From f8fa73a8d034564f7fdd511d7ff5e56e3809ae79 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 6 Jan 2025 15:03:44 +0000 Subject: [PATCH] Auto-Update: 2025-01-06T15:00:21.015734+00:00 --- CVE-2023/CVE-2023-428xx/CVE-2023-42867.json | 57 +++++++- CVE-2024/CVE-2024-113xx/CVE-2024-11356.json | 27 +++- CVE-2024/CVE-2024-118xx/CVE-2024-11849.json | 27 +++- CVE-2024/CVE-2024-123xx/CVE-2024-12302.json | 27 +++- CVE-2024/CVE-2024-123xx/CVE-2024-12311.json | 27 +++- CVE-2024/CVE-2024-127xx/CVE-2024-12794.json | 74 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13075.json | 79 ++++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13076.json | 77 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13077.json | 74 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13078.json | 77 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13079.json | 78 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13080.json | 74 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13081.json | 74 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13082.json | 74 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13083.json | 75 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13084.json | 73 +++++++++- CVE-2024/CVE-2024-130xx/CVE-2024-13085.json | 75 +++++++++- CVE-2024/CVE-2024-206xx/CVE-2024-20665.json | 150 +++++++++++++++++++- CVE-2024/CVE-2024-442xx/CVE-2024-44211.json | 56 +++++++- CVE-2024/CVE-2024-442xx/CVE-2024-44223.json | 56 +++++++- CVE-2024/CVE-2024-442xx/CVE-2024-44231.json | 58 +++++++- CVE-2024/CVE-2024-493xx/CVE-2024-49336.json | 48 ++++++- CVE-2024/CVE-2024-510xx/CVE-2024-51074.json | 13 +- CVE-2024/CVE-2024-55xx/CVE-2024-5594.json | 37 +++++ README.md | 55 +++---- _state.csv | 89 ++++++------ 26 files changed, 1446 insertions(+), 185 deletions(-) create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5594.json diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42867.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42867.json index 63cf52e1702..1f2ca8432a0 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42867.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42867.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42867", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-20T04:15:05.200", - "lastModified": "2024-12-27T19:15:06.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:20:04.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.9", + "matchCriteriaId": "78ED0789-F3CD-4105-A3FA-3DBE0705A9F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120299", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json index c098aa3a2d3..1758aa67892 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11356.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11356", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.177", - "lastModified": "2025-01-06T06:15:06.177", + "lastModified": "2025-01-06T14:15:07.233", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The tourmaster WordPress plugin before 5.3.4 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d70df54e-e99e-4539-9fd9-002c0642137e/", diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json index d8e4280c2cf..2739dd23fb4 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11849", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.390", - "lastModified": "2025-01-06T06:15:06.390", + "lastModified": "2025-01-06T14:15:07.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Pods WordPress plugin before 3.2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/85b25a5b-c30b-4a2a-96c1-f05b4eba8a9b/", diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json index 0145c624b3c..8dfb98e1891 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12302.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12302", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.487", - "lastModified": "2025-01-06T06:15:06.487", + "lastModified": "2025-01-06T14:15:08.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Icegram Engage WordPress plugin before 3.1.32 does not sanitise and escape some of its Campaign settings, which could allow authors and above to perform Stored Cross-Site Scripting attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ed860dac-8c4a-482f-8826-31f1a894b6ce/", diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json index 3835fca84a1..33394bcb2be 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12311.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12311", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-06T06:15:06.583", - "lastModified": "2025-01-06T06:15:06.583", + "lastModified": "2025-01-06T14:15:08.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Email Subscribers by Icegram Express WordPress plugin before 5.7.44 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5e00ba37-da7f-4703-a0b9-65237696fbdd/", diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json index 8e53023bd0b..e64bef185e0 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12794", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-19T18:15:09.963", - "lastModified": "2024-12-19T18:15:09.963", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:40:23.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,64 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/laowuzi/cve/blob/main/E-commerce/E-commerce_editorder.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.288975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.288975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.466241", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json index 2707dc81a6d..791621391f7 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13075.