diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json index 1d6bf5a66db..ea0af406b31 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3372", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-09T10:20:44.417", - "lastModified": "2024-11-21T01:40:43.900", + "lastModified": "2025-01-27T21:15:08.397", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json index d000221a37b..07338d8afbc 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json @@ -2,7 +2,7 @@ "id": "CVE-2014-4608", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.310", - "lastModified": "2024-11-21T02:10:33.310", + "lastModified": "2025-01-27T21:15:09.147", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -59,6 +81,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json b/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json index 203a0a77511..28532d1a927 100644 --- a/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json +++ b/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json @@ -2,8 +2,8 @@ "id": "CVE-2016-3427", "sourceIdentifier": "secalert_us@oracle.com", "published": "2016-04-21T11:00:21.667", - "lastModified": "2024-11-21T02:49:59.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:29:03.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json index e16119bcfbe..2f1067fc28e 100644 --- a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json +++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json @@ -2,8 +2,8 @@ "id": "CVE-2016-6415", "sourceIdentifier": "psirt@cisco.com", "published": "2016-09-19T01:59:06.167", - "lastModified": "2024-11-21T02:56:05.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:01:18.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json b/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json index dc96a2794e3..9e10aabc7b2 100644 --- a/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json +++ b/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json @@ -2,8 +2,8 @@ "id": "CVE-2016-9079", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:01.797", - "lastModified": "2024-11-21T03:00:33.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:53.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json index 33d054d2a4c..cb269ce5f9e 100644 --- a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json +++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json @@ -2,8 +2,8 @@ "id": "CVE-2017-3881", "sourceIdentifier": "psirt@cisco.com", "published": "2017-03-17T22:59:00.640", - "lastModified": "2024-11-21T03:26:18.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:04:25.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json index dedc966f43b..d10671238a5 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0179", "sourceIdentifier": "psirt@cisco.com", "published": "2018-03-28T22:29:01.467", - "lastModified": "2024-11-21T03:37:40.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:04:36.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json index c6adaf8fae9..b166a5f8c5f 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0180", "sourceIdentifier": "psirt@cisco.com", "published": "2018-03-28T22:29:01.547", - "lastModified": "2024-11-21T03:37:40.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:16:17.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json index 6fdcd2c4a18..7e027f11747 100644 --- a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json +++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0296", "sourceIdentifier": "psirt@cisco.com", "published": "2018-06-07T12:29:00.403", - "lastModified": "2024-11-21T03:37:55.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:31:23.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json index ec97a775aa7..2b37f048c90 100644 --- a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json +++ b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json @@ -2,8 +2,8 @@ "id": "CVE-2018-1273", "sourceIdentifier": "security_alert@emc.com", "published": "2018-04-11T13:29:00.290", - "lastModified": "2024-11-21T03:59:31.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:27:34.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json index 9d805ac7bb3..d7b5caec006 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json @@ -2,8 +2,8 @@ "id": "CVE-2018-13374", "sourceIdentifier": "psirt@fortinet.com", "published": "2019-01-22T14:29:00.220", - "lastModified": "2024-11-21T03:46:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:30:51.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json index b8565eab181..ff0f3dfb7cd 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json @@ -2,8 +2,8 @@ "id": "CVE-2018-13379", "sourceIdentifier": "psirt@fortinet.com", "published": "2019-06-04T21:29:00.233", - "lastModified": "2024-11-21T03:46:59.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:30:45.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json index acfa9a9b167..befce8c7da2 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json @@ -2,8 +2,8 @@ "id": "CVE-2018-13382", "sourceIdentifier": "psirt@fortinet.com", "published": "2019-06-04T21:29:00.373", - "lastModified": "2024-11-21T03:46:59.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:30:41.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json index 3a9c3feb1d0..e2184c255e7 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json @@ -2,8 +2,8 @@ "id": "CVE-2018-13383", "sourceIdentifier": "psirt@fortinet.com", "published": "2019-05-29T18:29:00.693", - "lastModified": "2024-11-21T03:46:59.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:30:37.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json b/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json index 3f02daaf313..79a8d6d01fb 100644 --- a/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json +++ b/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json @@ -2,8 +2,8 @@ "id": "CVE-2018-14667", "sourceIdentifier": "secalert@redhat.com", "published": "2018-11-06T22:29:00.193", - "lastModified": "2024-11-21T03:49:33.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:56:01.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json index 53722cd6430..88eb9970a90 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json @@ -2,8 +2,8 @@ "id": "CVE-2018-17463", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:00.297", - "lastModified": "2024-11-21T03:54:28.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:56:05.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json index 521ab136c78..4ec352fb2db 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json @@ -2,8 +2,8 @@ "id": "CVE-2018-17480", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-12-11T16:29:00.623", - "lastModified": "2024-11-21T03:54:30.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:14.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json b/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json index b8935f6eefc..e89b2449fb5 100644 --- a/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json +++ b/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json @@ -2,8 +2,8 @@ "id": "CVE-2018-18809", "sourceIdentifier": "security@tibco.com", "published": "2019-03-07T22:29:00.323", - "lastModified": "2024-11-21T03:56:39.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:23.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json b/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json index f6406d9c915..1035146b3da 100644 --- a/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json +++ b/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json @@ -2,8 +2,8 @@ "id": "CVE-2018-20250", "sourceIdentifier": "cve@checkpoint.com", "published": "2019-02-05T20:29:00.243", - "lastModified": "2024-11-21T04:01:10.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:18.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json b/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json index c428e61e9e6..76e39db75b8 100644 --- a/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json +++ b/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json @@ -2,8 +2,8 @@ "id": "CVE-2018-2628", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-04-19T02:29:00.457", - "lastModified": "2024-11-21T04:04:05.