "url": "https://discuss.elastic.co/t/elasticsearch-8-11-1-security-update-esa-2024-05/356458", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://discuss.elastic.co/t/elasticsearch-8-11-1-security-update-esa-2024-05/356458", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json index 66339722c4d..d65f9839680 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23451", "sourceIdentifier": "bressers@elastic.co", "published": "2024-03-27T18:15:10.330", - "lastModified": "2024-11-21T08:57:44.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:00:44.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.10.0", + "versionEndExcluding": "8.13.0", + "matchCriteriaId": "E269B352-478B-4F77-AFB3-3316EDCADE5C" + } + ] + } + ] } ], "references": [ { "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23690.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23690.json new file mode 100644 index 00000000000..a2d00dc72a6 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23690.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-23690", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-02-04T15:15:17.973", + "lastModified": "2025-02-04T15:15:17.973", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "disclosure@vulncheck.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted \"util backup_configuration\" commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://vulncheck.com/advisories/netgear-fvs336g-rce", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24902.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24902.json index 8705f27a12b..1ecd3b2a2b7 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24902.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24902", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T15:15:26.810", - "lastModified": "2024-12-13T15:15:26.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:54:56.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,80 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26133.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26133.json index f5d42984ff8..e8c4f6f3e42 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26133.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26133", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-21T17:15:10.060", - "lastModified": "2024-11-21T09:02:00.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:07:56.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,56 +69,142 @@ "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kurrent:eventstoredb:*:*:*:*:open-source:*:*:*", + "versionStartIncluding": "20.10.0", + "versionEndExcluding": "20.10.6", + "matchCriteriaId": "121A0F5F-F477-4096-B9DD-56B345A1DF25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kurrent:eventstoredb:*:*:*:*:open-source:*:*:*", + "versionStartIncluding": "21.10.0", + "versionEndExcluding": "21.10.11", + "matchCriteriaId": "0F82D0FF-AB86-47A8-B276-94665844CDDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kurrent:eventstoredb:*:*:*:*:open-source:*:*:*", + "versionStartIncluding": "22.10.0", + "versionEndExcluding": "22.10.5", + "matchCriteriaId": "34D1C437-C3A1-4307-861A-12D5DBE30220" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kurrent:eventstoredb:*:*:*:*:open-source:*:*:*", + "versionStartIncluding": "23.10.0", + "versionEndExcluding": "23.10.1", + "matchCriteriaId": "BB3E5FBA-1300-4774-A3D4-64F5FA02375D" + } + ] + } + ] } ], "references": [ { "url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.eventstore.com/blog/new-version-strategy", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.eventstore.com/blog/new-version-strategy", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28980.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28980.json index cb7d3c3720b..6abafa25444 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28980.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28980", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T15:15:26.953", - "lastModified": "2024-12-13T15:15:26.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:55:29.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29950.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29950.json index 18e94a8b5dc..b2068aa2e5a 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29950.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29950.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29950", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-17T19:15:07.213", - "lastModified": "2024-11-21T09:08:41.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:40:21.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-326" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23236", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23236", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29951.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29951.json index 3da5508c722..b19fc9ce9ec 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29951.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29951", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-17T20:15:08.060", - "lastModified": "2024-11-21T09:08:41.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:01:19.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-326" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23237", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23237", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29952.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29952.json index 88a30f5b8b4..8a9d15fb9bd 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29952.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29952", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-17T22:15:08.080", - "lastModified": "2024-11-21T09:08:41.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:02:13.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-312" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23238", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23238", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json index da59cffa8d5..605f61bbf0d 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29953", "sourceIdentifier": "sirt@brocade.com", "published": "2024-06-26T00:15:10.030", - "lastModified": "2024-11-21T09:08:41.407", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:19:11.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,20 +69,65 @@ "value": "CWE-922" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.1.1d", + "matchCriteriaId": "DB2D3825-6F9A-4150-BE38-9EA750E889FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.0b", + "matchCriteriaId": "64256C4C-AF75-4D8F-80C3-E4EF4AC0CC8E" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23227", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240822-0009/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23227", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29955.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29955.json index 1a4bf4947f6..a2849d3e586 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29955.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29955", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-17T22:15:08.370", - "lastModified": "2024-11-21T09:08:41.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:03:04.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23239", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23239", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29956.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29956.json index 7d479eb3f65..006f7b76aee 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29956.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29956", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-18T02:15:06.797", - "lastModified": "2024-11-21T09:08:41.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:58:26.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-312" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23240", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23240", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29957.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29957.json index a28210c7a43..695253bbece 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29957.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29957.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29957", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:09.390", - "lastModified": "2024-11-21T09:08:41.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:57:57.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23241", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23241", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29958.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29958.json index 20c53d6a59f..fd1c9347546 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29958.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29958", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:09.653", - "lastModified": "2024-11-21T09:08:42.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:57:10.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23242", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23242", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29959.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29959.json index 9e1917cbe9f..e874fcaf80a 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29959.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29959", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:10.020", - "lastModified": "2024-11-21T09:08:42.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:54:42.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23243", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23243", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29960.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29960.json index c779dacaaa3..b1177fb071d 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29960.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29960", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:10.270", - "lastModified": "2024-11-21T09:08:42.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:53:21.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-798" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23244", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23244", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29961.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29961.json index 3f27c8d2696..540206a1816 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29961.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29961.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29961", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:10.553", - "lastModified": "2024-11-21T09:08:42.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:52:04.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23246", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23246", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29962.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29962.json index 6a699ca10fc..b4fccde4516 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29962.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29962", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T05:15:48.940", - "lastModified": "2024-11-21T09:08:42.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:48:07.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23248", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23248", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29963.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29963.json index 917e74ff3d6..48adeba5e20 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29963.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29963.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29963", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T04:15:10.793", - "lastModified": "2024-11-21T09:08:42.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:51:01.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-798" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23247", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23247", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29964.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29964.json index 48dfed7fca2..40a1a15483d 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29964.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29964", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T05:15:49.217", - "lastModified": "2024-11-21T09:08:42.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:47:25.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-732" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23249", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23249", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29965.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29965.json index 21266fc2f24..278bb2a7fe9 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29965.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29965", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T05:15:49.390", - "lastModified": "2024-11-21T09:08:42.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:45:17.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-922" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23250", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23250", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29966.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29966.json index bcf7866d455..691f1eb4caf 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29966.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29966", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T05:15:49.567", - "lastModified": "2024-11-21T09:08:43.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:44:24.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-798" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23255", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23255", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29967.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29967.json index d7662349d8f..d801da254e7 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29967.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29967.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29967", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T05:15:49.737", - "lastModified": "2024-11-21T09:08:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:43:15.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23254", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23254", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29968.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29968.json index 0798a18d354..2d1eb8b26dc 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29968.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29968.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29968", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T06:15:06.497", - "lastModified": "2024-11-21T09:08:43.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:41:56.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-922" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23253", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23253", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29969.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29969.json index c6bde5fc60e..6a113303414 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29969.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29969", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-19T06:15:07.753", - "lastModified": "2024-11-21T09:08:43.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:41:14.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-326" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.2", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "AD6E430B-7C3A-4B79-987A-302A27CEBFCC" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23251", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23251", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30186.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30186.json index 3a3cb37b3cb..52e1566d0de 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30186.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30186.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30186", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T12:15:14.173", - "lastModified": "2024-11-21T09:11:23.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:38:13.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:prime_slider:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.13.2", + "matchCriteriaId": "4C65FFB7-EBE9-402F-9FCD-B56CA399EA2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json index 5e7df329cd8..da6866bb617 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32681", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-22T11:15:46.287", - "lastModified": "2024-11-21T09:15:27.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:39:14.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:prime_slider:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.13.3", + "matchCriteriaId": "E0BD3FD1-00C7-4DC4-9FC2-8653A686808F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json index 8c60eb512df..f3fefe0c4ce 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32682", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-22T11:15:46.630", - "lastModified": "2024-11-21T09:15:28.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:39:56.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:prime_slider:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.13.3", + "matchCriteriaId": "E0BD3FD1-00C7-4DC4-9FC2-8653A686808F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability-2?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32772.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32772.json index b4155d3c0ca..b17e6e951d3 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32772.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32772", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T11:15:47.603", - "lastModified": "2024-11-21T09:15:41.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:41:15.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.8.0", + "matchCriteriaId": "EC734793-B969-4614-8EE6-926DF9AD28CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-7-9-insecure-direct-object-references-idor-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-7-9-insecure-direct-object-references-idor-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32808.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32808.json index 9b68c4b6433..1defc094ba2 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32808.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32808", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T11:15:48.140", - "lastModified": "2024-11-21T09:15:46.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:42:41.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.8.0", + "matchCriteriaId": "EC734793-B969-4614-8EE6-926DF9AD28CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-7-9-insecure-direct-object-reference-idor-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-7-9-insecure-direct-object-reference-idor-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34896.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34896.json index 732da617c04..3e019b4726c 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34896.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34896.json @@ -2,16 +2,43 @@ "id": "CVE-2024-34896", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:12.573", - "lastModified": "2025-02-03T21:15:12.573", + "lastModified": "2025-02-04T16:15:37.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Nedis SmartLife Video Doorbell (WIFICDP10GY), Nedis SmartLife IOS v1.4.0 causes users who are disconnected from a previous peer-to-peer connection with the device to still have access to live video feed." + }, + { + "lang": "es", + "value": "Un problema con Nedis SmartLife Video Doorbell (WIFICDP10GY), Nedis SmartLife IOS v1.4.0 hace que los usuarios que est\u00e1n desconectados de una conexi\u00f3n peer to peer anterior con el dispositivo a\u00fan tengan acceso a la transmisi\u00f3n de video en vivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://nedis.com", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34897.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34897.json index 078f4b094ac..7e4c8c57cac 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34897.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34897.json @@ -2,16 +2,55 @@ "id": "CVE-2024-34897", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:12.680", - "lastModified": "2025-02-03T21:15:12.680", + "lastModified": "2025-02-04T16:15:37.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nedis SmartLife android app v1.4.0 was discovered to contain an API key disclosure vulnerability." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Nedis SmartLife android app v1.4.0 conten\u00eda una vulnerabilidad de divulgaci\u00f3n de clave API." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://nedis.com", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3747.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3747.json index d38ffef6fe4..34e6413ed02 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3747.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3747", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:31.223", - "lastModified": "2024-11-21T09:30:18.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:43:01.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.40", + "matchCriteriaId": "DC59284F-295F-4643-A42B-DC57080AA218" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=224954%40blocksy%2F2.0.40&old=224210%40blocksy%2F2.0.39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f71928-3f1d-4c15-8655-41cdfb707370?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=224954%40blocksy%2F2.0.40&old=224210%40blocksy%2F2.0.39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f71928-3f1d-4c15-8655-41cdfb707370?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38296.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38296.json index 2e0b918bd50..7296c1066ce 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38296.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38296", "sourceIdentifier": "security_alert@emc.com", "published": "2024-11-22T03:15:04.160", - "lastModified": "2024-12-09T15:15:13.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:05:01.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,13 +36,106 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:intel_management_engine_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.40.30.2879", + "matchCriteriaId": "995658F4-37C9-478C-B622-02315A6F935F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA59414-5A32-4706-85A5-D5459EE22BA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:intel_management_engine_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.94.2380", + "matchCriteriaId": "4AEE84CB-69AA-45C3-9414-EB9CE7C21531" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_5200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6832A53-E950-4572-A178-CF5DC14CACC5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000250949/dsa-2024-345-security-update-for-dell-networking-edge-gateway-5200-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json index 4e13375e7e9..6722dc685bd 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38485", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-09T15:15:14.110", - "lastModified": "2024-12-09T15:15:14.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:07:54.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.8.0.0", + "matchCriteriaId": "156E045B-F00F-4643-8D3C-81EE0B07C76B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000256185/dsa-2024-331-security-update-for-dell-ecs-host-header-injection-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json index 6c724def180..3936f686179 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38488", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T14:15:21.993", - "lastModified": "2024-12-13T14:15:21.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:52:59.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json index 733d0b2eec8..bd79f1d0985 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43317", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.480", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T15:32:08.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.1.1", + "matchCriteriaId": "61179F49-5364-4C57-A987-1DBF48111642" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-6-0-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4333.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4333.json index 70d33aff80e..0ce1abc8c08 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4333.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4333", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T16:17:33.863", - "lastModified": "2024-11-21T09:42:38.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:23:41.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "D609FDF8-D41B-42A2-9898-B343BE8405AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/assets/js/jquery.countdown.min.js", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/assets/js/typed.min.js", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3085825/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f616df94-7839-49db-baa5-88f8f1de208f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/assets/js/jquery.countdown.min.js", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/assets/js/typed.min.js", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3085825/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f616df94-7839-49db-baa5-88f8f1de208f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4373.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4373.json index 3650d45ef5a..c25ae2c321b 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4373.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4373", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-15T02:15:09.903", - "lastModified": "2024-11-21T09:42:43.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:47:21.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "D609FDF8-D41B-42A2-9898-B343BE8405AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3085825%40sina-extension-for-elementor&new=3085825%40sina-extension-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eee04b1d-188a-4b92-a6f3-dfa843ca20d7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3085825%40sina-extension-for-elementor&new=3085825%40sina-extension-for-elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eee04b1d-188a-4b92-a6f3-dfa843ca20d7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44449.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44449.json index c130b7a3233..4357a9e60fc 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44449.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44449.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44449", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:12.927", - "lastModified": "2025-02-03T21:15:12.927", + "lastModified": "2025-02-04T16:15:37.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Quorum onQ OS v.6.0.0.5.2064 allows a remote attacker to obtain sensitive information via the msg parameter in the Login page." + }, + { + "lang": "es", + "value": "La vulnerabilidad Cross Site Scripting en Quorum onQ OS v.6.0.0.5.2064 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro msg en la p\u00e1gina de inicio de sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://quorum.com/about/", diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47238.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47238.json index 51ce22c9a26..06a5dee5b3e 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47238.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47238", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-12T18:15:25.250", - "lastModified": "2024-12-12T18:15:25.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:52:06.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,284 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:embedded_box_pc_3000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.25.0", + "matchCriteriaId": "C6983E4A-CB0A-4ECA-98F6-087422CD7248" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:embedded_box_pc_3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3A103FC-917C-4C48-A7C5-1DFBD03D81F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_3001_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "999C5867-3C72-4168-9253-3DDC5A0F7B16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8909DDF-1E31-43BA-B1F4-D6AD6C63DB00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_3002_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "8AC17F4E-BED3-4115-AC3A-11CBA2AA339B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3002:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8AEDC56-9329-4FC3-A660-4255A2CDA2DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_3003_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "8A403B04-6CA6-44F7-BC8A-4450265CC0AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3165EDB1-D427-420E-B9B6-615A58387DD9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_5000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.0", + "matchCriteriaId": "0C9D9627-D510-41A3-A217-921FE7166550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B42C9EA-86DD-4643-8F5D-FCE91AEF9253" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_5100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.0", + "matchCriteriaId": "EBCB21BB-84A9-4BD3-8E01-965B8DF9A344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5D8F56-FBBB-4B2D-9720-5A806490F533" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_3000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "D90C7E5D-3B90-45AE-809C-0926A74F50AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB4FB13B-F6D1-428E-A0D5-2483EBD1DD1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:edge_gateway_3200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "EC04DD0A-9CD2-4459-8C60-97573BC16A05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:edge_gateway_3200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA59414-5A32-4706-85A5-D5459EE22BA5" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000227595/dsa-2024-355", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json index 6244303437f..b6abf56175a 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47239", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T03:15:08.413", - "lastModified": "2025-01-08T03:15:08.413", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:49:20.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,98 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.2.0", + "versionEndExcluding": "9.7.1.3", + "matchCriteriaId": "DE1F8BC0-2CBF-4F89-AFF0-CE6CE1FF8C2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.0.20", + "matchCriteriaId": "99236F29-3EC6-4BBF-A13E-747246A684B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0.0", + "versionEndExcluding": "9.5.1.2", + "matchCriteriaId": "55B4A1FD-73C9-4CF8-A7B0-213DD6B6EFB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0.0", + "versionEndExcluding": "9.9.0.1", + "matchCriteriaId": "2DDFFED2-4261-497B-8E12-A426828DEF85" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000269590/dsa-2024-480-security-update-for-dell-powerscale-onefs-security-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json index 31649668fc7..be5a5a8a631 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47480", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-18T03:15:26.583", - "lastModified": "2024-12-18T03:15:26.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:56:47.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-61" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:inventory_collector:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.0", + "matchCriteriaId": "3A6989DF-866A-4294-A604-4266EC37BA78" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000255700/dsa-2024-475", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47484.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47484.json index 732b9089b00..68d9792a6e8 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47484.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47484", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-10T11:15:07.400", - "lastModified": "2024-12-16T11:15:06.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:11:14.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*", + "matchCriteriaId": "A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C50D2C-B787-4366-AAED-057F9439A6A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41028ABC-C574-42AE-897B-E1C65CD0D0BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D9257-AA6C-4D68-B209-E72128A017D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*", + "matchCriteriaId": "7ADB97BD-3E80-439D-950C-93EF391DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "D0075FDA-26E4-4687-9D94-21283E2B5028" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen4t:*:*:*:*:*:*:*", + "matchCriteriaId": "7B67D705-545D-44A2-BA4B-6E5108FB06CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen5a:*:*:*:*:*:*:*", + "matchCriteriaId": "9DFA5C46-9E8C-4EF9-A1F1-133ABB34C6B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47977.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47977.json index c3aea734a4d..14889bdfdf4 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47977.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47977", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-10T11:15:07.550", - "lastModified": "2024-12-16T11:15:06.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:12:46.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*", + "matchCriteriaId": "A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C50D2C-B787-4366-AAED-057F9439A6A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41028ABC-C574-42AE-897B-E1C65CD0D0BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D9257-AA6C-4D68-B209-E72128A017D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*", + "matchCriteriaId": "7ADB97BD-3E80-439D-950C-93EF391DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "D0075FDA-26E4-4687-9D94-21283E2B5028" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen4t:*:*:*:*:*:*:*", + "matchCriteriaId": "7B67D705-545D-44A2-BA4B-6E5108FB06CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen5a:*:*:*:*:*:*:*", + "matchCriteriaId": "9DFA5C46-9E8C-4EF9-A1F1-133ABB34C6B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47984.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47984.json index 0a6d1bdf6a9..49beb509774 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47984.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47984", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T15:15:27.110", - "lastModified": "2024-12-13T15:15:27.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:56:03.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,80 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-790" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json index cc35e42a139..298ad6b4454 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48007", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T14:15:22.147", - "lastModified": "2024-12-13T14:15:22.