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13075", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T18:15:26.570", - "lastModified": "2025-01-02T20:16:04.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:57:56.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289828", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289828", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472183", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472183", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json index 6d4ce038d85..73be4c4fd8a 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13076", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T18:15:27.293", - "lastModified": "2025-01-02T20:16:04.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:51:54.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,71 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289829", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289829", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472185", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472185", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json index df8ec84a9dd..f67a30b42aa 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13077", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T19:15:07.880", - "lastModified": "2024-12-31T19:15:07.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:51:06.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472186", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json index d117b926d4a..3a2d8f92bc2 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13078", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T19:15:08.067", - "lastModified": "2025-01-02T20:16:04.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:49:59.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289831", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289831", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472187", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/land-record-system-using-php-and-mysql/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13079.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13079.json index 574c58ea9a1..a971c2e2258 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13079.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13079", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T20:15:27.937", - "lastModified": "2025-01-02T18:15:16.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:49:38.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289832", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289832", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472188", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/land-record-system-using-php-and-mysql/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json index d4f1245fb4e..e19cf4c34e7 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13080", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T20:15:28.157", - "lastModified": "2024-12-31T20:15:28.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:47:35.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289833", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289833", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472190", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json index 93eedcfc250..142c6139982 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13081", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T21:15:07.670", - "lastModified": "2024-12-31T21:15:07.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:47:13.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289834", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289834", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472192", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json index 62989876229..6bc09d1759c 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13082.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13082", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T21:15:08.730", - "lastModified": "2024-12-31T21:15:08.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:46:40.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289835", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289835", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472193", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json index 3de4b8181cd..632925763f7 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13083", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T22:15:07.167", - "lastModified": "2024-12-31T22:15:07.167", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:45:40.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,65 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289836", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289836", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472194", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json index b016aa43d27..5cda31c1cb3 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T22:15:07.783", - "lastModified": "2024-12-31T22:15:07.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:44:57.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,63 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289837", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289837", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472195", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json index 292dbd04d54..30954241dba 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13085", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T23:15:07.440", - "lastModified": "2024-12-31T23:15:07.440", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:43:13.