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:49.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json index 93f7e6c7602..857d55882e4 100644 --- a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json +++ b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json @@ -2,8 +2,8 @@ "id": "CVE-2018-5430", "sourceIdentifier": "security@tibco.com", "published": "2018-04-17T18:29:00.293", - "lastModified": "2024-11-21T04:08:47.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:46.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json index 1710db2c44f..8c9bf45344e 100644 --- a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json +++ b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6065", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:01.250", - "lastModified": "2024-11-21T04:09:59.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:09.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json b/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json index b2775a0d602..b02002a5c99 100644 --- a/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json +++ b/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6961", "sourceIdentifier": "security@vmware.com", "published": "2018-06-11T22:29:00.230", - "lastModified": "2024-11-21T04:11:29.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:57.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json b/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json index 6f5bd3e4785..69190750660 100644 --- a/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json +++ b/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json @@ -2,8 +2,8 @@ "id": "CVE-2018-7600", "sourceIdentifier": "mlhess@drupal.org", "published": "2018-03-29T07:29:00.260", - "lastModified": "2024-11-21T04:12:25.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:25:54.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json b/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json index 3948740027f..15f27ebdf5d 100644 --- a/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json +++ b/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json @@ -2,8 +2,8 @@ "id": "CVE-2018-7602", "sourceIdentifier": "mlhess@drupal.org", "published": "2018-07-19T17:29:00.373", - "lastModified": "2024-11-21T04:12:26.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:31:30.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json b/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json index e1110e0b3bc..b1ae0e04f98 100644 --- a/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json +++ b/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json @@ -2,8 +2,8 @@ "id": "CVE-2018-7841", "sourceIdentifier": "cybersecurity@se.com", "published": "2019-05-22T20:29:01.480", - "lastModified": "2024-11-21T04:12:51.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:44:08.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json b/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json index 0118569b825..dfdfd183493 100644 --- a/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json +++ b/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0344", "sourceIdentifier": "cna@sap.com", "published": "2019-08-14T14:15:16.463", - "lastModified": "2024-11-21T04:16:42.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:44:13.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json b/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json index d67ada47ae9..53145294ded 100644 --- a/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json +++ b/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0708", "sourceIdentifier": "secure@microsoft.com", "published": "2019-05-16T19:29:00.427", - "lastModified": "2024-11-21T04:17:08.487", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:40.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json index bbcbd7fe70d..1bb5f77a6c2 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0808", "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T03:29:00.873", - "lastModified": "2024-11-21T04:17:19.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:35.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json index 916950e5b1c..fed8025da39 100644 --- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json +++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1003029", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-03-08T21:29:00.297", - "lastModified": "2024-11-21T04:17:46.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:54:29.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27562.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27562.json index 28223b5b687..8db54b1e897 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27562.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27562.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27562", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:08.817", - "lastModified": "2024-11-21T07:53:09.210", + "lastModified": "2025-01-27T22:15:10.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27563.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27563.json index 3ebd305eb61..5b57840a18b 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27563.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27563.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27563", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:09.483", - "lastModified": "2024-11-21T07:53:09.367", + "lastModified": "2025-01-27T22:15:10.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27564.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27564.json index fcdc1d9adbf..76b1d540e53 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27564.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27564.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27564", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:09.660", - "lastModified": "2024-11-21T07:53:09.513", + "lastModified": "2025-01-27T21:15:09.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27888.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27888.json index b7a3d6fbf07..1e840ce8034 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27888.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27888.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27888", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:14.077", - "lastModified": "2024-11-21T07:53:38.207", + "lastModified": "2025-01-27T21:15:09.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27889.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27889.json index a494d97b48c..be7a338f051 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27889.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27889.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27889", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:14.280", - "lastModified": "2024-11-21T07:53:38.327", + "lastModified": "2025-01-27T21:15:10.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27918.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27918.json index 796a14ad00b..d3a11e3a442 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27918.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27918.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27918", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:14.547", - "lastModified": "2024-11-21T07:53:41.867", + "lastModified": "2025-01-27T21:15:10.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27919.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27919.json index 56325ae36f5..1e16675e026 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27919.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27919.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27919", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:14.753", - "lastModified": "2024-11-21T07:53:41.990", + "lastModified": "2025-01-27T21:15:10.