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:53:13.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,13 +36,70 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json index 2ca1a8acdaf..96bcf165152 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48008", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-13T14:15:22.273", - "lastModified": "2024-12-13T14:15:22.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:53:30.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,80 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-11" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1_p1:*:*:*:*:*:*", + "matchCriteriaId": "800D6F27-0B30-4E0A-94F6-B52367D50761" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49600.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49600.json index 20bd26f46c3..923ec85f716 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49600.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49600", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-09T15:15:17.387", - "lastModified": "2024-12-09T15:15:17.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:10:48.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:power_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.17", + "matchCriteriaId": "E127BA99-9574-479F-8967-8FE0C4F7FDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000244438/dsa-2024-439", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json index 6524f1d99ab..aec4985b91e 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50656", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T19:15:12.370", - "lastModified": "2025-02-03T19:15:12.370", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:37.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "itsourcecode Placement Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Full Name field in registration.php." + }, + { + "lang": "es", + "value": "itsourcecode Placement Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-50656", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json index ead28309238..47354278ec8 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50967", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T15:15:12.313", - "lastModified": "2025-01-17T15:15:12.313", + "lastModified": "2025-02-04T16:15:37.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La API REST /rest/rights/ Endpoint en Becon DATAGerry hasta la versi\u00f3n 2.2.0 contiene una vulnerabilidad de control de acceso incorrecto. Un atacante puede acceder de forma remota a este endpoint sin autenticaci\u00f3n, lo que lleva a la divulgaci\u00f3n no autorizada de informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://datagerry.readthedocs.io/en/latest/api/rest/user-management.html#rights", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json index 3fd7870967f..b5b14565000 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51417", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T19:15:10.950", - "lastModified": "2025-01-27T22:15:12.080", + "lastModified": "2025-02-04T16:15:38.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en System.Linq.Dynamic.Core La \u00faltima versi\u00f3n v.1.4.6 permite el acceso remoto a propiedades en tipos de reflexi\u00f3n y propiedades/campos est\u00e1ticos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://dynamic-linq.net/expression-language#operators", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52537.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52537.json index bf6493cd5a1..4b6dd554b56 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52537.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52537", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-11T08:15:05.747", - "lastModified": "2024-12-11T08:15:05.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:13:09.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,288 @@ }, "exploitabilityScore": 0.3, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-61" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_hd22q_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.00.23", + "matchCriteriaId": "825C47C8-B256-4514-92BC-C0CE31BFA8FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_hd22q_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.00.28", + "matchCriteriaId": "BA822ECC-570A-4521-B4E3-D2CE0E619AB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_wd19_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "01.00.44", + "matchCriteriaId": "86FD44DF-CFA8-46D6-8E12-699CDABB2DF4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_wd19_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "01.00.28", + "matchCriteriaId": "2B7FCBAB-8B93-4116-B381-2DB7730B3459" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_wd22tb4_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "01.00.28", + "matchCriteriaId": "7DD555F6-6503-4B26-9A97-6573C5C124FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:dock_wd22tb4_firmware_update_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "01.00.44", + "matchCriteriaId": "9088AD5B-E590-406F-933F-5CF0C214796B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "17639F23-A955-4E01-875B-0B7D6541E73C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000227591/dsa-2024-351", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52538.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52538.json index 4f4ed37f52f..772fc7d1ca8 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52538.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52538", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-10T11:15:07.690", - "lastModified": "2024-12-16T11:15:06.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:12:55.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*", + "matchCriteriaId": "A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C50D2C-B787-4366-AAED-057F9439A6A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41028ABC-C574-42AE-897B-E1C65CD0D0BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D9257-AA6C-4D68-B209-E72128A017D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*", + "matchCriteriaId": "7ADB97BD-3E80-439D-950C-93EF391DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "D0075FDA-26E4-4687-9D94-21283E2B5028" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen4t:*:*:*:*:*:*:*", + "matchCriteriaId": "7B67D705-545D-44A2-BA4B-6E5108FB06CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:avamar_data_store:gen5a:*:*:*:*:*:*:*", + "matchCriteriaId": "9DFA5C46-9E8C-4EF9-A1F1-133ABB34C6B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52542.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52542.json index 8a0e721cce6..5fd2a0e21a1 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52542.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52542", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-17T12:15:20.703", - "lastModified": "2024-12-17T12:15:20.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:56:24.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,77 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-61" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:appsync:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6.0.0", + "versionEndExcluding": "4.6.0.3", + "matchCriteriaId": "16E058A6-D016-43EB-9946-8F995D4251F6" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000261039/dsa-2024-496-security-update-for-dell-appsync-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5260.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5260.json index 26f17096b9e..1adbc0f02ef 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5260.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5260.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5260", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-02T09:15:19.780", - "lastModified": "2024-11-21T09:47:17.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:52:34.487", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,49 +36,129 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.6", + "matchCriteriaId": "9566B7D6-46FC-49A1-834A-CCDE5226D8DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.5.6/widgets/advanced/sina-blogpost.php?rev=3110446", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.5.6/widgets/basic/sina-table.php?rev=3110446", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-blogpost.php#L2067", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/basic/sina-table.php#L1659", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/da6dcf5c-bb70-4227-a784-55cf28980308?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.5.6/widgets/advanced/sina-blogpost.php?rev=3110446", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.5.6/widgets/basic/sina-table.php?rev=3110446", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-blogpost.php#L2067", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/basic/sina-table.php#L1659", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/da6dcf5c-bb70-4227-a784-55cf28980308?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53289.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53289.json index c0d41a08296..3e6737dafe9 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53289.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53289", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-11T08:15:06.010", - "lastModified": "2024-12-11T08:15:06.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:13:48.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:thinos:2408:*:*:*:*:*:*:*", + "matchCriteriaId": "8F71D748-6B04-4EB2-865C-63291F8A4226" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53290.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53290.json index f5ca66bd96b..fe1c87b3bfd 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53290.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53290", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-11T08:15:06.250", - "lastModified": "2024-12-11T08:15:06.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:14:05.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:thinos:2408:*:*:*:*:*:*:*", + "matchCriteriaId": "8F71D748-6B04-4EB2-865C-63291F8A4226" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53292.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53292.json index 3e7e6d1c11a..5d1d12065a3 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53292.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53292", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-11T08:15:06.423", - "lastModified": "2024-12-11T08:15:06.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T16:16:22.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 0.6, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "x.40.405", + "matchCriteriaId": "6B43C1AA-2261-46C8-BFD5-6C299616827E" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json index f076257194b..f02f529053d 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5460", "sourceIdentifier": "sirt@brocade.com", "published": "2024-06-26T00:15:11.093", - "lastModified": "2024-11-21T09:47:43.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:24:36.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-798" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.0.0", + "matchCriteriaId": "28897387-F3CA-441E-8290-E32C1BBFEED8" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24409", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24409", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55456.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55456.json index 4adbc28bc72..cb022c28077 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55456.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55456.json @@ -2,16 +2,43 @@ "id": "CVE-2024-55456", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T17:15:21.797", - "lastModified": "2025-02-03T17:15:21.797", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:38.200", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.1 was discovered to contain a segmentation violation via the component gray_find_cell" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.1 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_find_cell" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/sammycage/lunasvg/issues/199", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json index 5c1b8ff05c1..a89930697be 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55504", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T19:15:11.567", - "lastModified": "2025-01-21T19:15:11.567", + "lastModified": "2025-02-04T16:15:38.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en RAR Extractor - Unarchiver Free and Pro v.6.4.0 permite a atacantes locales inyectar c\u00f3digo arbitrario que potencialmente conduce al control remoto y acceso no autorizado a datos confidenciales del usuario a trav\u00e9s del componente exploit_combined.dylib en MacOS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://apps.apple.com/us/app/rar-extractor-unarchiver-pro/id647505820?mt=12", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json index 1d95c1c6672..070ad9ca442 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56898", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.047", - "lastModified": "2025-02-03T21:15:14.047", + "lastModified": "2025-02-04T16:15:38.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Geovision GV-ASWeb version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to manage and create new user accounts via supplying a crafted HTTP request." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DRAGOWN/CVE-2024-56898", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56901.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56901.json index 820972b53ef..2951c035724 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56901.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56901.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56901", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.157", - "lastModified": "2025-02-03T21:15:14.157", + "lastModified": "2025-02-04T16:15:38.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the Account Management component of Geovision GV-ASWeb version 6.1.1.0 or less allows attackers to arbitrarily create Admin accounts via a crafted GET request method." + }, + { + "lang": "es", + "value": "Cross-Site Request Forgery (CSRF) en Account Management component of Geovision GV-ASWeb version 6.1.1.0 o anterior permite a los atacantes crear arbitrariamente cuentas de administrador a trav\u00e9s de un m\u00e9todo de solicitud GET manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DRAGOWN/CVE-2024-56901", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56902.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56902.json index 784e67b7a3b..13f3800fd7a 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56902.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56902.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56902", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.270", - "lastModified": "2025-02-03T21:15:14.270", + "lastModified": "2025-02-04T15:15:18.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Geovision GV-ASWeb with version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to be able to request information about other accounts via a crafted HTTP request." + }, + { + "lang": "es", + "value": "Un problema en Geovision GV-ASWeb con la versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel puedan solicitar informaci\u00f3n sobre otras cuentas a trav\u00e9s de una solicitud HTTP manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DRAGOWN/CVE-2024-56902", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56903.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56903.json index d5eb162fcc0..59b790cbb05 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56903.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56903.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56903", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.357", - "lastModified": "2025-02-03T21:15:14.357", + "lastModified": "2025-02-04T15:15:18.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to execute arbitrary operations via supplying a crafted HTTP request." + }, + { + "lang": "es", + "value": "Cross-Site Request Forgery (CSRF) en Geovision GV-ASWeb con la versi\u00f3n 6.1.1.0 o menos permite a los atacantes ejecutar operaciones arbitrarias mediante el suministro de una solicitud HTTP manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DRAGOWN/CVE-2024-56903", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json index 4c559f6986b..8b5411a11c7 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56921", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:33.610", - "lastModified": "2025-02-03T20:15:33.610", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:38.850", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Open5gs v2.7.2. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of gmm_state_exception() function upon receipt of the Nausf_UEAuthentication_Authenticate response." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json index c80dd590184..37463275945 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56990", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T16:15:13.947", - "lastModified": "2025-01-21T16:15:13.947", + "lastModified": "2025-02-04T16:15:39.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) en /view-medhistory.php y /admin/view-patient.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/kirito999/HMS_stored_XSS/blob/main/stored%20XSS1%20%20in%20HMS4.0/stored%20XSS%20%20in%20HMS.md", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json index 0660a4b5126..478e964de67 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57036", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T16:15:14.143", - "lastModified": "2025-01-21T16:15:14.143", + "lastModified": "2025-02-04T16:15:39.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A810R V4.1.2cu.5032_B20200407 conten\u00eda una vulnerabilidad de inserci\u00f3n de comandos en la funci\u00f3n principal downloadFile.cgi. Esta vulnerabilidad permite que un atacante ejecute comandos arbitrarios mediante el env\u00edo de una solicitud HTTP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/luckysmallbird/Totolink-A810R-Vulnerability-1/blob/main/3.md", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json index 0f9e79ede8d..1a5b43760a8 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57098", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.013", - "lastModified": "2025-02-03T20:15:34.013", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:39.330", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moss v0.1.3 version has an SQL injection vulnerability that allows attackers to inject carefully designed payloads into the order parameter." + }, + { + "lang": "es", + "value": "La versi\u00f3n v0.1.3 de Moss tiene una vulnerabilidad de inyecci\u00f3n SQL que permite a los atacantes inyectar payloads cuidadosamente dise\u00f1ados en el par\u00e1metro de pedido." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/deep-project/moss/issues/13", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57099.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57099.json index 0ac94811058..499bae2b6e8 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57099.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57099.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57099", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.157", - "lastModified": "2025-02-03T20:15:34.157", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:39.477", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ClassCMS v4.8 has a code execution vulnerability. Attackers can exploit this vulnerability by constructing a payload in the classview parameter of the model management feature, allowing them to execute arbitrary code and potentially take control of the server." + }, + { + "lang": "es", + "value": "ClassCMS v4.8 tiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo. Los atacantes pueden aprovechar esta vulnerabilidad construyendo un payload en el par\u00e1metro classview de la funci\u00f3n de administraci\u00f3n de modelos, lo que les permite ejecutar c\u00f3digo arbitrario y potencialmente tomar el control del servidor." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ClassCMS/ClassCMS/issues/6", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57450.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57450.json index c417f0531ed..eeea189faa0 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57450.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57450.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57450", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.253", - "lastModified": "2025-02-03T20:15:34.253", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:39.637", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ChestnutCMS <=1.5.0 is vulnerable to File Upload via the Create template function." + }, + { + "lang": "es", + "value": "ChestnutCMS <=1.5.0 es vulnerable a la carga de archivos a trav\u00e9s de la funci\u00f3n Crear plantilla." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://locrian-lightning-dc7.notion.site/File-Upload-1628e5e2b1a2806a99b8faf140bd5e42", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json index 5acb28880e1..4e5b8ee8641 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57451", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.893", - "lastModified": "2025-02-03T21:15:14.893", + "lastModified": "2025-02-04T16:15:39.857", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory." + }, + { + "lang": "es", + "value": "ChestnutCMS <=1.5.0 tiene una vulnerabilidad Directory Traversal en contentcore.controller.FileController#getFileList, que permite a los atacantes ver cualquier directorio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json index 731ba2fc232..2a45b200d55 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57538", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.803", - "lastModified": "2025-01-21T21:15:11.803", + "lastModified": "2025-02-04T16:15:40.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 contiene una vulnerabilidad de desbordamiento de b\u00fafer. El campo analizado (anonymous_protect_status) se copia a la pila sin verificaci\u00f3n de longitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/10/10.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json index 42de7cdbb7e..bcb0ed47f22 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57539", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.920", - "lastModified": "2025-01-21T21:15:11.920", + "lastModified": "2025-02-04T16:15:40.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de userEmail." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/3/3.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json index 903df385cfb..fe00be58349 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57540", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.040", - "lastModified": "2025-01-21T21:15:12.040", + "lastModified": "2025-02-04T16:15:40.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 contiene una vulnerabilidad de desbordamiento de b\u00fafer. El campo analizado (acci\u00f3n) se copia a la pila sin verificaci\u00f3n de longitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/2/2.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json index d51ef2cd595..e20c64f9c22 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57583", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.800", - "lastModified": "2025-01-22T16:53:20.263", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-04T15:15:18.557", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json index 4e84dbf4c44..5b3897c57c2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57669", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.960", - "lastModified": "2025-02-03T20:15:34.960", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:40.503", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Zrlog backup-sql-file.jar v.3.0.31 allows a remote attacker to obtain sensitive information via the BackupController.java file." + }, + { + "lang": "es", + "value": "La vulnerabilidad Directory Traversal en Zrlog backup-sql-file.jar v.3.0.31 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del archivo BackupController.java." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/94fzb/zrlog-plugin-backup-sql-file/commit/32bdb36e6cc4f0b72e1ba85ef4458fb980946ea4", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json index 884869e7818..ff23e049320 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57703", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.003", - "lastModified": "2025-01-16T23:15:08.003", + "lastModified": "2025-02-04T15:15:18.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Tenda AC8v4 V16.03.34.06 tiene una vulnerabilidad de desbordamiento de pila. La funci\u00f3n setSchedWifi del archivo /goform/openSchedWifi se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento schedEndTime provoca un desbordamiento del b\u00fafer basado en la pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json index 1822a917d68..13baa81d68e 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57785", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.317", - "lastModified": "2025-01-16T23:15:08.317", + "lastModified": "2025-02-04T15:15:18.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que Zenitel AlphaWeb XE v11.2.3.10 contiene una vulnerabilidad de inclusi\u00f3n de archivos locales a trav\u00e9s del componente amc_uploads.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/s4fv4n/56c326450dcb3ab808b5ce8242a11e30", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json index c7adb3e084e..504f880d137 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7516", "sourceIdentifier": "sirt@brocade.com", "published": "2024-11-12T19:15:18.753", - "lastModified": "2024-11-21T17:15:25.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:25:22.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,12 +93,43 @@ "value": "CWE-322" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.2", + "matchCriteriaId": "531B7922-C15A-4800-9D2A-66B579B14444" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25177", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9643.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9643.json new file mode 100644 index 00000000000..878ecdd800d --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9643.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-9643", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-02-04T15:15:19.120", + "lastModified": "2025-02-04T16:15:40.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Four-Faith\u00a0F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + }, + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/four-faith-hard-coded-creds", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9644.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9644.json new file mode 100644 index 00000000000..13e0e15910d --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9644.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9644", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-02-04T15:15:19.273", + "lastModified": "2025-02-04T15:15:19.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an \nauthentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the \"bapply.cgi\" endpoint instead of the normal \"apply.cgi\" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + }, + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], + "references": [ + { + "url": "https://vulncheck.com/advisories/four-faith-hidden-api", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0825.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0825.json new file mode 100644 index 00000000000..5e6f428a4a1 --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0825.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0825", + "sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "published": "2025-02-04T15:15:19.420", + "lastModified": "2025-02-04T15:15:19.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters (\"\\r\\n\") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-113" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289", + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0844.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0844.json index 87de9edb584..c9f12ecf542 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0844.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0844.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0844", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T00:15:41.920", - "lastModified": "2025-01-30T00:15:41.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:57:26.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,67 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:needyadmin:library_card_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2912D187-72A6-4B21-B06E-3E2EF34654BC" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.294001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.websecurityinsights.my.id/2025/01/library-card-system-stored-cross-site.html?m=1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0846.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0846.json index 3549ef08ecc..9168dc45862 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0846.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0846.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0846", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T01:15:13.993", - "lastModified": "2025-01-30T01:15:13.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:49:08.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/onupset/CVE/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485756", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0847.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0847.json index e4aee908171..964544228d9 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0847.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0847.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0847", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T02:15:25.403", - "lastModified": "2025-01-30T02:15:25.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:36:19.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/onupset/CVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485762", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0849.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0849.json index 16403703a39..f45584a27fd 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0849.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0849.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0849", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T02:15:25.783", - "lastModified": "2025-01-30T02:15:25.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-04T16:27:36.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,73 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F55A7C78-D29A-46C8-8847-3189E7085C15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Sensitive%20Super%20Admin%20Data%20Exposure%20and%20Unauthorized%20Data%20Update%20via%20IDOR%20(Teacher%20Role%20to%20Super%20Admin%20Role).pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.294012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.487618", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20639.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20639.json index f3088052f74..4f709a6ffe4 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20639.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20639.json @@ -2,17 +2,41 @@ "id": "CVE-2025-20639", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:08.980", - "lastModified": "2025-02-03T18:15:41.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:24:00.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2060." + }, + { + "lang": "es", + "value": "En DA, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291146; ID de problema: MSV-2060." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -45,12 +69,279 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] } ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2025", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20640.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20640.json index 39d194ff4a7..7832d0ff51c 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20640.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20640.json @@ -2,17 +2,41 @@ "id": "CVE-2025-20640", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:09.093", - "lastModified": "2025-02-03T18:15:42.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:22:56.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2059." + }, + { + "lang": "es", + "value": "En DA, existe una posible lectura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291146; ID de problema: MSV-2059." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -45,12 +69,279 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] } ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2025", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20641.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20641.json index 8c17af99e85..4b7db8397cb 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20641.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20641.json @@ -2,17 +2,41 @@ "id": "CVE-2025-20641", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:09.210", - "lastModified": "2025-02-03T18:15:42.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:22:10.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2058." + }, + { + "lang": "es", + "value": "En DA, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291146; ID de problema: MSV-2058." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -45,12 +69,279 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] } ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2025", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20642.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20642.json index 8cf25e2d981..bbfdc825078 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20642.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20642.json @@ -2,17 +2,41 @@ "id": "CVE-2025-20642", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:09.333", - "lastModified": "2025-02-03T18:15:42.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:20:21.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2057." + }, + { + "lang": "es", + "value": "En DA, existe una posible escritura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291146; ID de problema: MSV-2057." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -45,12 +69,279 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] } ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2025", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20643.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20643.json index 3b02c7f3e4e..394048dc23a 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20643.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20643.json @@ -2,17 +2,41 @@ "id": "CVE-2025-20643", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:09.460", - "lastModified": "2025-02-03T18:15:42.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:19:23.