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -107,7 +127,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +138,65 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289838", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.289838", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.472196", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json index 42b10a9530a..21a12e7b9bb 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20665", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-09T17:15:32.413", - "lastModified": "2024-11-21T08:52:52.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:33:29.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,138 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20596", + "matchCriteriaId": "E7BDA51E-51E0-487D-A25F-2477213B563E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20596", + "matchCriteriaId": "A607FDAE-53FE-49DA-806F-0533F5ECC108" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6897", + "matchCriteriaId": "6CA18E04-75AD-4BC1-BCF7-B7C3DD33D9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6897", + "matchCriteriaId": "8E68CF86-FB36-4E0E-A919-D7010E1D9CEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5696", + "matchCriteriaId": "7C50F3D5-1329-4563-BB59-9C50E2EEC237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4291", + "matchCriteriaId": "1BE5B3C6-9F18-44A0-95CC-B4CD358794BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4291", + "matchCriteriaId": "23C51F9B-0BF1-414C-BFA5-4F5B81413E9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2899", + "matchCriteriaId": "39B18FD8-656D-46D2-8BDE-AF030C278E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3447", + "matchCriteriaId": "54B49649-55CB-4BFF-BB50-592662435694" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3447", + "matchCriteriaId": "79409538-C0CE-4051-80C3-383220427D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6897", + "matchCriteriaId": "412F0026-BBE6-4F7D-ABC2-56E9F1791122" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5696", + "matchCriteriaId": "4EAAB276-D0E4-41CA-8A25-4DE9FC90543E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2402", + "matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.830", + "matchCriteriaId": "F2B61B79-FEE5-4041-918D-6FE2C92771DC" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44211.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44211.json index 3c564c53b23..0dde59fe08d 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44211.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44211", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-20T04:15:05.410", - "lastModified": "2024-12-20T17:15:15.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T13:58:21.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121564", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44223.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44223.json index 1e5e794a669..6c1946a4ccf 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44223.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44223", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-20T04:15:05.523", - "lastModified": "2024-12-27T19:15:08.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T13:38:02.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121564", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44231.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44231.json index 625ddd29e96..6e02219c805 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44231.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44231", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-20T04:15:05.620", - "lastModified": "2024-12-20T17:15:15.277", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T13:35:56.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121564", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json index 8c27bf8b4f2..36c93b923cd 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49336", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-19T18:15:22.850", - "lastModified": "2024-12-19T18:15:22.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T14:29:06.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B4F327AB-9F53-402C-9BFA-F66F20A83B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179369", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json index 56fca7d22b0..b6a11a3b863 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json @@ -2,13 +2,20 @@ "id": "CVE-2024-51074", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T16:15:33.860", - "lastModified": "2024-11-25T21:15:20.390", + "lastModified": "2025-01-06T14:15:08.603", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "Incorrect access control in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to arbitrarily change odometer readings in the vehicle by targeting the instrument cluster through the unsecured CAN network." + "value": "Incorrect access control in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to arbitrarily change odometer readings in the vehicle by targeting the instrument cluster through the unsecured CAN network. NOTE: this is disputed by the supplier because the CAN bus is not externally exposed, and because the packets can only increase the odometer reading (which has no value to an adversary)." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json new file mode 100644 index 00000000000..f890fcdf99b --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-5594", + "sourceIdentifier": "security@openvpn.net", + "published": "2025-01-06T14:15:08.807", + "lastModified": "2025-01-06T14:15:08.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@openvpn.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594", + "source": "security@openvpn.net" + }, + { + "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", + "source": "security@openvpn.net" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 53cdb50ac45..ff13273bde3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-06T13:00:19.701762+00:00 +2025-01-06T15:00:21.015734+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-06T12:15:06.627000+00:00 +2025-01-06T14:57:56.690000+00:00 ``` ### Last Data Feed Release @@ -33,40 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275785 +275786 ``` ### CVEs added in the last Commit -Recently added CVEs: `20` +Recently added CVEs: `1` -- [CVE-2024-12970](CVE-2024/CVE-2024-129xx/CVE-2024-12970.json) (`2025-01-06T12:15:06.573`) -- [CVE-2024-21464](CVE-2024/CVE-2024-214xx/CVE-2024-21464.json) (`2025-01-06T11:15:06.537`) -- [CVE-2024-23366](CVE-2024/CVE-2024-233xx/CVE-2024-23366.json) (`2025-01-06T11:15:07.977`) -- [CVE-2024-33041](CVE-2024/CVE-2024-330xx/CVE-2024-33041.json) (`2025-01-06T11:15:08.157`) -- [CVE-2024-33055](CVE-2024/CVE-2024-330xx/CVE-2024-33055.json) (`2025-01-06T11:15:08.310`) -- [CVE-2024-33059](CVE-2024/CVE-2024-330xx/CVE-2024-33059.json) (`2025-01-06T11:15:08.470`) -- [CVE-2024-33061](CVE-2024/CVE-2024-330xx/CVE-2024-33061.json) (`2025-01-06T11:15:08.617`) -- [CVE-2024-33067](CVE-2024/CVE-2024-330xx/CVE-2024-33067.json) (`2025-01-06T11:15:08.770`) -- [CVE-2024-43063](CVE-2024/CVE-2024-430xx/CVE-2024-43063.json) (`2025-01-06T11:15:08.930`) -- [CVE-2024-43064](CVE-2024/CVE-2024-430xx/CVE-2024-43064.json) (`2025-01-06T11:15:09.073`) -- [CVE-2024-45541](CVE-2024/CVE-2024-455xx/CVE-2024-45541.json) (`2025-01-06T11:15:09.230`) -- [CVE-2024-45542](CVE-2024/CVE-2024-455xx/CVE-2024-45542.json) (`2025-01-06T11:15:09.390`) -- [CVE-2024-45546](CVE-2024/CVE-2024-455xx/CVE-2024-45546.json) (`2025-01-06T11:15:09.540`) -- [CVE-2024-45547](CVE-2024/CVE-2024-455xx/CVE-2024-45547.json) (`2025-01-06T11:15:09.707`) -- [CVE-2024-45548](CVE-2024/CVE-2024-455xx/CVE-2024-45548.json) (`2025-01-06T11:15:09.887`) -- [CVE-2024-45550](CVE-2024/CVE-2024-455xx/CVE-2024-45550.json) (`2025-01-06T11:15:10.050`) -- [CVE-2024-45553](CVE-2024/CVE-2024-455xx/CVE-2024-45553.json) (`2025-01-06T11:15:10.207`) -- [CVE-2024-45555](CVE-2024/CVE-2024-455xx/CVE-2024-45555.json) (`2025-01-06T11:15:10.383`) -- [CVE-2024-45558](CVE-2024/CVE-2024-455xx/CVE-2024-45558.json) (`2025-01-06T11:15:10.550`) -- [CVE-2024-45559](CVE-2024/CVE-2024-455xx/CVE-2024-45559.json) (`2025-01-06T11:15:10.720`) +- [CVE-2024-5594](CVE-2024/CVE-2024-55xx/CVE-2024-5594.json) (`2025-01-06T14:15:08.807`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `23` -- [CVE-2023-49508](CVE-2023/CVE-2023-495xx/CVE-2023-49508.json) (`2025-01-06T12:15:06.627`) +- [CVE-2023-42867](CVE-2023/CVE-2023-428xx/CVE-2023-42867.json) (`2025-01-06T14:20:04.917`) +- [CVE-2024-11356](CVE-2024/CVE-2024-113xx/CVE-2024-11356.json) (`2025-01-06T14:15:07.233`) +- [CVE-2024-11849](CVE-2024/CVE-2024-118xx/CVE-2024-11849.json) (`2025-01-06T14:15:07.883`) +- [CVE-2024-12302](CVE-2024/CVE-2024-123xx/CVE-2024-12302.json) (`2025-01-06T14:15:08.023`) +- [CVE-2024-12311](CVE-2024/CVE-2024-123xx/CVE-2024-12311.json) (`2025-01-06T14:15:08.153`) +- [CVE-2024-12794](CVE-2024/CVE-2024-127xx/CVE-2024-12794.json) (`2025-01-06T14:40:23.127`) +- [CVE-2024-13075](CVE-2024/CVE-2024-130xx/CVE-2024-13075.json) (`2025-01-06T14:57:56.690`) +- [CVE-2024-13076](CVE-2024/CVE-2024-130xx/CVE-2024-13076.json) (`2025-01-06T14:51:54.247`) +- [CVE-2024-13077](CVE-2024/CVE-2024-130xx/CVE-2024-13077.json) (`2025-01-06T14:51:06.337`) +- [CVE-2024-13078](CVE-2024/CVE-2024-130xx/CVE-2024-13078.json) (`2025-01-06T14:49:59.017`) +- [CVE-2024-13079](CVE-2024/CVE-2024-130xx/CVE-2024-13079.json) (`2025-01-06T14:49:38.193`) +- [CVE-2024-13080](CVE-2024/CVE-2024-130xx/CVE-2024-13080.json) (`2025-01-06T14:47:35.650`) +- [CVE-2024-13081](CVE-2024/CVE-2024-130xx/CVE-2024-13081.json) (`2025-01-06T14:47:13.503`) +- [CVE-2024-13082](CVE-2024/CVE-2024-130xx/CVE-2024-13082.json) (`2025-01-06T14:46:40.910`) +- [CVE-2024-13083](CVE-2024/CVE-2024-130xx/CVE-2024-13083.json) (`2025-01-06T14:45:40.307`) +- [CVE-2024-13084](CVE-2024/CVE-2024-130xx/CVE-2024-13084.json) (`2025-01-06T14:44:57.910`) +- [CVE-2024-13085](CVE-2024/CVE-2024-130xx/CVE-2024-13085.json) (`2025-01-06T14:43:13.437`) +- [CVE-2024-20665](CVE-2024/CVE-2024-206xx/CVE-2024-20665.json) (`2025-01-06T14:33:29.733`) +- [CVE-2024-44211](CVE-2024/CVE-2024-442xx/CVE-2024-44211.json) (`2025-01-06T13:58:21.267`) +- [CVE-2024-44223](CVE-2024/CVE-2024-442xx/CVE-2024-44223.json) (`2025-01-06T13:38:02.493`) +- [CVE-2024-44231](CVE-2024/CVE-2024-442xx/CVE-2024-44231.json) (`2025-01-06T13:35:56.217`) +- [CVE-2024-49336](CVE-2024/CVE-2024-493xx/CVE-2024-49336.json) (`2025-01-06T14:29:06.027`) +- [CVE-2024-51074](CVE-2024/CVE-2024-510xx/CVE-2024-51074.json) (`2025-01-06T14:15:08.603`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b588b6b6ef7..abeec11b2ba 100644 --- a/_state.csv +++ b/_state.csv @@ -233213,7 +233213,7 @@ CVE-2023-42861,0,0,51ef0be30f968445e5bb0e3fe6e386464916f684c592ec33960870427fb70 