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31587.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31587.json index 9990bfc803d..67b1c4b9fd0 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31587.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31587.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31587", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T15:15:09.277", - "lastModified": "2024-11-21T08:02:03.490", + "lastModified": "2025-01-27T21:15:10.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31903.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31903.json index c88694c0f24..3fdac1b9265 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31903.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31903.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31903", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T13:15:09.720", - "lastModified": "2024-11-21T08:02:22.280", + "lastModified": "2025-01-27T21:15:10.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32573.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32573.json index 327dadb93d3..a3b7807e9fa 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32573.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32573.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32573", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T06:15:19.070", - "lastModified": "2024-11-21T08:03:37.877", + "lastModified": "2025-01-27T21:15:11.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-369" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33009.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33009.json index 04b0bd33c20..a87ba53197c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33009.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33009.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33009", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-05-24T13:15:09.560", - "lastModified": "2024-11-21T08:04:23.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:44:27.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@zyxel.com.tw", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33010.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33010.json index 395e32c6e38..0334c24de78 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33010.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33010", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-05-24T13:15:09.640", - "lastModified": "2024-11-21T08:04:23.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:44:33.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json index 560c723885e..a16e985904e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33063", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.067", - "lastModified": "2024-11-21T08:04:39.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:46:41.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json index 9c8c1ec7642..a3486ea415d 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33106", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.673", - "lastModified": "2024-11-21T08:04:50.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:46:44.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -310,9 +310,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] }, @@ -321,9 +321,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] } diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json index 388df91df3b..72350c236d9 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33107", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.860", - "lastModified": "2024-11-21T08:04:50.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:46:48.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json index 632c554c577..99e28ac3b9e 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3519", "sourceIdentifier": "secure@citrix.com", "published": "2023-07-19T18:15:11.513", - "lastModified": "2024-11-21T08:17:26.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:10.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -123,11 +123,6 @@ "versionEndExcluding": "13.1-49.13", "matchCriteriaId": "FCEED8AC-F9A9-4F75-BB32-F53967A8E9A0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:11.1-65.22:*:*:*:fips:*:*:*", - "matchCriteriaId": "102C0D0F-AC37-43B0-8B9A-103B37436130" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json index c807d20ae24..d44521fa84c 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36844", "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.267", - "lastModified": "2024-11-21T08:10:43.983", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:22.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -89,327 +89,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AE3D4F71-8476-4F0D-A976-A308D6483D6D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F7BD5636-93D5-4C06-964F-00055DF6B2B8" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3302CB-457F-4BD2-B80B-F70FB4C4542E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3A0D9C0-34D3-430F-ABFA-B68010A8825D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5E04B126-F290-4242-BB80-5F573D623E6E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "671D9977-7657-48C7-A07C-4AED54380A86" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0E100C3C-070D-4132-927F-756538B91491" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2032E7DD-96FD-48B7-922C-5FE04675796C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D907D6A-B7C4-4A10-AA58-0F908575A435" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*", - "matchCriteriaId": "979C3597-C53B-4F4B-9EA7-126DA036C86D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62A536DA-5A57-4255-AB22-F99F8B7FF62A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FC326549-217D-4194-8310-AB398D6FF3F0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "47DAF5E7-E610-4D74-8573-41C16D642837" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53269C69-3D1E-4F05-8EF6-81743D7A699E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10DC1840-7409-4BD0-9522-B55B1166CF9C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "303ADB06-5CB5-44DA-8387-39FACC539EF0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9D842407-7A13-47C7-BBC9-FB0E978221CB" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3612D798-7A5F-4068-A5A2-92173893450E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A3ECB975-D1A0-4318-9C5E-752A3C98F76F" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6CC1C89-B37F-4C5F-9F79-12997C79711D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*", - "matchCriteriaId": "71FF88C7-89CB-4E04-BADA-AD64F8060C6C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B74B12A6-1CE2-4293-ABA5-E3F23E15485C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*", - "matchCriteriaId": "72E67A5A-0DFF-42D9-81A7-570E9BCA463D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B51C5371-51E9-40AE-8619-BC1267DD1D08" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D08A8D94-134A-41E7-8396-70D8B0735E9C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*", - "matchCriteriaId": "86E82CE3-F43D-4B29-A64D-B14ADB6CC357" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*", - "matchCriteriaId": "13C0199E-B9F0-41D3-B625-083990517CDF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8790B456-DFC7-4E82-9A0C-C89787139B79" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*", - "matchCriteriaId": "079290E9-DCC5-43F7-9480-64874DBF2696" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2EA71434-CCBF-4A55-8B30-D213A43E8641" - } - ] - }, { "operator": "OR", "negate": false, @@ -891,6 +570,327 @@ "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE3D4F71-8476-4F0D-A976-A308D6483D6D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7BD5636-93D5-4C06-964F-00055DF6B2B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B3302CB-457F-4BD2-B80B-F70FB4C4542E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3A0D9C0-34D3-430F-ABFA-B68010A8825D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E04B126-F290-4242-BB80-5F573D623E6E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "671D9977-7657-48C7-A07C-4AED54380A86" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E100C3C-070D-4132-927F-756538B91491" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2032E7DD-96FD-48B7-922C-5FE04675796C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D907D6A-B7C4-4A10-AA58-0F908575A435" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "979C3597-C53B-4F4B-9EA7-126DA036C86D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62A536DA-5A57-4255-AB22-F99F8B7FF62A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC326549-217D-4194-8310-AB398D6FF3F0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47DAF5E7-E610-4D74-8573-41C16D642837" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53269C69-3D1E-4F05-8EF6-81743D7A699E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10DC1840-7409-4BD0-9522-B55B1166CF9C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "303ADB06-5CB5-44DA-8387-39FACC539EF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D842407-7A13-47C7-BBC9-FB0E978221CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3612D798-7A5F-4068-A5A2-92173893450E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3ECB975-D1A0-4318-9C5E-752A3C98F76F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6CC1C89-B37F-4C5F-9F79-12997C79711D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71FF88C7-89CB-4E04-BADA-AD64F8060C6C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B74B12A6-1CE2-4293-ABA5-E3F23E15485C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72E67A5A-0DFF-42D9-81A7-570E9BCA463D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B51C5371-51E9-40AE-8619-BC1267DD1D08" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D08A8D94-134A-41E7-8396-70D8B0735E9C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E82CE3-F43D-4B29-A64D-B14ADB6CC357" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13C0199E-B9F0-41D3-B625-083990517CDF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8790B456-DFC7-4E82-9A0C-C89787139B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*", + "matchCriteriaId": "079290E9-DCC5-43F7-9480-64874DBF2696" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EA71434-CCBF-4A55-8B30-D213A43E8641" + } + ] } ] } @@ -909,7 +909,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "sirt@juniper.net", "tags": [ - "Mitigation", "Vendor Advisory" ] }, @@ -926,7 +925,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json index 6836379e6bd..ac7475cc37d 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36845", "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.360", - "lastModified": "2024-11-21T08:10:44.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:39:24.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -688,804 +688,6 @@ ] } ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", - "versionEndExcluding": "20.4", - "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", - "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", - "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", - "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", - "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", - "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", - "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", - "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", - "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*", - "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", - "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", - "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", - "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", - "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", - "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", - "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", - "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", - "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", - "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", - "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", - "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", - "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", - "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", - "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", - "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", - "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", - "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", - "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", - "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AE3D4F71-8476-4F0D-A976-A308D6483D6D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F7BD5636-93D5-4C06-964F-00055DF6B2B8" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3302CB-457F-4BD2-B80B-F70FB4C4542E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3A0D9C0-34D3-430F-ABFA-B68010A8825D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5E04B126-F290-4242-BB80-5F573D623E6E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "671D9977-7657-48C7-A07C-4AED54380A86" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0E100C3C-070D-4132-927F-756538B91491" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2032E7DD-96FD-48B7-922C-5FE04675796C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D907D6A-B7C4-4A10-AA58-0F908575A435" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*", - "matchCriteriaId": "979C3597-C53B-4F4B-9EA7-126DA036C86D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62A536DA-5A57-4255-AB22-F99F8B7FF62A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FC326549-217D-4194-8310-AB398D6FF3F0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "47DAF5E7-E610-4D74-8573-41C16D642837" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53269C69-3D1E-4F05-8EF6-81743D7A699E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10DC1840-7409-4BD0-9522-B55B1166CF9C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "303ADB06-5CB5-44DA-8387-39FACC539EF0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9D842407-7A13-47C7-BBC9-FB0E978221CB" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3612D798-7A5F-4068-A5A2-92173893450E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A3ECB975-D1A0-4318-9C5E-752A3C98F76F" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6CC1C89-B37F-4C5F-9F79-12997C79711D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*", - "matchCriteriaId": "71FF88C7-89CB-4E04-BADA-AD64F8060C6C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B74B12A6-1CE2-4293-ABA5-E3F23E15485C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*", - "matchCriteriaId": "72E67A5A-0DFF-42D9-81A7-570E9BCA463D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B51C5371-51E9-40AE-8619-BC1267DD1D08" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D08A8D94-134A-41E7-8396-70D8B0735E9C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*", - "matchCriteriaId": "86E82CE3-F43D-4B29-A64D-B14ADB6CC357" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*", - "matchCriteriaId": "13C0199E-B9F0-41D3-B625-083990517CDF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8790B456-DFC7-4E82-9A0C-C89787139B79" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*", - "matchCriteriaId": "079290E9-DCC5-43F7-9480-64874DBF2696" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2EA71434-CCBF-4A55-8B30-D213A43E8641" - } - ] - } - ] } ], "references": [ @@ -1511,7 +713,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "sirt@juniper.net", "tags": [ - "Mitigation", "Vendor Advisory" ] }, @@ -1537,7 +738,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36846.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36846.json index 46a4233c259..c3cb65ba092 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36846.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36846.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36846", "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.457", - "lastModified": "2024-11-21T08:10:44.