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2056." + }, + { + "lang": "es", + "value": "En DA, existe una posible lectura fuera de los l\u00edmites debido a un neutra. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, si un actor malicioso ya ha obtenido el privilegio System. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291146; ID de problema: MSV-2056." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 3.9, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -45,12 +69,279 @@ "value": "CWE-1295" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] } ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2025", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json index 6d96b579068..458dda126e1 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21101", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-15T05:15:09.097", - "lastModified": "2025-01-15T05:15:09.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:50:56.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:display_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.2.20", + "matchCriteriaId": "1594BAC6-F3B7-4ABE-91F8-E9619E0A1E6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000267927/dsa-2025-033", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json index 52fe7746832..7afe8412d1e 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21526", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:18.337", - "lastModified": "2025-01-21T21:15:18.337", + "lastModified": "2025-02-04T16:15:41.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json index b517aef2861..baa97644c79 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21527", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:18.467", - "lastModified": "2025-01-21T21:15:18.467", + "lastModified": "2025-02-04T16:15:41.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json index 0b4823cc55e..3c8d0c1b416 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21528", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:18.597", - "lastModified": "2025-01-21T21:15:18.597", + "lastModified": "2025-02-04T16:15:41.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json index 838a77b28c3..1aab2ec3478 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21553", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.880", - "lastModified": "2025-01-21T21:15:21.880", + "lastModified": "2025-02-04T16:15:41.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json index b1b86c888c1..34e9659358c 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21554", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.020", - "lastModified": "2025-01-21T21:15:22.020", + "lastModified": "2025-02-04T16:15:41.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json index 6d0e9553d18..6e29b6f9917 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21555", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.163", - "lastModified": "2025-01-21T21:15:22.163", + "lastModified": "2025-02-04T16:15:42.037", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json index 173846a3982..29d8d5dbd58 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21556", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.290", - "lastModified": "2025-01-21T21:15:22.290", + "lastModified": "2025-02-04T16:15:42.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json index 08f0e1372d7..487c708f157 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21558", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.537", - "lastModified": "2025-01-21T21:15:22.537", + "lastModified": "2025-02-04T16:15:42.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json index 49c155a9af3..fefcbc10b1a 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21559", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.667", - "lastModified": "2025-01-21T21:15:22.667", + "lastModified": "2025-02-04T16:15:42.407", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json index db8885d5bdf..e105317581a 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21561", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:22.920", - "lastModified": "2025-01-21T21:15:22.920", + "lastModified": "2025-02-04T16:15:42.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json index f134c0487a5..3759ac1302d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21562", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:23.060", - "lastModified": "2025-01-21T21:15:23.060", + "lastModified": "2025-02-04T16:15:42.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21669.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21669.json index 9fa51d77cdc..dad49cd45b4 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21669.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21669.json @@ -2,40 +2,172 @@ "id": "CVE-2025-21669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.053", - "lastModified": "2025-02-02T11:15:15.980", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:38:39.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: discard packets if the transport changes\n\nIf the socket has been de-assigned or assigned to another transport,\nwe must discard any packets received because they are not expected\nand would cause issues when we access vsk->transport.\n\nA possible scenario is described by Hyunwoo Kim in the attached link,\nwhere after a first connect() interrupted by a signal, and a second\nconnect() failed, we can find `vsk->transport` at NULL, leading to a\nNULL pointer dereference." + }, + { + "lang": "es", + "value": "En el kernel Linux, se ha resuelto la siguiente vulnerabilidad: vsock/virtio: descartar paquetes si cambia el transporte Si el socket ha sido desasignado o asignado a otro transporte, debemos descartar cualquier paquete recibido porque no son los esperados y causar\u00edan problemas cuando accedamos a vsk->transport. Un posible escenario es descrito por Hyunwoo Kim en el enlace adjunto, donde despu\u00e9s de un primer connect() interrumpido por una se\u00f1al, y un segundo connect() fallido, podemos encontrar `vsk->transport` en NULL, lo que lleva a una desreferencia de puntero NULL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.15.177", + "matchCriteriaId": "A5CB4FBE-68EB-481B-BDFC-B74722F3A409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.127", + "matchCriteriaId": "A3538C88-E91E-4A62-8415-2EA2F03EAAE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "38B2F4A9-C656-4A97-8718-D27E6BDFD82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/18a7fc371d1dbf8deff16c2dd9292bcc73f43040", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2cb7c756f605ec02ffe562fb26828e4bcc5fdfc1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6486915fa661584d70e8e7e4068c6c075c67dd6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/677579b641af109613564460a4e3bdcb16850b61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88244163bc7e7b0ce9dd7bf4c8a563b41525c3ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d88b249e14bd0ee1e46bbe4f456e22e01b8c68de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21670.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21670.json index a84f782ae04..8360d2046d5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21670.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21670.json @@ -2,28 +2,137 @@ "id": "CVE-2025-21670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.160", - "lastModified": "2025-01-31T12:15:28.160", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:37:25.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/bpf: return early if transport is not assigned\n\nSome of the core functions can only be called if the transport\nhas been assigned.\n\nAs Michal reported, a socket might have the transport at NULL,\nfor example after a failed connect(), causing the following trace:\n\n BUG: kernel NULL pointer dereference, address: 00000000000000a0\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 12faf8067 P4D 12faf8067 PUD 113670067 PMD 0\n Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 15 UID: 0 PID: 1198 Comm: a.out Not tainted 6.13.0-rc2+\n RIP: 0010:vsock_connectible_has_data+0x1f/0x40\n Call Trace:\n vsock_bpf_recvmsg+0xca/0x5e0\n sock_recvmsg+0xb9/0xc0\n __sys_recvfrom+0xb3/0x130\n __x64_sys_recvfrom+0x20/0x30\n do_syscall_64+0x93/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nSo we need to check the `vsk->transport` in vsock_bpf_recvmsg(),\nespecially for connected sockets (stream/seqpacket) as we already\ndo in __vsock_connectible_recvmsg()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vsock/bpf: retorno anticipado si el transporte no est\u00e1 asignado Algunas de las funciones principales solo se pueden llamar si el transporte ha sido asignado. Como inform\u00f3 Michal, un socket puede tener el transporte en NULL, por ejemplo despu\u00e9s de un connect() fallido, lo que provoca el siguiente seguimiento: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 00000000000000a0 #PF: acceso de lectura de supervisor en modo n\u00facleo #PF: error_code(0x0000) - p\u00e1gina no presente PGD 12faf8067 P4D 12faf8067 PUD 113670067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 15 UID: 0 PID: 1198 Comm: a.out No contaminado 6.13.0-rc2+ RIP: 0010:vsock_connectible_has_data+0x1f/0x40 Seguimiento de llamada: vsock_bpf_recvmsg+0xca/0x5e0 sock_recvmsg+0xb9/0xc0 __sys_recvfrom+0xb3/0x130 __x64_sys_recvfrom+0x20/0x30 do_syscall_64+0x93/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e Por lo tanto, debemos verificar `vsk->transport` en vsock_bpf_recvmsg(), especialmente para sockets conectados (stream/seqpacket) como ya lo hacemos en __vsock_connectible_recvmsg()." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "6BE232AC-5A0F-4273-8CB5-7767FDE5879E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/58e586c30d0b6f5dc0174a41026f2b0a48c9aab6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6771e1279dadf1d92a72e1465134257d9e6f2459", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6abafcd32f9cfc4b1a2f820ecea70773e26d423", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21671.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21671.json index 431c096b71a..9457006d10b 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21671.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21671.json @@ -2,32 +2,116 @@ "id": "CVE-2025-21671", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.263", - "lastModified": "2025-01-31T12:15:28.263", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:36:40.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nzram: fix potential UAF of zram table\n\nIf zram_meta_alloc failed early, it frees allocated zram->table without\nsetting it NULL. Which will potentially cause zram_meta_free to access\nthe table if user reset an failed and uninitialized device." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: zram: se corrige el UAF potencial de la tabla zram. Si zram_meta_alloc falla antes, libera la tabla zram-> asignada sin configurarla como NULL. Esto potencialmente har\u00e1 que zram_meta_free acceda a la tabla si el usuario reinicia un dispositivo fallido y no inicializado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.122", + "versionEndExcluding": "6.1.127", + "matchCriteriaId": "7318159A-C85D-4CB0-AEE8-F8203E4D319C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.68", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "BF52E59F-B164-40CD-9AD0-3AD081FC1BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "125A873D-530A-4FEE-BBCF-242EFC3271CD" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/212fe1c0df4a150fb6298db2cfff267ceaba5402", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/571d3f6045cd3a6d9f6aec33b678f3ffe97582ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/902ef8f16d5ca77edc77c30656be54186c1e99b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe3de867f94819ba0f28e035c0b0182150147d95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21673.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21673.json index 1257fb6e18f..363ccf7bcfc 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21673.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21673.json @@ -2,28 +2,144 @@ "id": "CVE-2025-21673", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.463", - "lastModified": "2025-01-31T12:15:28.463", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:33:41.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix double free of TCP_Server_Info::hostname\n\nWhen shutting down the server in cifs_put_tcp_session(), cifsd thread\nmight be reconnecting to multiple DFS targets before it realizes it\nshould exit the loop, so @server->hostname can't be freed as long as\ncifsd thread isn't done. Otherwise the following can happen:\n\n RIP: 0010:__slab_free+0x223/0x3c0\n Code: 5e 41 5f c3 cc cc cc cc 4c 89 de 4c 89 cf 44 89 44 24 08 4c 89\n 1c 24 e8 fb cf 8e 00 44 8b 44 24 08 4c 8b 1c 24 e9 5f fe ff ff <0f>\n 0b 41 f7 45 08 00 0d 21 00 0f 85 2d ff ff ff e9 1f ff ff ff 80\n RSP: 0018:ffffb26180dbfd08 EFLAGS: 00010246\n RAX: ffff8ea34728e510 RBX: ffff8ea34728e500 RCX: 0000000000800068\n RDX: 0000000000800068 RSI: 0000000000000000 RDI: ffff8ea340042400\n RBP: ffffe112041ca380 R08: 0000000000000001 R09: 0000000000000000\n R10: 6170732e31303000 R11: 70726f632e786563 R12: ffff8ea34728e500\n R13: ffff8ea340042400 R14: ffff8ea34728e500 R15: 0000000000800068\n FS: 0000000000000000(0000) GS:ffff8ea66fd80000(0000)\n 000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007ffc25376080 CR3: 000000012a2ba001 CR4:\n PKRU: 55555554\n Call Trace:\n \n ? show_trace_log_lvl+0x1c4/0x2df\n ? show_trace_log_lvl+0x1c4/0x2df\n ? __reconnect_target_unlocked+0x3e/0x160 [cifs]\n ? __die_body.cold+0x8/0xd\n ? die+0x2b/0x50\n ? do_trap+0xce/0x120\n ? __slab_free+0x223/0x3c0\n ? do_error_trap+0x65/0x80\n ? __slab_free+0x223/0x3c0\n ? exc_invalid_op+0x4e/0x70\n ? __slab_free+0x223/0x3c0\n ? asm_exc_invalid_op+0x16/0x20\n ? __slab_free+0x223/0x3c0\n ? extract_hostname+0x5c/0xa0 [cifs]\n ? extract_hostname+0x5c/0xa0 [cifs]\n ? __kmalloc+0x4b/0x140\n __reconnect_target_unlocked+0x3e/0x160 [cifs]\n reconnect_dfs_server+0x145/0x430 [cifs]\n cifs_handle_standard+0x1ad/0x1d0 [cifs]\n cifs_demultiplex_thread+0x592/0x730 [cifs]\n ? __pfx_cifs_demultiplex_thread+0x10/0x10 [cifs]\n kthread+0xdd/0x100\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x29/0x50\n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: se corrige la doble liberaci\u00f3n de TCP_Server_Info::hostname Al apagar el servidor en cifs_put_tcp_session(), el hilo cifsd podr\u00eda estar reconect\u00e1ndose a m\u00faltiples objetivos DFS antes de darse cuenta de que deber\u00eda salir del bucle, por lo que @server->hostname no se puede liberar mientras el hilo cifsd no haya terminado. De lo contrario, puede ocurrir lo siguiente: RIP: 0010:__slab_free+0x223/0x3c0 Code: 5e 41 5f c3 cc cc cc cc 4c 89 de 4c 89 cf 44 89 44 24 08 4c 89 1c 24 e8 fb cf 8e 00 44 8b 44 24 08 4c 8b 1c 24 e9 5f fe ff ff <0f> 0b 41 f7 45 08 00 0d 21 00 0f 85 2d ff ff ff e9 1f ff ff ff 80 RSP: 0018:ffffb26180dbfd08 EFLAGS: 00010246 RAX: ffff8ea34728e510 RBX: ffff8ea34728e500 RCX: 0000000000800068 RDX: 0000000000800068 RSI: 0000000000000000 RDI: ffff8ea340042400 RBP: ffffe112041ca380 R08: 0000000000000001 R09: 0000000000000000 R10: 6170732e31303000 R11: 70726f632e786563 R12: ffff8ea34728e500 R13: ffff8ea340042400 R14: ffff8ea34728e500 R15: 0000000000800068 FS: 0000000000000000(0000) GS:ffff8ea66fd80000(0000) 000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc25376080 CR3: 000000012a2ba001 CR4: PKRU: 55555554 Call Trace: ? show_trace_log_lvl+0x1c4/0x2df ? show_trace_log_lvl+0x1c4/0x2df ? __reconnect_target_unlocked+0x3e/0x160 [cifs] ? __die_body.cold+0x8/0xd ? die+0x2b/0x50 ? do_trap+0xce/0x120 ? __slab_free+0x223/0x3c0 ? do_error_trap+0x65/0x80 ? __slab_free+0x223/0x3c0 ? exc_invalid_op+0x4e/0x70 ? __slab_free+0x223/0x3c0 ? asm_exc_invalid_op+0x16/0x20 ? __slab_free+0x223/0x3c0 ? extract_hostname+0x5c/0xa0 [cifs] ? extract_hostname+0x5c/0xa0 [cifs] ? __kmalloc+0x4b/0x140 __reconnect_target_unlocked+0x3e/0x160 [cifs] reconnect_dfs_server+0x145/0x430 [cifs] cifs_handle_standard+0x1ad/0x1d0 [cifs] cifs_demultiplex_thread+0x592/0x730 [cifs] ? __pfx_cifs_demultiplex_thread+0x10/0x10 [cifs] kthread+0xdd/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x29/0x50 " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14.19", + "versionEndExcluding": "5.15", + "matchCriteriaId": "CC24A46F-AAF0-46A3-9255-D235078D50BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.3", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "B8FF05FF-1047-4F2A-8C1B-A65DC1A32135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1ea68070338518a1d31ce71e6abfe1b30001b27a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2be5f2ba34d0c6d5ef2624b24e3d852561fcd6a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa2f9906a7b333ba757a7dbae0713d8a5396186e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21674.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21674.json index cec75020e41..ebba2b7dd21 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21674.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21674.json @@ -2,28 +2,137 @@ "id": "CVE-2025-21674", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.560", - "lastModified": "2025-01-31T12:15:28.560", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:31:30.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel\n\nAttempt to enable IPsec packet offload in tunnel mode in debug kernel\ngenerates the following kernel panic, which is happening due to two\nissues:\n1. In SA add section, the should be _bh() variant when marking SA mode.\n2. There is not needed flush_workqueue in SA delete routine. It is not\nneeded as at this stage as it is removed from SADB and the running work\nwill be canceled later in SA free.\n\n =====================================================\n WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected\n 6.12.0+ #4 Not tainted\n -----------------------------------------------------\n charon/1337 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire:\n ffff88810f365020 (&xa->xa_lock#24){+.+.}-{3:3}, at: mlx5e_xfrm_del_state+0xca/0x1e0 [mlx5_core]\n\n and this task is already holding:\n ffff88813e0f0d48 (&x->lock){+.-.}-{3:3}, at: xfrm_state_delete+0x16/0x30\n which would create a new lock dependency:\n (&x->lock){+.-.}-{3:3} -> (&xa->xa_lock#24){+.+.}-{3:3}\n\n but this new dependency connects a SOFTIRQ-irq-safe lock:\n (&x->lock){+.-.}-{3:3}\n\n ... which became SOFTIRQ-irq-safe at:\n lock_acquire+0x1be/0x520\n _raw_spin_lock_bh+0x34/0x40\n xfrm_timer_handler+0x91/0xd70\n __hrtimer_run_queues+0x1dd/0xa60\n hrtimer_run_softirq+0x146/0x2e0\n handle_softirqs+0x266/0x860\n irq_exit_rcu+0x115/0x1a0\n sysvec_apic_timer_interrupt+0x6e/0x90\n asm_sysvec_apic_timer_interrupt+0x16/0x20\n default_idle+0x13/0x20\n default_idle_call+0x67/0xa0\n do_idle+0x2da/0x320\n cpu_startup_entry+0x50/0x60\n start_secondary+0x213/0x2a0\n common_startup_64+0x129/0x138\n\n to a SOFTIRQ-irq-unsafe lock:\n (&xa->xa_lock#24){+.+.}-{3:3}\n\n ... which became SOFTIRQ-irq-unsafe at:\n ...\n lock_acquire+0x1be/0x520\n _raw_spin_lock+0x2c/0x40\n xa_set_mark+0x70/0x110\n mlx5e_xfrm_add_state+0xe48/0x2290 [mlx5_core]\n xfrm_dev_state_add+0x3bb/0xd70\n xfrm_add_sa+0x2451/0x4a90\n xfrm_user_rcv_msg+0x493/0x880\n netlink_rcv_skb+0x12e/0x380\n xfrm_netlink_rcv+0x6d/0x90\n netlink_unicast+0x42f/0x740\n netlink_sendmsg+0x745/0xbe0\n __sock_sendmsg+0xc5/0x190\n __sys_sendto+0x1fe/0x2c0\n __x64_sys_sendto+0xdc/0x1b0\n do_syscall_64+0x6d/0x140\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n other info that might help us debug this:\n\n Possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(&xa->xa_lock#24);\n local_irq_disable();\n lock(&x->lock);\n lock(&xa->xa_lock#24);\n \n lock(&x->lock);\n\n *** DEADLOCK ***\n\n 2 locks held by charon/1337:\n #0: ffffffff87f8f858 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{4:4}, at: xfrm_netlink_rcv+0x5e/0x90\n #1: ffff88813e0f0d48 (&x->lock){+.-.}-{3:3}, at: xfrm_state_delete+0x16/0x30\n\n the dependencies between SOFTIRQ-irq-safe lock and the holding lock:\n -> (&x->lock){+.-.}-{3:3} ops: 29 {\n HARDIRQ-ON-W at:\n lock_acquire+0x1be/0x520\n _raw_spin_lock_bh+0x34/0x40\n xfrm_alloc_spi+0xc0/0xe60\n xfrm_alloc_userspi+0x5f6/0xbc0\n xfrm_user_rcv_msg+0x493/0x880\n netlink_rcv_skb+0x12e/0x380\n xfrm_netlink_rcv+0x6d/0x90\n netlink_unicast+0x42f/0x740\n netlink_sendmsg+0x745/0xbe0\n __sock_sendmsg+0xc5/0x190\n __sys_sendto+0x1fe/0x2c0\n __x64_sys_sendto+0xdc/0x1b0\n do_syscall_64+0x6d/0x140\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n IN-SOFTIRQ-W at:\n lock_acquire+0x1be/0x520\n _raw_spin_lock_bh+0x34/0x40\n xfrm_timer_handler+0x91/0xd70\n __hrtimer_run_queues+0x1dd/0xa60\n \n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: Se corrige la advertencia de dependencia de inversi\u00f3n al habilitar el t\u00fanel IPsec El intento de habilitar la descarga de paquetes IPsec en modo t\u00fanel en el kernel de depuraci\u00f3n genera el siguiente p\u00e1nico del kernel, que ocurre debido a dos problemas: 1. En la secci\u00f3n de adici\u00f3n de SA, deber\u00eda ser la variante _bh() al marcar el modo SA. 2. No se necesita flush_workqueue en la rutina de eliminaci\u00f3n de SA. No es necesario en esta etapa, ya que se elimina de SADB y el trabajo en ejecuci\u00f3n se cancelar\u00e1 m\u00e1s tarde en la liberaci\u00f3n de SA. ======================================================== ADVERTENCIA: Se detect\u00f3 orden de bloqueo SOFTIRQ-safe -> SOFTIRQ-unsafe 6.12.0+ #4 No contaminado -----------------------------------------------------charon/1337 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire: ffff88810f365020 (&xa->xa_lock#24){+.+.}-{3:3}, at: mlx5e_xfrm_del_state+0xca/0x1e0 [mlx5_core] and this task is already holding: ffff88813e0f0d48 (&x->lock){+.-.}-{3:3}, at: xfrm_state_delete+0x16/0x30 which would create a new lock dependency: (&x->lock){+.-.}-{3:3} -> (&xa->xa_lock#24){+.+.}-{3:3} but this new dependency connects a SOFTIRQ-irq-safe lock: (&x->lock){+.-.}-{3:3} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x1be/0x520 _raw_spin_lock_bh+0x34/0x40 xfrm_timer_handler+0x91/0xd70 __hrtimer_run_queues+0x1dd/0xa60 hrtimer_run_softirq+0x146/0x2e0 handle_softirqs+0x266/0x860 irq_exit_rcu+0x115/0x1a0 sysvec_apic_timer_interrupt+0x6e/0x90 asm_sysvec_apic_timer_interrupt+0x16/0x20 default_idle+0x13/0x20 default_idle_call+0x67/0xa0 do_idle+0x2da/0x320 cpu_startup_entry+0x50/0x60 start_secondary+0x213/0x2a0 common_startup_64+0x129/0x138 to a SOFTIRQ-irq-unsafe lock: (&xa->xa_lock#24){+.+.}-{3:3} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x1be/0x520 _raw_spin_lock+0x2c/0x40 xa_set_mark+0x70/0x110 mlx5e_xfrm_add_state+0xe48/0x2290 [mlx5_core] xfrm_dev_state_add+0x3bb/0xd70 xfrm_add_sa+0x2451/0x4a90 xfrm_user_rcv_msg+0x493/0x880 netlink_rcv_skb+0x12e/0x380 xfrm_netlink_rcv+0x6d/0x90 netlink_unicast+0x42f/0x740 netlink_sendmsg+0x745/0xbe0 __sock_sendmsg+0xc5/0x190 __sys_sendto+0x1fe/0x2c0 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x6d/0x140 entry_SYSCALL_64_after_hwframe+0x4b/0x53 other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&xa->xa_lock#24); local_irq_disable(); lock(&x->lock); lock(&xa->xa_lock#24); lock(&x->lock); *** DEADLOCK *** 2 locks held by charon/1337: #0: ffffffff87f8f858 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{4:4}, at: xfrm_netlink_rcv+0x5e/0x90 #1: ffff88813e0f0d48 (&x->lock){+.-.}-{3:3}, at: xfrm_state_delete+0x16/0x30 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&x->lock){+.-.}-{3:3} ops: 29 { HARDIRQ-ON-W at: lock_acquire+0x1be/0x520 _raw_spin_lock_bh+0x34/0x40 xfrm_alloc_spi+0xc0/0xe60 xfrm_alloc_userspi+0x5f6/0xbc0 xfrm_user_rcv_msg+0x493/0x880 netlink_rcv_skb+0x12e/0x380 xfrm_netlink_rcv+0x6d/0x90 netlink_unicast+0x42f/0x740 netlink_sendmsg+0x745/0xbe0 __sock_sendmsg+0xc5/0x190 __sys_sendto+0x1fe/0x2c0 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x6d/0x140 entry_SYSCALL_64_after_hwframe+0x4b/0x53 IN-SOFTIRQ-W at: lock_acquire+0x1be/0x520 _raw_spin_lock_bh+0x34/0x40 xfrm_timer_handler+0x91/0xd70 __hrtimer_run_queues+0x1dd/0xa60 ---truncated--- " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "6BE232AC-5A0F-4273-8CB5-7767FDE5879E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2c3688090f8a1f085230aa839cc63e4a7b977df0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d3d69c070d920fbb146d73dd3899a50f25d0901", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87c4417a902151cfe4363166245a3671a08c256c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21675.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21675.json index c3e138e77b0..75e69ab5742 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21675.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21675.json @@ -2,32 +2,151 @@ "id": "CVE-2025-21675", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.677", - "lastModified": "2025-01-31T12:15:28.677", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:30:22.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Clear port select structure when fail to create\n\nClear the port select structure on error so no stale values left after\ndefiners are destroyed. That's because the mlx5_lag_destroy_definers()\nalways try to destroy all lag definers in the tt_map, so in the flow\nbelow lag definers get double-destroyed and cause kernel crash:\n\n mlx5_lag_port_sel_create()\n mlx5_lag_create_definers()\n mlx5_lag_create_definer() <- Failed on tt 1\n mlx5_lag_destroy_definers() <- definers[tt=0] gets destroyed\n mlx5_lag_port_sel_create()\n mlx5_lag_create_definers()\n mlx5_lag_create_definer() <- Failed on tt 0\n mlx5_lag_destroy_definers() <- definers[tt=0] gets double-destroyed\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n Mem abort info:\n ESR = 0x0000000096000005\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x05: level 1 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n user pgtable: 64k pages, 48-bit VAs, pgdp=0000000112ce2e00\n [0000000000000008] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n Modules linked in: iptable_raw bonding ip_gre ip6_gre gre ip6_tunnel tunnel6 geneve ip6_udp_tunnel udp_tunnel ipip tunnel4 ip_tunnel rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) mlx5_fwctl(OE) fwctl(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlxfw(OE) memtrack(OE) mlx_compat(OE) openvswitch nsh nf_conncount psample xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter bridge stp llc netconsole overlay efi_pstore sch_fq_codel zram ip_tables crct10dif_ce qemu_fw_cfg fuse ipv6 crc_ccitt [last unloaded: mlx_compat(OE)]\n CPU: 3 UID: 0 PID: 217 Comm: kworker/u53:2 Tainted: G OE 6.11.0+ #2\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core]\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : mlx5_del_flow_rules+0x24/0x2c0 [mlx5_core]\n lr : mlx5_lag_destroy_definer+0x54/0x100 [mlx5_core]\n sp : ffff800085fafb00\n x29: ffff800085fafb00 x28: ffff0000da0c8000 x27: 0000000000000000\n x26: ffff0000da0c8000 x25: ffff0000da0c8000 x24: ffff0000da0c8000\n x23: ffff0000c31f81a0 x22: 0400000000000000 x21: ffff0000da0c8000\n x20: 0000000000000000 x19: 0000000000000001 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8b0c9350\n x14: 0000000000000000 x13: ffff800081390d18 x12: ffff800081dc3cc0\n x11: 0000000000000001 x10: 0000000000000b10 x9 : ffff80007ab7304c\n x8 : ffff0000d00711f0 x7 : 0000000000000004 x6 : 0000000000000190\n x5 : ffff00027edb3010 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : ffff0000d39b8000 x1 : ffff0000d39b8000 x0 : 0400000000000000\n Call trace:\n mlx5_del_flow_rules+0x24/0x2c0 [mlx5_core]\n mlx5_lag_destroy_definer+0x54/0x100 [mlx5_core]\n mlx5_lag_destroy_definers+0xa0/0x108 [mlx5_core]\n mlx5_lag_port_sel_create+0x2d4/0x6f8 [mlx5_core]\n mlx5_activate_lag+0x60c/0x6f8 [mlx5_core]\n mlx5_do_bond_work+0x284/0x5c8 [mlx5_core]\n process_one_work+0x170/0x3e0\n worker_thread+0x2d8/0x3e0\n kthread+0x11c/0x128\n ret_from_fork+0x10/0x20\n Code: a9025bf5 aa0003f6 a90363f7 f90023f9 (f9400400)\n ---[ end trace 0000000000000000 ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Borrar la estructura de selecci\u00f3n de puerto cuando falla la creaci\u00f3n. Borra la estructura de selecci\u00f3n de puerto en caso de error para que no queden valores obsoletos despu\u00e9s de que se destruyen los definidores. Esto se debe a que mlx5_lag_destroy_definers() siempre intenta destruir todos los definidores de retraso en tt_map, por lo que en el flujo a continuaci\u00f3n, los definidores de retraso se destruyen dos veces y causan un bloqueo del kernel: mlx5_lag_port_sel_create() mlx5_lag_create_definers() mlx5_lag_create_definer() <- Failed on tt 1 mlx5_lag_destroy_definers() <- definers[tt=0] gets destroyed mlx5_lag_port_sel_create() mlx5_lag_create_definers() mlx5_lag_create_definer() <- Failed on tt 0 mlx5_lag_destroy_definers() <- definers[tt=0] gets double-destroyed Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 64k pages, 48-bit VAs, pgdp=0000000112ce2e00 [0000000000000008] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: iptable_raw bonding ip_gre ip6_gre gre ip6_tunnel tunnel6 geneve ip6_udp_tunnel udp_tunnel ipip tunnel4 ip_tunnel rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) mlx5_fwctl(OE) fwctl(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlxfw(OE) memtrack(OE) mlx_compat(OE) openvswitch nsh nf_conncount psample xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter bridge stp llc netconsole overlay efi_pstore sch_fq_codel zram ip_tables crct10dif_ce qemu_fw_cfg fuse ipv6 crc_ccitt [last unloaded: mlx_compat(OE)] CPU: 3 UID: 0 PID: 217 Comm: kworker/u53:2 Tainted: G OE 6.11.0+ #2 Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : mlx5_del_flow_rules+0x24/0x2c0 [mlx5_core] lr : mlx5_lag_destroy_definer+0x54/0x100 [mlx5_core] sp : ffff800085fafb00 x29: ffff800085fafb00 x28: ffff0000da0c8000 x27: 0000000000000000 x26: ffff0000da0c8000 x25: ffff0000da0c8000 x24: ffff0000da0c8000 x23: ffff0000c31f81a0 x22: 0400000000000000 x21: ffff0000da0c8000 x20: 0000000000000000 x19: 0000000000000001 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8b0c9350 x14: 0000000000000000 x13: ffff800081390d18 x12: ffff800081dc3cc0 x11: 0000000000000001 x10: 0000000000000b10 x9 : ffff80007ab7304c x8 : ffff0000d00711f0 x7 : 0000000000000004 x6 : 0000000000000190 x5 : ffff00027edb3010 x4 : 0000000000000000 x3 : 0000000000000000 x2 : ffff0000d39b8000 x1 : ffff0000d39b8000 x0 : 0400000000000000 Call trace: mlx5_del_flow_rules+0x24/0x2c0 [mlx5_core] mlx5_lag_destroy_definer+0x54/0x100 [mlx5_core] mlx5_lag_destroy_definers+0xa0/0x108 [mlx5_core] mlx5_lag_port_sel_create+0x2d4/0x6f8 [mlx5_core] mlx5_activate_lag+0x60c/0x6f8 [mlx5_core] mlx5_do_bond_work+0x284/0x5c8 [mlx5_core] process_one_work+0x170/0x3e0 worker_thread+0x2d8/0x3e0 kthread+0x11c/0x128 ret_from_fork+0x10/0x20 Code: a9025bf5 aa0003f6 a90363f7 f90023f9 (f9400400) ---[ end trace 0000000000000000 ]--- " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.127", + "matchCriteriaId": "A3538C88-E91E-4A62-8415-2EA2F03EAAE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "38B2F4A9-C656-4A97-8718-D27E6BDFD82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1f6e619ef2a4def555b14ac2aeb4304bfccad59b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/473bc285378f49aa27e5b3e95a6d5ed12995d654", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5641e82cb55b4ecbc6366a499300917d2f3e6790", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/efc92a260e23cf9fafb0b6f6c9beb6f8df93fab4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21676.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21676.json index 1e44ceab372..bdd12735551 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21676.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21676.json @@ -2,28 +2,137 @@ "id": "CVE-2025-21676", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:28.780", - "lastModified": "2025-01-31T12:15:28.780", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:29:00.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: handle page_pool_dev_alloc_pages error\n\nThe fec_enet_update_cbd function calls page_pool_dev_alloc_pages but did\nnot handle the case when it returned NULL. There was a WARN_ON(!new_page)\nbut it would still proceed to use the NULL pointer and then crash.\n\nThis case does seem somewhat rare but when the system is under memory\npressure it can happen. One case where I can duplicate this with some\nfrequency is when writing over a smbd share to a SATA HDD attached to an\nimx6q.\n\nSetting /proc/sys/vm/min_free_kbytes to higher values also seems to solve\nthe problem for my test case. But it still seems wrong that the fec driver\nignores the memory allocation error and can crash.\n\nThis commit handles the allocation error by dropping the current packet." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fec: handle page_pool_dev_alloc_pages error La funci\u00f3n fec_enet_update_cbd llama a page_pool_dev_alloc_pages pero no gestion\u00f3 el caso cuando devolvi\u00f3 NULL. Hubo un WARN_ON(!new_page) pero a\u00fan as\u00ed proceder\u00eda a usar el puntero NULL y luego fallar\u00eda. Este caso parece algo raro, pero cuando el sistema est\u00e1 bajo presi\u00f3n de memoria puede suceder. Un caso en el que puedo duplicar esto con cierta frecuencia es cuando escribo sobre un recurso compartido smbd en un HDD SATA conectado a un imx6q. Establecer /proc/sys/vm/min_free_kbytes en valores m\u00e1s altos tambi\u00e9n parece resolver el problema para mi caso de prueba. Pero todav\u00eda parece incorrecto que el controlador fec ignore el error de asignaci\u00f3n de memoria y pueda fallar. Esta confirmaci\u00f3n gestiona el error de asignaci\u00f3n descartando el paquete actual." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "467D12FA-6BC4-4BB6-8A1A-AAF278B1ABC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/001ba0902046cb6c352494df610718c0763e77a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1425cb829556398f594658512d49292f988a2ab0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a0097db0544b658c159ac787319737712063a23", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21680.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21680.json index b432fa176e5..c141f37e61f 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21680.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21680.json @@ -2,36 +2,165 @@ "id": "CVE-2025-21680", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:29.160", - "lastModified": "2025-01-31T12:15:29.160", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:28:08.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npktgen: Avoid out-of-bounds access in get_imix_entries\n\nPassing a sufficient amount of imix entries leads to invalid access to the\npkt_dev->imix_entries array because of the incorrect boundary check.