CVE-2023-42862,0,0,da0a0390e3a6b251cbbd44904ae0343ada1c1e47a22f5cdb9211a360309b1627,2024-11-21T08:23:23.490000 CVE-2023-42865,0,0,6b1adebbfe54199fbd88c1f48a0707dd7d763317de7e8283554c7140f7d3ec4c,2024-11-21T08:23:23.610000 CVE-2023-42866,0,0,4825ed625b05a8c1608b93e75feb0484113e67d00eb04b720f74b3d42b768e19,2024-11-21T08:23:23.730000 -CVE-2023-42867,0,0,4f84b583f52edec1ec102d5acc178f0058376a89b714b0c7a3cc859fc7486ee6,2024-12-27T19:15:06.147000 +CVE-2023-42867,0,1,a59a0de35750defb2550242cea9df9f6f508011ed263a1760cce6815d999cb89,2025-01-06T14:20:04.917000 CVE-2023-42869,0,0,4b525b2d4d78240e429f6120cff3fbea3a9a62626e791bc07518dbd60f150db6,2024-11-21T08:23:23.850000 CVE-2023-42870,0,0,b052e765ed6b314dbe419b522569170970500fb212cc8d9009eece0ef048ce07,2024-11-21T08:23:23.957000 CVE-2023-42871,0,0,f13ae996b006635f073f8383fb0028141adede656e942393444895575f50667d,2024-11-21T08:23:24.150000 @@ -237936,7 +237936,7 @@ CVE-2023-49494,0,0,81ae2af9aba1f0599f724889e50222fc1614d4f34df24851ef830a84c7e56 CVE-2023-4950,0,0,a4648195833b242bd8dc90f4040087dba411d39a1856adc272c663858070dd30,2024-11-21T08:36:19.963000 CVE-2023-49501,0,0,d1d4cf2e652bd9d2b1793967db0891199408ff347661870dbf859b89bae84e59,2024-11-21T08:33:29.360000 CVE-2023-49502,0,0,d0187358d2290dbe6633ea162778b6f0ab90153cb026ab3d49a55b19dc1b8e21,2024-11-21T08:33:29.580000 -CVE-2023-49508,0,1,23e3fab68cb910ba43272343c8414a5e51d6003e3a3a2b66bc609d4ae8b09164,2025-01-06T12:15:06.627000 +CVE-2023-49508,0,0,23e3fab68cb910ba43272343c8414a5e51d6003e3a3a2b66bc609d4ae8b09164,2025-01-06T12:15:06.627000 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000 @@ -244278,7 +244278,7 @@ CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47 CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000 CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000 CVE-2024-11355,0,0,bcd06b7aaf6858bb0e6c5d2b1c10c8ea5c66a082156d2df4f7c406b73d08ca66,2024-11-22T06:15:19.450000 -CVE-2024-11356,0,0,f8d8d03a75cfcf96efd6bc394483c99519d50bb66fbf013b33f639a5bd282fa4,2025-01-06T06:15:06.177000 +CVE-2024-11356,0,1,e7a629179db8f92c458758e96025db6a9f4ab7e98f0d179ea3a98a7bb8b5cb81,2025-01-06T14:15:07.233000 CVE-2024-11357,0,0,1d7d8f3774cc93c4f64f8dd24ec6d72fa59b1e80d7807762e3b0711933fab190,2025-01-02T06:15:07.887000 CVE-2024-11358,0,0,47cd4959cf6059d3ce512e4a70aacad449e0c8fa7c946c06b27cb8a531be2885,2024-12-16T17:15:07.543000 CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000 @@ -244701,7 +244701,7 @@ CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a803 CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 -CVE-2024-11849,0,0,bf9357d6c75731c41afc18b42be9243803dfe6b4f2d58b564859df0e15244dcb,2025-01-06T06:15:06.390000 +CVE-2024-11849,0,1,8473aa8dbb39ffe86675b3f129e111bbce6418b17bab8f378a854d3fb16c0c29,2025-01-06T14:15:07.883000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11852,0,0,fcae6a31251538fa21922d7f8a34f94ee6c6390a3a29cfb5a4e8903a4faa77f7,2024-12-22T02:15:16.510000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244986,13 +244986,13 @@ CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192e CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000 -CVE-2024-12302,0,0,073760ea6f1570e4c66c7669aa02989f47f363a587e5906dee32d0c024cffb9f,2025-01-06T06:15:06.487000 +CVE-2024-12302,0,1,be2d24e288379ff4969bb6910d8961bf9165ff36f8ee6388f83c4a36b8b6f159,2025-01-06T14:15:08.023000 CVE-2024-12305,0,0,273e297c2c3404dceb5aa9b15a9613cb372f4eca60a3a417a7d24dc0972d8e0a,2024-12-09T09:15:04.970000 CVE-2024-12306,0,0,902fb51a4dbdd5670cb1cf5559cf247f9b3ba9c72034fe5330e7316e326e07b4,2024-12-09T09:15:05.293000 CVE-2024-12307,0,0,dd08ec1d0c570e2dfd8ff10541807fa47db4494718b1c9efb61df634a03bf8fd,2024-12-09T09:15:05.433000 CVE-2024-12309,0,0,16d03882c6009566e79b9c8c2443055d4427c7f1e57279e0146963b711b56a47,2024-12-13T09:15:07.810000 CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000 -CVE-2024-12311,0,0,4bf9e72d05b8594d3bb282d32aeb26b53ea71df084f5ef8fcb52eaad71d690ad,2025-01-06T06:15:06.583000 +CVE-2024-12311,0,1,815e3491f6c1f7b3abc4a4d287cec4a5fe89f53db46c7d87ecfb8135e71ecf12,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000 @@ -245232,7 +245232,7 @@ CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d CVE-2024-12791,0,0,00e274fb2644dd0737fedef7f600b72a2d7c4a341721b9f72cd4a6ccf93a5a2a,2024-12-19T18:15:08.263000 CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000 CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000 -CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000 +CVE-2024-12794,0,1,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 @@ -245336,7 +245336,7 @@ CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be3 CVE-2024-12968,0,0,473738ee0e0f6b6f86e9a3a8b8a283681eba25a6f3d6076d3cb1c2aa54667b10,2024-12-27T17:15:07.867000 CVE-2024-12969,0,0,bfc800521737ced79f0fdf84fea2951556653a7bc3ba525e5b81eb87e6e86ab2,2024-12-27T17:15:07.993000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 -CVE-2024-12970,1,1,ce16370907cf3d7d7ff5c5aa38fbc190de4af1a2f94a3c047e8f9929c4425823,2025-01-06T12:15:06.573000 +CVE-2024-12970,0,0,ce16370907cf3d7d7ff5c5aa38fbc190de4af1a2f94a3c047e8f9929c4425823,2025-01-06T12:15:06.573000 CVE-2024-12976,0,0,43a9acc7b69e46736fdd09ae24588944ab6f6c791f8fe6b3bbe2688255c67125,2024-12-27T19:15:08 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000 @@ -245422,18 +245422,18 @@ CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc7 CVE-2024-13070,0,0,2bcea116957c968caaf0f2b2dd670ac9a0f612c50f9d2c5bf3eb2ee627a8ffe6,2024-12-31T15:15:07.853000 CVE-2024-13072,0,0,84bf422f3b8a7c21e09c757cc41407a792f8a3cc3207316f0bc15bb0ec62e7cf,2024-12-31T15:15:08.083000 