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:39:36.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -69,152 +69,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", - "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", - "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", - "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", - "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", - "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", - "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" - } - ] - }, { "operator": "OR", "negate": false, @@ -666,6 +520,152 @@ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" + } + ] } ] } @@ -675,7 +675,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "sirt@juniper.net", "tags": [ - "Mitigation", "Vendor Advisory" ] }, @@ -683,7 +682,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36847.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36847.json index 7e16257c630..b3ef937e41f 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36847.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36847.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36847", "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.553", - "lastModified": "2024-11-21T08:10:44.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:40:15.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -850,7 +850,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "sirt@juniper.net", "tags": [ - "Mitigation", "Vendor Advisory" ] }, @@ -858,7 +857,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36851.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36851.json index 1765bfb8659..8c9b0b9326a 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36851.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36851.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36851", "sourceIdentifier": "sirt@juniper.net", "published": "2023-09-27T15:18:54.877", - "lastModified": "2024-11-21T08:10:46.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:40:19.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -89,6 +89,322 @@ { "operator": "AND", "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + }, { "operator": "OR", "negate": false, @@ -549,322 +865,6 @@ "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", - "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", - "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", - "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", - "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", - "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", - "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", - "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", - "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", - "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", - "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", - "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", - "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", - "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", - "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", - "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", - "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", - "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", - "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", - "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", - "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", - "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", - "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", - "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", - "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", - "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", - "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", - "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" - } - ] } ] } @@ -874,7 +874,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "sirt@juniper.net", "tags": [ - "Mitigation", "Vendor Advisory" ] }, @@ -882,7 +881,6 @@ "url": "https://supportportal.juniper.net/JSA72300", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json index 7997977e6e2..8447b0576e6 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37009", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.473", - "lastModified": "2025-01-22T15:15:10.473", - "vulnStatus": "Received", + "lastModified": "2025-01-27T22:15:10.977", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Notificaci\u00f3n de transferencia\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json index 1b962137853..71ca115d17d 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37010", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.580", - "lastModified": "2025-01-22T15:15:10.580", - "vulnStatus": "Received", + "lastModified": "2025-01-27T22:15:11.113", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de `Transferencia de estado de eNB` sin el campo `MME_UE_S1AP_ID` ??requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json index 9fae9841e45..e32166688e2 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37011", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.683", - "lastModified": "2025-01-22T15:15:10.683", - "vulnStatus": "Received", + "lastModified": "2025-01-27T22:15:11.250", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje \"Handover Required\" (Se requiere entrega) sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json index e4984156ccc..9384ddb6d7d 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37012", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.783", - "lastModified": "2025-01-22T15:15:10.783", - "vulnStatus": "Received", + "lastModified": "2025-01-27T21:15:11.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Mensaje inicial de UE\" sin el campo \"Identidad PLMN\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37580.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37580.json index c8fde57e297..dddf97afb1b 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37580.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37580.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37580", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-31T16:15:10.327", - "lastModified": "2024-11-21T08:11:59.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:55:19.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json index 9819051c2e6..71b779a492b 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40044", "sourceIdentifier": "security@progress.com", "published": "2023-09-27T15:18:57.307", - "lastModified": "2024-11-21T08:18:35.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:52:43.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -145,14 +145,15 @@ "url": "https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044", "source": "security@progress.com", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] }, { "url": "https://www.progress.com/ws_ftp", "source": "security@progress.com", "tags": [ - "Vendor Advisory" + "Product" ] }, { @@ -166,6 +167,7 @@ "url": "https://www.theregister.com/2023/10/02/ws_ftp_update/", "source": "security@progress.com", "tags": [ + "Press/Media Coverage", "Third Party Advisory" ] }, @@ -203,20 +205,22 @@ "url": "https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] }, { "url": "https://www.progress.com/ws_ftp", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Product" ] }, { "url": "https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -224,6 +228,7 @@ "url": "https://www.theregister.com/2023/10/02/ws_ftp_update/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Press/Media Coverage", "Third Party Advisory" ] } diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json index 23a7673ddd3..4ced9bf6237 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45249", "sourceIdentifier": "security@acronis.com", "published": "2024-07-24T14:15:04.867", - "lastModified": "2024-11-21T08:26:38.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:36:02.