\n\nUBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24\nindex 20 is out of range for type 'imix_pkt [20]'\nCPU: 2 PID: 1210 Comm: bash Not tainted 6.10.0-rc1 #121\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n\ndump_stack_lvl lib/dump_stack.c:117\n__ubsan_handle_out_of_bounds lib/ubsan.c:429\nget_imix_entries net/core/pktgen.c:874\npktgen_if_write net/core/pktgen.c:1063\npde_write fs/proc/inode.c:334\nproc_reg_write fs/proc/inode.c:346\nvfs_write fs/read_write.c:593\nksys_write fs/read_write.c:644\ndo_syscall_64 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:130\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[ fp: allow to fill the array completely; minor changelog cleanup ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pktgen: Evitar acceso fuera de los l\u00edmites en get_imix_entries Pasar una cantidad suficiente de entradas imix conduce a un acceso no v\u00e1lido a la matriz pkt_dev->imix_entries debido a la verificaci\u00f3n de los l\u00edmites incorrecta. UBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24 index 20 is out of range for type 'imix_pkt [20]' CPU: 2 PID: 1210 Comm: bash Not tainted 6.10.0-rc1 #121 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Call Trace: dump_stack_lvl lib/dump_stack.c:117 __ubsan_handle_out_of_bounds lib/ubsan.c:429 get_imix_entries net/core/pktgen.c:874 pktgen_if_write net/core/pktgen.c:1063 pde_write fs/proc/inode.c:334 proc_reg_write fs/proc/inode.c:346 vfs_write fs/read_write.c:593 ksys_write fs/read_write.c:644 do_syscall_64 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:130 Found by Linux Verification Center (linuxtesting.org) with SVACE. [ fp: allow to fill the array completely; minor changelog cleanup ] " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.177", + "matchCriteriaId": "291FBB70-AA64-4BD1-9986-88FD57C27F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.127", + "matchCriteriaId": "A3538C88-E91E-4A62-8415-2EA2F03EAAE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.74", + "matchCriteriaId": "38B2F4A9-C656-4A97-8718-D27E6BDFD82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "B7D0DBC3-F63C-4396-8A47-6F3D4FA0556E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1a9b65c672ca9dc4ba52ca2fd54329db9580ce29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3450092cc2d1c311c5ea92a2486daa2a33520ea5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76201b5979768500bca362871db66d77cb4c225e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cde21f52042aa2e29a654458166b873d2ae66b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5d24a7074dcd0c7e76b7e7e4efbbe7418d62486", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21682.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21682.json index fc46ebff195..fd37783227d 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21682.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21682.json @@ -2,24 +2,123 @@ "id": "CVE-2025-21682", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:29.363", - "lastModified": "2025-01-31T12:15:29.363", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:25:48.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: always recalculate features after XDP clearing, fix null-deref\n\nRecalculate features when XDP is detached.\n\nBefore:\n # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp\n # ip li set dev eth0 xdp off\n # ethtool -k eth0 | grep gro\n rx-gro-hw: off [requested on]\n\nAfter:\n # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp\n # ip li set dev eth0 xdp off\n # ethtool -k eth0 | grep gro\n rx-gro-hw: on\n\nThe fact that HW-GRO doesn't get re-enabled automatically is just\na minor annoyance. The real issue is that the features will randomly\ncome back during another reconfiguration which just happens to invoke\nnetdev_update_features(). The driver doesn't handle reconfiguring\ntwo things at a time very robustly.\n\nStarting with commit 98ba1d931f61 (\"bnxt_en: Fix RSS logic in\n__bnxt_reserve_rings()\") we only reconfigure the RSS hash table\nif the \"effective\" number of Rx rings has changed. If HW-GRO is\nenabled \"effective\" number of rings is 2x what user sees.\nSo if we are in the bad state, with HW-GRO re-enablement \"pending\"\nafter XDP off, and we lower the rings by / 2 - the HW-GRO rings\ndoing 2x and the ethtool -L doing / 2 may cancel each other out,\nand the:\n\n if (old_rx_rings != bp->hw_resc.resv_rx_rings &&\n\ncondition in __bnxt_reserve_rings() will be false.\nThe RSS map won't get updated, and we'll crash with:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000168\n RIP: 0010:__bnxt_hwrm_vnic_set_rss+0x13a/0x1a0\n bnxt_hwrm_vnic_rss_cfg_p5+0x47/0x180\n __bnxt_setup_vnic_p5+0x58/0x110\n bnxt_init_nic+0xb72/0xf50\n __bnxt_open_nic+0x40d/0xab0\n bnxt_open_nic+0x2b/0x60\n ethtool_set_channels+0x18c/0x1d0\n\nAs we try to access a freed ring.\n\nThe issue is present since XDP support was added, really, but\nprior to commit 98ba1d931f61 (\"bnxt_en: Fix RSS logic in\n__bnxt_reserve_rings()\") it wasn't causing major issues." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: bnxt: siempre recalcula las caracter\u00edsticas despu\u00e9s de borrar XDP, corrige null-deref Recalcula las caracter\u00edsticas cuando se desconecta XDP. Antes: # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp # ip li set dev eth0 xdp off # ethtool -k eth0 | grep gro rx-gro-hw: off [solicitado el] Despu\u00e9s: # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp # ip li set dev eth0 xdp off # ethtool -k eth0 | grep gro rx-gro-hw: on El hecho de que HW-GRO no se vuelva a habilitar autom\u00e1ticamente es solo una molestia menor. El problema real es que las funciones volver\u00e1n de forma aleatoria durante otra reconfiguraci\u00f3n que invoca netdev_update_features(). El controlador no gestiona la reconfiguraci\u00f3n de dos cosas a la vez de forma muy robusta. A partir de el commit 98ba1d931f61 (\"bnxt_en: Fix RSS logic in __bnxt_reserve_rings()\"), solo reconfiguramos la tabla hash RSS si el n\u00famero \"efectivo\" de anillos Rx ha cambiado. Si HW-GRO est\u00e1 habilitado, el n\u00famero \"efectivo\" de anillos es el doble de lo que ve el usuario. Entonces, si estamos en un mal estado, con la rehabilitaci\u00f3n de HW-GRO \"pendiente\" despu\u00e9s de desactivar XDP, y reducimos los anillos en / 2, los anillos de HW-GRO haciendo 2x y ethtool -L haciendo / 2 pueden cancelarse entre s\u00ed, y la condici\u00f3n: if (old_rx_rings != bp->hw_resc.resv_rx_rings && en __bnxt_reserve_rings() ser\u00e1 falsa. El mapa RSS no se actualizar\u00e1 y nos bloquearemos con: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000168 RIP: 0010:__bnxt_hwrm_vnic_set_rss+0x13a/0x1a0 bnxt_hwrm_vnic_rss_cfg_p5+0x47/0x180 __bnxt_setup_vnic_p5+0x58/0x110 bnxt_init_nic+0xb72/0xf50 __bnxt_open_nic+0x40d/0xab0 bnxt_open_nic+0x2b/0x60 ethtool_set_channels+0x18c/0x1d0 Cuando intentamos acceder a un anillo liberado, el problema est\u00e1 presente desde que se agreg\u00f3 la compatibilidad con XDP, pero antes de el commit 98ba1d931f61 (\"bnxt_en: Fix RSS logic in __bnxt_reserve_rings()\") no causaba problemas importantes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16", + "versionEndExcluding": "6.12.11", + "matchCriteriaId": "D85A4303-7769-4ADC-A840-D2F38DB827CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*", + "matchCriteriaId": "5DFCDFB8-4FD0-465A-9076-D813D78FE51B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/08831a894d18abfaabb5bbde7c2069a7fb41dd93", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0aa6a37a3dbb40b272df5fc6db93c114688adcd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22206.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22206.json new file mode 100644 index 00000000000..2eec865d74d --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22206.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22206", + "sourceIdentifier": "security@joomla.org", + "published": "2025-02-04T15:15:19.797", + "lastModified": "2025-02-04T15:15:19.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.2 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'fieldfor' parameter in the GDPR Field feature." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://joomsky.com/js-jobs-joomla/", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json index e1173776943..1dc86364b07 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22394", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-15T05:15:10.343", - "lastModified": "2025-01-15T05:15:10.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:51:11.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:display_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.2.20", + "matchCriteriaId": "1594BAC6-F3B7-4ABE-91F8-E9619E0A1E6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000267927/dsa-2025-033", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json index 52d83f2b84d..1f0cc178222 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22395.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22395", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-07T03:15:06.047", - "lastModified": "2025-01-07T03:15:06.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-04T15:49:52.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-280" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:update_package_framework:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.01.02", + "matchCriteriaId": "D60A8235-9077-47AB-943B-BB923F803750" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000269079/dsa-2025-034-security-update-for-dell-update-package-dup-framework-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22641.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22641.json new file mode 100644 index 00000000000..ee5a979bce4 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22641.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22641", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:19.923", + "lastModified": "2025-02-04T15:15:19.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Prem Tiwari FM Notification Bar allows Stored XSS. This issue affects FM Notification Bar: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fm-notification-bar/vulnerability/wordpress-fm-notification-bar-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22642.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22642.json new file mode 100644 index 00000000000..4ea1b1efa45 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22642.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22642", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:20.120", + "lastModified": "2025-02-04T15:15:20.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RTO GmbH Dynamic Conditions allows Stored XSS. This issue affects Dynamic Conditions: from n/a through 1.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dynamicconditions/vulnerability/wordpress-dynamic-conditions-plugin-1-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22643.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22643.json new file mode 100644 index 00000000000..9cd91a05e5d --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22643.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22643", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:20.350", + "lastModified": "2025-02-04T15:15:20.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in FameThemes OnePress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OnePress: from n/a through 2.3.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/onepress/vulnerability/wordpress-onepress-theme-2-3-11-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22653.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22653.json new file mode 100644 index 00000000000..031abadf116 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22653.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22653", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:20.557", + "lastModified": "2025-02-04T15:15:20.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in templaza Music Press Pro allows Stored XSS. This issue affects Music Press Pro: from n/a through 1.4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/music-press-pro/vulnerability/wordpress-music-press-pro-plugin-1-4-6-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22662.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22662.json new file mode 100644 index 00000000000..75c84c02a24 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22662.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22662", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:20.780", + "lastModified": "2025-02-04T15:15:20.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter allows Stored XSS. This issue affects SendPulse Email Marketing Newsletter: from n/a through 2.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sendpulse-email-marketing-newsletter/vulnerability/wordpress-sendpulse-email-marketing-newsletter-plugin-2-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json new file mode 100644 index 00000000000..ab186905d76 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22664", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.003", + "lastModified": "2025-02-04T15:15:21.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Survey Maker team Survey Maker allows Stored XSS. This issue affects Survey Maker: from n/a through 5.1.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/survey-maker/vulnerability/wordpress-survey-maker-plugin-5-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22674.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22674.json new file mode 100644 index 00000000000..dcc1ead79fa --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22674.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22674", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.227", + "lastModified": "2025-02-04T15:15:21.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Get Bowtied Product Blocks for WooCommerce allows Stored XSS. This issue affects Product Blocks for WooCommerce: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/product-blocks-for-woocommerce/vulnerability/wordpress-product-blocks-for-woocommerce-plugin-1-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22675.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22675.json new file mode 100644 index 00000000000..9cfdd541c4e --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22675.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22675", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.433", + "lastModified": "2025-02-04T15:15:21.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Alert Box Block \u2013 Display notice/alerts in the front end allows Stored XSS. This issue affects Alert Box Block \u2013 Display notice/alerts in the front end: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/alert-box-block/vulnerability/wordpress-alert-box-block-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22696.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22696.json new file mode 100644 index 00000000000..01f38ad75d1 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22696.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22696", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.643", + "lastModified": "2025-02-04T15:15:21.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in EmbedPress Document Block \u2013 Upload & Embed Docs. This issue affects Document Block \u2013 Upload & Embed Docs: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/document/vulnerability/wordpress-document-block-upload-embed-docs-pdf-ppt-xls-or-any-documents-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22697.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22697.json new file mode 100644 index 00000000000..c9dbe3debfa --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22697.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22697", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.793", + "lastModified": "2025-02-04T15:15:21.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CyberChimps Responsive Blocks allows Reflected XSS. This issue affects Responsive Blocks: from n/a through 1.9.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/responsive-block-editor-addons/vulnerability/wordpress-responsive-blocks-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22699.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22699.json new file mode 100644 index 00000000000..d4d539706ca --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22699.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22699", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:21.947", + "lastModified": "2025-02-04T15:15:21.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Traveler Code. This issue affects Traveler Code: from n/a through 3.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/traveler-code/vulnerability/wordpress-traveler-code-plugin-3-1-0-unauthenticated-arbitrary-sql-execution-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22700.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22700.json new file mode 100644 index 00000000000..8918b0989d9 --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22700.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22700", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:22.140", + "lastModified": "2025-02-04T15:15:22.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Traveler Code. This issue affects Traveler Code: from n/a through 3.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/traveler-code/vulnerability/wordpress-traveler-code-plugin-3-1-0-subscriber-arbitrary-sql-execution-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22730.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22730.json new file mode 100644 index 00000000000..61b71ec3838 --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22730.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22730", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:22.293", + "lastModified": "2025-02-04T15:15:22.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Ksher Ksher allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ksher: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ksher-payment/vulnerability/wordpress-ksher-plugin-1-1-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22794.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22794.json new file mode 100644 index 00000000000..b30cde2e11d --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22794.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22794", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:22.503", + "lastModified": "2025-02-04T15:15:22.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Landoweb Programador World Cup Predictor allows Reflected XSS. This issue affects World Cup Predictor: from n/a through 1.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/world-cup-predictor/vulnerability/wordpress-world-cup-predictor-plugin-1-9-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json index af40311d929..a1ea24e80dd 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json @@ -2,16 +2,55 @@ "id": "CVE-2025-22918", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:15.400", - "lastModified": "2025-02-03T21:15:15.400", + "lastModified": "2025-02-04T15:15:22.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Polycom RealPresence Group 500 <=20 has Insecure Permissions due to automatically loaded cookies. This allows for the use of administrator functions, resulting in the leakage of sensitive user information." + }, + { + "lang": "es", + "value": "Polycom RealPresence Group 500 <=20 tiene permisos inseguros debido a la carga autom\u00e1tica de cookies. Esto permite el uso de funciones de administrador, lo que da como resultado la filtraci\u00f3n de informaci\u00f3n confidencial del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MinggongKs/Polycom/blob/main/README.md", diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22978.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22978.json index ca84e8623e1..5c03be2f3f5 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22978.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22978.json @@ -2,16 +2,55 @@ "id": "CVE-2025-22978", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:36.720", - "lastModified": "2025-02-03T20:15:36.720", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:42.890", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "eladmin <=2.7 is vulnerable to CSV Injection in the exception log download module." + }, + { + "lang": "es", + "value": "eladmin <=2.7 es vulnerable a la inyecci\u00f3n CSV en el m\u00f3dulo de descarga del registro de excepciones." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/elunez/eladmin/issues/863", diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23645.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23645.json new file mode 100644 index 00000000000..556a2f5cd11 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23645.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23645", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:22.873", + "lastModified": "2025-02-04T15:15:22.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Optimize Worldwide Find Content IDs allows Reflected XSS. This issue affects Find Content IDs: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/find-content-ids/vulnerability/wordpress-find-content-ids-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24598.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24598.json new file mode 100644 index 00000000000..a20784a7814 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24598.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24598", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:23.027", + "lastModified": "2025-02-04T15:15:23.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brandtoss WP Mailster allows Reflected XSS. This issue affects WP Mailster: from n/a through 1.8.17.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-mailster/vulnerability/wordpress-wp-mailster-plugin-1-8-17-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24599.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24599.json new file mode 100644 index 00000000000..d07547250e7 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24599.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24599", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:23.177", + "lastModified": "2025-02-04T15:15:23.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS. This issue affects Newsletters: from n/a through 4.9.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/newsletters-lite/vulnerability/wordpress-newsletters-plugin-4-9-9-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24602.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24602.json new file mode 100644 index 00000000000..b47383b877c --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24602.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24602", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:23.320", + "lastModified": "2025-02-04T15:15:23.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP24 WP24 Domain Check allows Reflected XSS. This issue affects WP24 Domain Check: from n/a through 1.10.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp24-domain-check/vulnerability/wordpress-wp24-domain-check-plugin-1-10-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24648.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24648.json new file mode 100644 index 00000000000..afc75507443 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24648.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24648", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:23.460", + "lastModified": "2025-02-04T15:15:23.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in wpase.com Admin and Site Enhancements (ASE) allows Privilege Escalation. This issue affects Admin and Site Enhancements (ASE): from n/a through 7.6.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/admin-site-enhancements/vulnerability/wordpress-admin-and-site-enhancements-ase-plugin-7-6-1-1-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24677.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24677.json new file mode 100644 index 00000000000..95b252dbdb5 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24677.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24677", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-04T15:15:23.603", + "lastModified": "2025-02-04T15:15:23.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in WPSpins Post/Page Copying Tool allows Remote Code Inclusion. This issue affects Post/Page Copying Tool: from n/a through 2.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/postpage-import-export-with-custom-fields-taxonomies/vulnerability/wordpress-post-page-copying-tool-to-export-and-import-post-page-for-cross-site-migration-plugin-2-0-3-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24686.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24686.json index 5a37e4b5fbd..606fd2e405f 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24686.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24686.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24686", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-31T09:15:11.340", - "lastModified": "2025-01-31T09:15:11.340", - "vulnStatus": "Received", + "lastModified": "2025-02-04T15:51:54.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss User Registration Forms RegistrationMagic allows Reflected XSS. This issue affects RegistrationMagic: from n/a through 6.0.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Metagauss User Registration Forms RegistrationMagic permite XSS reflejado. Este problema afecta a RegistrationMagic: desde n/a hasta 6.0.3.3." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.3.4", + "matchCriteriaId": "1088F654-A976-4A1A-979E-5D598CDBC83D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-6-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json index 857c942bd1f..47a0992397e 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25064", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.257", - "lastModified": "2025-02-03T20:15:37.257", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:43.670", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the ZimbraSyncService SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en ZimbraSyncService SOAP endpoint en Zimbra Collaboration 10.0.x anterior a 10.0.12 y 10.1.x anterior a 10.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.12#Security_Fixes", diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json index 633213d1a60..3ae7f784e85 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25065", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.370", - "lastModified": "2025-02-03T20:15:37.370", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:43.830", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSRF vulnerability in the RSS feed parser in Zimbra Collaboration 9.0.0 before Patch 43, 10.0.x before 10.0.12, and 10.1.x before 10.1.4 allows unauthorized redirection to internal network endpoints." + }, + { + "lang": "es", + "value": "La vulnerabilidad SSRF en el analizador de fuentes RSS en Zimbra Collaboration 9.0.0 antes del parche 43, 10.0.x antes de 10.0.12 y 10.1.x antes de 10.1.4 permite la redirecci\u00f3n no autorizada a la red interna endpoints." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.12#Security_Fixes", diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json index 9fbf62f2ad8..a60be8629ed 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25181", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.477", - "lastModified": "2025-02-03T20:15:37.477", - "vulnStatus": "Received", + "lastModified": "2025-02-04T16:15:43.990", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en timeoutWarning.asp en Advantive VeraCore hasta 2025.1.0 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro PmSess1." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/README.md b/README.md index 00b7e9bf5da..cd5ed8bd3be 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-04T15:00:33.013095+00:00 +2025-02-04T17:00:32.909910+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-04T14:52:50.557000+00:00 +2025-02-04T16:57:26.867000+00:00 ``` ### Last Data Feed Release @@ -33,43 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -280024 +280049 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `25` -- [CVE-2024-11623](CVE-2024/CVE-2024-116xx/CVE-2024-11623.json) (`2025-02-04T14:15:30.480`) -- [CVE-2024-13699](CVE-2024/CVE-2024-136xx/CVE-2024-13699.json) (`2025-02-04T13:15:07.953`) -- [CVE-2025-0510](CVE-2025/CVE-2025-05xx/CVE-2025-0510.json) (`2025-02-04T14:15:31.550`) -- [CVE-2025-1009](CVE-2025/CVE-2025-10xx/CVE-2025-1009.json) (`2025-02-04T14:15:31.653`) -- [CVE-2025-1010](CVE-2025/CVE-2025-10xx/CVE-2025-1010.json) (`2025-02-04T14:15:31.767`) -- [CVE-2025-1011](CVE-2025/CVE-2025-10xx/CVE-2025-1011.json) (`2025-02-04T14:15:31.887`) -- [CVE-2025-1012](CVE-2025/CVE-2025-10xx/CVE-2025-1012.json) (`2025-02-04T14:15:32.000`) -- [CVE-2025-1013](CVE-2025/CVE-2025-10xx/CVE-2025-1013.json) (`2025-02-04T14:15:32.123`) -- [CVE-2025-1014](CVE-2025/CVE-2025-10xx/CVE-2025-1014.json) (`2025-02-04T14:15:32.237`) -- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-02-04T14:15:32.363`) -- [CVE-2025-1016](CVE-2025/CVE-2025-10xx/CVE-2025-1016.json) (`2025-02-04T14:15:32.467`) -- [CVE-2025-1017](CVE-2025/CVE-2025-10xx/CVE-2025-1017.json) (`2025-02-04T14:15:32.600`) -- [CVE-2025-1018](CVE-2025/CVE-2025-10xx/CVE-2025-1018.json) (`2025-02-04T14:15:32.727`) -- [CVE-2025-1019](CVE-2025/CVE-2025-10xx/CVE-2025-1019.json) (`2025-02-04T14:15:32.850`) -- [CVE-2025-1020](CVE-2025/CVE-2025-10xx/CVE-2025-1020.json) (`2025-02-04T14:15:32.953`) +- [CVE-2024-23690](CVE-2024/CVE-2024-236xx/CVE-2024-23690.json) (`2025-02-04T15:15:17.973`) +- [CVE-2024-9643](CVE-2024/CVE-2024-96xx/CVE-2024-9643.json) (`2025-02-04T15:15:19.120`) +- [CVE-2024-9644](CVE-2024/CVE-2024-96xx/CVE-2024-9644.json) (`2025-02-04T15:15:19.273`) +- [CVE-2025-0825](CVE-2025/CVE-2025-08xx/CVE-2025-0825.json) (`2025-02-04T15:15:19.420`) +- [CVE-2025-22206](CVE-2025/CVE-2025-222xx/CVE-2025-22206.json) (`2025-02-04T15:15:19.797`) +- [CVE-2025-22641](CVE-2025/CVE-2025-226xx/CVE-2025-22641.json) (`2025-02-04T15:15:19.923`) +- [CVE-2025-22642](CVE-2025/CVE-2025-226xx/CVE-2025-22642.json) (`2025-02-04T15:15:20.120`) +- [CVE-2025-22643](CVE-2025/CVE-2025-226xx/CVE-2025-22643.json) (`2025-02-04T15:15:20.350`) +- [CVE-2025-22653](CVE-2025/CVE-2025-226xx/CVE-2025-22653.json) (`2025-02-04T15:15:20.557`) +- [CVE-2025-22662](CVE-2025/CVE-2025-226xx/CVE-2025-22662.json) (`2025-02-04T15:15:20.780`) +- [CVE-2025-22664](CVE-2025/CVE-2025-226xx/CVE-2025-22664.json) (`2025-02-04T15:15:21.003`) +- [CVE-2025-22674](CVE-2025/CVE-2025-226xx/CVE-2025-22674.json) (`2025-02-04T15:15:21.227`) +- [CVE-2025-22675](CVE-2025/CVE-2025-226xx/CVE-2025-22675.json) (`2025-02-04T15:15:21.433`) +- [CVE-2025-22696](CVE-2025/CVE-2025-226xx/CVE-2025-22696.json) (`2025-02-04T15:15:21.643`) +- [CVE-2025-22697](CVE-2025/CVE-2025-226xx/CVE-2025-22697.json) (`2025-02-04T15:15:21.793`) +- [CVE-2025-22699](CVE-2025/CVE-2025-226xx/CVE-2025-22699.json) (`2025-02-04T15:15:21.947`) +- [CVE-2025-22700](CVE-2025/CVE-2025-227xx/CVE-2025-22700.json) (`2025-02-04T15:15:22.140`) +- [CVE-2025-22730](CVE-2025/CVE-2025-227xx/CVE-2025-22730.json) (`2025-02-04T15:15:22.293`) +- [CVE-2025-22794](CVE-2025/CVE-2025-227xx/CVE-2025-22794.json) (`2025-02-04T15:15:22.503`) +- [CVE-2025-23645](CVE-2025/CVE-2025-236xx/CVE-2025-23645.json) (`2025-02-04T15:15:22.873`) +- [CVE-2025-24598](CVE-2025/CVE-2025-245xx/CVE-2025-24598.json) (`2025-02-04T15:15:23.027`) +- [CVE-2025-24599](CVE-2025/CVE-2025-245xx/CVE-2025-24599.json) (`2025-02-04T15:15:23.177`) +- [CVE-2025-24602](CVE-2025/CVE-2025-246xx/CVE-2025-24602.json) (`2025-02-04T15:15:23.320`) +- [CVE-2025-24648](CVE-2025/CVE-2025-246xx/CVE-2025-24648.json) (`2025-02-04T15:15:23.460`) +- [CVE-2025-24677](CVE-2025/CVE-2025-246xx/CVE-2025-24677.json) (`2025-02-04T15:15:23.603`) ### CVEs modified in the last Commit -Recently modified CVEs: `9` +Recently modified CVEs: `184` -- [CVE-2016-7193](CVE-2016/CVE-2016-71xx/CVE-2016-7193.json) (`2025-02-04T14:15:28.307`) -- [CVE-2021-27103](CVE-2021/CVE-2021-271xx/CVE-2021-27103.json) (`2025-02-04T14:43:15.367`) -- [CVE-2022-40765](CVE-2022/CVE-2022-407xx/CVE-2022-40765.json) (`2025-02-04T14:52:50.557`) -- [CVE-2022-42964](CVE-2022/CVE-2022-429xx/CVE-2022-42964.json) (`2025-02-04T14:11:18.270`) -- [CVE-2024-11704](CVE-2024/CVE-2024-117xx/CVE-2024-11704.json) (`2025-02-04T14:15:30.700`) -- [CVE-2024-21544](CVE-2024/CVE-2024-215xx/CVE-2024-21544.json) (`2025-02-04T14:15:30.917`) -- [CVE-2024-21549](CVE-2024/CVE-2024-215xx/CVE-2024-21549.json) (`2025-02-04T14:15:31.160`) -- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2025-02-04T14:23:51.827`) -- [CVE-2025-0240](CVE-2025/CVE-2025-02xx/CVE-2025-0240.json) (`2025-02-04T14:15:31.367`) +- [CVE-2025-21553](CVE-2025/CVE-2025-215xx/CVE-2025-21553.json) (`2025-02-04T16:15:41.797`) +- [CVE-2025-21554](CVE-2025/CVE-2025-215xx/CVE-2025-21554.json) (`2025-02-04T16:15:41.920`) +- [CVE-2025-21555](CVE-2025/CVE-2025-215xx/CVE-2025-21555.json) (`2025-02-04T16:15:42.037`) +- [CVE-2025-21556](CVE-2025/CVE-2025-215xx/CVE-2025-21556.json) (`2025-02-04T16:15:42.170`) +- [CVE-2025-21558](CVE-2025/CVE-2025-215xx/CVE-2025-21558.json) (`2025-02-04T16:15:42.290`) +- [CVE-2025-21559](CVE-2025/CVE-2025-215xx/CVE-2025-21559.json) (`2025-02-04T16:15:42.407`) +- [CVE-2025-21561](CVE-2025/CVE-2025-215xx/CVE-2025-21561.json) (`2025-02-04T16:15:42.520`) +- [CVE-2025-21562](CVE-2025/CVE-2025-215xx/CVE-2025-21562.json) (`2025-02-04T16:15:42.637`) +- [CVE-2025-21669](CVE-2025/CVE-2025-216xx/CVE-2025-21669.json) (`2025-02-04T15:38:39.790`) +- [CVE-2025-21670](CVE-2025/CVE-2025-216xx/CVE-2025-21670.json) (`2025-02-04T15:37:25.103`) +- [CVE-2025-21671](CVE-2025/CVE-2025-216xx/CVE-2025-21671.json) (`2025-02-04T15:36:40.887`) +- [CVE-2025-21673](CVE-2025/CVE-2025-216xx/CVE-2025-21673.json) (`2025-02-04T15:33:41.723`) +- [CVE-2025-21674](CVE-2025/CVE-2025-216xx/CVE-2025-21674.json) (`2025-02-04T15:31:30.483`) +- [CVE-2025-21675](CVE-2025/CVE-2025-216xx/CVE-2025-21675.json) (`2025-02-04T15:30:22.973`) +- [CVE-2025-21676](CVE-2025/CVE-2025-216xx/CVE-2025-21676.json) (`2025-02-04T15:29:00.623`) +- [CVE-2025-21680](CVE-2025/CVE-2025-216xx/CVE-2025-21680.json) (`2025-02-04T15:28:08.510`) +- [CVE-2025-21682](CVE-2025/CVE-2025-216xx/CVE-2025-21682.json) (`2025-02-04T15:25:48.707`) +- [CVE-2025-22394](CVE-2025/CVE-2025-223xx/CVE-2025-22394.json) (`2025-02-04T15:51:11.187`) +- [CVE-2025-22395](CVE-2025/CVE-2025-223xx/CVE-2025-22395.json) (`2025-02-04T15:49:52.617`) +- [CVE-2025-22918](CVE-2025/CVE-2025-229xx/CVE-2025-22918.json) (`2025-02-04T15:15:22.713`) +- [CVE-2025-22978](CVE-2025/CVE-2025-229xx/CVE-2025-22978.json) (`2025-02-04T16:15:42.890`) +- [CVE-2025-24686](CVE-2025/CVE-2025-246xx/CVE-2025-24686.json) (`2025-02-04T15:51:54.843`) +- [CVE-2025-25064](CVE-2025/CVE-2025-250xx/CVE-2025-25064.json) (`2025-02-04T16:15:43.670`) +- [CVE-2025-25065](CVE-2025/CVE-2025-250xx/CVE-2025-25065.json) (`2025-02-04T16:15:43.830`) +- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-02-04T16:15:43.990`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 00d4c72ad5e..e1c6f5ebcff 100644 --- a/_state.csv +++ b/_state.csv @@ -75532,7 +75532,7 @@ CVE-2015-2047,0,0,2704a69c5415cf0032ffb800fb0c5fbb11a6ac1ee9bf8c1864588d2de549b4 CVE-2015-2048,0,0,fd99c803aeaa4b05fb164e9b853997f754d242468c30cf8c99e13e009614e1c9,2024-11-21T02:26:39.240000 CVE-2015-2049,0,0,f8f0d997bb37ec8639cbb7da18049aa17a872025f2b7d884b4feee0b321bac52,2024-11-21T02:26:39.380000 CVE-2015-2050,0,0,bbe386a91567e56321126dc93dd5386a1a9bae2855ee91c5ac823ca6c6018b67,2024-11-21T02:26:39.523000 -CVE-2015-2051,0,0,2ec6c4bce6413bd4b263a63ecdb49620305af2959028a8ad366cba4ee229d9b6,2025-01-06T15:15:08.723000 +CVE-2015-2051,0,1,9cbf0ef7cadf693ca7425de1eb15bd500c6e16807a0fba1fc5f9ef4abc227319,2025-02-04T15:40:56.297000 CVE-2015-2052,0,0,2cb54fe3b8bbacbfd68bc37cc687e8615315e5eb691c09dcebceefecfb956e93,2024-11-21T02:26:39.887000 