CVE-2024-13074,0,0,82c625761bcc4faebb78f7834747785ec87ab3107c377244ca37e3cdc15a076b,2024-12-31T18:15:25.917000 -CVE-2024-13075,0,0,d92fe4ba17505ba4973e75c3aa31dc5a4cc50c852bf2ed6d9d6798779938ec68,2025-01-02T20:16:04.217000 -CVE-2024-13076,0,0,84a99f289fe02a5cf28be407189cc5ef377d813180497111dc905339a1a24110,2025-01-02T20:16:04.437000 -CVE-2024-13077,0,0,b36a34d4540734be38220510b5d34296119f7d8845ccc2461973591d4c725ad2,2024-12-31T19:15:07.880000 -CVE-2024-13078,0,0,f841cdf9951f8f62d631c8a4c7d84792f57e84c9e348f86237ab2db28cc9e99a,2025-01-02T20:16:04.620000 -CVE-2024-13079,0,0,3727f51fe3cc89e7e50fd09f7933cab41c60cb54a9758cc5aa44064113695d62,2025-01-02T18:15:16.243000 +CVE-2024-13075,0,1,2cb13cdf67fdca2c3fead054a5dd1db8b5aa80d267d1df554624c5bb7ed51b62,2025-01-06T14:57:56.690000 +CVE-2024-13076,0,1,112637eaa000ca8ff065f2327ed83998dc721c9a700d6a6ae4ef32916cb3aa62,2025-01-06T14:51:54.247000 +CVE-2024-13077,0,1,82a1babf4a1d9b2dfecd283d6defb1aa61fff3ef99cf6e7f77d225aa53c1f8b4,2025-01-06T14:51:06.337000 +CVE-2024-13078,0,1,7291acf56374c3eeeb64f060b0d1e69876872ca8b8e88146f012144173c5de42,2025-01-06T14:49:59.017000 +CVE-2024-13079,0,1,5a9c0171e2f4848774c3795fcb192cd8b9cdcae0b524a0addadfe416efdd2391,2025-01-06T14:49:38.193000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 -CVE-2024-13080,0,0,1c8e2d440193d4ba780437306c4cf53651d6de43caa2d9826661c7b4abb00982,2024-12-31T20:15:28.157000 -CVE-2024-13081,0,0,91234c39213749eb5c13a194582c0394636f40bdd089bf3747e332ef70ede7b6,2024-12-31T21:15:07.670000 -CVE-2024-13082,0,0,54477787104f4bda28baf3002f70872af0bd5b4676295cc028c86994e3a89921,2024-12-31T21:15:08.730000 -CVE-2024-13083,0,0,32b708aac3faa06e2393867cece89bb98495b48a1f0549362c3f7cc78e7abb6e,2024-12-31T22:15:07.167000 -CVE-2024-13084,0,0,a50ea27e74e0d88c7f3f84b2049f2b396c45f947ef50cfccbe9c3d67018207c6,2024-12-31T22:15:07.783000 -CVE-2024-13085,0,0,583f6589f3745986be745571f05a9c49dd58310f5336b3e79c209e1e8b9df75e,2024-12-31T23:15:07.440000 +CVE-2024-13080,0,1,376a4cec2510e9bb91b8ac99ea37fa1922ddf304eac6d60768b73e6454a579a4,2025-01-06T14:47:35.650000 +CVE-2024-13081,0,1,4cde7e3fef0cb67973c6747bc854a5c0b024537a6b5407b8f72176e7ffcef06f,2025-01-06T14:47:13.503000 +CVE-2024-13082,0,1,821d00f62f130737f4fa2a0cfd42770dd159019d16c467ec665c8a0a558b33ea,2025-01-06T14:46:40.910000 +CVE-2024-13083,0,1,1a2720ef5e2b0f78c5a184d63cc5277e40fc2350e65508e227550bab7801181c,2025-01-06T14:45:40.307000 +CVE-2024-13084,0,1,adf9bed155b1bdff6036c9a3cc3b5be77cff7d25fd108fae5917224d01f6d618,2025-01-06T14:44:57.910000 +CVE-2024-13085,0,1,b364989b605ebd3cb7a9fd89ba82a0e74186880c8e21583fb8d42e57634e17d7,2025-01-06T14:43:13.437000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-13092,0,0,c91b73d17c0f98cc2058505aaad304ed0c903dbed81a5c0acc973b3fa326c5d8,2025-01-02T09:15:17.790000 CVE-2024-13093,0,0,30c693dcfee82a408abab68f4aeb856a5d4d0c29c89c2c28c90e10ec4260d37a,2025-01-02T09:15:18.047000 @@ -246614,7 +246614,7 @@ CVE-2024-20661,0,0,30e543c400437abc7f96e3109a6c30132015ba4b260c75c12935ac357f961 CVE-2024-20662,0,0,917a258648c4a51eaadafb0946b162ba9ad319c776312b2d34e4c3912032ae0e,2024-11-21T08:52:52.070000 CVE-2024-20663,0,0,98d0ecc071c6881aa086233a4f49226ea03fe88e6a42e7eb2818b7b99ad13c35,2024-11-21T08:52:52.223000 CVE-2024-20664,0,0,d2eb4face0f8f0d0f0a4a04f47040d17c1c6026a1869b44738d228cbc7d850db,2024-11-21T08:52:52.380000 -CVE-2024-20665,0,0,644d4382657eb58e6705d430963b13a715603b1c7d8141583e9fe1fba74c6247,2024-11-21T08:52:52.547000 +CVE-2024-20665,0,1,ddba14178d893bcbb52fd3cb7ea26310f3edddc497c01a887ad1e2b25a06d853,2025-01-06T14:33:29.733000 CVE-2024-20666,0,0,64613b17d7a3102d1325ccd3f27245ab53ccbff3b654c38bebeb520779d319e8,2024-11-21T08:52:52.700000 CVE-2024-20667,0,0,74b7eaeab6adad7a8d6a11e3aa398b5c550729fc518babae280c377b7f0458cb,2024-11-21T08:52:52.857000 CVE-2024-20669,0,0,373f2687061e10de8497f77e610c1b054ac6aedaeb4b11bc0800a0a32dde59b5,2024-11-21T08:52:52.990000 @@ -247431,7 +247431,7 @@ CVE-2024-21460,0,0,bbc35bb85743b24cb381a6829c5bdcd665ae90fe45617113a38e351e4de91 CVE-2024-21461,0,0,b8ed00e9f935c14f7c8ff589a6c471c291b3eab36d44de52ee6255ffad25fecf,2024-11-21T08:54:25.873000 CVE-2024-21462,0,0,bcbc82ba53d1866480b8fd482c19e43e0b78dde416cc6a766bb3446d7bac28c9,2024-11-21T08:54:26.687000 CVE-2024-21463,0,0,a1851904124a020600ad4c9445d48b896f0d4532a9c867b668e208a6b9bdcbba,2024-11-21T08:54:27.220000 -CVE-2024-21464,1,1,268db82f7c4decef1481aaed9da390422a5c340d11247b7365ac11823aea5232,2025-01-06T11:15:06.537000 +CVE-2024-21464,0,0,268db82f7c4decef1481aaed9da390422a5c340d11247b7365ac11823aea5232,2025-01-06T11:15:06.537000 CVE-2024-21465,0,0,f28128125b5e1a84044a749ab740f960fd012337488e5de839191b04efcf90ad,2024-11-21T08:54:27.423000 CVE-2024-21466,0,0,df004bc4c4677aba92f60dd08ca0577dd1ffc9a32b586a3bd8893ce9e4ad210b,2024-11-21T08:54:27.980000 CVE-2024-21467,0,0,63521bb6f92e531d4bfcb6b0eed69a9688a59d6e337966a6b7682d8bc9335a39,2024-11-26T15:46:26.137000 @@ -248836,7 +248836,7 @@ CVE-2024-23362,0,0,a9c1a4ca06b7e84f3ee5e603d9cb8d6a849416b5aaef36dc4087c56cd34cf CVE-2024-23363,0,0,b929ee6c16d557196594ea8ea75afe87ecf60c3c3fa389f565db8a6d87a69155,2024-11-21T08:57:36.620000 CVE-2024-23364,0,0,92b9c955a190e0f7988a265e74d2e2e61407eb429f6463ea32a27f54b1b1d636,2024-09-03T12:59:02.453000 CVE-2024-23365,0,0,00039caffc3c0a9aa17c21d65288fdfa63db6afc09492a7d6f8ebce8d8ae54c2,2024-09-03T12:59:02.453000 -CVE-2024-23366,1,1,02302580fc0299484a8bf5057ad914f1a3a4db01109ce4e64fb7430e4b0e2383,2025-01-06T11:15:07.977000 +CVE-2024-23366,0,0,02302580fc0299484a8bf5057ad914f1a3a4db01109ce4e64fb7430e4b0e2383,2025-01-06T11:15:07.977000 