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json index 3420e8f703d..a299e1dc4a8 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46747", "sourceIdentifier": "f5sirt@f5.com", "published": "2023-10-26T21:15:08.097", - "lastModified": "2024-11-21T08:29:13.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:31:36.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -1015,6 +1015,7 @@ "url": "http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json index 560a012a276..569ed7cb30a 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46748", "sourceIdentifier": "f5sirt@f5.com", "published": "2023-10-26T21:15:08.177", - "lastModified": "2024-11-21T08:29:13.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:31:47.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46805.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46805.json index 7a5b5910be5..44799a70beb 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46805.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46805", "sourceIdentifier": "support@hackerone.com", "published": "2024-01-12T17:15:09.530", - "lastModified": "2024-11-21T08:29:20.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:53:11.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json index 7b13f30cbf6..78ce221f4e8 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47565.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47565", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2023-12-08T16:15:16.367", - "lastModified": "2024-11-21T08:30:28.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:52:58.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@qnapsecurity.com.tw", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49897.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49897.json index 1eb68ac97a5..e189ee80e6f 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49897.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49897.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49897", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-12-06T07:15:41.883", - "lastModified": "2024-11-21T08:33:58.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:31:55.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json index d065cf270c0..40aa7533c95 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4911", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T18:15:10.463", - "lastModified": "2024-11-21T08:36:14.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:45:46.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -134,26 +134,86 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2ABBAA9E-CCBA-480B-ABB5-454448D91262" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BE16CC2-C6B4-4B73-98A1-F28475A92F49" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "936B046D-ADEB-4701-8957-AC28CFA9C5C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4B0BD8-527F-4728-A64B-F8F06D5EDEC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "910C9542-26FC-4635-9351-128727971830" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB1DF28D-0D84-4E40-8E46-BA0EFD371111" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "09AAD850-019A-46B8-A5A1-845DE048D30A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "88F9EB73-1F19-4BD9-AB19-36F9F1A5156E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "3C1A0CA2-2BBD-4A7A-B467-F456867D5EC6" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "86034E5B-BCDD-4AFD-A460-38E790F608F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "35232613-B8B5-4F4D-A6CD-3823C6666534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "7B3D7389-35C1-48C4-A9EC-2564842723C4" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "845B853C-8F99-4987-AA8E-76078CE6A977" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ED1251-245C-4390-8964-DDCAD54A8957" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1BB59-4BE6-4339-ABB7-C18B7D899FB9" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", @@ -179,11 +239,51 @@ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*", "matchCriteriaId": "37B7CE5C-BFEA-4F96-9759-D511EF189059" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "9A879F9F-F087-45D4-BD65-2990276477D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "26041661-0280-4544-AA0A-BC28FCED4699" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.6:*:*:*:*:*:*:*", @@ -194,11 +294,46 @@ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*", "matchCriteriaId": "A633E21A-EBAA-41C9-A009-A36BDC762464" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "CC6A25CB-907A-4D05-8460-A2488938A8BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "3C30F155-DF7D-4195-92D9-A5B80407228D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", @@ -226,13 +361,163 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*", - "matchCriteriaId": "204FC6CC-9DAC-45FB-8A9F-C9C8EDD29D54" + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" } ] } @@ -279,7 +564,6 @@ "url": "https://access.redhat.com/security/cve/CVE-2023-4911", "source": "secalert@redhat.com", "tags": [ - "Mitigation", "Third Party Advisory" ] }, @@ -288,8 +572,7 @@ "source": "secalert@redhat.com", "tags": [ "Issue Tracking", - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -309,43 +592,80 @@ }, { "url": "http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/03/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/03/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/05/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/13/11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/14/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/14/5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/14/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:5453", @@ -386,7 +706,6 @@ "url": "https://access.redhat.com/security/cve/CVE-2023-4911", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mitigation", "Third Party Advisory" ] }, @@ -395,33 +714,50 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", - "Patch", - "Third Party Advisory" + "Patch" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.gentoo.org/glsa/202310-03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231013-0006/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5514", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json index 24d34884696..0f0e79b4b08 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4966", "sourceIdentifier": "secure@citrix.com", "published": "2023-10-10T14:15:10.977", - "lastModified": "2024-11-21T08:36:21.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:46:22.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA \u202fvirtual\u202fserver.\u00a0\n\n\n\n" + "value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json index e3af9b236e9..cad88e7b18e 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5631", "sourceIdentifier": "security@eset.com", "published": "2023-10-18T15:15:08.727", - "lastModified": "2024-11-21T08:42:09.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:46:27.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -177,8 +177,7 @@ "source": "security@eset.com", "tags": [ "Mailing List", - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -200,8 +199,7 @@ "source": "security@eset.com", "tags": [ "Exploit", - "Issue Tracking", - "Third Party Advisory" + "Issue Tracking" ] }, { @@ -258,7 +256,7 @@ "url": "https://www.debian.org/security/2023/dsa-5531", "source": "security@eset.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { @@ -290,8 +288,7 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -313,8 +310,7 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", - "Issue Tracking", - "Third Party Advisory" + "Issue Tracking" ] }, { @@ -342,8 +338,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -371,7 +366,7 @@ "url": "https://www.debian.org/security/2023/dsa-5531", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] } ] diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json index 2a1eb61611c..02fd3b87df7 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6448", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2023-12-05T18:15:12.643", - "lastModified": "2024-11-21T08:43:52.