CVE-2015-2053,0,0,1cbb13193c9c15b7fffcd8a775c59016be05e9754e77d71097206817982b21d9,2024-11-21T02:26:40.020000 CVE-2015-2054,0,0,b4572a1920f607058a9b730c111e2615651825e83a65bb44f719ba29841028de,2024-11-21T02:26:40.163000 @@ -90149,7 +90149,7 @@ CVE-2016-7189,0,0,0a087a6720e56fac0ca05ec6e8f894824ec823772fede9a4fe29773dec36ac CVE-2016-7190,0,0,b964e4d524f2db2fbf9e7be1a5dff5d0e0c2c6c00bc0e1483bd71d460f620bd8,2024-11-21T02:57:40.523000 CVE-2016-7191,0,0,83758dd4986090dc7a54de58fc4ba5b9847119ea276597e59e51ad0f3a60b72c,2024-11-21T02:57:40.630000 CVE-2016-7192,0,0,025dd15a117dcc3f9a8fd318b5091df0fcba14976b5d724c3898b72cb5aa490d,2023-11-07T02:34:17.380000 -CVE-2016-7193,0,1,6a432d3a43faba00426651a0d39fe97a16d1ee8e4339cb1f315a0d2c4fc6368b,2025-02-04T14:15:28.307000 +CVE-2016-7193,0,0,6a432d3a43faba00426651a0d39fe97a16d1ee8e4339cb1f315a0d2c4fc6368b,2025-02-04T14:15:28.307000 CVE-2016-7194,0,0,8aab84e45d7873eb7560dbbb1418bde200869d2969b9cd22e0d30e2345d7bf28,2024-11-21T02:57:40.910000 CVE-2016-7195,0,0,c1384da90a0314f26d491ee18c775087216785b5a84bc5343229e80ea3f361cf,2024-11-21T02:57:41.030000 CVE-2016-7196,0,0,158af7495fb11d027dfdcad32f05a1a7fc4d0dbf85794d78063335fe4b1cddbb,2024-11-21T02:57:41.147000 @@ -92906,7 +92906,7 @@ CVE-2017-0141,0,0,5d50cc2a91ff21ac9aac2ec8596a4247d2dde09d04b2faaba6a35d682bad16 CVE-2017-0143,0,0,9e3fe7882f6a6a05f569b9d17e2c42157444dbdf96b380daa027feb73caf03db,2024-11-21T03:02:25.390000 CVE-2017-0144,0,0,467cf8dff52a7c9a26845ed41c610248af299b3a6081923ac1d261ab0535f468,2024-11-21T03:02:25.557000 CVE-2017-0145,0,0,d6ae7cdfe794a5a289357544ea4ea39c8477ded441b5fbc99bb7e0d2de5ce03a,2024-11-21T03:02:25.700000 -CVE-2017-0146,0,0,3b4e43205cc62d299307f8a19f6b8148a34a04f328b57b13ec4a30c116e58008,2024-11-21T03:02:25.847000 +CVE-2017-0146,0,1,6de48034ca92bb038717d56fa7d1e3d20b53d9b88bc0b10c4e345e9ef70a2f8d,2025-02-04T15:15:09.857000 CVE-2017-0147,0,0,72d811a618e4d8f8d8ea95988dabefa0dcb8f8556e8b0b943831793cf853411e,2024-11-21T03:02:25.993000 CVE-2017-0148,0,0,651d5e541b2c14a41ecc1e53211e9e719ecd6cba0f75717dee72e0c0a9a67e82,2024-11-21T03:02:26.143000 CVE-2017-0149,0,0,584de28918dd16d290f840ed63daae6c539f40e76f9ef0d82b3872de0d7cea3d,2024-11-21T03:02:26.330000 @@ -106741,7 +106741,7 @@ CVE-2017-6623,0,0,6d4774620fcb83c6b322f8e1d664cb13e12d0a339eeb6b0b725e009e440595 CVE-2017-6624,0,0,f76268456841d80cf0030a8d263b6d566268d518ecb486b090483ba7d246d77f,2024-11-21T03:30:09.277000 CVE-2017-6625,0,0,e0115d3c0a3799ef1ad77743639793bf6d16569e1012bfe831019e7e49a8a2df,2024-11-21T03:30:09.410000 CVE-2017-6626,0,0,ce313182f2ec6a10b02eedf83ed19ee7e3f882c7f59df5eb663ef08dbd74085e,2024-11-21T03:30:09.563000 -CVE-2017-6627,0,0,5db812f9964fce533cb2207f60b5c3fb6ffef508903e4bec902aa35a42116a3d,2025-01-27T19:38:29.867000 +CVE-2017-6627,0,1,08f5fb95fc3cce37286fae574ac4c97bf09d75973b748dc2efe0c2cd27ca9499,2025-02-04T16:15:29.117000 CVE-2017-6628,0,0,c54cd19471d8e65cdfbe6267dba07243fc81516dffcbd7dcbd8c7d61fc998130,2024-11-21T03:30:09.880000 CVE-2017-6629,0,0,bcd1c0382e6b9f8f923c5d781e0213c3a9cb536c50a8931b0d178989ca79cca5,2024-11-21T03:30:10.017000 CVE-2017-6630,0,0,f87e0f828fd9fd70cacf59f917a04aa6ef8fcaf453f9e8fc2011b9e59f1e3afb,2024-11-21T03:30:10.177000 @@ -106776,7 +106776,7 @@ CVE-2017-6658,0,0,3b6bb6f51f6f23e010c7f750bdf0aebc00115e7b494a7d81fde94324a503fc CVE-2017-6659,0,0,284165f5fc9e75c0fc49c9392c1f7ba00a5d0ece6e8135901877dc5dcc2a24b1,2024-11-21T03:30:14.680000 CVE-2017-6661,0,0,b0765e3e921f9f41c645fb064ff99e3b90499a074632508c02b61c4726ebdf54,2024-11-21T03:30:14.820000 CVE-2017-6662,0,0,7c8f6806cf1487236ce815b75eb672d840b52393f90a63d8485cf6bdf23dbe4f,2024-11-21T03:30:14.960000 -CVE-2017-6663,0,0,4211a94686a190ff6c0ebac8dc3c75a9487178d7dbccf2705d8e7f2c81d2048e,2025-01-27T20:19:13.787000 +CVE-2017-6663,0,1,869344c4026b7c4bd49f4015019b81b16f0cf8cab6ae220a3a09e71a7926ba42,2025-02-04T16:15:30.210000 CVE-2017-6664,0,0,bd78c98aa9961277ccd6d8ff1a0ede709d4fb899d1e41f5778e567b9f114e04e,2024-11-21T03:30:15.293000 CVE-2017-6665,0,0,b3be70c1f6ff699e4e1edcf0fa933602c3bf00a6df840c92674d12111fbeb2df,2024-11-21T03:30:15.440000 CVE-2017-6666,0,0,3d1019e1460279981e82c23c70b1d5b2726368dc05e78c200340eeb9396d3f68,2024-11-21T03:30:15.650000 @@ -106972,7 +106972,7 @@ CVE-2017-6877,0,0,9e8fc21ed4fd5d51752234bdde8df875041593db1a71f2e2ae6aa9a6c31894 CVE-2017-6878,0,0,66ceb535c85fc028792ff0af830c1111262cc367069859c27d02a524c1b78688,2024-11-21T03:30:42.877000 CVE-2017-6880,0,0,5e0dd410d3c5b00d6797ce83b2bd3c0649ecd3ef83cd0b851e1ae29367f9eb5e,2024-11-21T03:30:43.023000 CVE-2017-6883,0,0,4637d16b5c6af9932713bccb06a78ff84880e71e1f0f7fa7f98c46a7ae4002e0,2024-11-21T03:30:43.163000 -CVE-2017-6884,0,0,8f59b8587decb2c0a59295b2f6e6f943dc7099894666dc6111cfdd0dc28bc60a,2025-02-03T17:15:11.053000 +CVE-2017-6884,0,1,1283eb3e136c1a140496cfff3fa58a4ef7490714cb7a3ecece639a7e4b72e33a,2025-02-04T16:15:30.533000 CVE-2017-6885,0,0,04192b8b93d8e5f8b03f1ac7bfe807fe51f139471f31f691f478e099ec3ef6e1,2024-11-21T03:30:43.500000 CVE-2017-6886,0,0,2ade6acebcd0f72d1999f1a1b81b27b018dc228658ec3e32d8b01fee597c8fd4,2024-11-21T03:30:43.630000 CVE-2017-6887,0,0,7ddb4964686b101fada99cc02a37f491dfd99bb8365b71201f651fb8ec6d02db,2024-11-21T03:30:43.763000 @@ -111676,7 +111676,7 @@ CVE-2018-10553,0,0,44750b683e35eda64489bb3f7250809fa70f47dfb3bfad52443ce1e48897c CVE-2018-10554,0,0,62d77c77bbc83537edc6c13aa9bd1ac84c8d0e8668f08fbb6a35d7527f4e3266,2024-11-21T03:41:33.270000 CVE-2018-1056,0,0,762927b7e5f4456ed0e29cfc52a5e67f1f8f69080099349a6c09414a88f40f2a,2024-11-21T03:59:04.990000 CVE-2018-10561,0,0,f65fb6b24df82e398cfb7f234a4c87dfee144d1c18618661a90af03369b5bd44,2025-02-03T16:15:29.493000 -CVE-2018-10562,0,0,95ea8671d136befd0c3523d204778473cbd3c8fe8595a81d55a7af14a3cfaa9f,2025-01-23T17:23:16.207000 +CVE-2018-10562,0,1,f974c6f9cc071bc4e84d7a823fe69f006c939b19aaf848d2ceb37a76136b5480,2025-02-04T15:15:10.307000 CVE-2018-10563,0,0,bd4d4c366c874e7eabeee4db9f3325de1403473f96480bbde2ca58fbda04842b,2024-11-21T03:41:33.750000 CVE-2018-10564,0,0,d53db1104a16f166dd8b80c1424031108f95577ef1743aa1269ade879afde85c,2024-11-21T03:41:33.893000 CVE-2018-10565,0,0,aa56410f3d808a84b7421b4613176def76efb4d6e8c315f9392b326740cbbdf2,2024-11-21T03:41:34.043000 @@ -116374,7 +116374,7 @@ CVE-2018-15957,0,0,57a0b1480d8b8f522bae870ec99aea38b515c85fc81dc08b228ff3ede20a7 CVE-2018-15958,0,0,0f85c77372b6b59d96ac689eeafe11b08e16e9412f51ee8c5179ac8ce2e31bfe,2024-11-21T03:51:48.273000 CVE-2018-15959,0,0,d413549a4bcc41d7d4d7227e3efd9f81326d6fd8e25b9e128ab36d9f2472cbf6,2024-11-21T03:51:48.433000 CVE-2018-15960,0,0,a4820e78d3f3ff49c05bce547803a74dc7a101fd9f753a1b3f5d6ac75e1e681a,2024-11-21T03:51:48.560000 -CVE-2018-15961,0,0,20cf8084883e3662c3ed3f88bddc5462f2f9e5f036e46a7c1659a6c054bed1e8,2025-01-23T17:53:22.733000 +CVE-2018-15961,0,1,17123dc51c1183bc011fbe739139e9ed3793ad86084283d3c21dca0ff4be51f2,2025-02-04T16:15:30.740000 CVE-2018-15962,0,0,9e452596abbb0d3bce7f467ca3e73c2a0226823c3b1aedef08ee33fe22539f55,2024-11-21T03:51:48.813000 CVE-2018-15963,0,0,8efe13732c3664978942474b6dc4c636a07837aebb800ae09e901c02d472878b,2024-11-21T03:51:48.943000 CVE-2018-15964,0,0,032759fe99a6eda628ffca69ee2f4ccb25edc2b9b087b276029eee86257ba6e3,2024-11-21T03:51:49.093000 @@ -119242,7 +119242,7 @@ CVE-2018-19406,0,0,43a6b9abcb935b102d54df72d8bec105050eff0847d09bee05a843fd0844c CVE-2018-19407,0,0,24fea91ce6b2e274d978c9dab0a2381b2df1539d9b3c9be92ca0e5747b6e9a79,2024-11-21T03:57:51.883000 CVE-2018-19409,0,0,1876e55a2d65afba0be02ce8a4b2444f17432a36bc272a7f6b07999057ecb22f,2024-11-21T03:57:52.067000 CVE-2018-1941,0,0,7221aec0ebd68fd329a49613886292da9a4f97973fdf56aa45caaa0dfabf726c,2024-11-21T04:00:38.130000 -CVE-2018-19410,0,0,b35bccd4ab28e771c850d3e1b7e62dca9944ca1b2a242e4ab0b916bc9ac0f793,2024-11-21T03:57:52.247000 +CVE-2018-19410,0,1,9ea6f866e5c7e8905aa7260db22ca43a297aefa8acf8dd23373d75a72b6c93ba,2025-02-04T16:15:30.963000 CVE-2018-19411,0,0,af45ed89010d349c21ea79a761116ae9a975994d2004d0d769bee072e0e3e153,2024-11-21T03:57:52.390000 CVE-2018-19413,0,0,f4113187e10bf90fb789c0d6906ec800aca2db8949bd6c22eb87b2974b518c1a,2024-11-21T03:57:52.540000 CVE-2018-19414,0,0,8ef7b90d3ca4f10c7d7d78e3d33ab0b1878ed67276ca2eb97b5dc76432c2fb6c,2024-11-21T03:57:52.690000 @@ -123481,7 +123481,7 @@ CVE-2018-4935,0,0,399998ac67f634b872f680c3ab88b518d1b7522c988571ccde1825342ee456 CVE-2018-4936,0,0,271ca644a13b593428b1d96d5ee35c1fb7bedfe88af2b402336b313e1b9390fd,2024-11-21T04:07:44.760000 CVE-2018-4937,0,0,96a07bf209f86ba011673cf73c0d98ce9c8331c74e615eae43383c5e8a71fc41,2024-11-21T04:07:44.890000 CVE-2018-4938,0,0,838a8c7bbb985b850f0cf887792b9ee59b8cbd5a1f48a2637cc5d2b46199428b,2024-11-21T04:07:45.027000 -CVE-2018-4939,0,0,387fd6870caede22d37461c89f5a5c58e882403a5a64d9f2e5ad5502acfd9444,2025-01-23T15:36:22.337000 +CVE-2018-4939,0,1,84f30819d0da8f2e72b4258417e7effe194992683396da8be5d045d189091237,2025-02-04T16:15:31.183000 CVE-2018-4940,0,0,58e9c596099b32df415dedd77c2fabcf01942da5d842274955e956635e9fc36f,2024-11-21T04:07:45.277000 CVE-2018-4941,0,0,c9746042e985ba715e6224aa8d5e3ca3bc94efb2036fe1778d418e1de275b807,2024-11-21T04:07:45.403000 CVE-2018-4942,0,0,badf52afcf03141ee18de1887aaa45c591c4e8a4cec6581f3991cfff3b3fd89a,2024-11-21T04:07:45.530000 @@ -126376,7 +126376,7 @@ CVE-2018-8577,0,0,a37939f87fb8613fcaa1f9b3749855855e6ab22f4541764103e4fa662ae6d8 CVE-2018-8578,0,0,c3845b7683b296295195f4c72f82bfedbfbf991296f67c4b5d7a5ac2fd4e8e02,2024-11-21T04:14:04.460000 CVE-2018-8579,0,0,fb338fafdc43e642a9801199527c1a37d85e0686b3bf929fb8ea36c5770f9a3f,2024-11-21T04:14:04.570000 CVE-2018-8580,0,0,6cfac3d8f82cd6505408218bec5738b927926f9b3e2e3c2f81e587ffcec25999,2024-11-21T04:14:04.683000 -CVE-2018-8581,0,0,457f2eff07d1aad5f093f07f71e4d83f60b839c3302ae8cb0ee8a16a50c38854,2024-11-21T04:14:04.793000 +CVE-2018-8581,0,1,f4d0b237aba171d815422bf775da5c2a5baae189e34402057625575df5dec1ae,2025-02-04T16:15:31.400000 CVE-2018-8582,0,0,5530f4e0697922a0c5b19038a38714f2b1322a28b95e31c013e5813fe7206489,2024-11-21T04:14:04.893000 CVE-2018-8583,0,0,3e8b2518c174e5fd6b22b8afdb3708d6b23bc783be1b23267d194a7154d64bdf,2024-11-21T04:14:05.030000 CVE-2018-8584,0,0,c58a6adf8bf131feb510df0cfce4b001b46f4e75023bc31c2a34bf87491d5e68,2024-11-21T04:14:05.160000 @@ -126869,7 +126869,7 @@ CVE-2018-9272,0,0,ac554883181ea7a8e6a7dc5aae78490d576013aafb81a6f499cfcb5caabdc3 CVE-2018-9273,0,0,87b88345c90ffaef935bcb7a09ce9476b02fca862f53f32581cc84e26fac9166,2024-11-21T04:15:16.210000 CVE-2018-9274,0,0,2eb92080af4fbf961f1e5f751288f455e1c66b2f5e2512eefdfab3ef55f08244,2024-11-21T04:15:16.370000 CVE-2018-9275,0,0,a8d6e5bdcca45958f73a4232e8f17755e94443388e2a9fc9a136fe387e6300a1,2024-11-21T04:15:16.520000 -CVE-2018-9276,0,0,c7cd49678d7cfaf30e3db7c7eb6c586c0b02967663d0784a960857f61be5b771,2024-11-21T04:15:16.670000 +CVE-2018-9276,0,1,0c0c9a2d80fdde1b8717f7d134d8b49d9dec54d47b9886b1f54bd6f26073a6fc,2025-02-04T16:15:31.603000 CVE-2018-9279,0,0,0a86219880870026a4d53c5397bc07946d9c71712fd7e40dcc9f1723b2e42de2,2024-11-21T04:15:16.833000 CVE-2018-9280,0,0,a32154fcbceddb33a222c921a469a97842c8df1742b170e1248af4f6c92328b2,2024-11-21T04:15:16.980000 CVE-2018-9281,0,0,db4c44c2f0239c12c4e1201d93237d902949521e082bcf8f5a76fde8a4caf846,2024-11-21T04:15:17.127000 @@ -127611,7 +127611,7 @@ CVE-2019-0539,0,0,c73a3d36f90d9c6dff6809040077ae483187a0f062d6d85f6774cd37654d1d CVE-2019-0540,0,0,92ee09f5b1924f3ebce93d331f303c215d97d91da02233f652258f8deee2e47d,2024-11-21T04:16:49.117000 CVE-2019-0541,0,0,dc1875bdce2afd70d3598de4ccf8a0d1e64c79f5332af0a070ca8ffbc12ab057,2024-11-21T04:16:49.277000 CVE-2019-0542,0,0,14ec09a29e1407a93d2372effd914d8d28a08f679c05677d3254c7f81ad98292,2024-11-21T04:16:49.423000 -CVE-2019-0543,0,0,096dd34e5e9e64d4b10387a63f650d4ea837bee0bc340445e91708fe74fd002e,2024-11-21T04:16:49.550000 +CVE-2019-0543,0,1,8c223aca5215cb13ca334e4d57fcf74d7559e4897ac01c1b545e342f7eec9047,2025-02-04T16:15:31.837000 CVE-2019-0544,0,0,9f794b8b887b44cb7f8bfe74a8aea542043eb92ca78a6138037744860a9a6c0f,2023-11-07T03:01:54.657000 CVE-2019-0545,0,0,c6b46d83898deb37ce8bab6eed71637453c2a8637033092729a487a5da325817,2024-11-21T04:16:49.683000 CVE-2019-0546,0,0,184bdf5ad49c35937422c96cf09b1b8114e43d86520bddb5ae13e47357d6ab1b,2024-11-21T04:16:49.840000 @@ -131402,7 +131402,7 @@ CVE-2019-1321,0,0,85356204dc592489cd2237ba60698985b538ae4d2f6405d6416298d6b5aab7 CVE-2019-13217,0,0,270c15a2297a74168c601232215f604cc09932a804ba8c0d8b925ff614d88bc4,2024-11-21T04:24:28.070000 CVE-2019-13218,0,0,068754b3aac0330171c517fa202b35e3e560f759cab3478a7e34f4a7e0a519d0,2024-11-21T04:24:28.223000 CVE-2019-13219,0,0,e75598f26f80a57d74032b2516a6225a3b70b75c6e13c6401ef24a9edda29b94,2024-11-21T04:24:28.383000 -CVE-2019-1322,0,0,c9d3e4741c353384ef6a79059b612024a77afbf821164cf534c539a29fc01996,2024-11-21T04:36:28.590000 +CVE-2019-1322,0,1,406a0153ab838b9854081d029bcab515daa21d36aec288bb61e69683e91cf71c,2025-02-04T16:15:31.997000 CVE-2019-13220,0,0,60cb3a84a60b7c878f814837989cfff36db1e50b7fad9b8b481b5990e87b8eec,2024-11-21T04:24:28.537000 CVE-2019-13221,0,0,066b7847e47337a52a45eee1522252cd2b24391ed1934bc763fbb1cf3bdca914,2024-11-21T04:24:28.680000 CVE-2019-13222,0,0,ba4c2c4483100c9cf5af83be2fb17bce8a8ab9bac675e7d3f369eaaefd685c05,2024-11-21T04:24:28.820000 @@ -145064,7 +145064,7 @@ CVE-2020-0792,0,0,a6015feec0a34b742ee81719a2f63158fa09a07ab11fac2e18cc47c268e7a9 CVE-2020-0793,0,0,f1e4bba0d9d29de61e8ac7582e616aa90cfc14c113ec2eb72cd708db50d30441,2024-11-21T04:54:13.640000 CVE-2020-0794,0,0,ad9e77fd6552ddc6d1f870ed0c284703676069ef880165bcdba77bda0c52ed05,2024-11-21T04:54:13.763000 CVE-2020-0795,0,0,c21c894c6be5666d718ab1145258857c88a7e7366c4ada7b1bb855a2eb30be97,2024-11-21T04:54:13.877000 -CVE-2020-0796,0,0,8b19ca204dea880ba8a79a81a5513236ea159ce961365b1a3a170ce9f95d0447,2024-11-21T04:54:13.983000 +CVE-2020-0796,0,1,2ee151bbd348f83a07522caea9949270e2b7f7a5a303d71654034b1b48569eac,2025-02-04T16:15:32.283000 CVE-2020-0797,0,0,08b2d3e02cb264cfadd4237cf9cd4d19ecd78df1d89995b83594269b7050a381,2024-11-21T04:54:14.107000 CVE-2020-0798,0,0,147a88c30d12fc1c50cfe588b515514e6e9d3b3f1062894c24f70a02b494ee51,2024-11-21T04:54:14.223000 CVE-2020-0799,0,0,262891ceca543ea99d49bf617b1a5a6fc678a1c8751d75424b97fc14465f4190,2024-11-21T04:54:14.333000 @@ -150921,7 +150921,7 @@ CVE-2020-15995,0,0,ec69dba4367df4a7ef943446ca0379ddec0fb425be65abc7e0cad807d629a CVE-2020-15996,0,0,32184d1c13e9b50fd32372ca7d6b090527c05b7b000135a09518344f67154fc4,2024-11-21T05:06:38.243000 CVE-2020-15997,0,0,49be56b5486d68eee3e7aadb2ce6d5b8d04fccde5d111535ad15f6a220aeb833,2024-11-21T05:06:38.357000 CVE-2020-15998,0,0,4a970fa702d70e3c664a24a50bf110f296ac609fe155181e1761ea8b04035268,2024-11-21T05:06:38.467000 -CVE-2020-15999,0,0,460fd83fe4b144b594b87ec7a74935bd189c311ee9603d2e7ef1517f3140ef41,2025-02-03T15:15:11.433000 +CVE-2020-15999,0,1,0b2d1768612e92b5ef5e689cca90b6a71bfc520547a227d59d43b0a25713eff7,2025-02-04T15:15:10.580000 CVE-2020-1600,0,0,7c334ada4a0f3b4f892353c307d7ca882ef017a7370838cb4f71f59c493ae725,2024-11-21T05:10:55.953000 CVE-2020-16000,0,0,a927bcf679f88ed56044568236d24e82309e0b0dcfb6362de2539c3d41f9358c,2024-11-21T05:06:38.740000 CVE-2020-16001,0,0,876a9498456d19a3360c8e89b35ec96096b5627699f61320b07d3aca59d8fc97,2024-11-21T05:06:38.883000 @@ -159882,7 +159882,7 @@ CVE-2020-4002,0,0,e9beaec2101c37bc4d501b6ddef1038d8d23b3467265083528445d931e584c CVE-2020-4003,0,0,b41fb7acd7eacefa1f8ae797ac7e75ec576eeb6ad8b6123d8d1cd1d856843434,2024-11-21T05:32:08.760000 CVE-2020-4004,0,0,d4a740c23a00f0852b28b82ed859b3946a28e39527f027ebdca964fe7396c7e7,2024-11-21T05:32:08.870000 CVE-2020-4005,0,0,a403b3a2aecdfdb93f6f7acda23bf3ffd474e06e3ae0f5e3faa59d52c457bf7e,2024-11-21T05:32:09.030000 -CVE-2020-4006,0,0,7d1fba214f69d44bfc4eeb3b6e873a629310230a31cf3edf5a35af4a653a1e61,2024-11-21T05:32:09.153000 +CVE-2020-4006,0,1,a1d4f53d3e5b763c79abed7b3c2e0221e30f8767e7c2bad1d96430361a99afa9,2025-02-04T16:15:32.567000 CVE-2020-4008,0,0,9f2fd03418678bcf9efff1d1f391f4168cba79a0b4eec05a79e46d857bb8d9aa,2024-11-21T05:32:09.273000 CVE-2020-4013,0,0,97618e3d51b1c8cb696b551db762bf430762dca78d4fdf79f3826c607380eca1,2024-11-21T05:32:09.397000 CVE-2020-4014,0,0,87351da1fec8c4b4bc96286aefc594a5f1750213b586cf6d9a8f386df52746f7,2024-11-21T05:32:09.510000 @@ -161978,7 +161978,7 @@ CVE-2020-6568,0,0,0d06ac2d74579c9841c223e03809605179c185b1cd93859e050e309f31fee0 CVE-2020-6569,0,0,dd7acd9fc556b7b252c05b52dfba75961e01f6fda7326f72f03c9cb506d91b0e,2024-11-21T05:35:58.860000 CVE-2020-6570,0,0,40c1c23d973add53721be1be2de9a2c4c86cb53d72938de93810d8529c9d0198,2024-11-21T05:35:58.973000 CVE-2020-6571,0,0,735d3a790133bdd740d6dd33af2c2857cf73a47d1fede83582c7291195240a26,2024-11-21T05:35:59.090000 -CVE-2020-6572,0,0,232078c2bc250004fca3065a55d690454a2fe3408808705eb77f94a3162c468b,2025-02-03T15:15:12.520000 +CVE-2020-6572,0,1,789222bc8484bda9f1d4a3069d0efa54ab49a3363708a94e2a74c6b37ff01549,2025-02-04T15:15:10.900000 CVE-2020-6573,0,0,7047a584fd32b6b671bfff5b08be624a4e9187010bd11257c53f2886f046384b,2024-11-21T05:35:59.293000 CVE-2020-6574,0,0,303ad55fcb736769f4cf9ea3ed4a390f8f37dd9323d86dff170695ea9dcaf2bf,2024-11-21T05:35:59.420000 CVE-2020-6575,0,0,62024afcd971a1d42c6d1ce843a96019408fb91a7a5f300a21805d0cdf3b1172,2024-11-21T05:35:59.543000 @@ -166643,7 +166643,7 @@ CVE-2021-20024,0,0,ed3768e12e4f14c754a691b9f1a8d63c0ba5d9e615ceab7a5079097a78da5 CVE-2021-20025,0,0,a557c524f3d0620495311f58e53d5b6d2a34e4771a645ab67df4e0312ad32324,2024-11-21T05:45:48.370000 CVE-2021-20026,0,0,cafa6aa3457f63a66d981234d7b8cc409a1192e2cdbdbe23e971556fd89fd7b2,2024-11-21T05:45:48.497000 CVE-2021-20027,0,0,88895d818d156f39ff2b30851242b0c197f6948efc84f5711f86ab5d1a5d2fbf,2024-11-21T05:45:48.637000 -CVE-2021-20028,0,0,8132c226643238dc3f4e2dab93406d9105fe43a389d7f4fade5dd1a28f43bc6b,2024-11-21T05:45:48.813000 +CVE-2021-20028,0,1,f783b4fa01234113c474da34f02ff458e9e0d5703e4fc8b4aefba2ce13b631ae,2025-02-04T15:15:11.157000 CVE-2021-2003,0,0,29ec8ab1f7ed338ee4e46ebe726330ad37fbb2128b651c9c6cfa3c380059f387,2024-11-21T06:02:09.357000 CVE-2021-20030,0,0,9b67b74830787f2ff0a1b8cb957fe2717fd348199e3d219354cc8d5245c1064d,2024-11-21T05:45:48.980000 CVE-2021-20031,0,0,393dffb096b4b1f69a8f8cf5cfddd75db046671f0d08a89d7fb4b11e2f7b97a2,2024-11-21T05:45:49.147000 @@ -166651,7 +166651,7 @@ CVE-2021-20032,0,0,52f842cb9755b5c2485b43ba984b75004b19d509a7da6dbc70562eb63d80c CVE-2021-20034,0,0,2a844d6d5040359580b1efc44ad416e71ea4320d170a591d54fe0dae55f70546,2024-11-21T05:45:49.503000 CVE-2021-20035,0,0,0b363c786323ddee134788c1f608ed27016e0264622d6532ba4189c93692c248,2024-11-21T05:45:49.650000 CVE-2021-20037,0,0,a7ea94c5e8b39193e65358b7a42f730428ba61716910826ea9e5d64063ef401f,2024-11-21T05:45:49.770000 -CVE-2021-20038,0,0,ecec515a86534f6891b2b8a907d71274f9ce5ca64adbb4f388983236757c8698,2024-11-21T05:45:49.880000 +CVE-2021-20038,0,1,42d73c9f686a5721ebf67293b12a0224ea3510f33657b245d30251be7c4f5068,2025-02-04T15:15:11.480000 CVE-2021-20039,0,0,1e5dd0dd591b15823cb51846afa29d54c89a836311a15ec29f219fdec6acb97c,2024-11-21T05:45:50.030000 CVE-2021-2004,0,0,3e4da59a3277ea5180dadf6ab84c031b04e5f9cee49ad7f6d011f75216a4b23f,2024-11-21T06:02:09.473000 CVE-2021-20040,0,0,3855c4ef3203e65969977782fa0e89ffc46ac3cec982a854c3bdd7873f31f773,2024-11-21T05:45:50.157000 @@ -168514,7 +168514,7 @@ CVE-2021-21969,0,0,4addf9bbf3662d8229acaca4e880204f1601b31da2a081daf56b5ed796906 CVE-2021-2197,0,0,3f3db597d4914db83f4ab28169f5f58121ce7bcca935decda34671de30a0618f,2024-11-21T06:02:36.277000 CVE-2021-21970,0,0,e50b82f20c897311b554d7d59260102f13c4cd1b557720ea6f916eec21ce6df7,2024-11-21T05:49:20.640000 CVE-2021-21971,0,0,a15f1643a0f04bb936cefae8f6967a0fc877c6217c175a92d1206b9f1c8fdd98,2024-11-21T05:49:20.760000 -CVE-2021-21972,0,0,1e8c1b352864ea6a5ad4d21b0a4a4276c5819ab0e32cadd601038578a2a05d73,2024-11-21T05:49:20.893000 +CVE-2021-21972,0,1,b57c893da4ffcca06a65da114b9ad2b198306b125accfcb2157b074d4baad2cb,2025-02-04T16:15:32.760000 CVE-2021-21973,0,0,7cd54f6a67d61381f0a6f03401cdb1a702f8c1be8a6263593f77b592173b1b38,2024-11-21T05:49:21.043000 CVE-2021-21974,0,0,3de0ff3f51a876bb964c76490a717a7a534efb367618e09e797a5112d8532ed2,2024-11-21T05:49:21.173000 CVE-2021-21975,0,0,a59dfe3f56e1f21963abfbbbe294abb2602ccb6a7bcceb8dcaffe80f523f15d8,2025-01-29T18:15:39.043000 @@ -169351,7 +169351,7 @@ CVE-2021-22890,0,0,b070522bf25344ce3f1f36ff4bb9e2b3083a07d1d0f51ae7b2b353856f978 CVE-2021-22891,0,0,f1375f40f883e827bf954d816430dab2da18924ceee385303e34e274ec76665e,2024-11-21T05:50:51.160000 CVE-2021-22892,0,0,ed6ed3f15ea68b0c996a949c8c3e1fd78c0607ed69e70e2bd692094d3e09e915,2024-11-21T05:50:51.297000 CVE-2021-22893,0,0,02a47fe94f8e8b2a41f1b3c9bf861591b108223aa158884bda87adf9af387c33,2024-11-21T05:50:51.423000 -CVE-2021-22894,0,0,21a59f900575780a6ad50c8ad4ce6aa7ec2fd28527962c0ee19bada1396ed6c5,2024-11-21T05:50:51.567000 +CVE-2021-22894,0,1,86830f6f0b379c2664e99fc6152efd7d54a69da601dda3cc8cff4ec55684796d,2025-02-04T16:15:32.970000 CVE-2021-22895,0,0,30ac68f6be63438396a0462875cc9f9f8f9e40842ca410d3d92335e7a77e0178,2024-11-21T05:50:51.690000 CVE-2021-22896,0,0,88a15b138df68bc2a8949795a527448e66f8c592f21449636430638999cdd4c6,2024-11-21T05:50:51.803000 CVE-2021-22897,0,0,fc717ef450a94baa694373bc4fd1267e7b274a7a872b4b90df18bac7da5698e3,2024-11-21T05:50:51.927000 @@ -169403,7 +169403,7 @@ CVE-2021-22938,0,0,7a77589f30e447691dcc10fd2341f6fa466f5af305dc56e15a9579d960711 CVE-2021-22939,0,0,d537c8c2001847f3f8cb83ea2061e51678ab74dd374c57713d6ac3ac3488b3fd,2024-11-21T05:50:58.657000 CVE-2021-2294,0,0,db37cea420ffce0ba24a4ff567e38ae40936541597f1bb31a8e7524ae9699f0e,2024-11-21T06:02:49.697000 CVE-2021-22940,0,0,ba980ff4bfe2d7dab1c758699edf885ee05e4080e45821f463929e4ce959dfa9,2024-11-21T05:50:58.827000 -CVE-2021-22941,0,0,ec2e58e72a42586cbcee451416d3c286f78ce274b9e9de73f7da90f007cb187c,2024-11-21T05:50:58.987000 +CVE-2021-22941,0,1,72a680e2152b3f95ffc47453e4c70a8b82d1e945918597311b8712baa1680dc3,2025-02-04T15:15:11.857000 CVE-2021-22942,0,0,7f33b415af558d8d60da5ea380ce34bac5709ef653426d8c09d598fadeb83ec2,2024-11-21T05:50:59.093000 CVE-2021-22943,0,0,0d6b49e6af1c4392f57318758567c9c2018155ffe54a33ee61492f95cace1bb0,2024-11-21T05:50:59.213000 CVE-2021-22944,0,0,6881a80440cbea6ce701d2e108dd54e4dc1123dc8d1df3d5df8be44ccf53b9d1,2024-11-21T05:50:59.317000 @@ -171936,7 +171936,7 @@ CVE-2021-26080,0,0,9d1851518e72abfea418fcd3eb6de8729a30f11b4c207e08bae1111c1c1f4 CVE-2021-26081,0,0,196a1e3dac3b7f00bea589174861ac7c897d8a5750b06d75fd93ddad18488aee,2024-11-21T05:55:50.027000 CVE-2021-26082,0,0,b743153a2b3f833c773cf54fdd6844d06278173a6242ed9dde6cd46a06bdf62d,2024-11-21T05:55:50.220000 CVE-2021-26083,0,0,4711545f1d357e7393e6d3e534d28e1f9e5c94f03b05466f1c19461e6b4f4159,2024-11-21T05:55:50.333000 -CVE-2021-26084,0,0,27ecffd2747721dde617b1cf5824d67a1363fef0dec2687d406c5a2189013b9c,2024-11-21T05:55:50.450000 +CVE-2021-26084,0,1,05f6a8462039fe2919e89d1e8c80dbc996ee21dc27d899e84742a2607e1413dc,2025-02-04T15:15:12.120000 CVE-2021-26085,0,0,afdf781542a291800442bdc2659868f39ebb6566dc120cda320ff76f629d8e35,2024-11-21T05:55:50.590000 CVE-2021-26086,0,0,fa328924fa5b64cf3fd5de1c1ff21e1c8f7e7b70bdc34e63e407d676aa56596b,2024-11-21T05:55:50.703000 CVE-2021-26088,0,0,c26e6d0a3d2d39cb55ac02c63c46a7014509930ab7b8dfa748b6804dc94fc467,2024-11-21T05:55:50.907000 @@ -172586,7 +172586,7 @@ CVE-2021-27098,0,0,9e6cdda3120a814f234d76d3afb16b7396fd3a84d763d4f4a227c5586e3b8 CVE-2021-27099,0,0,751da259055179f5efef507a51923df3861abe80c46a1e49665fb5671879d662,2024-11-21T05:57:20.980000 CVE-2021-27101,0,0,2183a732ecaaaaabcabec5d9241017df931c7a6d72ff5abd7b64692cb4330fb2,2025-02-03T17:15:11.897000 CVE-2021-27102,0,0,1137d8139a3e9961c49b2becd0a30e011ac59344f581b041f2ce2bce6c0d4c50,2025-02-03T16:15:30.850000 -CVE-2021-27103,0,1,ab24e21db6b5e5209dce9d4db268ef374607ac6b3fdebf0f192e15e93c5dfa35,2025-02-04T14:43:15.367000 +CVE-2021-27103,0,0,ab24e21db6b5e5209dce9d4db268ef374607ac6b3fdebf0f192e15e93c5dfa35,2025-02-04T14:43:15.367000 CVE-2021-27104,0,0,af2d9ad04e5da447e63e7e94193ceda9e4d7d214236a68b555d022f94133c383,2025-02-03T15:15:13.040000 CVE-2021-27112,0,0,cbbed17de1054afa510765cfa52b436a02453db6e83d45d04da354e853cb8fb7,2024-11-21T05:57:21.747000 CVE-2021-27113,0,0,7244e7dc4ebd88a8ab3d77fa361332420b0152c881e93c3a63236cf8a4dba149,2024-11-21T05:57:21.887000 @@ -174924,10 +174924,10 @@ CVE-2021-30548,0,0,987fcd8b3b147776f039b343711af133faa4e63aa92d0b52ec0b21027ec2f CVE-2021-30549,0,0,1dd2553a2385252934dbdaa10a6cbd4bea10aeaf6256fdae94277073abbc2626,2024-11-21T06:04:09.653000 CVE-2021-3055,0,0,0ecf47c54b852f501f721af6fb3b0faae1fb6fc03b2defa3cc6d49a51dfcd402,2024-11-21T06:20:51.793000 CVE-2021-30550,0,0,74eee0834cf3f8c8b71935939c5937c50e4be880a3f3186227e9a01a3425f89f,2024-11-21T06:04:09.777000 -CVE-2021-30551,0,0,2b9ebdc6f34068cb229250f6f38d07d8b3129559546c5025222b986932994220,2025-01-29T17:15:13.843000 +CVE-2021-30551,0,1,05026f0668ece8359c7b53c7d79b1f6e7af8e0323b4c43ded9cfc26d295eb265,2025-02-04T15:44:35.517000 CVE-2021-30552,0,0,64694bd2cb5a29a5f271c82d2e028209d4d2211ecbb47b6db21a7c8a6f3529ae,2024-11-21T06:04:10.023000 CVE-2021-30553,0,0,e3e4b72bb4acdc3ca83b854051e0d236e7435425a4f625906307f37bdc941a5a,2024-11-21T06:04:10.147000 -CVE-2021-30554,0,0,4374a6339ed57c5dbd736f7219d2655f1da0c3b1a13cbc5e23d1917013d1d1fa,2025-02-03T14:15:31.783000 +CVE-2021-30554,0,1,993952b55c58062188c69e67d56a6c74b55a1b5bf93049675f10664f52469818,2025-02-04T15:43:43.350000 CVE-2021-30555,0,0,cef21144d62e876f041646588c1fc5b01be693ff85907faf6b93fcb5a9fdce16,2024-11-21T06:04:10.390000 CVE-2021-30556,0,0,0fb5acb73cef6327903959a8e9b8306517789c12718da39e0f4c6bc00fa80c01,2024-11-21T06:04:10.510000 CVE-2021-30557,0,0,36461e61e42beb4d1113ccb885ae837db09ea0887d37c0af53b24003790adedd,2024-11-21T06:04:10.650000 @@ -177972,7 +177972,7 @@ CVE-2021-34469,0,0,d4dbc48ce9563a483455b43cdb9625d3b723f3b7bbac8da7f56a38837e996 CVE-2021-3447,0,0,1e7558907c1c1faba522cc7a6730edf6ac5facb27d87689e27df1c15a6b9e864,2024-11-21T06:21:32.710000 CVE-2021-34470,0,0,da05bdace483db545d4950e89ab5caa8d4704a9cbef95e25b4526976371d7619,2024-11-21T06:10:28.947000 CVE-2021-34471,0,0,31018fb1130f9a345d4966602af418d2b134d9e36f03eaf8c025bdfc4923486c,2024-11-21T06:10:29.080000 -CVE-2021-34473,0,0,610ed7801dd1a6dae7e407f093a4397e5685cd394c410f1c4105dbf116201304,2024-11-21T06:10:29.203000 +CVE-2021-34473,0,1,cf59bfbacf9453e5a1cc2aca457255091a87aa1d7ce4704d9572d0e411953823,2025-02-04T16:15:33.243000 CVE-2021-34474,0,0,735de343dc608f0136e4af8f6909c6448a8f08bfdede68f6071e7c8b222ceacc,2024-11-21T06:10:29.333000 CVE-2021-34475,0,0,387e0dbb7edf18b41bb58e0f66e068cfd81597b0f3ab3b1ebfb8d1339f8690bc,2024-11-21T06:10:29.460000 CVE-2021-34476,0,0,b2c84dc9acd4339fb28788804a6452b29cbfe33dcd8d2805272f323fbe1e46fa,2024-11-21T06:10:29.577000 @@ -177985,7 +177985,7 @@ CVE-2021-34481,0,0,fa9f58a34ed425a85fb32c16b6516829698221f7cd1ef8caa2d810c37809a CVE-2021-34483,0,0,b1bcf3bf0153b3e21f85a32e1c1320e1bc1a3f2dec9aac2b8c831fa061f8a0c5,2024-11-21T06:10:30.470000 CVE-2021-34484,0,0,6dabe49c49aa1942857bfc753ff3ddda1cd8c6501dac1cda002856653f71f81b,2024-11-21T06:10:30.613000 CVE-2021-34485,0,0,7ec07ddc7298b19a8bd5cacbf8ba2419676dd38d881ceb2cddd8bc3466b58d19,2024-11-21T06:10:30.770000 -CVE-2021-34486,0,0,bb1f43f38f534c1b379725cbba7eda57769e35e1b86e39ee3d3e8962995dde6d,2024-11-21T06:10:30.910000 +CVE-2021-34486,0,1,705af7f0fd93080f383cb775c23fd117526d2db5dcc62d9c994d62ce39e2ee94,2025-02-04T16:15:33.430000 CVE-2021-34487,0,0,36c9da9b1916b16290217d789ec95077a0d488305cd0e4abf8b665a6e00ca0e3,2024-11-21T06:10:31.087000 CVE-2021-34488,0,0,47c70b3edeebc429b06ced75bc61a245a8be23991924b8ad72a522526ea9092a,2024-11-21T06:10:31.220000 CVE-2021-34489,0,0,e75fb0321c20b47db8f2bcb5bfb42c5b930f73c1a42ae98e680f72c904eef22c,2024-11-21T06:10:31.353000 @@ -182573,7 +182573,7 @@ CVE-2021-40440,0,0,b50794c0137adc8bf2a653200e33f12b6612b278dc022589bfa486bd00cd7 CVE-2021-40441,0,0,08d21c64325fa7646787d6bad4fc8533260370d6de6f2edac612aec7a3f6b10f,2024-11-21T06:24:07.390000 CVE-2021-40442,0,0,0d7325900a291e8244ff143aadf19c537df8dd072fea5aac43868d6be2e322f9,2024-11-21T06:24:07.530000 CVE-2021-40443,0,0,f80c23d2a9c050ef5b18038dcf58b79bd6b493ecb1af45f599d492702f3e2e75,2024-11-21T06:24:07.677000 -CVE-2021-40444,0,0,9a4a840875040c0152f834e164ebcca006f8b3e096b1053fe57ada82523ca8f7,2024-11-21T06:24:07.883000 +CVE-2021-40444,0,1,d5d338b1255f3f5b73ec1b1a97dfdc17683f9983b9ba04c96b66cd0ed0dba911,2025-02-04T15:15:12.880000 CVE-2021-40447,0,0,f7acf519a68e80057b033ca2f90440b01e6d22edfaeb719db2e282621649f113,2024-11-21T06:24:08.087000 CVE-2021-40448,0,0,ae218b8e895a2dd87217b3043e17f30044e1d360f67e6cb830e631757b235874,2024-11-21T06:24:08.260000 CVE-2021-40449,0,0,1d57afb5649049ff3ca3323db4f7580a4351b2a4cbe7d889574b5344539da896,2024-11-21T06:24:08.403000 @@ -183631,7 +183631,7 @@ CVE-2021-4177,0,0,bf9d146f0532655354315f29596a870d0ffea8d8e3b0920af52b702204784a CVE-2021-41770,0,0,1035e650feeb58e09243b6ad13e7db1f3eba964f55ccd77597e7e9ff1efed5ba,2024-11-21T06:26:43.900000 CVE-2021-41771,0,0,1c578a31326bd4a8f1f53d0c539be0748b3c2ac73b56ff7bb4f6d9cc968e54db,2024-11-21T06:26:44.027000 CVE-2021-41772,0,0,709a47ef27c54021a74ca225df0f2263bac818c4282744e7560f33ab4adfe536,2024-11-21T06:26:44.223000 -CVE-2021-41773,0,0,7089c2eb61e9daaa8c3d6fd005f7264279cb008fd6bc9b6db24b72d44c81b423,2024-11-21T06:26:44.420000 +CVE-2021-41773,0,1,9b0d960f817aef79e595beb090cb3b9900b91f20c99af9cd36ed4fc4ec5ae3a0,2025-02-04T15:15:13.140000 CVE-2021-4178,0,0,674e3f91d2833b23c1ba01932bff2399f8dd07d66aad1cb2ee4a39682c3e39c6,2024-11-21T06:37:04.627000 CVE-2021-41780,0,0,c3984a11ccf7ea4457a4ecda385f9dd3f856457668115340a945d0f535de7c1b,2024-11-21T06:26:44.707000 CVE-2021-41781,0,0,7b967de462b6dbcdb33e628e62820540801fd869f87771abbf0eb195f70276d3,2024-11-21T06:26:44.963000 @@ -183796,7 +183796,7 @@ CVE-2021-4201,0,0,976b47d1d4dafafa9255de22f3cdc01ec39386b0e392e0800732af09f98a98 CVE-2021-42010,0,0,efc1973fc430b8f7d18fc9f4372c64e49e0c80779bd955eeaf9cd93f6b2ad868,2024-11-21T06:27:03.907000 CVE-2021-42011,0,0,21bdf6246c2ceac23af12cac8bc686b8af74127b1c8c12dc7e30eec23bdee2a6,2024-11-21T06:27:04.050000 CVE-2021-42012,0,0,94a68a0ce7dd39a14506e4737d82ec446409e944fed0f6546bf78eac6237d954,2024-11-21T06:27:04.180000 -CVE-2021-42013,0,0,2fad4bed7fab2d9ad847bf4029d98c1f555f3aad1362439686e41c8c8ce8c649,2024-11-21T06:27:04.317000 +CVE-2021-42013,0,1,039b992a181e258f9d7b3a80561ff99e43d02e51c1f87abf676b309ed6e86bb8,2025-02-04T15:15:13.490000 CVE-2021-42015,0,0,4cc7a40735b051ac400c475539c8f6fb95b4d98d607304002d40fd48a58db774,2024-11-21T06:27:04.590000 CVE-2021-42016,0,0,5903dbf52f35e3388b1239ba7c735871c416b387b1d37604fb76ad3aa603d825,2024-11-21T06:27:04.723000 CVE-2021-42017,0,0,8575ff68152222b86b3e8297abd38103510b3131cd0f37e9c3f65d406d3c9fb3,2024-11-21T06:27:04.943000 @@ -185416,7 +185416,7 @@ CVE-2021-44224,0,0,3358cecefe8889de59ba370cb46a60401d0787bf29c3e8c0d8c7923bcd348 CVE-2021-44225,0,0,beeb6bb6fc0b7078b8b42399f31e2da7d8cd03be9ff0e13d1dd9151bbcc74d22,2024-11-21T06:30:37.470000 CVE-2021-44226,0,0,93d37b63af182f0b7e15488b391d033b7c14746759ea0d434a42d95ced7fab00,2024-11-21T06:30:37.663000 CVE-2021-44227,0,0,9a4cb43aea88a36a4f32aa94820b8dadfd710438fcda1a8a40e9346fcb45c313,2024-11-21T06:30:37.880000 -CVE-2021-44228,0,0,10114aadf259960fccb3a23821148fbba65317673d804119243c07e7aa7a708d,2024-11-21T06:30:38.047000 +CVE-2021-44228,0,1,12abf7b0208fe25d3022c6215ab7a8adbd4ebef3f4ebbc431d1b0f64bd99d691,2025-02-04T15:15:13.773000 CVE-2021-4423,0,0,6e2bd3dd4553a9678f41ca410baa0cd72472df6a487dff9c9f7f697651733045,2024-11-21T06:37:41.523000 CVE-2021-44230,0,0,2ff1a75b41be0b37b3a6d1c7dcbe4e7e980eba10dcc79171f38c7f8184f23d8f,2024-11-21T06:30:38.567000 CVE-2021-44231,0,0,a08ab12f776e98868e4d3ac697c9b674e42b8676d0f9fb64b26e8e04b2919ed4,2024-11-21T06:30:38.730000 @@ -191764,7 +191764,7 @@ CVE-2022-22068,0,0,22d4e9263d7b2a00ab1295b25bf6da2f6050cae170ebea7a83b2d7f17e7fc CVE-2022-22069,0,0,909863bd311b0130ab1b5bfe1dcbef76afe674d56ab96951624f16d166587a0b,2024-11-21T06:46:03.057000 CVE-2022-2207,0,0,d7ec409d3337bba95d0017cd7b92cc1fbe328c7832022b3bf4a719fc7ea0e5b7,2024-11-21T07:00:32.190000 CVE-2022-22070,0,0,f4a2df4ba8abfbe59db88982d1e55013b9b2e862ee3a372b0ff1665299c36916,2024-11-21T06:46:03.250000 -CVE-2022-22071,0,0,2bb295f469369e5aab38d075566e68d1a29c716fea0b256e652049ad2e84d73d,2024-11-21T06:46:03.520000 +CVE-2022-22071,0,1,5d10e9894bc6252e974d1d26eade109132ca0129a1d18f69cb2eba21bec5df5e,2025-02-04T15:15:14.317000 CVE-2022-22072,0,0,d4a8cf6b67be6e1986f427788ebd513299d868fa449cf777cfc1bcd7b123ec21,2024-11-21T06:46:04.037000 CVE-2022-22074,0,0,b53b9230854679871463b18649cabd576f2be9bc37c992291b6c45123c01618f,2024-11-21T06:46:04.210000 CVE-2022-22075,0,0,52cd9613b67939ebc0bcfc4f56bf6fefa01232ec16b0aa3eea3acf0422d17f6f,2024-11-21T06:46:04.470000 @@ -192569,7 +192569,7 @@ CVE-2022-22950,0,0,88494e9ffc065d5fd395f35de4b43f8a972435dcc785c9f163a7e02c9d7da CVE-2022-22951,0,0,5e8f615b27d44612a082101ffdbe47f069468341147c0b9e92719bcc1f080652,2024-11-21T06:47:40.273000 CVE-2022-22952,0,0,8d53f1559c20a794adc7b935f25356fd5cb8eb6d05cb8c7e362d60032bbedcf6,2024-11-21T06:47:40.390000 CVE-2022-22953,0,0,9b4a0da4097422605bd3bc7ce64d2ef78e294654020afb4819ba39faa13c6d78,2024-11-21T06:47:40.510000 -CVE-2022-22954,0,0,1cf80cb0acfb951ad5abfe94b4b36188260b4de2ef32eb1b95502754e538ed86,2024-11-21T06:47:40.637000 +CVE-2022-22954,0,1,874a4f471391beecb0203e6f3c47503f2009f6ea48d389d75dc4dbe35d5f3957,2025-02-04T15:15:14.727000 CVE-2022-22955,0,0,3386fa424756991232636d43d36a68bf82013e927603d67aecb6c93ebf80d05c,2024-11-21T06:47:40.777000 CVE-2022-22956,0,0,26ee8f7ead7a32359ebd8e7869bd27339ecf9fc3c5f4017cd847d887a3869422,2024-11-21T06:47:40.900000 CVE-2022-22957,0,0,b0c7ae55c47567082fa7a7b659b94c25d83554ac934992e33eec14a73ce4890c,2024-11-21T06:47:41.020000 @@ -193982,7 +193982,7 @@ CVE-2022-24517,0,0,976ee993882a7905c82c05f5af5ab1a71a8008f20bf5530d2f6936ce8e48d CVE-2022-24518,0,0,3f656079681678859ef7766766ebbca2a0d289d14d6322178dccd570d82f0351,2024-11-21T06:50:35.303000 CVE-2022-24519,0,0,afba24f646cad3b0321a1dad00d502fd95d8463d4825cf8dd965c5826ae6bd33,2024-11-21T06:50:35.437000 CVE-2022-24520,0,0,4392a22e66ebd8297d143ad67bc5c303a73cfe44177d595cc65da8fb4eaa925a,2024-11-21T06:50:35.553000 -CVE-2022-24521,0,0,0a671df04b7ab1ed69fa552b1a1557564cf388dbbb2d0579e13763d5566f5d30,2024-11-21T06:50:35.670000 +CVE-2022-24521,0,1,e4f04a0ced6e10ab7c5defc94284be518cfbb94be2b7e9ed3bf3a75cb4ad3c5f,2025-02-04T15:15:15.040000 CVE-2022-24522,0,0,953edbcb0ded95b09da79479905980eebddf7270b863f7d62fe23afee4ed2573,2024-11-21T06:50:35.827000 CVE-2022-24523,0,0,2026211e64565ecb5aece6760ea77f91c7efb638bee1b889801a283f194a6570,2024-11-21T06:50:35.943000 CVE-2022-24525,0,0,0fa0b071bf9a5e89a3b6d122baca2672bd1f8c8a6e691b1d6d6d1a17c34bd011,2024-11-21T06:50:36.063000 @@ -195365,7 +195365,7 @@ CVE-2022-2613,0,0,f8ce05cee8d1e273448115fbd30f31d15de2ca2e8f37ceb478015f2534fe6c CVE-2022-26130,0,0,47819454a5cd08c8a983516eb19437070f5776baa88eb28496a0fb14aab72e86,2024-11-21T06:53:29.507000 CVE-2022-26131,0,0,94a6679920530bf6dfa2afefcc3d6fb64abe37d1620cff5eca3c127d67aff2d2,2024-11-21T06:53:29.633000 CVE-2022-26133,0,0,a2960ace56bcfb2ae6f92be53b900de50b6e5dfca9196a76ab47bfc65808e438,2024-11-21T06:53:29.743000 -CVE-2022-26134,0,0,3b951c8de0870b434ae300e91d5d863231c0da5575318a0a2833221d7e219b5c,2024-11-21T06:53:29.950000 +CVE-2022-26134,0,1,314b0f837357bbacb418ef58e7e2e88c3110c8a03b6344bda835f50fa1a322ca,2025-02-04T15:15:15.253000 CVE-2022-26135,0,0,c258a9f4b815cd45ab057a121f950eb4d7354fa95044515959fef1cdb68c2403,2024-11-21T06:53:30.093000 CVE-2022-26136,0,0,0b97c5da8a3a68841cd35f68e9028b2bce7c37e69ee8dac1b8359736096bda7d,2024-11-21T06:53:30.297000 CVE-2022-26137,0,0,61ecd43e7b848312e401ec9c18aeb8a8a294860b7a919f4330a21bb16395a832,2024-11-21T06:53:30.583000 @@ -201537,7 +201537,7 @@ CVE-2022-33888,0,0,bec95b314d216069285da860c9d1fe6275a5844d2bebb90279c582d09a787 CVE-2022-33889,0,0,f22110b75ada3f14c223946fe03fe0395e707aed86f255f47b6efd3b6e41b43b,2024-11-21T07:08:32.230000 