CVE-2024-23368,0,0,b2f512c479cfd6ff7ceb55face2c60799ea87250aa89c6478e5ec1ffaf580e8f,2024-11-21T08:57:37.290000 CVE-2024-23369,0,0,7004519158a8d3cb9d79373d32f5689062b600a6ed9e64041c9c4aa11e898c8b,2024-10-16T20:30:19.067000 CVE-2024-2337,0,0,04ebb312faf7a4a0b6a127bf56097a2a7eda8f9ca03897ecb8aa2895a9ed60cf,2024-11-21T09:09:32.557000 @@ -256158,7 +256158,7 @@ CVE-2024-33037,0,0,004b5e473e32e61ba89e464690eb52425842309fdbb691ce74e4f1fe5ca07 CVE-2024-33038,0,0,3fa95bcb86da6690578028a8fd1c5bf34e8f52fe062a9d486732742636ea2fe2,2024-09-04T17:21:28.943000 CVE-2024-33039,0,0,c70cd5c8387baec87864315064b8cd71824c91bfe9bffb94509e0271db4159ed,2024-12-11T16:15:37 CVE-2024-33040,0,0,ec89092e2f81a4db83f210a851ea365544915c884404ba5019a0b6e1e6743860,2024-12-12T15:21:35.590000 -CVE-2024-33041,1,1,fb5ae64a40f4b872c599bec077de2cf56209f197626d5b849f24a168cc65d477,2025-01-06T11:15:08.157000 +CVE-2024-33041,0,0,fb5ae64a40f4b872c599bec077de2cf56209f197626d5b849f24a168cc65d477,2025-01-06T11:15:08.157000 CVE-2024-33042,0,0,cb5fc696225b31902209ef8ef520020bd65113c14578e54cac28b7b4036e44fd,2024-09-04T17:08:07.433000 CVE-2024-33043,0,0,888d59d76f2b08f2775279205fe97ef80c2d9ac568503f1a140b40b0aecf1319,2024-12-20T14:33:22.363000 CVE-2024-33044,0,0,2d7b18559a893802d33431e8ff7cb5b7a9add59de5079930cd1c576a25dcc1c0,2024-12-12T15:23:26.007000 @@ -256172,18 +256172,18 @@ CVE-2024-33051,0,0,32ce4c3eacc9e21c4175acb628649cb84f4d7cc6f2643c5301f869cbf4644 CVE-2024-33052,0,0,a5d8e7449a09efaab4e8a36068f440af976c17a80eacaa3425868abb37d97949,2024-09-04T17:18:07.783000 CVE-2024-33053,0,0,3880bbdd10137ef63185c17bdb708273cc216500aa528571fafa89df1e94ba75,2024-12-12T15:23:57.243000 CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b5f5,2024-09-04T17:06:47.337000 -CVE-2024-33055,1,1,bf23714a88a34d953acad88be0163778517e670dd4538435308364f84bac9dd5,2025-01-06T11:15:08.310000 +CVE-2024-33055,0,0,bf23714a88a34d953acad88be0163778517e670dd4538435308364f84bac9dd5,2025-01-06T11:15:08.310000 CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000 CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000 -CVE-2024-33059,1,1,f061aacd21fb2658c82f91356f41645818a6b5e092df8a0cba9bd3f1b5cedb57,2025-01-06T11:15:08.470000 +CVE-2024-33059,0,0,f061aacd21fb2658c82f91356f41645818a6b5e092df8a0cba9bd3f1b5cedb57,2025-01-06T11:15:08.470000 CVE-2024-3306,0,0,093d5328c842e15a972b71e278c2d0dbdec8004a861bda133bd4338bd1cf6d54,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000 -CVE-2024-33061,1,1,a45b1e729ebb5b9bb038b7fafb5c5028a4fbcb6b9643409dfc42bc0664669b94,2025-01-06T11:15:08.617000 +CVE-2024-33061,0,0,a45b1e729ebb5b9bb038b7fafb5c5028a4fbcb6b9643409dfc42bc0664669b94,2025-01-06T11:15:08.617000 CVE-2024-33063,0,0,653997ca09ab3cc513e42e57788b4aeaeb606731b2b1f5440bf511b2642493be,2024-12-12T15:26:19.350000 CVE-2024-33064,0,0,02367680089235514c560f68b202c9e04de82b07dbfb786741881f3459cd7935,2024-10-16T19:52:54.483000 CVE-2024-33065,0,0,820aeb82046c04074680c0efb639ca176e5bd0cb7e0d09e06a9618e10b57f782,2024-10-16T19:50:45.190000 CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e540b,2024-10-16T19:49:40.333000 -CVE-2024-33067,1,1,fb59dae36a5bf0ad8508db8803a155df789fe3e6c3caa06195243c275d307002,2025-01-06T11:15:08.770000 +CVE-2024-33067,0,0,fb59dae36a5bf0ad8508db8803a155df789fe3e6c3caa06195243c275d307002,2025-01-06T11:15:08.770000 CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000 CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000 CVE-2024-3307,0,0,5392e910a9f18aa74f00667d7fa40ed94d60062bc5e8b43b55756ba9f0da5e3e,2024-11-21T09:29:21.743000 @@ -263444,8 +263444,8 @@ CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c01 CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000 CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 -CVE-2024-43063,1,1,612df8035a06126aab6f71180a90da3cf5da239f499f515f4fe2684622f6ceb1,2025-01-06T11:15:08.930000 -CVE-2024-43064,1,1,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000 +CVE-2024-43063,0,0,612df8035a06126aab6f71180a90da3cf5da239f499f515f4fe2684622f6ceb1,2025-01-06T11:15:08.930000 +CVE-2024-43064,0,0,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000 @@ -264510,7 +264510,7 @@ CVE-2024-44205,0,0,479ce40b4658e11ccfe7113f730a76d2315c870d209a012f733f4449cc380 CVE-2024-44206,0,0,d8e5aac347cb04d8524629aaf70121480231b4f8b4280238ac4fc071f1a60444,2024-11-21T21:15:21.477000 CVE-2024-44207,0,0,df8e300cf7f6b361cf79cc82a13f930868069c30b911e0bc1e5fb07b5725fa64,2024-10-04T17:31:41.970000 CVE-2024-44208,0,0,0f110c58ea3b1936a6fa272413b21f60fe5e44f11a840cf53eeb8d5bd692f5ed,2024-10-30T19:35:18.340000 -CVE-2024-44211,0,0,c9c4cbbd82019994e55fa96cebc5a169527b6d90089393f019e2d19b6df0ca80,2024-12-20T17:15:15.053000 +CVE-2024-44211,0,1,8ffcfc397958e8711bea7b409479ee053bed8240f8d62c68d05ebb9da012e9a8,2025-01-06T13:58:21.267000 CVE-2024-44212,0,0,7535d563779e625850b85dac200bcdac9ff61370543d5a527301902571d866fd,2024-12-20T19:15:06.570000 CVE-2024-44213,0,0,d54c85400318007c85dac3cf8abc38cb1350827f6126f81634ef8d1828179ea9,2024-10-30T19:35:19.187000 CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d6cf,2024-10-30T21:35:06.770000 @@ -264520,13 +264520,13 @@ CVE-2024-44218,0,0,f11365ca91eee54b03c90ea2492115b72c14e7e1b502a66bb17b9ea40f969 CVE-2024-4422,0,0,88e38c8f81c558e863db276496d3d3966ccaae5dc31d3db1528474edcaac1cce,2024-11-21T09:42:47.860000 CVE-2024-44220,0,0,bad2b508e552d1a09c11c8017d22721370fec111da93bdc30606a926bfe3892d,2024-12-18T18:37:48.003000 CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370f17,2024-10-30T17:25:30.903000 -CVE-2024-44223,0,0,cdaafb7ad1aa4136c4b407107cef3b200110a403661fd356994d4b6de36be0d7,2024-12-27T19:15:08.647000 +CVE-2024-44223,0,1,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 -CVE-2024-44231,0,0,63eaf7b89c80e2b6f9288b9e173d5041f87f7d6191463179a32995e4218eac06,2024-12-20T17:15:15.277000 +CVE-2024-44231,0,1,50b5a6efbd657ac5be338774290c79c41a056afd4d50503f4277fcf86f278b3c,2025-01-06T13:35:56.217000 CVE-2024-44232,0,0,c9e60a0c1965d8b25770744bfea513326538d2727d3411f3ea53393806685d07,2024-11-04T21:35:07.233000 CVE-2024-44233,0,0,faa9cc95169f99a6ba5b7b809b52a3296f8f8d5cfb2ab7775af98f1caeb58709,2024-11-04T22:35:07.613000 CVE-2024-44234,0,0,1b996be4e23122b67d229b562bc4172f47ad474e322c6880a3e7f0b7746d3c2c,2024-11-04T21:35:08.147000 @@ -265317,17 +265317,17 @@ CVE-2024-45528,0,0,ff006d3788a72915c0ea7e0acb04c7bc391e0a5989792ab2fc5081b004438 CVE-2024-4553,0,0,9862f42eb10f611dc9aec9c57d4f4f13e8047cde599ac2416b7f996e777484e8,2024-11-21T09:43:05.533000 CVE-2024-45537,0,0,597f8cb0bc693defc5493b35ff64dd73b6ef5e1561e8374a576856f0f629ae61,2024-10-01T20:41:33.207000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 -CVE-2024-45541,1,1,51274b640375a2820e7f1484fb3f070939b71fb0a749b6e02a71928f4ae9c1b4,2025-01-06T11:15:09.230000 -CVE-2024-45542,1,1,a56b1bce0adf91d9dad8cf087012b8ec7884408c3d93039936f8404c4eb87d4b,2025-01-06T11:15:09.390000 -CVE-2024-45546,1,1,8403fc698bd5f592c2ef44e8b2c55cfb5649e2fd452892ff27b0c2584c28d968,2025-01-06T11:15:09.540000 -CVE-2024-45547,1,1,4dc3eed2ac1b3c54c9ff2888a99f52b0a8b71ade207943bbae56c90042492d6c,2025-01-06T11:15:09.707000 -CVE-2024-45548,1,1,3d56484871c5f989d6bd26cb413e0b687cf5563ecad273db2c9df0909a2aa015,2025-01-06T11:15:09.887000 +CVE-2024-45541,0,0,51274b640375a2820e7f1484fb3f070939b71fb0a749b6e02a71928f4ae9c1b4,2025-01-06T11:15:09.230000 +CVE-2024-45542,0,0,a56b1bce0adf91d9dad8cf087012b8ec7884408c3d93039936f8404c4eb87d4b,2025-01-06T11:15:09.390000 +CVE-2024-45546,0,0,8403fc698bd5f592c2ef44e8b2c55cfb5649e2fd452892ff27b0c2584c28d968,2025-01-06T11:15:09.540000 +CVE-2024-45547,0,0,4dc3eed2ac1b3c54c9ff2888a99f52b0a8b71ade207943bbae56c90042492d6c,2025-01-06T11:15:09.707000 +CVE-2024-45548,0,0,3d56484871c5f989d6bd26cb413e0b687cf5563ecad273db2c9df0909a2aa015,2025-01-06T11:15:09.887000 CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000 -CVE-2024-45550,1,1,b0789fdd4961d36c08190b6dbce2260108f9777f2e0a44de8894dfe1e7a2da96,2025-01-06T11:15:10.050000 -CVE-2024-45553,1,1,6c4f6e446b91e4d791279b00cecb9bdc5aa80c60e2b3c4a228bac5b39437acef,2025-01-06T11:15:10.207000 -CVE-2024-45555,1,1,7fbff62653b149bd141f389e0b75ef05ec9b9bc8e4a8762678686006a6181419,2025-01-06T11:15:10.383000 -CVE-2024-45558,1,1,98e955ee35293bb99ece2d059213abbe054f9d5bf8112563dd64a49acb170aa1,2025-01-06T11:15:10.550000 -CVE-2024-45559,1,1,3817efc707280a2061c6d619f118d1fdf9eaa12e9f052dd916e5cb009c17ceb1,2025-01-06T11:15:10.720000 +CVE-2024-45550,0,0,b0789fdd4961d36c08190b6dbce2260108f9777f2e0a44de8894dfe1e7a2da96,2025-01-06T11:15:10.050000 +CVE-2024-45553,0,0,6c4f6e446b91e4d791279b00cecb9bdc5aa80c60e2b3c4a228bac5b39437acef,2025-01-06T11:15:10.207000 +CVE-2024-45555,0,0,7fbff62653b149bd141f389e0b75ef05ec9b9bc8e4a8762678686006a6181419,2025-01-06T11:15:10.383000 +CVE-2024-45558,0,0,98e955ee35293bb99ece2d059213abbe054f9d5bf8112563dd64a49acb170aa1,2025-01-06T11:15:10.550000 +CVE-2024-45559,0,0,3817efc707280a2061c6d619f118d1fdf9eaa12e9f052dd916e5cb009c17ceb1,2025-01-06T11:15:10.720000 CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000 CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 @@ -267711,7 +267711,7 @@ CVE-2024-49331,0,0,fc33cda51d0ae00f7fe88fbdfa0860d165096722e67220af6538ac02d3a62 CVE-2024-49332,0,0,163fc61e1aa5949d0dc085fe875d10ef86a8206eb7889644482dca315618c25c,2024-10-24T15:49:34.827000 CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000 CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000 -CVE-2024-49336,0,0,013d94bdede5c6aa3853d5f953f494546c44f449943374ac3dffd0be4fc5f0f4,2024-12-19T18:15:22.850000 +CVE-2024-49336,0,1,74b5d6ca5a527605069a19da7232fb13c834e91072ba01d322d091e1df5fa9ca,2025-01-06T14:29:06.027000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 @@ -268989,7 +268989,7 @@ CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8f CVE-2024-5107,0,0,cfd74aa13a9fbc85357817a74c8babd68a8bc1d5dfe9424bcc7079ee3a2d17ae,2024-11-21T09:46:59.060000 CVE-2024-51072,0,0,d31050b6f86bd1474c576a9adbed44a1fd96845f76da230b11a2e0afed15fe64,2024-11-26T18:15:19.603000 CVE-2024-51073,0,0,47550b86e87b9ad893be36bd036661bdba14fc9cfd111004954e770bf76aece7,2024-11-25T21:15:19.847000 -CVE-2024-51074,0,0,46fa6d6a32acbe3d13af5177a97c0d6dfeb90ac011f6faf886199af6e54749db,2024-11-25T21:15:20.390000 +CVE-2024-51074,0,1,5347cb1f0cf92dbf57bc95ee2581b58d2c08c673802ec81440eb1887778f199e,2025-01-06T14:15:08.603000 CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d87dc,2024-11-04T13:41:29.567000 CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000 CVE-2024-5108,0,0,f2b37ea1b0a2eaf40b91f0a0decdc81067dcde7a11d14f062144b5c6307c4de6,2024-11-21T09:46:59.207000 @@ -271490,6 +271490,7 @@ CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c8981452067 CVE-2024-5591,0,0,e2235dc9118cc79b3ae0a586a8dc702d3b6ecde665fe3ab616de0261ded7cef3,2025-01-03T15:15:10.813000 CVE-2024-55917,0,0,a2dca5ced3d5dcd8acfac3cb6ea6554a4664068c0ef8ff9f8ad449c34b6bc417,2024-12-31T17:15:09.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 +CVE-2024-5594,1,1,42d88bff5e048997716e90f34250051c97a61e331f41209cc6dc6bb22fb4b491,2025-01-06T14:15:08.807000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000 CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000