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:52:49.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6548.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6548.json index fe2da31f38a..becd4d9a229 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6548.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6548", "sourceIdentifier": "secure@citrix.com", "published": "2024-01-17T20:15:50.627", - "lastModified": "2024-11-21T08:44:04.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:48:11.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6549.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6549.json index b6b90b6d76b..246bb874ff5 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6549.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6549.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6549", "sourceIdentifier": "secure@citrix.com", "published": "2024-01-17T21:15:11.690", - "lastModified": "2024-11-21T08:44:04.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:48:20.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json index 594c9917d0a..6f1f2430794 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7101", "sourceIdentifier": "mandiant-cve@google.com", "published": "2023-12-24T22:15:07.983", - "lastModified": "2024-11-21T08:45:16.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:53:06.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -198,8 +198,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html", "source": "mandiant-cve@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -282,8 +281,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12321.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12321.json index 2d1063ad2e9..45e6cce9534 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12321.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12321.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12321", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:22.473", - "lastModified": "2025-01-27T06:15:22.473", + "lastModified": "2025-01-27T21:15:11.763", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,38 @@ "value": "The WC Affiliate WordPress plugin through 2.3.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d4c55d30-1c15-41ee-95e0-670891d67684/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/d4c55d30-1c15-41ee-95e0-670891d67684/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1212.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1212.json index dccb0f25c62..6dffe080568 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1212.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1212", "sourceIdentifier": "security@progress.com", "published": "2024-02-21T18:15:50.417", - "lastModified": "2024-11-21T08:50:03.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:48:30.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json index fa7a2c2f1ec..ff307e7abec 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13176", "sourceIdentifier": "openssl-security@openssl.org", "published": "2025-01-20T14:15:26.247", - "lastModified": "2025-01-24T20:15:32.150", + "lastModified": "2025-01-27T21:15:11.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Resumen del problema: Existe un canal lateral de temporizaci\u00f3n que potencialmente podr\u00eda permitir recuperar la clave privada en el c\u00e1lculo de la firma ECDSA. Resumen del impacto: Un canal lateral de temporizaci\u00f3n en los c\u00e1lculos de firmas ECDSA podr\u00eda permitir que un atacante recupere la clave privada. Sin embargo, para medir el tiempo se necesitar\u00eda acceso local a la aplicaci\u00f3n de firma o una conexi\u00f3n de red muy r\u00e1pida con baja latencia. Hay una se\u00f1al de tiempo de alrededor de 300 nanosegundos cuando la palabra superior del valor nonce ECDSA invertido es cero. Esto puede suceder con una probabilidad significativa s\u00f3lo para algunas de las curvas el\u00edpticas admitidas. En particular, la curva NIST P-521 se ve afectada. Para poder medir esta fuga, el proceso atacante debe estar ubicado en la misma computadora f\u00edsica o debe tener una conexi\u00f3n de red muy r\u00e1pida con baja latencia. Por esa raz\u00f3n la severidad de esta vulnerabilidad es Baja." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "openssl-security@openssl.org", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1709.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1709.json index c68ba518f0c..c1504990090 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1709.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1709", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-02-21T16:15:50.420", - "lastModified": "2024-11-21T08:51:08.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:48:25.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,6 +109,7 @@ "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Issue Tracking", + "Patch", "Third Party Advisory" ] }, @@ -185,6 +186,7 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", + "Patch", "Third Party Advisory" ] }, @@ -238,6 +240,7 @@ "url": "https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Exploit", "Third Party Advisory" ] }, diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json index cb7935a9a1f..9b6feac6604 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23148", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.283", - "lastModified": "2024-11-21T08:57:04.127", + "lastModified": "2025-01-27T22:15:11.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json index fe9c3bb14fe..fc1db90d7d2 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23149", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.370", - "lastModified": "2024-11-21T08:57:04.323", + "lastModified": "2025-01-27T22:15:11.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json index 72e9bb73193..8f9f0030367 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23692", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-05-31T10:15:09.330", - "lastModified": "2024-11-21T08:58:10.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:43:16.410", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "disclosure@vulncheck.com", @@ -116,7 +116,8 @@ "source": "disclosure@vulncheck.com", "tags": [ "Exploit", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -130,7 +131,6 @@ "url": "https://vulncheck.com/advisories/rejetto-unauth-rce", "source": "disclosure@vulncheck.com", "tags": [ - "Exploit", "Third Party Advisory" ] }, @@ -139,7 +139,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -153,13 +154,16 @@ "url": "https://vulncheck.com/advisories/rejetto-unauth-rce", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Exploit", "Third Party Advisory" ] }, { "url": "https://www.vicarius.io/vsociety/posts/unauthenticated-rce-flaw-in-rejetto-http-file-server-cve-2024-23692", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24919.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24919.json index a9780cb41b3..6a27dd8c57b 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24919.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24919", "sourceIdentifier": "cve@checkpoint.com", "published": "2024-05-28T19:15:10.060", - "lastModified": "2024-11-21T08:59:58.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:42:18.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json index 785cf63ccee..e701f83c9eb 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36971", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-10T09:15:09.127", - "lastModified": "2024-11-21T09:22:56.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:43:21.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json index f2592689742..2de960693b7 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37000", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.463", - "lastModified": "2024-11-21T09:23:00.530", + "lastModified": "2025-01-27T21:15:12.