CVE-2022-3389,0,0,170f40290e07538a47ed2282bb165624a18b895e2c0b0ee4f03fa58a72ab5e8a,2024-11-21T07:19:25.717000 CVE-2022-33890,0,0,6f754cf8b3704b6de1966fc4707d0c907e5ff1f9e878e6f03dfd3f8b6a306268,2024-11-21T07:08:32.367000 -CVE-2022-33891,0,0,b1435eee8111df31158ff55710386b6b8f1e187e522b0e6aafbdb3f637865ed4,2024-11-21T07:08:32.510000 +CVE-2022-33891,0,1,0ce925234b1b3c4ad801906b640e010111486e25e7e743f233ff3e86813ae548,2025-02-04T15:15:15.563000 CVE-2022-33892,0,0,b4ce4e861ca6e1724f37c3dec47baaa2d7e43f4cd4c2d38aac91385f64963b8b,2024-11-21T07:08:32.657000 CVE-2022-33894,0,0,bae0494b1c6f9164ba568c66b15205f2d6b5fc33e61b9ea8c8ad1e75400a44fe,2024-11-21T07:08:32.790000 CVE-2022-33896,0,0,e6e899698691c9ef55e6240a668ba34c2cd180c5eb3f1fa3db81448572d3d809,2024-11-21T07:08:33.270000 @@ -206939,7 +206939,7 @@ CVE-2022-40760,0,0,3b8330dcaeea66fc41cbbfb30e363441bace935cfa31035445cb64fb2e161 CVE-2022-40761,0,0,e0e8f95d864eea98671480b59c2f3d95626a783e1b1a70271c73b4973b6ef441,2024-11-21T07:22:00.490000 CVE-2022-40762,0,0,91f090a43b5aa597b92589edfa6d359b7230de62df78f964616afad8067a6692,2024-11-21T07:22:00.660000 CVE-2022-40764,0,0,4329a78e1452aef44a49b5773c9502aa0e5278c4fce482c8ddedb0e88209c008,2024-11-21T07:22:00.823000 -CVE-2022-40765,0,1,70d7dea098c0c4ec9de57bc92c8f5e0660273365a58722cbf8a69eb9379ee7a9,2025-02-04T14:52:50.557000 +CVE-2022-40765,0,0,70d7dea098c0c4ec9de57bc92c8f5e0660273365a58722cbf8a69eb9379ee7a9,2025-02-04T14:52:50.557000 CVE-2022-40766,0,0,384298aaab8e727d5c41cfc1cd6817fb10a65417409619d3f2d1e81c8c938c73,2024-11-21T07:22:01.173000 CVE-2022-40768,0,0,095913b7bd4f4664c3632edd755e2e1de4009274ae79fb343bb666fe5608a7d2,2024-11-21T07:22:01.320000 CVE-2022-40769,0,0,6135cbca6394cea1de90da1966ac0c9fc5a9d22b26cd5efd8714509afefb0337,2024-11-21T07:22:01.510000 @@ -207181,7 +207181,7 @@ CVE-2022-41063,0,0,9435a8e4ef0bd0f50fc908a2dbba3cf01fddc74e86e7c27bcbf629ae50f6c CVE-2022-41064,0,0,f04f6f08373dc8a60423f3ffa6286de803341a47388fd1b659533c8de9b8a34d,2025-01-02T22:15:22.180000 CVE-2022-41066,0,0,ce1a2b1b5b482b1b2b3c54fda71cd53caf8a12b892d2129ed715010d9e9f4ebd,2024-11-21T07:22:33.333000 CVE-2022-4107,0,0,c246852a852714826df52737e54f6a60efe1fcbe46137aab522cc8208332341d,2024-11-21T07:34:35.760000 -CVE-2022-41073,0,0,5b26e0502f0e825fabd221bb81443a9e64c6ce9af7a6aa26bc65ef8c071b18ea,2025-01-02T22:15:22.443000 +CVE-2022-41073,0,1,41048e88e45c08ac02f25f5c4580693ce9d33ae43e60a01a3f9b5a3fde5a1eee,2025-02-04T15:15:16.030000 CVE-2022-41074,0,0,5acedadf8aae837bcd545bf7b350b491a313ea4094c95e5c67cf49e8835a3aa4,2024-11-21T07:22:33.643000 CVE-2022-41076,0,0,78f083f1c56486769c87d0b1bd55077536e9e81ee66ff16a6d0643fe9a1b0c6b,2025-01-02T22:15:22.733000 CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f6b5,2024-11-21T07:22:33.977000 @@ -207229,7 +207229,7 @@ CVE-2022-41120,0,0,84857395e75383ab804a670dc49a3d8950fdb1fef0ab47fbd83e5999ee279 CVE-2022-41121,0,0,4e594b1edf648c1fb0fe39657ca551c3229e2ba56f66b60b38dbff70d860305b,2025-01-02T22:15:27.007000 CVE-2022-41122,0,0,133e8735e10ecae83fee6579759d253bb3c7ca5d683d17cc0c179ed130908ba1,2024-11-21T07:22:39.850000 CVE-2022-41123,0,0,c21f7ec46912883651196d10160a60b8e8210f5760e35c9197740e4c6b4104de,2024-11-21T07:22:39.970000 -CVE-2022-41125,0,0,d0a748e9ad17bf3fca5b80110dd42a16fd471346585ba36d07db9dbc90bfb874,2024-11-21T07:22:40.080000 +CVE-2022-41125,0,1,38ded03505fbd74ef22998e67450e89b12fad819db724b879a79f0650f2eda16,2025-02-04T16:15:34.370000 CVE-2022-41127,0,0,c5470238c8916101c4c113c61b86334eac0b25796dc9bb1b6c150173f84c4526,2024-11-21T07:22:40.220000 CVE-2022-41128,0,0,06b3b8a1888f0c96f33c0aacf94835ccc39c664e258797f30e5849ce3524ab78,2024-11-21T07:22:40.347000 CVE-2022-41131,0,0,a9b352ec223f536926e75cba1208c8854d94f58ab28fa8a4439b6ee55aa538be,2024-11-21T07:22:40.500000 @@ -208728,7 +208728,7 @@ CVE-2022-42956,0,0,0cc8f2156a3a4139aed3f88fd2c93a076d17702abfe220c1c52f72367b9eb CVE-2022-4296,0,0,95538a4b65e537a3557845a12e8b70a31c904b8375e91a729002961ad96f5e82,2024-11-21T07:34:57.730000 CVE-2022-42960,0,0,c7fcfa49ffcc1cb01539369f93e4befb435803faa642efe0122fc14364b339ad,2024-11-21T07:25:41.240000 CVE-2022-42961,0,0,7eed0c145b8de8fa0ef2b8dc53359e5a697f5cab307d59a3e3cf0f0620d4d7e7,2024-11-21T07:25:41.433000 -CVE-2022-42964,0,1,d043d925d69e366330dc43ef210d84600f05ad36ab527caf15498e6da28afc40,2025-02-04T14:11:18.270000 +CVE-2022-42964,0,0,d043d925d69e366330dc43ef210d84600f05ad36ab527caf15498e6da28afc40,2025-02-04T14:11:18.270000 CVE-2022-42965,0,0,2582f2e83102690cfe5fc6a061f59ec9c4bd93fc318d83dbbb569797ccc2f7cc,2024-11-21T07:25:41.780000 CVE-2022-42966,0,0,ffba4565ca985fb5a74bb5971af239e431f7e3e2bce6bbf65bdf82da078f9a60,2024-11-21T07:25:41.930000 CVE-2022-42967,0,0,acd40bc3bcc7040819f5a4c846d65dfbca6e100e8cda5ca0a59c1627b5a86486,2024-11-21T07:25:42.080000 @@ -213809,7 +213809,7 @@ CVE-2023-0665,0,0,f38be998f5b2ed4f8a710dae6c708e87a0da01499468b6ac7f9425307dec03 CVE-2023-0666,0,0,ffdb9ed65b66d9501fb7ba4f3ba75e2f59e17b429aa8ed9e9aade22c103edf94,2025-01-07T16:15:28.873000 CVE-2023-0667,0,0,6ce2da8cd021a850e6b966b13d3f1c5aa6c4612f36c388d5e418ef2a0edd1e51,2025-01-06T21:15:08.783000 CVE-2023-0668,0,0,0bcd556958f148852498223d61a9b6e12f93a04aba52c0ec5107946ad0f89ac1,2025-01-07T16:15:29.157000 -CVE-2023-0669,0,0,fff921b621ad70082c23fad8bf9015d87babc283877a7fa6ac12ff58fee6f287,2024-11-21T07:37:35.710000 +CVE-2023-0669,0,1,7f166c24580d566b937bd0eb53081f8abe4beec8b49c73462aa8a599bbcef30a,2025-02-04T15:15:16.333000 CVE-2023-0670,0,0,5bdded158185e9657a0a331db34ccdf5912942247170670e10672ccd4117ea74,2024-11-21T07:37:35.850000 CVE-2023-0671,0,0,31a0191d43d5caefbf53a2b1834f7f7af28c570b673efd2065d279713f8ddd58,2024-11-21T07:37:35.960000 CVE-2023-0673,0,0,c3bce74a461ebe1702e63971ad350776ed1eb8cf80ef301e8975000ddfcda787,2024-11-21T07:37:36.077000 @@ -214520,7 +214520,7 @@ CVE-2023-1409,0,0,d14e01a3c5bbcd8a10f89252d9321bbc3ab171ee2e8f033a034c9cba10046f CVE-2023-1410,0,0,4e3f97794f69944c55f8788380a3b2b857f09922e2dbe52f9c3b9c1146b617d8,2024-11-21T07:39:08.240000 CVE-2023-1412,0,0,f811e09a3b158dac64b90742e1ab427f28dfe5cdeeea2b6b89b21a2418fb6596,2024-11-21T07:39:08.370000 CVE-2023-1413,0,0,10f71941908f5a7a57899a0cf10953e2c3dc07305a5fb27b87e70cb4ecf21465,2024-11-21T07:39:08.500000 -CVE-2023-1414,0,0,000e2dc03f8188e98c664f92c896b5615057d6f0224efa3eba36be2088d19a80,2024-11-21T07:39:08.613000 +CVE-2023-1414,0,1,d0ca89fe779ba1c4657b57703931748b5c56cd3c9c361911bbbc64edaef7c77b,2025-02-04T16:15:34.597000 CVE-2023-1415,0,0,607570f89f68bde63511492aaa111103c7338107c2bb13e707645997f915c5f4,2024-11-21T07:39:08.733000 CVE-2023-1416,0,0,7e80c618136ceee77c10207d261275035d7f445f7adbc053b389431d568e0cb9,2024-11-21T07:39:08.877000 CVE-2023-1417,0,0,723ec1b85545207bd6a87db126fda94bb73fc09990fbe30a9d949006daf69b8d,2024-11-21T07:39:09.020000 @@ -217350,7 +217350,7 @@ CVE-2023-2254,0,0,3e407c04b45b0e6f36fd7cad3373e80962de22c83968e41c624a3bcbea8c98 CVE-2023-2255,0,0,a587bcc9a68e2dd3cad145801af7fe005841d8266d2538b9c9fc1553589c72d2,2024-11-21T07:58:14.943000 CVE-2023-22551,0,0,f241a9745d817419730e82432832dea3f1b9f3fa3d0848f43b0de18834d6f659,2024-11-21T07:44:59.190000 CVE-2023-2256,0,0,2e9b8d9a07ca7e0fe5f058d0b33b6a7bac561c4d38c2e77ebfa54154da6d4aa2,2025-01-10T18:15:18.907000 -CVE-2023-2257,0,0,fbf00936f033bfad11318b689e75b3e6b3fe19a705919e898b40baa7f99d8f57,2024-11-21T07:58:15.187000 +CVE-2023-2257,0,1,6f6c2f922ed38f967a5568fc5b4aa604fd44ffcfe2c7f0c1b5f6c4712d8061d9,2025-02-04T16:15:36.487000 CVE-2023-22572,0,0,06ab316cf3fc6311331e196b84abd2fe40bdbdc3a41a3f27c94f49957700699f,2024-11-21T07:44:59.340000 CVE-2023-22573,0,0,7ae9d9bae825417fa4b6fdb8bb70a54cdb9153c33917e52a6ca153e2b06b1e2c,2024-11-21T07:44:59.467000 CVE-2023-22574,0,0,cb475a5bf1fd3e70bbeda2e08c2d7338995b59d61e99734be122a9d89a2e0120,2024-11-21T07:44:59.590000 @@ -217598,7 +217598,7 @@ CVE-2023-22816,0,0,60110ba7416eafde95686e1ca47a2608b033a9631b340f4e5ab1d4b0ea75a CVE-2023-22817,0,0,e1ad14e78daeffc2382ba23de52ccd8a03da8b9ab3d263417e352da68d2188ed,2024-11-21T07:45:28.620000 CVE-2023-22818,0,0,42b363d7a30f56c6e25cb1635af5497bbb2accd9bf4dd7700362367bad06caa6,2024-11-21T07:45:28.767000 CVE-2023-22819,0,0,eed4854da8083a678f67c762d11b00ec3f42c533d8c9cd87ba081c2b9415c9e0,2024-11-21T07:45:28.917000 -CVE-2023-2282,0,0,c11cdd396d9ae015d26fee800c213ef70ce1b3dbd669d0a76e5b4266e8425c2a,2024-11-21T07:58:18.240000 +CVE-2023-2282,0,1,fdfa455935749c3c108198c837d273facab67fa966e7a0cf7d9257c1a77e07e9,2025-02-04T15:15:17.270000 CVE-2023-2283,0,0,0a5958153a41bcf7e2892b48932c770274f05a769bb2cef11980c6fa7c31001d,2024-11-21T07:58:18.360000 CVE-2023-22832,0,0,6bc8eaf5030c123cb84d947565166e60236689892bb016c292cb55d39cecd655,2024-11-21T07:45:29.053000 CVE-2023-22833,0,0,0a00242252af164a963ec5adbfedad8e000992f83cb8a8699ab70b5ba05d0229,2024-11-21T07:45:29.187000 @@ -219179,7 +219179,7 @@ CVE-2023-24872,0,0,671db372b4fc5cf0a6a0e4e79a322a469f6ee9128071f391172290f9fdc06 CVE-2023-24876,0,0,b6b8afa42ab869a9a2feba8724301da7d4129a5fc5bc8a3dd1f583bca1fdcc07,2024-11-21T07:48:41.827000 CVE-2023-24879,0,0,f72aad5ba8755e42c3f76fe291f888c146ecddaade48a1928011910b5d07e6a0,2024-11-21T07:48:41.960000 CVE-2023-2488,0,0,1ff030b9a9cc358926f2f31f1cebcdc10263b6fd1a8f39d3ff95a9e9e914dd17,2025-01-08T17:15:11.237000 -CVE-2023-24880,0,0,4c89ae2911a7e08b0c143b8b45af1eda38a9d94f7c256bc0446ab48600d30af0,2024-11-21T07:48:42.067000 +CVE-2023-24880,0,1,967a9e43e2a16b18b1f676a0fa9cfb63ffd62c128a88a89a9e0427f54de24ea3,2025-02-04T15:15:16.667000 CVE-2023-24881,0,0,6b069e84033388c6b792588edb6dded8ddf1805480c83fada6521fb31796bbfe,2024-11-21T07:48:42.197000 CVE-2023-24882,0,0,aa9fb886dcc5cab48e91df247f90a69aca2b6abd32e6f6bd56dacc0faefe4e9c,2024-11-21T07:48:42.310000 CVE-2023-24883,0,0,f8cd2e3c588975da658157610ea853db7cf61d2aa3e5ce70748358ea9d242e3f,2024-11-21T07:48:42.410000 @@ -219568,7 +219568,7 @@ CVE-2023-25344,0,0,8a83a30314d7b7167b00f406ae152838e039dee182e8c3aadf0cc57ee858b CVE-2023-25345,0,0,3047d7e94bcb27ce1963bc1007e57600c1401bd6a1e52384238fe1fc44a5b2f8,2024-11-21T07:49:25.413000 CVE-2023-25346,0,0,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000 CVE-2023-25347,0,0,8138b3973d3e366663faf7de4265569e4c2f24365a27a090704a19edcaa8b236,2024-11-21T07:49:25.670000 -CVE-2023-25348,0,0,43b2d94221c22266ccc7c295ab2746cc9adaa7e535258cc20d633841f6d263bf,2024-11-21T07:49:25.803000 +CVE-2023-25348,0,1,7b24e64ac0df04bfc1b24e00ef9e1851d7c486926aa7bdf9d8bc8b9ef222eb15,2025-02-04T16:15:34.780000 CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94ea,2023-11-07T04:12:51.317000 CVE-2023-25350,0,0,7c58eaa57d66254e13765ebf86b30641b26b6ed22bff7e285e4c3070a3c3ec1b,2024-11-21T07:49:25.943000 CVE-2023-25355,0,0,9299541b7ecf05bd5ebe243bb5dd82e026377da551587252a389f25add8aa48e,2024-11-21T07:49:26.080000 @@ -220199,8 +220199,8 @@ CVE-2023-26053,0,0,253fd48baa4ee1f3bc547a123aa5fb36e46d437ede9198561acb8711efe9e CVE-2023-26054,0,0,a95df6d9d26bf10840bda4fc052f3150cb0e3ee69318dbf00b021e35488d999e,2024-11-21T07:50:40.180000 CVE-2023-26055,0,0,2a57a2013ad746471b1edb6ca4d27f04c5338f374d91359b8c277b7607f77b73,2024-11-21T07:50:40.323000 CVE-2023-26056,0,0,2e9611be834a53cc24e2e15ccd4a50042054aaaa8836239cf2471c28f028c1a4,2024-11-21T07:50:40.453000 -CVE-2023-26057,0,0,e4ad5bb160e24fe129811fe6d9dee5ee297dad2d8de752a888e36ff651970c68,2024-11-21T07:50:40.580000 -CVE-2023-26058,0,0,38f901cc68c443ee6cdf11d198b47651c0742864b89bb3e904466ed7a698e510,2024-11-21T07:50:40.727000 +CVE-2023-26057,0,1,67626c32f3fc68bd0d07159c1dfceb7b4b4964ab799e9ecacfeef119b8b18ddf,2025-02-04T16:15:35.023000 +CVE-2023-26058,0,1,bfae1e553962311588704b54084371fe273795fc5d96f6628fc4133f5fd6e279,2025-02-04T16:15:35.440000 CVE-2023-26059,0,0,2b95c89af4dea867c12e5dbe105d54ca0314017d7446d39572911d10ce277c80,2024-11-21T07:50:40.933000 CVE-2023-2606,0,0,e94dd045ba7759275905cee33b867cab95b730a26bd6b17f8086e2a9c8ec468a,2024-11-21T07:58:55.210000 CVE-2023-26060,0,0,19893df82a6ff872661a24fa2cd90cd9d1da7824218fb502624183bf734cdec2,2024-11-21T07:50:41.083000 @@ -220236,7 +220236,7 @@ CVE-2023-26092,0,0,e5a3b4cb15350cc2cc153cc7b66cc97322e35487f497512afb2d9e6dff253 CVE-2023-26093,0,0,6d9698af7819285fcb47697cb35e91d572f9dab777fb31f827c1edd6c523d889,2024-11-21T07:50:45.700000 CVE-2023-26095,0,0,1a1f28a15cbd42cd08e7c4711c166157740df1a4a7b74d2f1dfdefd18bc58484,2024-11-21T07:50:45.833000 CVE-2023-26097,0,0,d6a74e9a4f153ec1226c5faac6ef9516a4bcdaa569114ca7d34c19b01237225e,2024-11-21T07:50:46.033000 -CVE-2023-26098,0,0,4584e848f409e25af88de70084bfa8ae2c485457df9fc525d26d6afbc6aca211,2024-11-21T07:50:46.180000 +CVE-2023-26098,0,1,5106a943c572a0343f46ee9440e9b1bbba146cdf557b717b9c49be958965050a,2025-02-04T16:15:35.607000 CVE-2023-26099,0,0,daef45a4a5079e3664281482bb5aed531859143d74f266889fdf4d70272bd203,2024-11-21T07:50:46.327000 CVE-2023-2610,0,0,09b4faf2015566c48d195c0564ba2eaa8f67a730801f03b898ad9fb8b6160753,2024-11-29T12:15:05.820000 CVE-2023-26100,0,0,7649602c1992276d9de891d2063623c153e3fd458b39141209b2fcb170dba9e2,2024-11-21T07:50:46.477000 @@ -220653,7 +220653,7 @@ CVE-2023-26556,0,0,ff8e0264be1786927f569c5bfc55337c6f57533e359ff05b8f030bb8c14e5 CVE-2023-26557,0,0,8c76696de8c44d652536d7024aaa7a5c5ea36a0ab5458480926ac8fe383f5596,2024-11-21T07:51:44.787000 CVE-2023-26559,0,0,22d0251426fffa0264ed19ec859ba20757795325ada70a6e5bfc78212d8ea255,2024-11-21T07:51:44.920000 CVE-2023-2656,0,0,b71b650ca67d3b7186cb875b770791661512eabf755bc7e5377364764511aff5,2024-11-21T07:59:01.027000 -CVE-2023-26560,0,0,808d6ee9b60639c44d457a2f995b86919a063a3ff862ed7f3f4eb97871bcd793,2024-11-21T07:51:45.070000 +CVE-2023-26560,0,1,51e9ef4b60ed16a61f95e3129b907dc7f4cd31bafb42a8b0619c791f98ab887f,2025-02-04T16:15:35.777000 CVE-2023-26562,0,0,a5aa92ec8388945edbe49747875a73de91d1e04ec6e2668a298f710035393f1d,2024-11-21T07:51:45.207000 CVE-2023-26563,0,0,68147042a4ea8cfd3f33650fc6a7b17d6f71f3b0034155ffe776fbd93b1a1080,2024-11-21T07:51:45.487000 CVE-2023-26564,0,0,f21c0eb0f8f27a289ebc45740c73f391adb349b200c8fafc55d6c2d644a223a6,2024-11-21T07:51:45.640000 @@ -220728,7 +220728,7 @@ CVE-2023-2671,0,0,97870763a7eedee419e173781ef2c336dd0ecab2dd2d540058c12e1c853bb5 CVE-2023-2672,0,0,d9b40a95976d1126fc3f4b4942d6b7a876b13432f2f21e468e9c4efe06a210d0,2024-11-21T07:59:03.143000 CVE-2023-2673,0,0,2c76086594f6fa37f5bb831c355e44353ee5d687033bdde9b4d9feafa037c789,2024-11-21T07:59:03.280000 CVE-2023-26733,0,0,eff87f9e9d591c9e1001c128f595616b246364ebfbce36272ff260ab5f11d3d5,2024-11-21T07:51:53.427000 -CVE-2023-26735,0,0,01666d526ccad3fe13adbcd6ef64299720d420b7d1cf0dcfba8cc0e09d5e720e,2024-11-21T07:51:53.550000 +CVE-2023-26735,0,1,95cf64be05faf534a27bc86b26955c67c506fdad8bf08d6a66ad8109aca14550,2025-02-04T16:15:35.973000 CVE-2023-2674,0,0,039137594fe7c7d34bb7f37fd7078029f10c4a0df18a4010fa89d3fbf147de76,2024-11-21T07:59:03.490000 CVE-2023-2675,0,0,07c06275419dcd681decfa003611adff7356076776c10b0fa95b5660ea113d52,2024-11-21T07:59:03.617000 CVE-2023-26750,0,0,e54d61e2b79845527d951b1846ecbb259f3848ee8e0fd60b3d572036f2ca7e6b,2024-11-21T07:51:53.710000 @@ -220778,12 +220778,12 @@ CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92 CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000 CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000 CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000 -CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b3db,2024-11-21T07:51:59.153000 +CVE-2023-26839,0,1,e18b17b8b760de23c33835c07c5d11b0e19565942bcd80c3f25ae67fe72322fd,2025-02-04T15:15:16.863000 CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000 CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000 CVE-2023-26841,0,0,0100fc3380f5eb3112a8ff24af369b3bb07821b8b3ee2a09a94dcc1b0c1d83e8,2025-02-03T22:15:26.607000 CVE-2023-26842,0,0,d39eda28623af714efe7f85aeb376ccc0342f23c9b1231f090e68b81cb28e036,2025-01-09T20:15:31.650000 -CVE-2023-26843,0,0,786845edc94077cb46de16ddea7568a47d83125548a040d79aacb36c0f0421db,2024-11-21T07:51:59.693000 +CVE-2023-26843,0,1,2a09f8324564001c90d6481ed70826717cdacca44c9297f9c816b1125637748b,2025-02-04T15:15:17.083000 CVE-2023-26845,0,0,a2f9c7776186d3df0ceb2e2b27a5bea533a9c3929c9c21044c3c55f1e99de846,2024-11-21T07:51:59.823000 CVE-2023-26846,0,0,4ba659ca1afcfc2f01339e16ad44eeea13b1388f168b2112ee0043c3544e16ea,2024-11-21T07:51:59.967000 CVE-2023-26847,0,0,0648be61042be4b28e63d9a0bdac9e9a628578ed2ed71eb769e8ad0598de8af7,2024-11-21T07:52:00.120000 @@ -223315,7 +223315,7 @@ CVE-2023-29842,0,0,222ee17770c768bb4c4271e0e32c5a95054e0767864852f0298258fa332b7 CVE-2023-29845,0,0,0d6601a8b19a56bb94196f82c15ebc3bb9a3355618b52f3161b02c947456d3bb,2023-11-07T04:11:25.217000 CVE-2023-29847,0,0,d1092ee64c7d377ba144127dde358c4a598c49fce064137e4f900a3c903ea1f2,2024-11-21T07:57:34.513000 CVE-2023-29848,0,0,31d1cf856660ad5646094d5fee4633d7c4aef8513c1011713fad2f7f83081ffe,2024-11-21T07:57:34.653000 -CVE-2023-29849,0,0,d688bd67960956764e45526bf538e1c555e717f3c2e4599ab808d1d5c73b18f3,2024-11-21T07:57:34.790000 +CVE-2023-29849,0,1,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000 CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000 CVE-2023-29850,0,0,a81b8c5567d5da4adb295ee9f08035dfb076cc3f42a4b9f0bd2c2c3c6079f983,2024-11-21T07:57:34.940000 CVE-2023-29854,0,0,fc98dbefb3f0918404342d0de6358664a9df189b2710368d978c55821fd941df,2024-11-21T07:57:35.073000 @@ -226981,7 +226981,7 @@ CVE-2023-3451,0,0,32f58b09567a7d88bb63f1df853d18f9b629c04c12fd741d157d0d24756305 CVE-2023-3452,0,0,28f0545ccc04eef3fa7c913815f02bee168c95cb39295128eafd1af11d1108a2,2024-11-21T08:17:17.887000 CVE-2023-3453,0,0,4e7b4620c80804e47e84fa5c408ea299c159847661af0bb3988fb617d1d34f28,2024-11-21T08:17:18.023000 CVE-2023-34537,0,0,b070ccf52e6a5ffea666040a13a395fcb374f7bf3fb9c9ba3d347eca0b6d953b,2024-11-21T08:07:21.400000 -CVE-2023-3454,0,0,c3fb08bc8bb4dfaa374003d97b8946449a88d896652e362d9f1383e5350fd697,2024-11-21T08:17:18.173000 +CVE-2023-3454,0,1,e4bd50fba9a3c3ab158a190aee986a98114389b52657b5ff5d32fa6a87752325,2025-02-04T15:29:56.257000 CVE-2023-34540,0,0,8473fbca114ddbb501b0e011d548d8ccbadc39107b282883f4a6dcc5f6d9da91,2024-11-21T08:07:21.550000 CVE-2023-34541,0,0,b8f6ab4a3569aa026e87d3cc4c56488fc44c7864c4d77df50b05512dd6282168,2024-12-09T22:15:21.740000 CVE-2023-34545,0,0,d149765cd47581e0c018a5fef10b99dc070520c9f77eca7e784a8ee9b0bf2e00,2024-11-21T08:07:21.850000 @@ -232837,7 +232837,7 @@ CVE-2023-42106,0,0,447b9ae9affd3d0c9de283ba5b34b328b5720b3ab58d3f53e9737107e014d CVE-2023-42107,0,0,4c6b9e07bb342649063cc5347eca19bb657c8c9fd1d77cb5e4432722215e6dd7,2024-11-21T08:22:17.340000 CVE-2023-42108,0,0,27fddc624a1c5c9018d3d720e5576e631e6a6a8278b5615ec396b1c70bc9e8b9,2024-11-21T08:22:17.460000 CVE-2023-42109,0,0,0ca557e538c7c48ab18ac8bf8c46c110b9da67b5fbbbb7b22c216feaa0e6ddab,2024-11-21T08:22:17.597000 -CVE-2023-4211,0,0,b1ab19d481207a1938f55802fe0297e4d7e538bbeec739b39f34049d12926b89,2024-11-29T14:45:13.110000 +CVE-2023-4211,0,1,a669ae8cecfbcde690be841abd2ce4f7815bcbef6d8a97c6f615c5032b9ada81,2025-02-04T15:15:17.480000 CVE-2023-42110,0,0,28576136c00cb00997c7a4562e8bc812f565322c6205ab39454fc89564f27098,2024-11-21T08:22:17.723000 CVE-2023-42111,0,0,411e4403445247c72b5192b2c32e45d4c38257ebe22f73e5a39910fa8feadc3d,2024-11-21T08:22:17.847000 CVE-2023-42112,0,0,4c5f6ea3f5a116489efba7e1d9025c3ea82db9123ac6e4046e9eeb7dd1a74684,2024-11-21T08:22:17.967000 @@ -238339,7 +238339,7 @@ CVE-2023-49828,0,0,d8b0d88f23ad4c2a93f24196cb40b110a38c1749eea0350a3a5455084a892 CVE-2023-49829,0,0,bfd4ddf8e135a63d2a5dc6027270e86d6085d05cb03fcb953d1c8ac7c83c6682,2024-11-21T08:33:55.280000 CVE-2023-4983,0,0,ba8581d072fa763b8e33414ee019fec45b158b79ac56bfbec2bbb09413faf98c,2024-11-21T08:36:24.130000 CVE-2023-49830,0,0,c8c78af711eb3456a893d9727111e792bc12cdc4e3d2634429c352093b3504c7,2024-11-21T08:33:55.410000 -CVE-2023-49831,0,0,d33dc7c11ef9b79e685d055f30bb837579f02b9f85d2f71c28624f7c1dc69fbf,2024-12-09T13:15:36.463000 +CVE-2023-49831,0,1,b4972e3c4bbc63d8a302975757b66c05afe3feb127236b9ac82b926268b17609,2025-02-04T15:51:16.457000 CVE-2023-49832,0,0,1bc945dbdd7535ac9f620e0d391b0dba06cbbdd375e5ca59ab024c035c1193d7,2024-12-09T13:15:36.597000 CVE-2023-49833,0,0,d18597be456f334cb6e7261800855280d9e590ede3c241c7df50b343ef49d5f7,2024-11-21T08:33:55.537000 CVE-2023-49834,0,0,9af32e71aec1c900f10a1919ce40c423d33500e1360db47f2c93be4cd95603ef,2024-11-21T08:33:55.660000 @@ -241278,7 +241278,7 @@ CVE-2023-5969,0,0,773fdd47607b4a01a767b928797ecf3d0a5187901f659ebff3170d23818565 CVE-2023-5970,0,0,7683508ce13fe6f967201c3a789b457ca40205592f9c376139c6b1f69a3326fc,2024-11-21T08:42:53.403000 CVE-2023-5971,0,0,b88e617ac1955e3d48bd1cb01bc606e278b5d91c64984b1f8bc0bff1e4507045,2024-11-21T08:42:53.540000 CVE-2023-5972,0,0,106505593d4de6b570cc5eafbeeda3a7aa756b3a3cf0a559a021c5850e3ee835,2024-11-21T08:42:53.720000 -CVE-2023-5973,0,0,048c886c128acbdefd9a6d2332af73cc33ef39b903c99fcc661f7e2d81380eaf,2024-11-21T08:42:53.873000 +CVE-2023-5973,0,1,b35f9ebd8f5ca7a5c84ec4a6ad6935c110118759ea36522aef2ef61e05cade24,2025-02-04T15:30:49 CVE-2023-5974,0,0,835821d292015e2ca60f54b34d38d29ed89b59f1c11e39713433a141b7d12855,2024-11-21T08:42:54.007000 CVE-2023-5975,0,0,b56a246c98fac375cab8751ff48a315972c3342da763344fdac97fed7ee72374,2024-11-21T08:42:54.140000 CVE-2023-5976,0,0,e6e6a27dc26b16d5de07fada633526b7a51ebe0ea6e6c1ef95a77c7ea1f507d1,2024-11-21T08:42:54.267000 @@ -243704,7 +243704,7 @@ CVE-2024-1040,0,0,0cf971725042aa5f584fe060b54c880b9831934b517dc5a41c0a4db005bb07 CVE-2024-10400,0,0,d10eac0c14c2aab70360c507793101d484e08be5c30dd80a0293df79fcc3c93a,2025-01-23T17:01:14.073000 CVE-2024-10401,0,0,98699d6fa898cdfb3f15470619245cee1d067345348d71b83edf212f320fd87d,2025-01-16T02:15:26.770000 CVE-2024-10402,0,0,3bec3b03f6b37743b2963c176dfcef56ddbbfd70980eeed7f59bf60f8417973e,2024-10-28T13:58:09.230000 -CVE-2024-10403,0,0,b1d5f4b2163a64675363bd6bd4278ec16e48d3fc23395a5c72d67b0e9b0925db,2024-11-21T13:57:24.187000 +CVE-2024-10403,0,1,a7572191e8102ed6d59e64918362af5517a9fa6fa7640d8839b0f51d80dd26d0,2025-02-04T15:28:04.053000 CVE-2024-10406,0,0,3ea80fa9309bbe01bfc18fc28a58ebc2cd4384a2976470d5a0c7d74740e10fea,2024-10-29T20:48:36.967000 CVE-2024-10407,0,0,c0767597cc1c9f2445774d0945d82cd1deb05bfba27e932afc95a08efb60df7c,2024-10-29T20:47:53.667000 CVE-2024-10408,0,0,bdf278858219e19c5b454fd4cbba3d2031672da6a8bc18e5cf1bab48edd4d3ed,2024-10-29T20:44:07.630000 @@ -244268,7 +244268,7 @@ CVE-2024-11029,0,0,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62ab CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000 CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000 CVE-2024-11034,0,0,3ab7c1e6f92ed311ef7c84bc99d8afea9fbbf7ceee2269128230e97b66af0fb8,2024-11-23T12:15:16.090000 -CVE-2024-11036,0,0,1d4d92ec5a80ec0a5b48f937afd13a9f7a3ccd1b8605296386eed3c3bb1c15aa,2024-11-19T21:57:32.967000 +CVE-2024-11036,0,1,cb568211d88e95057f50625b3b2d9e73f075acca4f066000c5f19e1ceef18c3a,2025-02-04T15:44:41.967000 CVE-2024-11038,0,0,b081c95425ffdb28a4796f93241b66af2f4b7d8ba42742ef93d502aa5f9c9555,2024-11-19T21:57:32.967000 CVE-2024-1104,0,0,1eae50c75d8d746ca0f746c7f8113a7b95b6cc5ee3b09f81f9dcc34a01c59d82,2024-11-21T08:49:48.370000 CVE-2024-11046,0,0,2caf63d8bac1e385be2de70c4233794a6ec536d01544b5247c40884a80b23455,2024-11-13T21:01:01.540000 @@ -244487,7 +244487,7 @@ CVE-2024-11287,0,0,2b855907be08ce91eab121bf5a3c8cc1d79ede49cf458848842325e314d36 CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000 CVE-2024-1129,0,0,6172b693dff43dce89b309e8fb2fb924d24a685a24573723261b8e6649270d9f,2025-01-15T17:27:54.877000 CVE-2024-11290,0,0,ab57176650cc50c586193b71c3243e9600beb71b8fde58a74d5423838f5c5c16,2025-01-07T05:15:11.117000 -CVE-2024-11291,0,0,4ee53e96a9c91047a49f81e80d0a8085b44f7d785d6e7494b6a1322c661efbb5,2024-12-18T12:15:08.710000 +CVE-2024-11291,0,1,c32c3a1dc228c4726182fc106b61ff1b27b8ded191a8a86e255835c7dc130518,2025-02-04T15:51:41.903000 CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000 CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5068,2024-12-04T08:15:06.343000 CVE-2024-11294,0,0,db8f0d0eb379d5b4c1577b3532340b8b4a9bea79795bc10cc5d37031c79603b0,2024-12-17T09:15:05.193000 @@ -244797,7 +244797,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 -CVE-2024-11623,1,1,f39264a1f5f08d59c6fac32d574e35fc4cdf6957bd6207102e10628de2c9aa22,2025-02-04T14:15:30.480000 +CVE-2024-11623,0,0,f39264a1f5f08d59c6fac32d574e35fc4cdf6957bd6207102e10628de2c9aa22,2025-02-04T14:15:30.480000 CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 CVE-2024-11625,0,0,c71612eff4dbfdfd57dcd77786b9f90aeda1003c787b3baa9b3e022b7aa38e14,2025-01-07T09:15:06.560000 CVE-2024-11626,0,0,e05f68563d0cfe4fcf37166c88856797ec0301944e16df5d7b6760557f29956d,2025-01-07T09:15:07.533000 @@ -244881,7 +244881,7 @@ CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a4903 CVE-2024-11701,0,0,c825848705d456c74824a186f3a702976bbd1db3104a2cd1c202a595c80d93b4,2024-11-27T16:15:13.470000 CVE-2024-11702,0,0,e280c66930279c933ba67473303c53b6d6772276abccd746d35e492c09179838,2024-11-27T16:15:13.660000 CVE-2024-11703,0,0,066d1bf191b3c715a9f0e76133a16cb73e57cb6df71926665b900ef9b350c267,2024-12-04T15:15:09.437000 -CVE-2024-11704,0,1,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff729c0,2025-02-04T14:15:30.700000 +CVE-2024-11704,0,0,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff729c0,2025-02-04T14:15:30.700000 CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14 CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce0e6,2024-11-26T17:15:23.010000 CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd9c9,2024-12-03T08:15:06.223000 @@ -245619,7 +245619,7 @@ CVE-2024-12532,0,0,199fed046db6fc1b5b34521e2b9548b73238ea6ea9f77361d16a8dbec2a81 CVE-2024-12535,0,0,783cbd5e17eda49b126d7013b7661e75fb62741f3c668d86577a16b9b9c20d52,2025-01-07T06:15:17.220000 CVE-2024-12536,0,0,a925f1a48eff74b537962fd623796390384e9d276d37e7a9cb0d9ba10f9464b0,2024-12-13T17:14:44.007000 CVE-2024-12538,0,0,09768d3293edcfe78eeb71291a6d043c617de31a086c72fbf20722cd5259fcb2,2025-01-07T04:15:08.720000 -CVE-2024-12539,0,0,2fe66a32cfe12f1947c910877da8c8ccaf0c8c819ce797afe3d13bc4d7275456,2024-12-17T21:15:07.183000 +CVE-2024-12539,0,1,f64db7285a2aa95600e430876a853db4fc0c12265a5e4000f41245d0093e5ccf,2025-02-04T15:16:44.880000 CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c91,2024-11-21T08:50:09.993000 CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000 CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 @@ -246338,7 +246338,7 @@ CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649 CVE-2024-13450,0,0,55aac58f3b224e585d80696b297daa1a2f04303929075f05739feced1b90310d,2025-01-25T09:15:07.733000 CVE-2024-13453,0,0,06294509141aad47f8448241fbfd046c29dc34b48e64b560f728719f3766672f,2025-01-30T14:15:33.873000 CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000 -CVE-2024-13457,0,0,c531fb697f7586f177e92c6e71734de6d936588e8d30c717ab9f73acc24d98b0,2025-01-30T07:15:07.067000 +CVE-2024-13457,0,1,50ef872bba848f1f9a16a56e1b864add10755e96bd5662309efd6c7a5adb1d3a,2025-02-04T16:06:15.343000 CVE-2024-13458,0,0,c214ba7823c3955da84c7e9c6dba72cd30c145080a4340abf10dff53962a091a,2025-01-25T08:15:09.337000 CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000 @@ -246410,7 +246410,7 @@ CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336 CVE-2024-13623,0,0,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 -CVE-2024-13642,0,0,07b1f2e3f89f75ec1996bce670602e5c7d92a916639b313346cfabd85b339ca7,2025-01-30T07:15:08.700000 +CVE-2024-13642,0,1,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 CVE-2024-13646,0,0,df579ebc80f166383afd2bf72cceedaa012995a592dad78c8758f9a4e2dd62bd,2025-01-31T18:19:45.780000 CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 CVE-2024-13651,0,0,259fa33c63aeec7e7f52f40e196384b2b9057cbf4d09539ce04d35ea66e756ff,2025-02-01T04:15:30.997000 @@ -246430,7 +246430,7 @@ CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4 CVE-2024-13694,0,0,9aa541d461c4bc816b6731ac794b259487fbcf971b45f6c278f4e7c83a84a300,2025-01-30T09:15:08.180000 CVE-2024-13696,0,0,907b8ab3ba012bf859122d0e684422f6614f2b08adc0bed327048c6d108c2e19,2025-01-29T08:15:19.677000 CVE-2024-13698,0,0,f47c146713a30dbaf3109d49a8189423713fed8a48570f78f3e95ed414a0fd9e,2025-01-24T16:15:34.597000 -CVE-2024-13699,1,1,b1c1df4527ad1aa6ec97619b608ddd6ab21a99c918ed2b77f43efebaf3bac4a7,2025-02-04T13:15:07.953000 +CVE-2024-13699,0,0,b1c1df4527ad1aa6ec97619b608ddd6ab21a99c918ed2b77f43efebaf3bac4a7,2025-02-04T13:15:07.953000 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000 @@ -246809,14 +246809,14 @@ CVE-2024-1755,0,0,a7ea4e5076a3c70d07f1af2be88a686318f2826b2707f5d9b21f454fe91f58 CVE-2024-1756,0,0,a55105396c0a5cfd03125dbd5666bd370a097913a79fb44905b745cf43bd3390,2024-11-21T08:51:14.803000 CVE-2024-1758,0,0,313830f6e19da3cc97c553441ff7c3a8cfd29a19025908c7843ff9adbf04db2d,2024-11-21T08:51:14.920000 CVE-2024-1759,0,0,614d1507146f28d12a0973d6adebe08ab063cf89cb20e4d985e3b2bf348ea399,2024-11-21T08:51:15.043000 -CVE-2024-1760,0,0,57b4d1e1cac8d2ede1adc8be04932790a30f8211ed8d80524500e2452561d651,2024-11-21T08:51:15.167000 +CVE-2024-1760,0,1,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000 CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000 CVE-2024-1762,0,0,3be22d9a9c6b76a2491e99335b6950ddb3cfa7de8323a0bacf5e471294a0e4a9,2024-11-21T08:51:15.427000 CVE-2024-1763,0,0,0873c590a96444d43b11806402d682be1946102f5b2ded8fa8fc5912f1ad2df6,2024-11-21T08:51:15.553000 CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000 CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04bf,2024-11-21T08:51:15.800000 CVE-2024-1766,0,0,d8ff872b7c733da8ac7e1c2957ad11b4600ff77b669728faaac2462853b27909,2024-11-21T08:51:15.920000 -CVE-2024-1767,0,0,66db2e2cd5f63685db3a5d890d38b1d739a1a9f6642d06bbb7cb997d6bd3ac55,2024-11-21T08:51:16.067000 +CVE-2024-1767,0,1,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db05e,2025-02-04T15:37:30.920000 CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f30,2024-11-21T08:51:16.190000 CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 @@ -248445,12 +248445,12 @@ CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b19 CVE-2024-21541,0,0,4e51d4ffec662bfa33031c554d0443805e80d7623a2fcd0aac98e03becc00741,2025-01-14T17:15:16.573000 CVE-2024-21542,0,0,e36314e0d3629ecf9734bb5ba8a685163900633286b99b2fd1cecc21e5922d77,2024-12-10T05:15:07.567000 CVE-2024-21543,0,0,68304a5533fa87bd25f6b9e8eef51a7d0e0430fe8ba6353c974e145fdddfa801,2024-12-13T20:15:19.613000 -CVE-2024-21544,0,1,541db173143a336d5bc0349fcd445d8d51ea6126b0c28a2aa55a2e0ee867b116,2025-02-04T14:15:30.917000 +CVE-2024-21544,0,0,541db173143a336d5bc0349fcd445d8d51ea6126b0c28a2aa55a2e0ee867b116,2025-02-04T14:15:30.917000 CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af746,2024-09-26T13:32:02.803000 CVE-2024-21546,0,0,3ea5e480180e9a32c7d44b675d39ba094630d4767cbbc0ceeadcf4b6436e2293,2025-01-27T18:15:36.990000 CVE-2024-21547,0,0,4ab55050078c8543cab81c74bc4c8135319befe90d647e9f05452836831c5bdd,2024-12-18T06:15:23.187000 CVE-2024-21548,0,0,64a07c921575831d75973f97352c3ae7b31e7fcbc6055b89c564893bda5b7deb,2024-12-18T15:15:09.947000 -CVE-2024-21549,0,1,960b8900ed7f931d72e1aaf715a74890738ab80d1e72fecad0c48aad69c13a8f,2025-02-04T14:15:31.160000 +CVE-2024-21549,0,0,960b8900ed7f931d72e1aaf715a74890738ab80d1e72fecad0c48aad69c13a8f,2025-02-04T14:15:31.160000 CVE-2024-2155,0,0,c4046476de717845ad993f72042c777e8830cb00c2720514d4f4bc09d623807e,2024-11-21T09:09:09.070000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 @@ -249256,7 +249256,7 @@ CVE-2024-22457,0,0,979d34a1ed7d504df3092a3574c3153ea97167472249239cb545f67f4062b CVE-2024-22458,0,0,054e05bee56fc2634d5e195c469d65ee7587b8df2315833e22fae6dafab2d0eb,2024-12-04T17:19:03.560000 CVE-2024-22459,0,0,2fc94a97f33cf0ef21eac69fcc3524efa900da095878fd5c77e9271253848da8,2024-11-21T08:56:19.873000 CVE-2024-22460,0,0,2bb6f2d7c991232d933dfb3e51d80b2bdf0aec0f66a6726a4eddb6cb8db8a32c,2024-11-21T08:56:20.010000 -CVE-2024-22461,0,0,064b43a614f746597c8aebb4626cd7a526306827a176d0c7d8e70984df5b2a71,2024-12-13T14:15:21.383000 +CVE-2024-22461,0,1,3c292b06768bb8dfee695cfb6152f392d17d70fccec1b3d719c25e798f5f4072,2025-02-04T15:52:29.483000 CVE-2024-22463,0,0,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0b97,2025-01-08T15:46:14.627000 CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000 CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000 @@ -249856,15 +249856,15 @@ CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01af CVE-2024-23441,0,0,5fbfae92029097d4fc891359f80283dcab2b38733988c2bba5734ba6888ded2a,2024-11-21T08:57:42.840000 CVE-2024-23442,0,0,85a9a2957fc08ee9b474618a1da6b8d0a607c36f5bd40b243be47bb63ce225c4,2024-11-21T08:57:42.983000 CVE-2024-23443,0,0,79d3867a4e948824eaf20b1806b13e7084a9b2c28ab2263038bce23380ab86d5,2024-11-21T08:57:43.147000 -CVE-2024-23444,0,0,7cda3059aab17ce7392064f806a94af2c4e70570364ea9064af4463fedc5f8b3,2024-08-01T12:42:36.933000 +CVE-2024-23444,0,1,3c2d5948aacac60a950c86f94aecfdcc048cf8f1995531448fad25dd580aeb36,2025-02-04T15:16:17.213000 CVE-2024-23445,0,0,5a98d70239e8a6725edcc504c99917a137f22d7333af5692831022efa1e7fc8e,2024-11-21T08:57:43.363000 CVE-2024-23446,0,0,5dac469644df56e016069cb2b6033de032a2a84a296ba41a4b3adb64c5000379,2024-11-21T08:57:43.497000 CVE-2024-23447,0,0,6afa966e7df879c22a58cc28eb7dd08f955e5e8addd70577ae0aef510a1a7749,2024-11-21T08:57:43.630000 CVE-2024-23448,0,0,5251ea2dc5602951d18026468dd69a8dd3434f2d7c29b4b58cecb5321b32d62e,2024-11-21T08:57:43.770000 -CVE-2024-23449,0,0,52d2cd379da29078e144ff388599df26d8e8f8b7de5fc3d78755e45d26d11215,2024-11-21T08:57:43.903000 +CVE-2024-23449,0,1,26ed413bef2af0f4f25ad2c35842efa76107e4ad03e8271f6ad6232c7e3dd568,2025-02-04T15:14:46.527000 CVE-2024-2345,0,0,f85325bec47f9d494dcc044df538791d8749c8ac600a2d4269d5b8696ed7d64d,2024-11-21T09:09:33.607000 -CVE-2024-23450,0,1,cac5084382027b413d7cad8f84c3230907b7428b647da7042d8975dee7c3a7b6,2025-02-04T14:23:51.827000 -CVE-2024-23451,0,0,95975ed3844d7859cdbba349021d8836a25b958b70a255e630c35d994cc64a97,2024-11-21T08:57:44.157000 +CVE-2024-23450,0,0,cac5084382027b413d7cad8f84c3230907b7428b647da7042d8975dee7c3a7b6,2025-02-04T14:23:51.827000 +CVE-2024-23451,0,1,9d93d5612af7d18716a95afced0cb29549b42487233eeb9d44fb85c83a19a345,2025-02-04T15:00:44.310000 CVE-2024-23452,0,0,f6dfdcbe0423fd566f2e766a6b4c5416e0580e55bb6daa810a4f535f602f1c21,2024-11-21T08:57:44.283000 CVE-2024-23453,0,0,f2aa15459318400df0e929ab571f9f860ff649548d88853ea4ebc2a82c1e2759,2024-11-21T08:57:44.420000 CVE-2024-23454,0,0,c2e4ca3acb8e0bf500fb81b23eb19f93e1a6633a33218f1156462305295deeba,2024-11-21T08:57:44.547000 @@ -250079,6 +250079,7 @@ CVE-2024-23687,0,0,cddc185324aeacb6827c4b6d838475827c51f9b8ce212d0d3fb833f97a103 CVE-2024-23688,0,0,c659042598645c0c0fe5f9aca9a8b934e5ec750f56491cd83f91b6f1b5a4fb4a,2024-11-21T08:58:10.720000 CVE-2024-23689,0,0,e6b0f4cd27f0b28e80b35d8eec6ff10d357cb4712a691dea5fdf4ee6cf0168d1,2024-11-21T08:58:10.850000 CVE-2024-2369,0,0,eab708bdb3030a9091cd2f82435a394416d6e76814dcc673d1fb843dae51dc2d,2024-11-21T09:09:36.597000 +CVE-2024-23690,1,1,e8999fb6606d3035a48ae34065cc28c0cc453c8c45a1f4ea94035198aee86088,2025-02-04T15:15:17.973000 CVE-2024-23692,0,0,35e01d17f2522bee02c27fbb176fc1c2ffc8f44ac6474aacb00c52c4e115a298,2025-01-27T21:43:16.410000 CVE-2024-23695,0,0,a416c243a4115ab74e222722bc0324c0d332df39bfb3ccb986ed5ec6237a05a7,2024-12-17T16:52:47.107000 CVE-2024-23696,0,0,678f8b53e63e26ed90afc5803fa458e4881112fb33c3e850d458b8dc68e8772f,2024-12-17T16:52:14.557000 @@ -250893,7 +250894,7 @@ CVE-2024-24899,0,0,2bc91dcd7ae04ef9b7ce8699e0547facdca6bac3dccb8b3215f6cc8ec7bb7 CVE-2024-2490,0,0,c3b0eb7efb25b538b364cd516512248d66a30fe84a5a239e4f9ec85b93f525f7,2025-01-14T15:07:33.927000 CVE-2024-24900,0,0,d5304f8431348447d6c427e55f3d4ca1cb09c058bcac6836ca3d23f9d77a4f59,2024-12-04T17:57:20.727000 CVE-2024-24901,0,0,90f43cff66c2d3472fc27e388657195ab3c16dada990167848ae27558cad40b9,2025-01-08T15:38:23.727000 -CVE-2024-24902,0,0,17dae5aed3d07afac5dd88ff1adc2441e91e6887d449297a92798b9fb424a2c3,2024-12-13T15:15:26.810000 +CVE-2024-24902,0,1,c4ed22b2cc4c385ee67ad5af615e187bf2a07fb877777ee4d15f9e09bfecacac,2025-02-04T15:54:56.213000 CVE-2024-24903,0,0,c3a9a41ff490c9fdd4344ed69609d58d017da5c09d11cfb9e580e9b5f0d24596,2024-12-05T16:45:06.087000 CVE-2024-24904,0,0,89ccd1ef3878c459f037e72c0bd66f3e26116e19f4be95f7db4d735ee9ada7fa,2024-12-05T16:46:28.330000 CVE-2024-24905,0,0,e2273c6b44ecfcd7cad48c4025037d34dbb46e6d15f70467bbb2992d0057e81e,2024-12-05T16:47:29.837000 @@ -251805,7 +251806,7 @@ CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b CVE-2024-26130,0,0,59dbefc86c1031aba378031c672a5f376743b0d682ff90d25ffac7caadc4d1ea,2024-11-21T09:01:59.757000 CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af4029a,2024-11-21T09:01:59.880000 CVE-2024-26132,0,0,276f956129ff17889c7494d0dab8cf40bce32133285459c625bfc72a90dade70,2024-11-21T09:02:00.017000 -CVE-2024-26133,0,0,414e865b4d71c6e97782d5b5ae0b162d8235dd6d767b1d33bac291a9dbd931b9,2024-11-21T09:02:00.150000 +CVE-2024-26133,0,1,d338ce6cfe6ec438f546291f4ca2f1c9a9cde1d97a1f5b31f82e5c4463815840,2025-02-04T15:07:56.017000 CVE-2024-26134,0,0,4b0383f16deb8444e0ffe32a9ced439fcf2df8e070f9714cd8b9bac5583f2c2d,2025-01-02T14:18:48.553000 CVE-2024-26135,0,0,779dc441638c260d7cf5f634019d9991826fae60fddcfb8bc24dadacfd0496f8,2025-01-16T19:24:58.253000 CVE-2024-26136,0,0,78c4ea448beb9cf3c6ef8342e477ea2790594fc079dbed58994d56834e580c2e,2024-11-21T09:02:00.540000 @@ -254035,7 +254036,7 @@ CVE-2024-28977,0,0,08e5aa631d446df2875f7b417e5760d9e5fd3f4ccc9e4a23eb70ca460e37c CVE-2024-28978,0,0,da799c0a16393f900a300a366c8e866774ce711453c2c4b1160779dba68ae01b,2024-11-21T09:07:18.667000 CVE-2024-28979,0,0,99a7aab3884e5ebe09de299942c15bf9528d835168880a8bb57f8c808495f0e1,2024-11-21T09:07:18.823000 CVE-2024-2898,0,0,4e3255cbb3d949cb224ace5d36c85a1998408ab17d3e02741e60cfdc4b4e67c0,2025-01-22T17:52:16.723000 -CVE-2024-28980,0,0,cadd53d5eab9dd929795015f856a05c424742e2bd047c13559098c7706d3271c,2024-12-13T15:15:26.953000 +CVE-2024-28980,0,1,b332b411a06b692726a898dc70ba347fa765408ba3744c575f760eb4ad7da2cc,2025-02-04T15:55:29.643000 CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000 CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000 CVE-2024-28983,0,0,853eb2b12a9ad3bf106c30e0e1489518e0cbe87352e67323535e3cf905652c16,2024-11-21T09:07:19.230000 @@ -254676,27 +254677,27 @@ CVE-2024-29947,0,0,74fb461578267f697163eb48e8e3a87ea3fdcefc1be5ba6a81d7493952a5b CVE-2024-29948,0,0,b8f80600fc56fdcabdf907a995e59589c886d6ad8e18b309d4c3fd9df6c5ebfe,2024-11-21T09:08:40.760000 CVE-2024-29949,0,0,f70118e2497b440f4b0f84bfcaefaaa1dbba7fc1aa2ea861d87e1df52ee85e2f,2024-11-21T09:08:40.883000 CVE-2024-2995,0,0,9f2ab836af0be20171b7f46f52263d7cc005cbea664b19860daea070d373f292,2024-11-21T09:11:00.897000 -CVE-2024-29950,0,0,4242418187d61061def3edf2fc7dbc425759f01bedfaef8262e7860b3c59e9ef,2024-11-21T09:08:41.023000 -CVE-2024-29951,0,0,515f29a6f1d05fbb2d864b504a4d27c9a46a8269c981fe5a152ead6d404176dd,2024-11-21T09:08:41.157000 -CVE-2024-29952,0,0,7931c762136d92d8257cb23bfb1988a445a95d696aa4c652dffa3d94e85484da,2024-11-21T09:08:41.290000 -CVE-2024-29953,0,0,7f080772ca10aad795a2dcd58207b2d8ca76103839c0cf1df5daa3bbdad18fa6,2024-11-21T09:08:41.407000 +CVE-2024-29950,0,1,80c6b4437db378f66f89cf31e15925ce4ba739b0d2a604d99f51bd3a3a52860c,2025-02-04T15:40:21.197000 +CVE-2024-29951,0,1,bd86eaaddbd14729b0de4affbde384cbfda731879d75c98df2ceefecf6126fca,2025-02-04T16:01:19.393000 +CVE-2024-29952,0,1,4ef956a1bde3bbf0cd38b3e68b886b42996617fa8d91c5588aa639a9fb29c1d8,2025-02-04T16:02:13.487000 +CVE-2024-29953,0,1,7099fbfd02e471aa611e24a0a57bde6127503aea0634f69df1825f62a426eda0,2025-02-04T15:19:11.473000 CVE-2024-29954,0,0,9356a83352238148d36e4581851f1ac74b888a98d6b8c44b5bc6513e0b3930d6,2024-11-21T09:08:41.527000 -CVE-2024-29955,0,0,74426bf296de318a8900e46769d24a0613f37709a3b482f11a5b056ff78ff76d,2024-11-21T09:08:41.670000 -CVE-2024-29956,0,0,188cc2a9f5bcc2a2f4204aab1c8e111809dec173ae459950aa21e92bc298c4dc,2024-11-21T09:08:41.803000 -CVE-2024-29957,0,0,d874d79f6ec26c1fe3b88fc2fe0b879cd464e0e4520130c560ff19feb7705883,2024-11-21T09:08:41.923000 -CVE-2024-29958,0,0,80b23ac20914653a755ec42f823e2b8de3d757bab63d66a190fbc400ccc5a293,2024-11-21T09:08:42.050000 -CVE-2024-29959,0,0,5518ec8fb6032ae4ff1d0702c646bf5080e84043483709b9cc5c818c50e7c52a,2024-11-21T09:08:42.173000 +CVE-2024-29955,0,1,3661966fa1219a73749b273d14ae7f87497ddbceaf9e59231744cd3bf323fcab,2025-02-04T16:03:04.923000 +CVE-2024-29956,0,1,0acd6540b410ec634d0c036a7eeea01b052653cb803090a763826c83babb0cce,2025-02-04T15:58:26.297000 +CVE-2024-29957,0,1,70ba4c896cc1ffca005fbeb10bbf5df4d60eaee4a0adcce9c75dd93712bd8bb4,2025-02-04T15:57:57.087000 +CVE-2024-29958,0,1,e451fe567cd476c43bc0f0630db35e30ff6017050f5d4cceb89cf67b8326ee25,2025-02-04T15:57:10.910000 +CVE-2024-29959,0,1,fcae3e199197e6c5910135052d31e093b695f8ecbf2a65ef23567c27c9ed0128,2025-02-04T15:54:42.997000 CVE-2024-2996,0,0,e2911795dad47ec9a86ea21af0f0b188e77dc85db0303c963bbbb905c32b50b7,2024-11-21T09:11:01.030000 -CVE-2024-29960,0,0,12f649bec4b7ecdceeb12fd73616edbbfa04a78930f34758544f08dfe14969e8,2024-11-21T09:08:42.290000 -CVE-2024-29961,0,0,0df4a91c9b1b3806df01f19ecd23b3aee38d0bec563ac6114f71c6b1aa1dfcbb,2024-11-21T09:08:42.410000 -CVE-2024-29962,0,0,ffd97c76beda63898dc10de9797ef982d0f0aca04712c3865bed1d1129706310,2024-11-21T09:08:42.533000 -CVE-2024-29963,0,0,b687ad9a66e9b917337dea5474cc75579099b76b19ecd6ea3396ac21fd81efed,2024-11-21T09:08:42.663000 -CVE-2024-29964,0,0,c1152e551780ff6da4d4b649621bc74e662f08f39df88732802404cc36ea4ff4,2024-11-21T09:08:42.797000 -CVE-2024-29965,0,0,dbb2bf7bc33829847d2ef6258ddc89fd730366dba81c30947398922edfca187c,2024-11-21T09:08:42.927000 -CVE-2024-29966,0,0,b7df36deb234ae4a85ae271f992f424c5daa599ece8c66536c3b529b9b531daa,2024-11-21T09:08:43.050000 -CVE-2024-29967,0,0,d82ebad11dfb5d1cfca5a40a54c1664eab6b2c7049d86eaeba6d5832308b0b18,2024-11-21T09:08:43.170000 -CVE-2024-29968,0,0,95773ad208e1e4b128f66738a28ba326d5e907ec8172642086a5ae899f98380d,2024-11-21T09:08:43.297000 -CVE-2024-29969,0,0,a88342fd00c5b13b444b2dc3a9c41d7d06d0bb130b74314a54468c2ede3b5437,2024-11-21T09:08:43.420000 +CVE-2024-29960,0,1,c1ac4f728db0ce56b35b4096e294772b54c42cd7d34b664e438e3aa514ef1c44,2025-02-04T15:53:21.440000 +CVE-2024-29961,0,1,23b6afc8546223d4c28a4d906fa3a4016e878e0ad63d9dbdb7ca8764ee1f0b1f,2025-02-04T15:52:04.420000 +CVE-2024-29962,0,1,dbf23890b1871d3bb9db2a3ca3cc9d48d287d20d52088c8149445002c4144fa4,2025-02-04T15:48:07.963000 +CVE-2024-29963,0,1,b2974d72392a3cf408b109ee8a9e450e401df872f17c0420c3f9ab28b5ad7535,2025-02-04T15:51:01.833000 +CVE-2024-29964,0,1,affdd0450dad05f54b073dd3e2529d7bc15e677a423374a4680be30456dd2726,2025-02-04T15:47:25.243000 +CVE-2024-29965,0,1,ed2bd18b9cfae5fbc54e8cf75d2e893a1f1ccfd5c6626a3416534b86bf140ddb,2025-02-04T15:45:17.783000 +CVE-2024-29966,0,1,9817630004e4f9d4a0e0a788b7bffbfdf7f4d5d460d7b6913dfd628a37f88b37,2025-02-04T15:44:24.547000 +CVE-2024-29967,0,1,7fb2da47e3e9971d0eb77a91de49cb0c3c56d22f08b4aa2f3abe35d5ef7326c4,2025-02-04T15:43:15.313000 +CVE-2024-29968,0,1,76c0dcb3b20e0f30760f0738161c4405206b9ed109fb79f494d7a7769292f0e2,2025-02-04T15:41:56.900000 +CVE-2024-29969,0,1,00af3b0cb31f5ed33b88c85d289859989a5d43b77c909cbc5f0dadf2c52baacb,2025-02-04T15:41:14.437000 CVE-2024-2997,0,0,34d2a19b9ff69df27205fef4532b986a51bd9c34f866ab6910f03b0cf9556b07,2024-11-21T09:11:01.173000 CVE-2024-29970,0,0,30ccfc672dbcc68f9e9c530abc2a318b021327a43912d1a8fe68035e6eb0947c,2025-01-14T15:15:14.973000 CVE-2024-29971,0,0,d6ed4ef29e7bc64c3c722e51c9009928cc19e29fe2b4f6b6879ff10e2eada349,2025-01-14T15:15:15.167000 @@ -254903,7 +254904,7 @@ CVE-2024-30182,0,0,a81fe3e00d46c578a5fa49e4c9a985f129425c5b65c74e18be12daadef011 CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000 CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000 CVE-2024-30185,0,0,787e08030b6e37360a04f3751038f8618b01aeb2d2ef62ed332526e7c3605226,2025-01-29T15:34:03.450000 -CVE-2024-30186,0,0,5f453d9195ee42b0246f8974590a4439c96e12f354b7abf341c7c38de972aeb4,2024-11-21T09:11:23.400000 +CVE-2024-30186,0,1,c2333a0bfbaafc1dcd95c704a8a42f6fc9d6b04c8b25382d7e6ff08c12b2cd16,2025-02-04T15:38:13.097000 CVE-2024-30187,0,0,6ab90f628d4de6ea936b04cbe7ef6693781b7e8f80de722020d6b283f2bcf671,2024-11-21T09:11:23.513000 CVE-2024-30188,0,0,0be51808a0bc5ec77e2bd06528cca0a9f7702d4428b403b3dca1bd25f0cce002,2024-11-21T09:11:23.740000 CVE-2024-30189,0,0,e721bd4c497ccc35c87c783519bd78ef82e9c5fd493ae1b9081ec3fa1cb8373f,2024-11-21T09:11:23.883000 @@ -256794,8 +256795,8 @@ CVE-2024-32678,0,0,7641fbb4727f544a250314692648516c0791c5bc4f107a1e7d58c2e4f6886 CVE-2024-32679,0,0,fe54e15dc839123d941b045ae3670b09750598217110f0f298a92e4fd577034e,2024-11-21T09:15:27.677000 CVE-2024-3268,0,0,60c1a62c7389f7360d6ad5869cac7297ed89b5423c26930d728b2c622d1df1d5,2024-11-21T09:29:17.033000 CVE-2024-32680,0,0,c7e3bbc2863f1f6c038c97dd7bd24f596f67341b6cc8523b4593e13c3e61f331,2024-11-21T09:15:27.820000 -CVE-2024-32681,0,0,373cf9eba5c3dd422d0b9810e930740b209ba7d2db088047c61b378bf1f1c54d,2024-11-21T09:15:27.957000 -CVE-2024-32682,0,0,d36787a38a603acb49166aad383272d66bb6c67f8c89a647323343630e118fdf,2024-11-21T09:15:28.090000 +CVE-2024-32681,0,1,476cba4d3d7c527b8043035a88ce8d1329415a651c248f4e6b1c4a0a70da8d5e,2025-02-04T15:39:14.603000 +CVE-2024-32682,0,1,dda0b3bf8b170e0ba23d37939705048be89c9fc3b986eb82eaf0cb6655f5bc88,2025-02-04T15:39:56.673000 CVE-2024-32683,0,0,3e6b2654a5155bdea05e1f63c251f10a05c60cd5a6a0b88db23d84e536120a5e,2024-11-21T09:15:28.220000 CVE-2024-32684,0,0,62f14e7ff57c312db4661a3f24fc6b08a714355bf87fada63b3a6e255ffca748,2024-11-21T09:15:28.353000 CVE-2024-32685,0,0,145e6c4923780873187bc7090616028588c7a8f08602bfdfd018fa9ab984ed34,2024-11-21T09:15:28.480000 @@ -256887,7 +256888,7 @@ CVE-2024-32769,0,0,f4e05875d0c6c3744ce9af04fe39c8aebced4c8ee47494e4291d6dfdaf5c1 CVE-2024-3277,0,0,bc532e2a146bb7ef2113e65780a5e3fce92a43c53b40ed8dec151c9f9ba9408e,2024-11-21T09:29:18.350000 CVE-2024-32770,0,0,b337b9f7f7e0a69730cf6a0792853ee2fa309a1262fcf6d2c0c817c656553143,2024-11-22T16:15:22.893000 CVE-2024-32771,0,0,93787dce433f8c267a8f36ae491f6df0eb0f256e01e97cf05a2b86b38fc2585e,2024-09-20T16:38:56.687000 -CVE-2024-32772,0,0,fc5e3295449e4b95054475ac340edd1e89413474a29a3cf823bcb65990c3e130,2024-11-21T09:15:41.403000 +CVE-2024-32772,0,1,a58ad430a3c4be668e4d9ea3f243c2acd20bbfa885ac67e152254906a4ef4624,2025-02-04T15:41:15.333000 CVE-2024-32773,0,0,02cc096a0debe92fb2b14d661cbd10d75e3bc4fc78eab083c415cc9c4bc5b092,2024-11-21T09:15:41.533000 CVE-2024-32774,0,0,f02296e5affb503a23a7af13f9ad4913fe2d33f01de795b05d6e552b2529d5f9,2025-02-03T16:14:27.270000 CVE-2024-32775,0,0,857ec45f0ee60726e753374d679cc82301910ac429e9b20f38438b83a7df3f09,2024-11-21T09:15:41.777000 @@ -256925,7 +256926,7 @@ CVE-2024-32804,0,0,62cbbd93e7d04476a3d17dd601cf81c36f8918f595cf521a860c2985914cd CVE-2024-32805,0,0,5b545eefe736f4e6d0cb9a1479d35115ce08b6af77f432cbe645f22a778702ad,2024-11-21T09:15:45.600000 CVE-2024-32806,0,0,10a9c7a631c28ea01b2282853a6cc5ccb28d8042e254e41025a508e6caf68910,2024-11-21T09:15:45.723000 CVE-2024-32807,0,0,1e516f85107a3627fa4dd678f7a93ce5a404d003a9257a0d2b54b51e4e0afed1,2024-11-21T09:15:45.847000 -CVE-2024-32808,0,0,58fd1ee2553c80b087d7b79fdae674b9f06ebdace1baefa0676ec22ab30dd4c8,2024-11-21T09:15:46 +CVE-2024-32808,0,1,bcff2f9d119a26b85db449b2e473bdbab7447533be2fee2d286e6c9d797ac234,2025-02-04T15:42:41.833000 CVE-2024-32809,0,0,cdabbb959561b35cad5e3d19819317f428c1fc59b966e80ed97cabf23b942296,2024-11-21T09:15:46.120000 CVE-2024-3281,0,0,2482fe63c7424f766bbe910ecda7910a8a23fd7f6f01db11424091242fd707ab,2024-11-21T09:29:18.697000 CVE-2024-32810,0,0,fc588b7101c8724c0618f39b810de8e0e0b303254edf9f0385bb55ecb8ec3be0,2024-11-21T09:15:46.253000 @@ -258523,8 +258524,8 @@ CVE-2024-34885,0,0,152b0b9e5d3216b5b9a7beaa1f04a898f996e21d92477998a2435b7f0ccb0 CVE-2024-34887,0,0,15bfad19b1d1ed181ea959191d94dc734739bf83ed021b83e2ef5681c9e26ff6,2024-11-06T19:28:15.613000 CVE-2024-3489,0,0,d81ffb51bf0a659f164f0f5b63c8747e7c707bdc92a027d4fc95141a53a81b1b,2025-01-21T20:21:03.310000 CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d3819c2,2024-11-05T17:35:17.710000 -CVE-2024-34896,0,0,2f8a155fd996a91a940bcb6e264fbe092c2a0657976e851445c91413f6b43530,2025-02-03T21:15:12.573000 -CVE-2024-34897,0,0,84ab9c262ee5310a655523000ad21bc8bb020241fb0320e2f4b356a94ef63f2d,2025-02-03T21:15:12.680000 +CVE-2024-34896,0,1,3cbe69db1a1acebb4100335a3ecf575aa02a1c2d9789160a59cb06eb5c7789c8,2025-02-04T16:15:37.067000 +CVE-2024-34897,0,1,e48abab35f8c22d8d2ce1d132e429450eb040b953ddf23275a05a9c384f18fc6,2025-02-04T16:15:37.227000 CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000 CVE-2024-3490,0,0,a44d4e788dbbb31c2d20e7cda7c06080195f41b9c2be3506ebb9ea17f43626d8,2024-11-21T09:29:42.900000 CVE-2024-34905,0,0,59d0bb8ac29776054ec2390b8e9ed63207063a9a715e1e403ae1d1ccb3a38a14,2024-11-21T09:19:31.277000 @@ -260557,7 +260558,7 @@ CVE-2024-37466,0,0,15fbd8302b54cf76dcf3489b124c8132e7d1fe29ad5c3affe1b94cf346981 CVE-2024-37467,0,0,ae9b81f57e9c702fa540b027b391baef01f1155f5fd7702b5d7e9246b9cca186,2025-01-02T12:15:20.590000 CVE-2024-37468,0,0,9dd792d48a98823a2e07622ccb861fe7cf4bcdf683ca987cf4c06817c1fde86b,2024-11-01T20:24:53.730000 CVE-2024-37469,0,0,5540b96698dab68edd3e92c4e7ac1383634565149f568bacc79e91f44d8da152,2025-01-31T16:57:05.917000 -CVE-2024-3747,0,0,62dfb702389557bb997bd7f680ebded542a8883a91c8b8feac67b8cd7850830e,2024-11-21T09:30:18.343000 +CVE-2024-3747,0,1,d8ed05ea935cfc68b257162b18929a32ce726a9f434e6c4eacbd1464ad41c9c5,2025-02-04T15:43:01.337000 CVE-2024-37470,0,0,a92631a08fe94bbd806fe05edf14860a412e48e0eecb2ec3f6a20c694bfa7b7f,2024-11-01T20:24:53.730000 CVE-2024-37471,0,0,ab0e5e26fa182324f797d18d1a476a944d5268fb874b409c4ad9b61542eac7a4,2024-11-21T09:23:53.823000 CVE-2024-37472,0,0,07682d0adeda20462c52ba3c8c0200175d089eb326fa031c5a5f1123a0e8a30d,2024-11-21T09:23:53.977000 @@ -261222,7 +261223,7 @@ CVE-2024-3829,0,0,01a0c111086a56df7a8152424dede2af2945ece1419808b25f3a1751a9b175 CVE-2024-38293,0,0,60919199132fd520a1e4f078a9a5c31f13510df36764c4be0738cf814e061e9c,2024-11-21T09:25:18.930000 CVE-2024-38294,0,0,6f3448200c484074d0836c56f5e1c9fe346f248c9334967a8e78fc758b5adfdf,2024-11-21T09:25:19.280000 CVE-2024-38295,0,0,f358c490df2a2504a6d87be69cb330bfbc1382bb00194c4d2ceb8f036013735b,2024-11-21T09:25:19.577000 -CVE-2024-38296,0,0,7d2c90ed3f943fa89268dfa2277e21ebcdf996969081683bf83bdef71fa23306,2024-12-09T15:15:13.993000 +CVE-2024-38296,0,1,be411747a2daafd2f2fffde8f9a19828d78ae5902f8aea12f8b65918c872daa2,2025-02-04T16:05:01.007000 CVE-2024-38301,0,0,4ed3fa9c79b4615c31506838a9d16fce326b29b50510a98765e221d758d5a217,2024-11-21T09:25:19.937000 CVE-2024-38302,0,0,32e62119f82303b51bc65dbe74c23be015fce5e44837e407094449faa0c8425e,2024-11-21T09:25:20.210000 CVE-2024-38303,0,0,48f740ae5336dea6993e1df6502cbae19e1e53f943bf40615f10bf1afa498a91,2024-12-20T14:40:09.410000 @@ -261378,9 +261379,9 @@ CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade CVE-2024-38481,0,0,e569c1b2683e1d59dfe394dee132f7375b3825578031c3d522810bc8473f889e,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f391,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,178f813aaa538f36bfe36509f188778c0f04be9869ce4e1261bd547bb7ef5b0d,2024-09-18T19:19:24.453000 -CVE-2024-38485,0,0,b89f8ba0e9336eb997bcb6f93748c2518a43e1ab15d5699942677d203b8864fa,2024-12-09T15:15:14.110000 +CVE-2024-38485,0,1,f1a5c4c0a54c80f933e00de05c4dca43c8d8e1156c64bf73e38e25a67813bcd7,2025-02-04T16:07:54.040000 CVE-2024-38486,0,0,f8a666c446c24f8e00c7959e1edfc5d2cebe73bc53af61bbc50964dc6ddfca28,2024-09-13T20:36:08.597000 -CVE-2024-38488,0,0,0e1cbb39e5670b017fa406f9175abc55312f50431968bbe046a92f5bf9792da9,2024-12-13T14:15:21.993000 +CVE-2024-38488,0,1,5b9192816c26813d06f450b124b39ebd33c89483443db4056cfa0322d9831257,2025-02-04T15:52:59.177000 CVE-2024-38489,0,0,c8809c3a3b8dbca7d8ce1d14c39e410a336e30ff83b4df53210b8bbc08792dcd,2024-08-02T13:54:55.697000 CVE-2024-3849,0,0,c4d82e661506a17f61c6a5ea96e76bd4bfb630a3e4a4f00bce2b38979f6f7063,2024-11-21T09:30:32.223000 CVE-2024-38490,0,0,1d72bac2abc6246d7283cfd30ba48185eaee3c92949f556d841f42b29013bf38,2024-08-02T13:54:51.277000 @@ -264863,7 +264864,7 @@ CVE-2024-43313,0,0,619bae1057eb2a4fb2cdaede934b5838a621d3fbac4eff5e382e5f1e8f5a4 CVE-2024-43314,0,0,e0fe13572737dd40e8eae7a5a70f0012b5223269eeaa8d1d423c9538800347eb,2024-11-13T01:25:37.903000 CVE-2024-43315,0,0,43efe193e545a1a018442ce58344fa5145c51545ebcb1f9bae52bdba196793a9,2024-08-19T12:59:59.177000 CVE-2024-43316,0,0,ee1d81718fe238da9a8d790284cd77171b1257e6d8432417481ba5519951685f,2024-09-12T21:26:12.670000 -CVE-2024-43317,0,0,2c1488658b7ee38c790a55d2a75c450fab3c32c18561a3c7611111c765f4782c,2024-08-20T15:44:20.567000 +CVE-2024-43317,0,1,36b45c3535dd06a11f4a48830cbd7951f3cbf99675543d9f963cfb105e6c0166,2025-02-04T15:32:08.027000 CVE-2024-43318,0,0,890d47183f5ebeef7a19987b6c38b5b26573a68a3c5a1ba15215fb11bd14521f,2024-09-12T16:24:35.640000 CVE-2024-43319,0,0,981504e9a741a1e110a3ff68c47f5d7737b0a86e302a51e14da734e83959f322,2024-08-26T19:10:09.607000 CVE-2024-4332,0,0,ef522c92b0a0556fe59a78b0d891f83e0f8b9dd05513ca804de3acc434464e31,2024-11-21T09:42:38.703000 @@ -264877,7 +264878,7 @@ CVE-2024-43326,0,0,446246555cc6c5649b053b5746bcc08658e93d2ec2c0ceb74828c0014a091 CVE-2024-43327,0,0,ce3c2152e49d6d960b5db133d9e6e912c18bf5bc04bfe0dbb5da4ff9a0e0f5ac,2024-09-18T17:07:45.553000 CVE-2024-43328,0,0,715732940a0a4d4f0de5c056fabcedb526205c6a803c49eb3a86a6f5d5c87cf7,2024-08-20T15:44:20.567000 CVE-2024-43329,0,0,6571774f6c8fd88f0784ff8e7d9379cdf66afc8a05fddf684b6376b6fec0ffc6,2024-09-17T19:59:39.933000 -CVE-2024-4333,0,0,c1c8f2dd851ddaa5efa8ff0e20eea45989cf4f7b7d7d2160aa738ee7f0f26b78,2024-11-21T09:42:38.830000 +CVE-2024-4333,0,1,a6d205ba44ee948927cff870ebfc2f44376bba94d7e4b38fca4189220fb96013,2025-02-04T16:23:41.580000 CVE-2024-43330,0,0,de1e029e710a50a8fdcf88e35914bcd709af0e53818ad280b1212ae996b49ab1,2024-09-17T19:53:40.987000 CVE-2024-43331,0,0,2bb4a2eb8c879d43df9b7c3640060eae9f5ac448f5a8f4f77927d8dd01d85079,2024-08-22T12:48:02.790000 CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000 @@ -265260,7 +265261,7 @@ CVE-2024-43726,0,0,25e5303aa3d2752d4973cd451cf4740ebcd9f1f02789fc820a4b05c4601e1 CVE-2024-43727,0,0,6e56c5fd624e3d379d7a3f747e5e59a0ffcf502486e1f94044c9e261f88907bd,2024-12-17T16:08:59.233000 CVE-2024-43728,0,0,c3233a8c789e7819d2c5f63e98573c68412f95bb218cc659cfa54ba5cd1b9f27,2024-12-17T16:08:52.357000 CVE-2024-43729,0,0,7a131de0c59e32e4352a453ba888ebe7aef76b944681c7cec4f19a9eb2fc7d59,2025-01-15T17:39:30.203000 -CVE-2024-4373,0,0,90a0bc6a003143c6727c6fb96559f1f531614f51612ca46e3d9865e65abf33ed,2024-11-21T09:42:43.307000 +CVE-2024-4373,0,1,c0420bfc1af85c1ce6a2f1027bc6a7a2f59949253921f540265b26edbb0dcbe0,2025-02-04T16:47:21.660000 CVE-2024-43730,0,0,511fc38ab1b131240f519e4f5725c0c19c0dc6686d2f45ccf117f360ef4d0ec4,2024-12-17T16:09:14.430000 CVE-2024-43731,0,0,9f0faccc6d59622c1c50a431b0a6d85ef1e8c087ead2cc717afda06dc8c4446b,2025-01-15T17:40:19.700000 CVE-2024-43732,0,0,d6320d07d27825fe26289d95b0ef0809cf1168dcd72804211be7b630d7eb9634,2024-12-17T15:08:29.537000 @@ -265870,7 +265871,7 @@ CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512 CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000 CVE-2024-4444,0,0,39fa2450f325301ad817fc86319bbebd1813f8dd3cf2b80a01c74cecff95e276,2025-01-14T21:40:27.670000 CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000 -CVE-2024-44449,0,0,47b864eaa67e3159adbe4b6fa4810c68f694aa0b8ef0226b9f2473a49efe078d,2025-02-03T21:15:12.927000 +CVE-2024-44449,0,1,b83230dc08500d13a8ac9aeb8e4325a69f7caecb9af457f5167430916d435393,2025-02-04T16:15:37.440000 CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000 CVE-2024-44450,0,0,e2b00db1a138b66c9c880a204501c6260391eb5150f3adddaf21310d31badd17,2025-01-07T19:15:32.417000 CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000 @@ -267634,8 +267635,8 @@ CVE-2024-47224,0,0,d9e6235047a8b36e1bec1532e801ad35e030e2c8a80450d35371614fd0df1 CVE-2024-47226,0,0,6a25a0d071ab5701a47d882acebc80a4d8b5fc68de099ea62782be7804f42767,2024-09-26T13:32:55.343000 CVE-2024-47227,0,0,6f3ab8e4530635c45675163a95fcca820448d6a59b97a7e312ec08fa6e1adb85,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,4af091203745bd84c430d86c99d3eb1a1bbf42d9cd7d7cc786b00931c8615cb4,2024-11-21T09:43:27.393000 -CVE-2024-47238,0,0,c5bfe39d8812beb31588a3b3419c2b6cd05ee2f7ecfbd26bcedf95439d4debde,2024-12-12T18:15:25.250000 -CVE-2024-47239,0,0,35d6edef12cb5d46e409a27104baefb8f1679eb58cbc79bca7a93a64e6dedf07,2025-01-08T03:15:08.413000 +CVE-2024-47238,0,1,3709bb1da472fa14a8861b2d409dfdb7e041dc8d6028f86d52acea12f7a7161a,2025-02-04T15:52:06.230000 +CVE-2024-47239,0,1,d6ca42533d7129daeda62ba444384afbde00359ac41a2b9f7ce8d590ade793ab,2025-02-04T15:49:20.267000 CVE-2024-4724,0,0,cfaff446ce857d4884ca5d5aa97ad803d1f94867ae84d40ef51da0f69b75c51d,2024-11-21T09:43:27.537000 CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000 CVE-2024-47241,0,0,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000 @@ -267839,10 +267840,10 @@ CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a CVE-2024-47475,0,0,bf0f8358bb387d27925e7e2bcc11679964bf5b3a92ce72f7eb49a3a11a0c2668,2025-01-09T16:04:01.680000 CVE-2024-47476,0,0,6e990c853e692a8fd64c99a9ad1b15c530c423acd9421da07d1db5546a7d2cd5,2025-02-03T14:48:29.350000 CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000 -CVE-2024-47480,0,0,44d73a6ff9ee57b8ad644b90b4f723a6a3c5019bc50da4f34acddcc6771b4046,2024-12-18T03:15:26.583000 +CVE-2024-47480,0,1,caca75850ac835121c0352a644ac55067ba808faa3ef6cb737d2573312d8c275,2025-02-04T15:56:47.287000 CVE-2024-47481,0,0,71ea09e89917de5bc1b44200d74f1ffc8698bb7da082bd763134d649f33a6380,2024-10-31T00:01:40.487000 CVE-2024-47483,0,0,f01599a6880bac8eacea8814fc1f580c96bada992530caa76be5bdf38bc089f7,2024-10-31T00:01:05.127000 -CVE-2024-47484,0,0,1dd467206ee4a450b12d6144f8387e0badd158fed6658ba55dab988152dd8ce8,2024-12-16T11:15:06.110000 +CVE-2024-47484,0,1,9e78e9e2fd497ad51356aeff482c1eaa9f027f06e02cba4ff6a7fc58802f11bd,2025-02-04T16:11:14.310000 CVE-2024-47485,0,0,f3e17ff20ae3263d9853078761f1fcc280526d84c6f26f0f79a89c8c8da75f6d,2024-10-22T16:23:22.890000 CVE-2024-47486,0,0,73b6ec5c93b8df7e12b45674095673d040f8ca89712ac88fe6ad816e1b46356f,2024-11-21T15:15:31.407000 CVE-2024-47487,0,0,285367b03b1e1af1cf720c4c097845509c3c98a24864a9cd28d57659dbb3da2b,2024-10-22T16:10:08.027000 @@ -268303,14 +268304,14 @@ CVE-2024-47973,0,0,4c755251fddad4f39a2e7e0c2967304daa922575998c42fd2fc2365294c3e CVE-2024-47974,0,0,5b42e76afcab24c20bdceb8d619dc3b1d3700c61728605186411865d26bbe7c7,2024-10-31T13:35:11.790000 CVE-2024-47975,0,0,919a5c25fcfdd1004bec82ba910db5fe6300dd9cdcfe2f11fc4b0bb574f4091b,2024-10-11T20:15:05.143000 CVE-2024-47976,0,0,b7d584a3048cada45c1f6e92a2751d3e6ae6406892198b5d0fe37bebaa37f847,2024-10-17T22:15:03.210000 -CVE-2024-47977,0,0,cf353fb214d896485be2f91921b8179f922d8b627e286c03c52100cb8dc4168d,2024-12-16T11:15:06.370000 +CVE-2024-47977,0,1,cf4d13cf325be37efa31f4ee2bee8b5e9aedc615bb23f1f62f5093211008dfb9,2025-02-04T16:12:46.480000 CVE-2024-47978,0,0,78e1bcfbea2c6c803f24962c7cf119ffbc143ca52da6667d52159f75aa51af9c,2025-01-29T20:40:56.640000 CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000 -CVE-2024-47984,0,0,fb4ac3aad8f7964158c3a1efa355d5e64f14a1532d20e4c56835fcba9c1fe1d2,2024-12-13T15:15:27.110000 +CVE-2024-47984,0,1,d336e138dcb44629755be8ed885a5b167bc71a20eceb1d37510eb484e154462b,2025-02-04T15:56:03 CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000 CVE-2024-4800,0,0,d6e648ed7e57041fcab1c34d0d022e8b177d9063790ccf92ab37010db4d3952a,2024-11-21T09:43:38.470000 -CVE-2024-48007,0,0,748c5eaa562d2810a62384f3987aa2aa284cb419efa1736cfed7ba9393f9f0af,2024-12-13T14:15:22.147000 -CVE-2024-48008,0,0,c04fd1a67845a87777393c643d4276d37d6060fb339ca526047b2150ee5f6359,2024-12-13T14:15:22.273000 +CVE-2024-48007,0,1,bc5618631dd26a4d9339271a067d15d026c8cf9d2a904a72b7e2166470968e10,2025-02-04T15:53:13.560000 +CVE-2024-48008,0,1,f18a28bc4df2324c87d1effed6def0d111afea7dcdbc08ab9e3436c19daf10d2,2025-02-04T15:53:30.747000 CVE-2024-4801,0,0,267e61329220ade99a7910aa98f0de25e6611f732de1b6d7e824595026eb04d8,2024-11-21T09:43:38.607000 CVE-2024-48010,0,0,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000 CVE-2024-48011,0,0,d0802d36d8c16d447cb26517cc8d3b6131002351b295b4fb171a8b113f998f1d,2024-11-26T02:12:04.277000 @@ -269249,7 +269250,7 @@ CVE-2024-49595,0,0,9dcdc489e7a905f34699c5abdecc55ff874d971fe6cdab5a7a9c940438c71 CVE-2024-49596,0,0,59f12ea24b85efe99582dbf4c7f368ed8daabdccd27b8888a507afdb2350be78,2024-11-26T03:15:06.570000 CVE-2024-49597,0,0,289d210e1a84097417043b17841d88b0b7b70db3c7b49297de7f69e637bfd782,2024-11-26T03:15:06.940000 CVE-2024-4960,0,0,cb9d437153604ad93bb6e00104a9b56bfe5e254dbc3e337bc4ad4c4807dc6043,2024-11-21T09:43:57.130000 -CVE-2024-49600,0,0,e05b1d4f714220ac5ab4abfbc06857c8688d20eacb259180bda84c915c12762e,2024-12-09T15:15:17.387000 +CVE-2024-49600,0,1,e76167604d13f2ebffa0b3a871c9ce4a992612d959351091d21477e455c1050e,2025-02-04T16:10:48.620000 CVE-2024-49602,0,0,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000 CVE-2024-49603,0,0,a4bfea8d6205a36c6ccbfdcc6517bedb6fb1c64a34415f1f1c91481a5593a5b2,2025-01-09T15:46:25.277000 CVE-2024-49604,0,0,52d4bcd33cef053b3c621fc8feb1ba701ad78ff56ae956fe76566248ea674eb4,2024-10-23T15:49:25.567000 @@ -270254,7 +270255,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 -CVE-2024-50656,0,0,b6048ec034cf2de098020db8c89c8a2cbaac6142dfc2a566a356a30ba806ea18,2025-02-03T19:15:12.370000 +CVE-2024-50656,0,1,9dda241bebbf1f4657161ef3f1e37a791714c8e03260ae549df95abbfe59b205,2025-02-04T16:15:37.697000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000 CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 @@ -270369,7 +270370,7 @@ CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3f CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000 CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000 CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000 -CVE-2024-50967,0,0,4c07c908a69428d1bb0640cc5c7c220f6b0b98c0e5c25c35cce4767486279216,2025-01-17T15:15:12.313000 +CVE-2024-50967,0,1,a510a0bc53da9b8204db12045069c14674f172a420837c75cd83c80e3a09cc7a,2025-02-04T16:15:37.863000 CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000 CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000 CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000 @@ -270563,7 +270564,7 @@ CVE-2024-51407,0,0,93182ccc1b00077d8adc2e38926051ab4a291bb0f8537bd782b970d50b4a6 CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000 CVE-2024-51409,0,0,084b944bc571cbe682a95858718ef89eef5aff4f21cc9a356c9712b68f4a5fa8,2024-11-08T19:01:25.633000 CVE-2024-5141,0,0,ef1fc3a8abb2248dc1075aaa92c468f9b71ed2a6f95f513df5e167bd1a7726ac,2024-11-21T09:47:03.473000 -CVE-2024-51417,0,0,c32b44e414e15cca7282799c0b5e8da407b765c954e162afa94ef4ddd58e4d1c,2025-01-27T22:15:12.080000 +CVE-2024-51417,0,1,24b3b814afe084ed71e339ba2341ee7732881cb0faa4316aa437c8928628803f,2025-02-04T16:15:38.033000 CVE-2024-51419,0,0,98a28979982a6ebbf942e483f64a66dcbb5943a8a4d7c3ddbfd245760ff332d6,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,f22ae7f46fb9912f1b5aa95d591e960fe9755fe6ab06f8b9867977c897d9332e,2024-11-21T09:47:03.607000 CVE-2024-51424,0,0,1f71d6224f9befbfc3f88ae1ebc8a838b12024ea8e79eff1bdf093cb107029be,2024-11-04T06:15:03.767000 @@ -271440,10 +271441,10 @@ CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bc CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000 CVE-2024-52534,0,0,5d1ce3a10ece7acac704b059e3e790cd8501a0b08318bc1cc5ddf348b08718b9,2025-01-21T21:30:49.030000 CVE-2024-52535,0,0,bef515410181a811c26fc680524553d9ad7877ab91586d8a4ff019d63662832e,2025-01-29T20:37:43.070000 -CVE-2024-52537,0,0,2e41304d80aa5dc48fefc0b2ca47695d3554a8c6fea4dafa4eb2952620d50a3e,2024-12-11T08:15:05.747000 -CVE-2024-52538,0,0,838e651548479e70f2f94d93db9692cee47caf486afed93bcdfb3c606c969d0b,2024-12-16T11:15:06.523000 +CVE-2024-52537,0,1,452ae911f4de5122c99d1e9bb0a1a51cc02727fc3434d173d3a4156ab777cd38,2025-02-04T16:13:09.543000 +CVE-2024-52538,0,1,bdc7a8adbcccc26407d6cd63a537a1ed9796d07ff2d4f217707baf8e0c83204d,2025-02-04T16:12:55.947000 CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000 -CVE-2024-52542,0,0,9087fa5d47859dcf90d7959de1341177bad5dd099f61de139cdc3220302b40e8,2024-12-17T12:15:20.703000 +CVE-2024-52542,0,1,782d30ca63c890d96ad6bbe11bf7f4bbe0aeaf8efe12cef1c1148c420124d676,2025-02-04T15:56:24.143000 CVE-2024-52543,0,0,33519c6ddd0702e3ff651d02a1fcc974b38a1e8f86180d3c4f24bb697efb92b1,2025-01-29T20:26:09.100000 CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000 CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000 @@ -271493,7 +271494,7 @@ CVE-2024-52596,0,0,f3a36e6746d90779d638b312d4c826a468906b9bc77aa701634ae63129f1d CVE-2024-52597,0,0,66d5ffd2bc6b002b25a9fdd759f439714e790757fa7dcdfc2d3f27142c3f3287,2024-11-21T13:57:24.187000 CVE-2024-52598,0,0,47dc45c1ab85a5c823a1a36c4d8f9937ef6c2dfd969360f3e9511e6544eaac89,2024-11-21T13:57:24.187000 CVE-2024-52599,0,0,0db0a011c2a72c6bb6dd64e9b34949435e5305b006875a178839b0fbb4bb2f3f,2024-12-09T19:15:13.863000 -CVE-2024-5260,0,0,94e815a87d6c591d24da63e43d3039cd8c9b83efb1be3bb3f841ed63fe37b4b7,2024-11-21T09:47:17.820000 +CVE-2024-5260,0,1,8aeb5f59e0af1434aed2a86695fc7323d358843f1ec9f9fa343a3c87b2dc49d8,2025-02-04T16:52:34.487000 CVE-2024-52600,0,0,a943c0271bba15206eb04ad43ca34044fe44d51a2cff4ca3141bbb7e1938b0c4,2024-11-19T21:56:45.533000 CVE-2024-52602,0,0,dbb3f6bfc53551d2091c95c757df3cb100dad25fbc396d181000dd0d2ef91aa4,2025-01-16T20:15:32.503000 CVE-2024-5261,0,0,580aa98e51c4d4415b97bb4b6e967076a591fa4b24cde3cedd85bd2f60c23569,2024-11-21T09:47:17.947000 @@ -271976,11 +271977,11 @@ CVE-2024-53282,0,0,d4a4fb28cbd1e885d606aadffc6ca838ffe3c4e8311f989c7fc556dd2fb9c CVE-2024-53283,0,0,0b80134f77f1215c18ecc4d841119db91928dc1ea7711a45f65f8ae02159204d,2024-12-09T04:15:05.073000 CVE-2024-53284,0,0,da2ade891e45ccfc949f5ed18c4cc69432afb57744d30d995cdd8f6d68b2d93b,2024-12-09T04:15:05.220000 CVE-2024-53285,0,0,c2ecada22121f7b17c10fd447456e68801df7cd8946752141828b9091e6bc32d,2024-12-09T04:15:05.387000 -CVE-2024-53289,0,0,1c3eac2def75c96c029cad6c5bab983eb6122bd73bc59abcec159b0760c983f2,2024-12-11T08:15:06.010000 +CVE-2024-53289,0,1,ebb769786fb2018b117e23e7656c3ca0fa531b5ddc712757be217915c38eb234,2025-02-04T16:13:48.413000 CVE-2024-5329,0,0,daffb0d0cde1b0a7abdef85d122cb231171a58845d7b7cc2d00de14c5f127b92,2024-11-21T09:47:26.100000 -CVE-2024-53290,0,0,44f5965070e5c45cca46ec31165fea7afee4d9eb1148f8fb51f225df763496b2,2024-12-11T08:15:06.250000 +CVE-2024-53290,0,1,b2cb6c92203f8f990bb7734fc8962d1fc00112d20e18a64c7342f416a4d9de61,2025-02-04T16:14:05.260000 CVE-2024-53291,0,0,f458e544e78a21ac318b3f57de0e880167c6757e00adcc9b4813b246d9d1a4a3,2025-01-29T20:26:51.673000 -CVE-2024-53292,0,0,b20059370b3030ad774a72e5181a9bb8ad95a8d483d4f06dd01c037a32a8832b,2024-12-11T08:15:06.423000 +CVE-2024-53292,0,1,bd619889663fd62d8e8cbaa5bfff01dfe8f5581c509f8c8b421edd00bad8509c,2025-02-04T16:16:22.017000 CVE-2024-53295,0,0,0623e08e5af9c68c610470140678ff5dc297cdaae7c2f7aca97db41a5ff7415a,2025-02-01T05:15:10.847000 CVE-2024-53296,0,0,e28bf767e01b1aaa2164d43f0620bdb3386846f2c98a1468aa6affeb743edc60,2025-02-01T04:15:31.293000 CVE-2024-53299,0,0,9f86b830eea010b1a445e73d9dbaf9c5c5f6dc050ddebe79e4b7713ae5f50bb1,2025-01-23T18:15:30.777000 @@ -272839,7 +272840,7 @@ CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03cc CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 -CVE-2024-5460,0,0,7046c178eefca6c6b073c219da29e97442af7e310cdabeff0163e83e01c0ec6a,2024-11-21T09:47:43.710000 +CVE-2024-5460,0,1,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000 CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 @@ -273051,7 +273052,7 @@ CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0 CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000 CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000 -CVE-2024-55456,0,0,bc9a6997d2ccc3c26661876314a1a796c10b06773c7081ddb69c2090efda13d0,2025-02-03T17:15:21.797000 +CVE-2024-55456,0,1,f7b046f2321be9392e91d2324d3a59483034c0cfdc1c2f449258cb1512b7fbc5,2025-02-04T16:15:38.200000 CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 @@ -273067,7 +273068,7 @@ CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55503,0,0,01a804c79c1137dc6f6a99f161e5ec4960fdb74ed53d202af527ca6f31c7464b,2025-01-31T21:15:10.640000 -CVE-2024-55504,0,0,6917e546e66911d72a2d6f725102338c9b04fae01f5a59fdddec1e7de9f6c741,2025-01-21T19:15:11.567000 +CVE-2024-55504,0,1,860b49bd638bc2d5a003845485e874e0bc9b85f4d9b1a1d6187969336e05d39e,2025-02-04T16:15:38.353000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000 @@ -273920,15 +273921,15 @@ CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c16458 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 -CVE-2024-56898,0,0,9ae57ff9e729ce7948a9198f3fcb4535abcce7cb095215a11d1908052010d69e,2025-02-03T21:15:14.047000 +CVE-2024-56898,0,1,95ac46b7a3b2f6f25d1013c6ef81f22f2e492bb821c24059c0414fc4fd54effa,2025-02-04T16:15:38.523000 CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000 -CVE-2024-56901,0,0,961934b3471c81d03b97682bc04d12f2b6ebd894d3542fa5265fea40c509a10b,2025-02-03T21:15:14.157000 -CVE-2024-56902,0,0,609f9bb136b2c4af95bed57c64465a88e9193ce7d7fcc02e9749eebc0e6813ec,2025-02-03T21:15:14.270000 -CVE-2024-56903,0,0,c0fde83230cba30dc68b89c58ba19b9d6bc1d05ac23f033fe63f7796558f3aec,2025-02-03T21:15:14.357000 +CVE-2024-56901,0,1,c4394cf3cb7fc9241b4ffae7218b32a6832012adf735e1cdf00bc267573307ec,2025-02-04T16:15:38.687000 +CVE-2024-56902,0,1,364206544de9e86edb21862b09ceabc4c128267b58def3cf7da053569c0842f0,2025-02-04T15:15:18.163000 +CVE-2024-56903,0,1,3411aa4876c340f769f2718fbd97745d98c69d1f15c0d560302b62b1cc98ecc3,2025-02-04T15:15:18.387000 CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000 -CVE-2024-56921,0,0,59308a6a4118b5ed6d8f1b39e741ed93cdb6518178f579e631168f317706958b,2025-02-03T20:15:33.610000 +CVE-2024-56921,0,1,6774b39a988e50bba460b36475d3f9b61bedaeb83d3c538c52aba2bd62c301a3,2025-02-04T16:15:38.850000 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 @@ -273961,7 +273962,7 @@ CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad5498977 CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 -CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43f66,2025-01-21T16:15:13.947000 +CVE-2024-56990,0,1,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6f0c,2025-02-04T16:15:39.010000 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 @@ -273990,7 +273991,7 @@ CVE-2024-57032,0,0,c44ddb8d6c7e924f7e3a4a1f8b2a801cae252e0630b13e5adf63bc93f16d1 CVE-2024-57033,0,0,b213e3eee22d5746b72c15bc18b2e100f2a7f8ef13f3a1ff51e93f85d64bfa75,2025-01-23T17:15:16.950000 CVE-2024-57034,0,0,532c19a19bce4f1154e6252ae78be4d2c5ad6b3aefd0c92a026a2bc0955f97bc,2025-01-21T17:15:15.513000 CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6def2f,2025-01-21T17:15:15.703000 -CVE-2024-57036,0,0,53a08b77e64e14052538b358d3b699e5ff91badbb6cbef1e8c382e8b41ad333f,2025-01-21T16:15:14.143000 +CVE-2024-57036,0,1,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,e9d5d6fed9694112063568252f730d4f4bf67fc11323125dff3066e4510cf854,2025-01-24T20:15:33.353000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 @@ -273998,8 +273999,8 @@ CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f599303766 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,34b0fe239993395502715f1a333962d78d9014d2bbef810d2b8502261121cb56,2025-01-24T20:15:33.473000 CVE-2024-57097,0,0,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000 -CVE-2024-57098,0,0,526c6bd5fc25a9e33d86cb6eb5f9c2f28fc48cd8314a760fa7b874925ceb9371,2025-02-03T20:15:34.013000 -CVE-2024-57099,0,0,6862aaeb55106a9d56f138c9c5c35e97d385d30773837f82252148803043a42f,2025-02-03T20:15:34.157000 +CVE-2024-57098,0,1,c1da1aa7856c306e706557949d32b569f5d3943054f9e8eeafd409129124804e,2025-02-04T16:15:39.330000 +CVE-2024-57099,0,1,de28c6ababfc0d2fa13f5e4af1299596e6a190a4861b027cf0431262825628e6,2025-02-04T16:15:39.477000 CVE-2024-5710,0,0,9b8da5c1d380b97df0420ebc8886a7e69a937a7c44dad142b0c060e78b36a5bf,2024-11-21T09:48:12.877000 CVE-2024-5711,0,0,ee26b23352bc3eb492910cce0ac4d4e0fcc138593b5b885cf10639f27fe76384,2024-11-21T09:48:13.010000 CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a91,2024-11-21T09:48:13.160000 @@ -274077,8 +274078,8 @@ CVE-2024-57438,0,0,a3f3379a583f056a3eceb0974a3a5c5f30e5dd1beddcfe86f2ad82efd2782 CVE-2024-57439,0,0,4cb58a3938fc882d4399a493b10fd8366d3d4345b283844490118a46a57a5249,2025-01-29T17:15:28.650000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000 -CVE-2024-57450,0,0,d672f4d4399feef9d4b7e96fe9a32a34f21114f50d942adfac374a01ff7e7330,2025-02-03T20:15:34.253000 -CVE-2024-57451,0,0,25da2c69e1bedb2de75fffcef691d5e5e61c2c7065c349b48d354ab17fd19e5d,2025-02-03T21:15:14.893000 +CVE-2024-57450,0,1,eac1745392ee6cb6b0712de9ef2b9b099a5a224c9e8b1d29d975c746796ba5fa,2025-02-04T16:15:39.637000 +CVE-2024-57451,0,1,9ab9475c95baf8672081ba698949e84f62748066b38eb93390f844c704ff1820,2025-02-04T16:15:39.857000 CVE-2024-57452,0,0,ab17ba2c958b860fb1e227749065c42543e789b75ec4aef288002bc5421c2347,2025-02-03T20:15:34.373000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 CVE-2024-57471,0,0,046199a988b5112e867977ad6d82bd57c13f52bc945d9be0e662c5b8b39ac509,2025-01-23T17:15:17.410000 @@ -274102,10 +274103,10 @@ CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 -CVE-2024-57538,0,0,cd5690522299166d7d3b5c94ae6adb093799a28371cc34b53a2ee8c321062505,2025-01-21T21:15:11.803000 -CVE-2024-57539,0,0,eb3b72956f964eb5950331f2e2bbcf9cfa2081217cffaaefa2ea82d3a928fa1b,2025-01-21T21:15:11.920000 +CVE-2024-57538,0,1,264c3f3e932919fe606b2937b3d87e9b80deee70cb4c78e0ad770d4314f6bbd0,2025-02-04T16:15:40.017000 +CVE-2024-57539,0,1,54d02e8762f98e37972371ee375b01c6507850d549c84e61792562ada531e3bd,2025-02-04T16:15:40.180000 CVE-2024-5754,0,0,f2c4f40343fb16d68e3a72c7a389800b829b93f31dea5ecdb29b9f34a3018f5d,2024-09-19T01:44:29.550000 -CVE-2024-57540,0,0,e9bc8bb8d371d0d08c5d00c3244575707f168508cb1b7bef72858858f2e4eb7e,2025-01-21T21:15:12.040000 +CVE-2024-57540,0,1,f0dad62ad37b9e1ea5d81c55e64b877cc4aaf0f0ee515c7fd104eaa86508b64a,2025-02-04T16:15:40.340000 CVE-2024-57541,0,0,dd2049b57cd1989e6fcbdb2380ed3e62d7ed6520c2b79fda0eef8f38c76fb1b0,2025-01-22T21:15:10.453000 CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a6a8,2025-01-22T21:15:10.630000 CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000 @@ -274127,7 +274128,7 @@ CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee9 CVE-2024-57580,0,0,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000 CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000 CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 -CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 +CVE-2024-57583,0,1,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000 CVE-2024-57587,0,0,eb949770c2ea18c03b7dc379fa594f10d0dd35fc8b72257d36ec25b4059b70e0,2025-02-03T18:15:37.693000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 @@ -274191,7 +274192,7 @@ CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaea CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18 CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 -CVE-2024-57669,0,0,d409eadc88b4529018be8ca17f00281cdf8ff74894d368fef3370b5b0f111a8d,2025-02-03T20:15:34.960000 +CVE-2024-57669,0,1,6bd10bbf91cdcd56c4203123470fc7a934ba1644d36243028508a60d3cc7fa53,2025-02-04T16:15:40.503000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 CVE-2024-57676,0,0,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000 CVE-2024-57677,0,0,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000 @@ -274207,7 +274208,7 @@ CVE-2024-57686,0,0,bff67f4870fa1a425dfb954d4d6446624978b67b9e08d7ce0318060f20535 CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 -CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000 +CVE-2024-57703,0,1,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093660,2025-02-04T15:15:18.763000 CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 CVE-2024-57719,0,0,643301859a6cc77c578653132f0918510423f22a025f08c288f4c8d7e8730d3b,2025-01-23T15:15:11.920000 @@ -274245,7 +274246,7 @@ CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b101590 CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 -CVE-2024-57785,0,0,135792af397929898d575e62bc51d4dfce68cd8f2d0c7ad555f4b589f8dc76ad,2025-01-16T23:15:08.317000 +CVE-2024-57785,0,1,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 @@ -275906,7 +275907,7 @@ CVE-2024-7512,0,0,6e6986c7b9ae27924efa1b771bcbe402501f560cb58148172cc36bd006ab92 CVE-2024-7513,0,0,a939e10bde4aa537caff9f1f7c3fbb8d321671cb9263818d646772a52d0eec2d,2025-01-31T15:25:24.030000 CVE-2024-7514,0,0,14ce9dcc3ffed0373a6deaa5aa3e357b4b0f7014d133d7f13dac237fa2f5873a,2024-10-15T12:58:51.050000 CVE-2024-7515,0,0,144060b2d32affc4e63578ef1d58b4a89b0be73fa975a25e8bdeb2b20501ddf2,2024-08-15T13:01:10.150000 -CVE-2024-7516,0,0,852f3ddaf7a0c44d6dc8db6129ed31ca9ebf7633fb7316ad89e0114b4d95db4a,2024-11-21T17:15:25.520000 +CVE-2024-7516,0,1,06930c0fb76b3e08e3eeaa826d8ad379d78a5fa528b0abfef63f669a9f76aa58,2025-02-04T15:25:22.437000 CVE-2024-7517,0,0,7efa31a8ab7bf5454771eaae8841c53ec59ba67a365b66dc848915031ceb3149,2024-11-21T13:57:24.187000 CVE-2024-7518,0,0,3b0dcafb77453d8cc2fdabac4c13d17bf38d6dfd279e8d4067ed746793e3f86e,2024-10-29T20:35:43.097000 CVE-2024-7519,0,0,05acbea0f5b6788e514f26ac7bbde64d19991e936293d8e0394f5caa6fb0f53e,2024-08-12T16:04:20 @@ -277674,6 +277675,8 @@ CVE-2024-9637,0,0,0f4d16db68000f66da50bae84c41a0f228004e7436fcad95d0969905f72e93 CVE-2024-9638,0,0,d242a26cf294563aa693c3b48eace80fd3f0c8397670ca74457232bc92e1deda,2025-01-07T16:15:38.170000 CVE-2024-9641,0,0,1af3f797b9845e72a30c1ec84ed9cc9350f350e1f0f00ee15b2f0dce5766f023,2024-12-12T18:15:28.297000 CVE-2024-9642,0,0,e785c942bfa480a7574dc49561aef989c60cf4146a0b8eb964f23c4e5169b91d,2024-10-28T13:58:09.230000 +CVE-2024-9643,1,1,8df82d3e94dfa3b75019d409a9aad89f1a8e0cffa2c400f7b90eeaacd698e5a9,2025-02-04T16:15:40.703000 +CVE-2024-9644,1,1,429afe8d81050134d8b4eca269db4cd6c13f49121bd38ffd05cb4faf51c60586,2025-02-04T15:15:19.273000 CVE-2024-9647,0,0,fcdcaf92364c0d2df50a52f6773b32a5c3346fda1bdd5380b00168c49162a8b6,2024-10-16T16:38:14.557000 CVE-2024-9649,0,0,aef177183a046c3f046fd6be8c976f15a331c30746d190b980aa15df26ed1b01,2024-10-16T16:38:14.557000 CVE-2024-9650,0,0,2327d0b00f83aa6287d8e0fc737d152f9293bbe0c165388e74c80db5393555e5,2024-10-25T12:56:07.750000 @@ -278058,7 +278061,7 @@ CVE-2025-0233,0,0,89de13b0515a1cf87760945992d61d99115394e614dc8c040d21f875c84f32 CVE-2025-0237,0,0,726b9fd4a1cc35feeb251f210c4adbb8387d0cfa8a7807bfe531c06c5d5e23c4,2025-01-13T22:15:14.740000 CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000 CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000 -CVE-2025-0240,0,1,686c7c63ed008107fa8d0d821a55efe907259d45d6e6d62a75773f196ba84ce4,2025-02-04T14:15:31.367000 +CVE-2025-0240,0,0,686c7c63ed008107fa8d0d821a55efe907259d45d6e6d62a75773f196ba84ce4,2025-02-04T14:15:31.367000 CVE-2025-0241,0,0,a0bdcf70fd4da55c1667c939c86352d55f81eaf4e4e33ce9139ad56bc1c71ee5,2025-01-30T22:15:09.700000 CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000 CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000 @@ -278197,7 +278200,7 @@ CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed2 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 CVE-2025-0507,0,0,c71309f02e1e1a70cd7841937b6297c5bb1df964c2538ccde7cab1ea15c8c533,2025-01-31T05:15:10.280000 -CVE-2025-0510,1,1,7651af521ace0b71fb60f58dd06598bee055dd55c568a05c6e23cf1b03e2c603,2025-02-04T14:15:31.550000 +CVE-2025-0510,0,0,7651af521ace0b71fb60f58dd06598bee055dd55c568a05c6e23cf1b03e2c603,2025-02-04T14:15:31.550000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000 @@ -278333,16 +278336,17 @@ CVE-2025-0803,0,0,bc6dacf0f5269e68a75e9f35b22e16e36c29765c316d4afe0d694dcf8f5244 CVE-2025-0804,0,0,26294e7be538767be4504322449a044f032f52b2c3bc7cc8d2439459f4931229,2025-01-29T04:15:07.193000 CVE-2025-0806,0,0,2638cb3406156416d91341ed96877dc8521b453051587e0f777634140533117a,2025-01-29T03:15:06.900000 CVE-2025-0809,0,0,6ac613b1e050877076ee97d33f9f05d07be9a26746d7a212d0ba0c21df26e426,2025-01-31T06:15:29.933000 +CVE-2025-0825,1,1,18421f3dd23133dae58069abda0e7521b4ae0d607c9026b51441e8a70cccf6ba,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0840,0,0,7a571b476972bc26452112bd2fe7feb65917e4d294cee34e70dd905907ea9749,2025-01-29T20:15:35.007000 CVE-2025-0841,0,0,19ed3e4a8b9e1368fb006a2926892cdeeb158750f421a0cd44decdb9292329ac,2025-01-29T21:15:20.973000 CVE-2025-0842,0,0,f7dcd1055d8de29fa9e0a6a76ded0ebe2dc1cce132a2d62b25b5cac3ae92b134,2025-01-29T22:15:30.283000 CVE-2025-0843,0,0,596677aa6c41ed4ff4d180e6558327d274de3ffb3d5aacaf359f747820f28e70,2025-01-29T23:15:23.110000 -CVE-2025-0844,0,0,1f15667747beff1af31d1403e507235895379709a2ca659ddda0f96c8ec9e63e,2025-01-30T00:15:41.920000 -CVE-2025-0846,0,0,34a4df2b33b372bd5bb923544e807269cf131fd9d4ca24ae58505a904105e2aa,2025-01-30T01:15:13.993000 -CVE-2025-0847,0,0,d8db7b984b65ad9da7bf5279381fe825b5bb1adc1178ac97dbd3d5fe026c671e,2025-01-30T02:15:25.403000 +CVE-2025-0844,0,1,ad0b1a7348478a828c001600461d65bf73245b959ca405694b29d0dd4103c380,2025-02-04T16:57:26.867000 +CVE-2025-0846,0,1,a5652316e4d2a87c8e4e7eada54d0a2ca9765b5059002cbb6848bf67345c7f05,2025-02-04T16:49:08.027000 +CVE-2025-0847,0,1,357f990478a3d7a8ac7a511b3154afa55f39759c26f4e404e4495abf6ec13266,2025-02-04T16:36:19.400000 CVE-2025-0848,0,0,1be1cf225ad3e11696c8f9251d0da5fb412c25fa88c35ca58c2e9b025805269a,2025-01-30T02:15:25.597000 -CVE-2025-0849,0,0,6bb490a189e000a3f70af4cf73bd450eb44902550e6a07765cef6d7871128387,2025-01-30T02:15:25.783000 +CVE-2025-0849,0,1,833f144c8aa23bc8c8df5da04fd7335d4895c3b610f7c0585df5dcb790ae97b4,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,a694ba8628252a8a49300531d1aeef2b68800ccc060b5012afd86c4edc73767a,2025-01-29T22:15:30.463000 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 @@ -278377,18 +278381,18 @@ CVE-2025-0972,0,0,3993ac5cb544f96eddd4ea382f0cae390a0048486c03ea18bb36ab062e41c6 CVE-2025-0973,0,0,37f661449c5d41bc7d595495ef0c9ea92e0effb9bc1925009def0bc433286647,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,8c546eff83dbe5240d979de322859dbce3e0f40803afa459c807306a06c0fe25,2025-02-03T02:15:26.433000 CVE-2025-1003,0,0,28c07c3915c653630648b64a7cbd4a7c616ace8285e5d0c3a3c404659b6f5188,2025-02-04T00:15:33.940000 -CVE-2025-1009,1,1,057e48239e169f5c122c35983321285c81a42e300741bd775d740b302b9ccfb9,2025-02-04T14:15:31.653000 -CVE-2025-1010,1,1,fca9569fb8d93879c5dfa6ccf6d4519cc9975c31116e72a8c2473813e18aa884,2025-02-04T14:15:31.767000 -CVE-2025-1011,1,1,297e07de9abfd504a94223cff191d662176349a8a03f656d368cc065d6c534f2,2025-02-04T14:15:31.887000 -CVE-2025-1012,1,1,2a19be69d1525f7aec900e728054707705be864f913ac23e02463b64f637808a,2025-02-04T14:15:32 -CVE-2025-1013,1,1,7813177c5d5b8508fe8b41eeacc0ca43aa6e14718627783b09e3739d64027188,2025-02-04T14:15:32.123000 -CVE-2025-1014,1,1,544817131bc2a393c39ccd531718fe5c0dd3a6cd30b85cb9bf6937fb9e6d4be4,2025-02-04T14:15:32.237000 -CVE-2025-1015,1,1,78f5fecd53c2aa86c7ca6d563228a76004114ac181528abd6a45351d728a1c0a,2025-02-04T14:15:32.363000 -CVE-2025-1016,1,1,efa8db97120255b01241f5781d3dc7ba89f46e1536b94d5bcfc3c70208ef9d4a,2025-02-04T14:15:32.467000 -CVE-2025-1017,1,1,f5f7b8b5a8afec6f64c593865fae0e1442488e21ca02614ca10f9acba9138165,2025-02-04T14:15:32.600000 -CVE-2025-1018,1,1,8996508fc60b15b22e7370d79020bd66f3818a3a8fbe2c227f5392a8d438c66f,2025-02-04T14:15:32.727000 -CVE-2025-1019,1,1,5e0591954bee495a00e8dabb1003ba7e5349e5489de6607472e2d61d55149324,2025-02-04T14:15:32.850000 -CVE-2025-1020,1,1,eda0323a4c0776f4a73195a989cdd4cfe84003acb905d73dc0fc500a0b13bb10,2025-02-04T14:15:32.953000 +CVE-2025-1009,0,0,057e48239e169f5c122c35983321285c81a42e300741bd775d740b302b9ccfb9,2025-02-04T14:15:31.653000 +CVE-2025-1010,0,0,fca9569fb8d93879c5dfa6ccf6d4519cc9975c31116e72a8c2473813e18aa884,2025-02-04T14:15:31.767000 +CVE-2025-1011,0,0,297e07de9abfd504a94223cff191d662176349a8a03f656d368cc065d6c534f2,2025-02-04T14:15:31.887000 +CVE-2025-1012,0,0,2a19be69d1525f7aec900e728054707705be864f913ac23e02463b64f637808a,2025-02-04T14:15:32 +CVE-2025-1013,0,0,7813177c5d5b8508fe8b41eeacc0ca43aa6e14718627783b09e3739d64027188,2025-02-04T14:15:32.123000 +CVE-2025-1014,0,0,544817131bc2a393c39ccd531718fe5c0dd3a6cd30b85cb9bf6937fb9e6d4be4,2025-02-04T14:15:32.237000 +CVE-2025-1015,0,0,78f5fecd53c2aa86c7ca6d563228a76004114ac181528abd6a45351d728a1c0a,2025-02-04T14:15:32.363000 +CVE-2025-1016,0,0,efa8db97120255b01241f5781d3dc7ba89f46e1536b94d5bcfc3c70208ef9d4a,2025-02-04T14:15:32.467000 +CVE-2025-1017,0,0,f5f7b8b5a8afec6f64c593865fae0e1442488e21ca02614ca10f9acba9138165,2025-02-04T14:15:32.600000 +CVE-2025-1018,0,0,8996508fc60b15b22e7370d79020bd66f3818a3a8fbe2c227f5392a8d438c66f,2025-02-04T14:15:32.727000 +CVE-2025-1019,0,0,5e0591954bee495a00e8dabb1003ba7e5349e5489de6607472e2d61d55149324,2025-02-04T14:15:32.850000 +CVE-2025-1020,0,0,eda0323a4c0776f4a73195a989cdd4cfe84003acb905d73dc0fc500a0b13bb10,2025-02-04T14:15:32.953000 CVE-2025-20014,0,0,c7b03c8de0f1a02652afc1076707a5c9ed340500d3cc7fc3a1a2840db59d647f,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 @@ -278418,11 +278422,11 @@ CVE-2025-20635,0,0,65fe66228d0f30d1cbb4c96eba5c4c20eab6b3488b5e520bb46c7b3b55023 CVE-2025-20636,0,0,6b1cb377acf80eca086d18d547ffd31b4fe2dff2463d36def9e4ca0101d37bc2,2025-02-03T19:39:49.587000 CVE-2025-20637,0,0,01e21e716c01df51a52eb39da1f26c221e3ebff427ba1c1f070d11a24095fec6,2025-02-03T17:54:51.210000 CVE-2025-20638,0,0,9e714cc585f02512c5c5fda219a2d683a01596c9aa307760426e5898e59938cc,2025-02-03T19:40:23.927000 -CVE-2025-20639,0,0,8fecb2ed6400cd2539c2040114be616b9077331d755b64fbfcf682dd3141d0a6,2025-02-03T18:15:41.977000 -CVE-2025-20640,0,0,40ff3414c09b58aa1346613707feda74cde698d5358816ed9981132edb8e2f3a,2025-02-03T18:15:42.190000 -CVE-2025-20641,0,0,153c26cc51726ea02952f964a6ba554db7a970cb9d0ddabf4bb6e6564c1ac555,2025-02-03T18:15:42.400000 -CVE-2025-20642,0,0,50e8bd363568f17d8013d73f82eb051a0aafc70b6009943d69daf6805fbc2ca7,2025-02-03T18:15:42.623000 -CVE-2025-20643,0,0,1db24172586eb4f12d5fdcafb98c66605e4bf3e8ef54a26eadf4f6c208391cf0,2025-02-03T18:15:42.860000 +CVE-2025-20639,0,1,17768a082d000d8edbb8d765dc2ec03f9c211008cd739454854e21355c649809,2025-02-04T15:24:00.723000 +CVE-2025-20640,0,1,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee449ec,2025-02-04T15:22:56.603000 +CVE-2025-20641,0,1,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000 +CVE-2025-20642,0,1,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000 +CVE-2025-20643,0,1,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000 CVE-2025-20881,0,0,c83437091b00f876aa04e9b526d129c928cb129e5ad7884d5370f74210e4f402,2025-02-04T08:15:28.957000 CVE-2025-20882,0,0,69b99365842b08d26a64e97fecbfa691df26b18f27b03e4a0c81dba75093b808,2025-02-04T08:15:29.097000 CVE-2025-20883,0,0,461448c7c259a0ef8ce0a4215584ba4c3d3f0997d2819ab8062ef14bac222e2a,2025-02-04T08:15:29.210000 @@ -278451,7 +278455,7 @@ CVE-2025-20906,0,0,d436092b7af54f2929e8c24b2fced68db5cd0220841fa96873756ed0de7be CVE-2025-20907,0,0,08fbc69316245af44979117f75bfc85507f5538affecdc924c935ae1ce8c2fa4,2025-02-04T08:15:32.403000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 -CVE-2025-21101,0,0,54fc3436ce4cfc40d8a2f15abbf941cc22582b7c164f3bb799cb159e69cf76ad,2025-01-15T05:15:09.097000 +CVE-2025-21101,0,1,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 CVE-2025-21107,0,0,a8bef9790437256d8a5036e86822b9dec5f8fcf588041208330c76eafa41979d,2025-01-30T10:15:09.100000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 @@ -278670,9 +278674,9 @@ CVE-2025-21522,0,0,cb66a3c1d1dfcbcb008084ba6cf867c8acb6791563e88e0edf7750492de7f CVE-2025-21523,0,0,ca70e2be63d4056657cc5a2d3e21fcb5185cba37e016db56f0a855093c1c81f7,2025-01-31T21:15:13.267000 CVE-2025-21524,0,0,72109ee106deef22f99a7277273f72a274014cb1d3680a24fc7f9635a7177c12,2025-01-31T21:15:13.387000 CVE-2025-21525,0,0,7869072a71baaec403876ed8c4e7bedc0906c6a810619a82f167d35d4eea8aea,2025-01-22T19:15:11.697000 -CVE-2025-21526,0,0,291ec3b9da7511e5cbe9402d9d2f6bf78e8bc830ff77a5db4255e44ed9584922,2025-01-21T21:15:18.337000 -CVE-2025-21527,0,0,81a728da38f4b9a72f3ae1e7a0f840757be5156c1111d5926d28955cb066c62d,2025-01-21T21:15:18.467000 -CVE-2025-21528,0,0,a92cd98b4d3d0bb5ada5ac678d97ee5580729b09764671da9a2e610dc228d484,2025-01-21T21:15:18.597000 +CVE-2025-21526,0,1,fdac7cf5aa22219ce3d30e2931ce86c3afca18afa9001cd9d592ceb99fd9883a,2025-02-04T16:15:41.390000 +CVE-2025-21527,0,1,fe6e17ba8c4f9cbb7443f4ecebffc8123cb250add87fccb4e7a78b1549e18f3c,2025-02-04T16:15:41.537000 +CVE-2025-21528,0,1,e4a89dd052a14e910c273cde2b54814a4717a3a651bc8b5657a5be581524c187,2025-02-04T16:15:41.670000 CVE-2025-21529,0,0,dee20dece2eedb23e04324824e015e8f05eee7ea7433e5b61e65814c57dca6fa,2025-01-22T18:15:20.530000 CVE-2025-21530,0,0,5acf6e339ccb7e518b28b3b1dd72423eccb0a9ebb7d08da09f9b674845742584,2025-01-22T18:15:20.687000 CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000 @@ -278697,16 +278701,16 @@ CVE-2025-21549,0,0,9516fee84da3e6782710c423fcb70a88cfe6b1a5953c8090349aba05fb0d6 CVE-2025-21550,0,0,fc6018fa8689705a1d97565e90143ad8107b7d09e9ac94ceaa7a818b6a1e81be,2025-01-21T21:15:21.510000 CVE-2025-21551,0,0,daa54f6d6f11d62de70aabb398b2fdea0e2b5009532720b06e87bdb84d893d74,2025-01-21T21:15:21.637000 CVE-2025-21552,0,0,184f54b713cc98d823a9fc2330b628ba0a292c83f1bc80e376a100e4eda1dd79,2025-01-21T21:15:21.763000 -CVE-2025-21553,0,0,7d308c146b3c7810fa852832243b2d92e2cfa13a5d7f7400a8a0b2f84234922d,2025-01-21T21:15:21.880000 -CVE-2025-21554,0,0,fdea1d1a9290a331c13afaa642e6b53d7015239c71aa687e3d14929cbab5ddf9,2025-01-21T21:15:22.020000 -CVE-2025-21555,0,0,e57db3c6bd259ef7446282faa445cd7ad5017e791a7401ea749189403f7689ff,2025-01-21T21:15:22.163000 -CVE-2025-21556,0,0,f0ca1d262afa25ce06e9714581f4f8b508fd291386a7c2a62887a84f4eecf2e7,2025-01-21T21:15:22.290000 +CVE-2025-21553,0,1,92802bf9739837fa0d2c62514ebaef4b18196a11ad6b61143f1fb0c046ffa5cc,2025-02-04T16:15:41.797000 +CVE-2025-21554,0,1,057a21b99b0003e30cfcffad40f558d564f568ec6093ef32985e74f657a466a5,2025-02-04T16:15:41.920000 +CVE-2025-21555,0,1,c200e162e6af7483fb02c38aa55f2a9bbc1c5ad3179780ab1a619f63021dba4c,2025-02-04T16:15:42.037000 +CVE-2025-21556,0,1,2ca53531791b17fdbd6bb88c5394c8ae78bab852033584ff3921090c252ceab1,2025-02-04T16:15:42.170000 CVE-2025-21557,0,0,798e4b1b8a7014aa38ad2f372a3a346d564536908b595a9b4541227da7fcb731,2025-01-21T21:15:22.423000 -CVE-2025-21558,0,0,49eec64b7b3a060ba7815a1df52970f882fbc806a1ae78e400fae98a14c6394f,2025-01-21T21:15:22.537000 -CVE-2025-21559,0,0,9237171151be9682f8f6aabdb23cca6f39420b1a1db4c42dc3654fc832ff0bff,2025-01-21T21:15:22.667000 +CVE-2025-21558,0,1,d91417ebf2e92be22e3b6c55ff5636ad00825d5f0539bf7f598a5950b74fddc7,2025-02-04T16:15:42.290000 +CVE-2025-21559,0,1,6c73e2ebfac734ed3432dfe1bb82ae818caf5b99256c1e70ac75f22855b96d4c,2025-02-04T16:15:42.407000 CVE-2025-21560,0,0,80fd7e3ab134b4d950daafa4b01ece2cf5b9b72b3285a042bf7263dbbdb0d67d,2025-01-31T21:15:13.497000 -CVE-2025-21561,0,0,103f3afdaf46845d7fd30d0e314656d8447494da25afd1c40c34cbb19a363aec,2025-01-21T21:15:22.920000 -CVE-2025-21562,0,0,c4fcf668621bd5a314c0662999546e50fd68ae6809417b8bc8e8bcd20e6c19e7,2025-01-21T21:15:23.060000 +CVE-2025-21561,0,1,7efdccc7a248e933e78886a0b81e0b487661615085dc3344b303a3566e5b85b9,2025-02-04T16:15:42.520000 +CVE-2025-21562,0,1,b7d38e9daf5cae5a61d4a6e321108fac685427b39066b8273fa5765cf7fb41be,2025-02-04T16:15:42.637000 CVE-2025-21563,0,0,9dde7e85498b0c6cb479808cf9779a362e0054870f74eadbdd00723ac0a75dd4,2025-01-21T21:15:23.207000 CVE-2025-21564,0,0,b4901d47146ac77220681a9cdc88c1e92d9cee9e0592a699f0129c2e4baadceb,2025-01-21T21:15:23.330000 CVE-2025-21565,0,0,493b671d0a3624fc1e289c3830076af5d36863ee7e16754f3d0112f59a66caa8,2025-01-21T21:15:23.460000 @@ -278782,20 +278786,20 @@ CVE-2025-21665,0,0,fb059002f5ce248788ba8e290451855e9eb46e1b2f953588f42101e6529c2 CVE-2025-21666,0,0,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4316,2025-02-03T19:59:37.907000 CVE-2025-21667,0,0,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000 CVE-2025-21668,0,0,8b20b97df5dd2ed7cbbba0cbf3d1ebbd67685e3ecc54b7dd3a7c5749df4931d3,2025-01-31T12:15:27.960000 -CVE-2025-21669,0,0,57297746ea6af4232634b5feda860c3a6d2f8b8ad8b40e3f332c512b5ded5f6b,2025-02-02T11:15:15.980000 -CVE-2025-21670,0,0,d12c9401cba1e8e9338731815f7b5e159255c5e225990eb8a1877fd4ffbecb00,2025-01-31T12:15:28.160000 -CVE-2025-21671,0,0,82055684ba59cdb4ac3ab58ee2cb025fec2afdb765aa94af38cc1c0dc4207a2a,2025-01-31T12:15:28.263000 +CVE-2025-21669,0,1,f693fe3407a5a10b6015a8b5648a41115fa5f363f68427e72ac57ff90c068424,2025-02-04T15:38:39.790000 +CVE-2025-21670,0,1,ca2de355b2236daf5daae7fbc1d2b8883b364d957a9314e913d3902bff31465c,2025-02-04T15:37:25.103000 +CVE-2025-21671,0,1,567707187a4196a506a4b9c3cde4135e1c070c0366d29298e9a2777c408d3225,2025-02-04T15:36:40.887000 CVE-2025-21672,0,0,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000 -CVE-2025-21673,0,0,9e628820134e026486c4acee1bb676a96b70d1edf2eac2a3aa94349cc89905c5,2025-01-31T12:15:28.463000 -CVE-2025-21674,0,0,69194298cd8940d45652dbb676d8c3f7403965bcf926595dfedefd4ad16e7c95,2025-01-31T12:15:28.560000 -CVE-2025-21675,0,0,c3bd3ced751194a1431aa53c613e3e5b576f540db0c777b43a76ef120c168980,2025-01-31T12:15:28.677000 -CVE-2025-21676,0,0,064284a3dbaf38fe834566f826bc3f11ae4fddcdbdf86300e5683c199decbcd1,2025-01-31T12:15:28.780000 +CVE-2025-21673,0,1,d0a679bc106ee109cee5168a780298c0cf125fba805d401a08b45f9fd6332742,2025-02-04T15:33:41.723000 +CVE-2025-21674,0,1,64efdc03dd836624cf0a2ee09b14be70ebf827a9a124ea9489ce5e5c5ecaf3f1,2025-02-04T15:31:30.483000 +CVE-2025-21675,0,1,4ff6f38fbf246a312f30bd93343ac721689c7cffc045f31507f9bf7c03d1d91d,2025-02-04T15:30:22.973000 +CVE-2025-21676,0,1,c9a88e8d4f002858e2b77db9f4c0fcaff9fe5c4337ce1ebb294fcd25435e43dd,2025-02-04T15:29:00.623000 CVE-2025-21677,0,0,70fa9dbb19be63f0e5ea80750777ba5aef07e7b8b2e923cb9bd850906eb4000c,2025-01-31T12:15:28.877000 CVE-2025-21678,0,0,65465c1349470e2848efc9789a1e7208b2689fc22a978118bf7837cf785e5e27,2025-02-02T11:15:16.117000 CVE-2025-21679,0,0,c0a036194b73d5170da4843624623a1fb4b9e085c3ba3466b8d8f2581a1bd77d,2025-01-31T12:15:29.070000 -CVE-2025-21680,0,0,b3ddbaaa8dc622ecaf35025de804bcc4011af952e154dc87e5b861a81b1add98,2025-01-31T12:15:29.160000 +CVE-2025-21680,0,1,ab176bb9040b4730f514a36acb954e8ef4736becce0eddc54061e7998d46f0ed,2025-02-04T15:28:08.510000 CVE-2025-21681,0,0,33386cfbe1cd639dc40c49e4251fab4b0a535f237b027c151bda6b0c921455cb,2025-01-31T12:15:29.260000 -CVE-2025-21682,0,0,af36b62ce352ba03944473d01a4afdd64cf998543119197419230273df44e036,2025-01-31T12:15:29.363000 +CVE-2025-21682,0,1,462d4deac5e2e59ee2d3e31f4dfc91555e87d58a1e47d6fecad84acad53c8a69,2025-02-04T15:25:48.707000 CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000 CVE-2025-22129,0,0,33e0404310f131287ac9ad09e9894e740e319437070c1354f7ac6457bfb0c49c,2025-02-03T22:15:28.040000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 @@ -278821,6 +278825,7 @@ CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000 CVE-2025-22204,0,0,3b42820a1800a03b8acf62ff924fd1d2e7e34ccd41795d8e793292d4cc1a4b90,2025-02-04T08:15:32.563000 CVE-2025-22205,0,0,07ac7f8a63905a316ed7661116685ba888a790a04ad75ff39009e21a6e11f041,2025-02-04T08:15:32.703000 +CVE-2025-22206,1,1,a37042fb30bfdf8bd3c913d95d1ff708db17da436c3c8cae244028ea6ab45674,2025-02-04T15:15:19.797000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22216,0,0,b108a47a76cc941caf7304a7cc76897ef598f7beee3219dba5477e4826578b01,2025-01-31T18:15:38.247000 @@ -278918,8 +278923,8 @@ CVE-2025-22387,0,0,dd138547075d8154ac170b8fa1fe2fff6d798eaa102e4686c32ded5b7657a CVE-2025-22388,0,0,861b73b67db062deb352be180b2d48906ffed263b47a8a982206529cfeb63b66,2025-01-06T15:15:16.307000 CVE-2025-22389,0,0,64b4c3bed98d63311740979c9a99a1902edafd1044e1f65b92e496841e753fba,2025-01-04T03:15:07.580000 CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6ad14,2025-01-06T17:15:48.170000 -CVE-2025-22394,0,0,780dd34f6c8d956773fe66cc9a40882a1aab9e62547a957c365351c2cacb4ae6,2025-01-15T05:15:10.343000 -CVE-2025-22395,0,0,b4af1e2771240dce0266f3a11cdb786994cfedb40584485f4b0605f4b74ce136,2025-01-07T03:15:06.047000 +CVE-2025-22394,0,1,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000 +CVE-2025-22395,0,1,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 @@ -279038,7 +279043,15 @@ CVE-2025-22618,0,0,ad61907d0f72e0ce3f21a94e69cc540d7b1cd780e0ad571607d65d3ecdbef CVE-2025-22619,0,0,13eaf69e13cd48ca237219c7a91847c694b4162a944b2e77691398b837195a0e,2025-01-13T21:15:15.620000 CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 +CVE-2025-22641,1,1,3c8ba62f7e7ae6e5655dec504dd86ab90fe373678b0c1d9197700f6f086c84e3,2025-02-04T15:15:19.923000 +CVE-2025-22642,1,1,6048182eb0f6b4a4c203e871865e853bcffbe5c034ce17b10db7807b361683de,2025-02-04T15:15:20.120000 +CVE-2025-22643,1,1,6eb628956bc9132d0dbedd120294417af8859c2fa0f55bd8f60caf39d3a17df7,2025-02-04T15:15:20.350000 +CVE-2025-22653,1,1,a20ac3cb4da9afd28f7f5bc3af6a3e6c41a4d6a9c11f04099502efb1319c49b8,2025-02-04T15:15:20.557000 CVE-2025-22661,0,0,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a81e,2025-01-21T18:15:15.707000 +CVE-2025-22662,1,1,ec0603955022e73883f87a862799a91e013c58c344f57337582a4590f1ccb6a0,2025-02-04T15:15:20.780000 +CVE-2025-22664,1,1,cec70e9e91cd990dda045fa7fe51e27822446697683c95d1c254a83171752776,2025-02-04T15:15:21.003000 +CVE-2025-22674,1,1,cf0d75f9965fd022e1c1527f6157aee67925bff1f1f116eb23e5ae73cd026bb1,2025-02-04T15:15:21.227000 +CVE-2025-22675,1,1,ec052d64a6829f28773a87d38f12faaf3ffcc4496001ec5dd3ec5b8f812a7871,2025-02-04T15:15:21.433000 CVE-2025-22677,0,0,8d43b65d172c46d7266c70bfaa483d5719af6f4ddf32810946ba372733d4ca33,2025-02-03T15:15:17.827000 CVE-2025-22679,0,0,982b3ef25a24faf54ddfcb5cc683fea9a4f95f012aa30e8fde170988f777a95d,2025-02-03T15:15:17.980000 CVE-2025-22681,0,0,2e6e3a2dbda39e901ee3682e80fb398447b2801624e7ca9f8e89352a0191e4dc,2025-02-03T15:15:18.127000 @@ -279053,6 +279066,10 @@ CVE-2025-22691,0,0,ba504f0c068648b56f41eea8e144ba6ecac9c76b087293859f332c8e1a434 CVE-2025-22693,0,0,4b59b40a0d306e100c74dfe74d67980cca6d4d92eaed217c1d9e80fa8151b89d,2025-02-03T15:15:19.467000 CVE-2025-22694,0,0,03ac65919087fda8f9accb3cbfcf926c0a726a7c0ba478ac877e88dd11071394,2025-02-03T15:15:19.597000 CVE-2025-22695,0,0,9d542fff69055c37eaddd3115bc887932cef66fc0b0625a791356e6c3a7c8fbb,2025-02-03T15:15:19.770000 +CVE-2025-22696,1,1,d305e284e6ca2c9352ef9d75882534a5561d527a2be396a8e32bfb77810f81ed,2025-02-04T15:15:21.643000 +CVE-2025-22697,1,1,64404059e1f225b774623742169ccd5e5c1c8ac75672beac0e97ead81efbc4a1,2025-02-04T15:15:21.793000 +CVE-2025-22699,1,1,0ae15a7e128d5248658798ee01bb503286be3ad07a1f5d24088afa44098c9901,2025-02-04T15:15:21.947000 +CVE-2025-22700,1,1,b161d4bdb11a90357e59b7735cdaecf9b56590bf970b81e5679476cb7893a0a7,2025-02-04T15:15:22.140000 CVE-2025-22701,0,0,63b5c1b319af1355ea922911d969183ffbd269cea60dd1bea1234982ed69b493,2025-02-03T15:15:19.933000 CVE-2025-22703,0,0,810fc4d434152d23bf85599562cad0b7718f761623d1f0c2ce66568a77207e7f,2025-02-03T15:15:20.100000 CVE-2025-22704,0,0,c7282a7fe87729f4bbe104963957d743e820ab1275e47a79301bb959d030cedb,2025-02-03T15:15:20.273000 @@ -279072,6 +279089,7 @@ CVE-2025-22723,0,0,9840575079edde83aa306dc43108d401256a5ee1d470cd37a6e795011bb56 CVE-2025-22724,0,0,4b71697c4166f64157fa259051322142853491130762e53a926cbeb456975423,2025-01-15T16:15:35.250000 CVE-2025-22727,0,0,8d1395d07c39bf78bab959ae382e9d7d3cd5abcb4c9cd8b35dcbcfc6ddf2960d,2025-01-21T14:15:12.173000 CVE-2025-22729,0,0,b385c13a23a149f64df46d7196231b40966fb99b0f0f2a85978036f7c5cdb1e2,2025-01-15T16:15:35.400000 +CVE-2025-22730,1,1,85297e3c87cadddf854af9f8742c33faf1c8eb3335ddc71c529e5aa2bed025db,2025-02-04T15:15:22.293000 CVE-2025-22731,0,0,591ca873395a60ee615f6aa95897c12d402f7661783a3bda5439845de448c196,2025-01-15T16:15:35.550000 CVE-2025-22732,0,0,9d0821ec10c5b1a62f175cf9908a52dbfcb9a254ac41317428585e83454ea58f,2025-01-21T14:15:12.387000 CVE-2025-22733,0,0,bfe9070d5ce2cdd151d292e6709b64dab140c8bb1a8c1bebc8fd23f76ab9727c,2025-01-21T14:15:12.570000 @@ -279122,6 +279140,7 @@ CVE-2025-22786,0,0,bbe34793af48ca2408914a3f7c7ee4c16a9abc2b55fa750872644376b8835 CVE-2025-22787,0,0,61c6ac678e37e56bdf009616d68873da6951821ed07437bc8836d50664142439,2025-01-15T16:15:41.603000 CVE-2025-22788,0,0,af55bbe385e5ad19db90f54f67dcad4a6458802599e6dbb5e4a7878a0103b5e0,2025-01-15T16:15:41.750000 CVE-2025-22793,0,0,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000 +CVE-2025-22794,1,1,6c408a3ef0c6f2f0098bdaad5eaecc37836582a2608efa856a92c697e03921f9,2025-02-04T15:15:22.503000 CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9b7c,2025-01-15T16:15:42.053000 CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 @@ -279163,7 +279182,7 @@ CVE-2025-22912,0,0,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaed CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000 CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 CVE-2025-22917,0,0,719cb439e4aa013d46c277c9fd9c1581990f1a43ff92759e99b4634c1058cb35,2025-01-29T16:15:43.907000 -CVE-2025-22918,0,0,e2d613a5eab7f892f5de317abf0d46cdcd99aac12650adb75272eb6183939977,2025-02-03T21:15:15.400000 +CVE-2025-22918,0,1,c2acc93785383a23d09a5f2a5b1d1c26758fcb9ff8c53b46662815b62f354985,2025-02-04T15:15:22.713000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000 @@ -279171,7 +279190,7 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000 -CVE-2025-22978,0,0,c0e66c6fb03b619e0a62303a233be14e0f9e5c7efff96484200104b1d2538157,2025-02-03T20:15:36.720000 +CVE-2025-22978,0,1,6be2fb193ba25eb252c1a958b0de2d1d9f8029d13358fd699d94e6d2260dffde,2025-02-04T16:15:42.890000 CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 @@ -279407,6 +279426,7 @@ CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7 CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000 CVE-2025-23643,0,0,b353edc36c329787ccb2df45790b0cdfde93aca21e629f256a43abc715ef88b9,2025-01-22T15:15:20.153000 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 +CVE-2025-23645,1,1,f6118bb684175b9a79d4adcee206d638914db861b430b0ffc16a910451eab100,2025-02-04T15:15:22.873000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 CVE-2025-23656,0,0,4fe4744bbcc61c2321b6cbd30725f827b3f92385477c5c9ee9df58c660bf6e0e,2025-01-27T15:15:12.267000 @@ -279847,8 +279867,11 @@ CVE-2025-24594,0,0,73bf09320fa1b7179db1666156c05f97abc550bf9d0baf98782d841299e7f CVE-2025-24595,0,0,16f0773a0ac998ce98c1ad4fdbcb17e9d21438c910f7f360ad71b07bc0b68a7f,2025-01-24T18:15:36.497000 CVE-2025-24596,0,0,56c6d7379b75b25c392c56ee01f8355f65eab2aef27ef45713b8db261fdb1c19,2025-01-24T18:15:36.657000 CVE-2025-24597,0,0,4f9595b5b3d6a1b18fa628038d17ebdb90040d7d0e2b83043a402812377ecc27,2025-01-31T09:15:10.607000 +CVE-2025-24598,1,1,2b6167b1a67d017e963b1161fda54f9ef475cdcd8358188a16ede48edfa9dc5e,2025-02-04T15:15:23.027000 +CVE-2025-24599,1,1,7d80fa1fdf489d16ed4436349cd51d0e1d90fbde31b2e6f95b0af7a46736aa9c,2025-02-04T15:15:23.177000 CVE-2025-24600,0,0,d73cf28f4801384b188b04e1c3f7c9aa64bafbdb94df7783dbeec7d4fce95949,2025-01-27T15:15:14.233000 CVE-2025-24601,0,0,09460b80aea0be0d3888ba8430958b62e3e145d2cc8dc47d5ade291ee8bc9e14,2025-01-27T14:15:28.927000 +CVE-2025-24602,1,1,893d44e8ef8a282321bea5a8cc3ad3fe66932dfd6ea1ec060679ede896ec305f,2025-02-04T15:15:23.320000 CVE-2025-24603,0,0,899aa638f00959e0f6ecc829945b005eba28b2e8ebef1639295a1400a29e306a,2025-01-27T15:15:14.437000 CVE-2025-24604,0,0,d37c8d145dd4b425ec86d64b2f12ad09b475bfd45dc61638083338e8e14d6bd7,2025-01-24T18:15:36.823000 CVE-2025-24605,0,0,89b84d6165e86daf6e24dcbdbda0aeddd7b734e1ae696f33a35ecc342684c362,2025-02-03T15:15:26.473000 @@ -279882,6 +279905,7 @@ CVE-2025-24643,0,0,e68c5a0a338ba2f15360b2cddb8570fa813ffaf5d24f91279de06e8dea404 CVE-2025-24644,0,0,c11455cdae9ca03e39dc04ec62779c7c0859d653b9bdbf51299744a7cad98d09,2025-01-24T18:15:38.833000 CVE-2025-24646,0,0,1e03ae6a240704431721f016fd18d7a4cf140a2c7bf659d4a18fe290c8540cc2,2025-02-03T15:15:28.703000 CVE-2025-24647,0,0,da26d264cb6001e25e487a4c9450401789a0d8cfe970fbb96d833bc8b0364e55,2025-01-24T18:15:39.007000 +CVE-2025-24648,1,1,b7d24c4b225205f2c19af50b752d3bb7c27439812048452059e3f5738487b3ba,2025-02-04T15:15:23.460000 CVE-2025-24649,0,0,e12480c1af3d0562228e7fb9bbaf4547ea4bbda52378bc55597c9726e90f1308,2025-01-24T18:15:39.167000 CVE-2025-24650,0,0,cf29d8d279217dee566ee4460668d165f9e48ce550ac749d6590b4b9f5b6b792,2025-01-24T18:15:39.347000 CVE-2025-24652,0,0,d90894c97a505cc62307f231d47ef8ad42b7ce29fb19e773557e5f9b19657322,2025-01-24T18:15:39.517000 @@ -279906,6 +279930,7 @@ CVE-2025-24673,0,0,375fd4d5a67b13bb37b9d15dd33278412a2c19ff7829305fc029d52bce5b7 CVE-2025-24674,0,0,a507f840918a80b91b40ae2964f97e85346f7134fab44583868d1a3e665d981c,2025-01-24T18:15:41.190000 CVE-2025-24675,0,0,5fe2ef5029b94119d5b43f856c22c4f184db2954b4c44ad2337d3475fe76df16,2025-01-24T18:15:41.340000 CVE-2025-24676,0,0,1ab037de7d7b67b372c6adfa1424190aaf7a19c132d0b6f32077682801effa69,2025-02-03T15:15:29.750000 +CVE-2025-24677,1,1,cb91af9f39e59d72c75c322c370b99288d47b6a701e0749fb66df2b2cbcc0126,2025-02-04T15:15:23.603000 CVE-2025-24678,0,0,2cddc623e27e076bc2a6878aba77d879e28e53dfb2a98645340346abc02694ec,2025-01-24T18:15:41.477000 CVE-2025-24679,0,0,3d6de841664e33b6f6e9590c83951022000e20d4c694158f443e6496e6c50b35,2025-01-24T18:15:41.630000 CVE-2025-24680,0,0,69dddbc5b0eed7be1f45b8bf1577a3bdbfa51d4d6e32e2946d2ba9862d893011,2025-01-27T15:15:15.863000 @@ -279914,7 +279939,7 @@ CVE-2025-24682,0,0,0ebd3e3193b136a8128d7d98451b59eaab3c55a3e3734670a8685e2dfa79a CVE-2025-24683,0,0,c245d3f7727f5908ddc879cbe8006df42c628b25b1ce3a5d4b0cfac18540821a,2025-01-24T18:15:42.133000 CVE-2025-24684,0,0,67071635ef21e7d113eb1540031beafaa98a4f1bfc2d9cef1acc914f7e5d6edd,2025-02-03T15:15:29.913000 CVE-2025-24685,0,0,fdcaca6fac5e717a758b4ac17bb07c0e9bc09d7373bc667009495d9fbea3cf5b,2025-01-27T14:15:29.333000 -CVE-2025-24686,0,0,f70de11c29db663e16f62dc00c94a534e549254878c7eacd82f90f3a962e5fec,2025-01-31T09:15:11.340000 +CVE-2025-24686,0,1,97742af3eda9d56646da5ea63ea29d8b115553c2b1043bb2326cc5cadc437206,2025-02-04T15:51:54.843000 CVE-2025-24687,0,0,4f313f7437b0c469fca644802e08faa421aca3cfeb317c64f699d59fc01af8a1,2025-01-24T18:15:42.283000 CVE-2025-24689,0,0,f218e863f228c61257761842aa427f2a1d58cb14105e705e05cace7f8c8c972c,2025-01-27T15:15:16.073000 CVE-2025-24691,0,0,e5918fb574e9aac4aabb2b574b9343495a4809a98bb9ec1e87899b2d2d957550,2025-01-24T18:15:42.433000 @@ -280019,7 +280044,7 @@ CVE-2025-24962,0,0,cad0fbdcfb05076f806434170502dc17aca55f786aca2318dd6c83afd74eb CVE-2025-24982,0,0,1f0ad84d8e07e22dc45a54eb7fe535ab050ad44dbd615392de494766094c54dc,2025-02-04T05:15:10.543000 CVE-2025-25062,0,0,d7cd47140e90c99ff5d70fbea50bb5a39373533859e38c36979aba1d23137e6e,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,8c34659c6a257a89c707c83868a8b18d34ee010ab7504a5a7479117985ac792f,2025-02-03T04:15:09.760000 -CVE-2025-25064,0,0,3076e4ff7637d7a7b60e69dd88ee29e96116ff1d59c408ed746bbdb8163cc047,2025-02-03T20:15:37.257000 -CVE-2025-25065,0,0,58746094964b936818741b64449bb715aafff8a3479a301f5483d466acca8651,2025-02-03T20:15:37.370000 +CVE-2025-25064,0,1,c295057976fdc8a8b609d6de80c4b0c6e625906133a6082f47b681501fd47a33,2025-02-04T16:15:43.670000 +CVE-2025-25065,0,1,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000 CVE-2025-25066,0,0,d0c17153a53bf4d9b0d515b1e1a73dc9d8d2f57a6959d34f7f617b813c748218,2025-02-03T06:15:11.373000 -CVE-2025-25181,0,0,f7b9cf7b4935e5ecbcd9854aa2796da2ee83f10476b9a7d0dba28c2d5cb813ed,2025-02-03T20:15:37.477000 +CVE-2025-25181,0,1,b1a5d099fefd65381302f10267736121bee37bd430eba8a29818b7cd4e804603,2025-02-04T16:15:43.990000