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json index 972b96b613b..d1f751abb67 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json @@ -2,13 +2,13 @@ "id": "CVE-2024-37001", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.553", - "lastModified": "2024-11-21T09:23:00.710", + "lastModified": "2025-01-27T21:15:12.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "[A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json index 27a1aec45e2..b1705ad1db1 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37002", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.647", - "lastModified": "2024-11-21T09:23:00.910", + "lastModified": "2025-01-27T21:15:12.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json index 42643e13d8e..e97927d9e80 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37003", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.370", - "lastModified": "2024-11-21T09:23:01.083", + "lastModified": "2025-01-27T21:15:12.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json index 65dd4b49875..e7d8a80f28c 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37004", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.567", - "lastModified": "2024-11-21T09:23:01.267", + "lastModified": "2025-01-27T21:15:12.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json index 43ab2575016..6690021d55d 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json @@ -2,13 +2,13 @@ "id": "CVE-2024-37005", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.890", - "lastModified": "2024-11-21T09:23:01.450", + "lastModified": "2025-01-27T21:15:13.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37526.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37526.json new file mode 100644 index 00000000000..19e6a577b57 --- /dev/null +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37526", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T22:15:11.770", + "lastModified": "2025-01-27T22:15:11.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Watson Query on Cloud Pak for Data (IBM Data Virtualization\u00a01.8, 2.0, 2.1, 2.2, and 3.0.0) could allow an authenticated user to obtain sensitive information from objects published using Watson Query due to an improper data protection mechanism." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173774", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json index 6f839c49330..06cad5abb91 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38014", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-10T17:15:20.320", - "lastModified": "2024-11-21T09:24:42.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:38:24.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -134,15 +134,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.26100.1742", - "matchCriteriaId": "6231A772-376C-4ED3-919B-EAD9D1439021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.26100.1742", - "matchCriteriaId": "82EA7851-0235-4ACA-8BDB-89243CF2BDA7" + "matchCriteriaId": "889E645C-92D6-422B-A89B-05D6774B7543" }, { "vulnerable": true, @@ -209,7 +203,11 @@ }, { "url": "http://seclists.org/fulldisclosure/2024/Sep/43", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json index c26a5dba983..f8aa5e87034 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38080", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:43.410", - "lastModified": "2024-11-21T09:24:51.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:35:27.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json index ede4afad160..9734fe36671 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38094", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:46.090", - "lastModified": "2024-11-21T09:24:53.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:35:36.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json index d9e9ca909ad..4d7daa8dbca 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38112", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:47.860", - "lastModified": "2024-11-21T09:24:55.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:35:50.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -80,15 +80,27 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.7159", - "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + "matchCriteriaId": "0307F3A7-693F-45DC-9A11-AE725F942F1F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "EC49BDAF-EAFF-4803-9944-826C82A5DBD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.6054", - "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + "matchCriteriaId": "CC6302F7-6909-4EAA-A1BB-3B2BA92680BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "6DCF52FA-7A1F-44B4-8405-7D4C9E1CB79F" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json index f3ba3e87754..7bf3d98df57 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38217", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-10T17:15:24.640", - "lastModified": "2024-11-21T09:25:04.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:38:34.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", @@ -98,9 +98,15 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.17763.6293", - "matchCriteriaId": "3A9450F3-BE07-4F9B-9C2B-29208AB91A9C" + "matchCriteriaId": "ADD534CE-0B4C-43DB-A27C-AC67246D0A87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6293", + "matchCriteriaId": "23DBE62F-98CC-4F76-A841-BB20C5E8075F" }, { "vulnerable": true, @@ -146,28 +152,23 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", - "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", - "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76" + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "F73D1308-DB13-4B6C-A66F-5542FDCA749C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", - "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" }, { "vulnerable": true, @@ -209,7 +210,11 @@ }, { "url": "https://www.elastic.co/security-labs/dismantling-smart-app-control", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json index 98650a8231e..becd0150947 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4040", "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", "published": "2024-04-22T20:15:07.803", - "lastModified": "2024-11-21T09:42:05.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:48:42.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -132,6 +132,7 @@ "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update", "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", "tags": [ + "Patch", "Vendor Advisory" ] }, @@ -154,17 +155,16 @@ "url": "https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/", "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", "tags": [ - "Press/Media Coverage", - "Third Party Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/", "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", "tags": [ - "Patch", - "Press/Media Coverage", - "Third Party Advisory" + "Issue Tracking", + "Patch" ] }, { @@ -187,6 +187,7 @@ "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Patch", "Vendor Advisory" ] }, @@ -209,17 +210,16 @@ "url": "https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Press/Media Coverage", - "Third Party Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Patch", - "Press/Media Coverage", - "Third Party Advisory" + "Issue Tracking", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4358.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4358.json index e8577c1aaff..b224a6ebe48 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4358.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4358", "sourceIdentifier": "security@progress.com", "published": "2024-05-29T15:16:06.477", - "lastModified": "2024-11-21T09:42:41.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:43:05.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44172.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44172.json new file mode 100644 index 00000000000..28824a62f4e --- /dev/null +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44172.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44172", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:11.930", + "lastModified": "2025-01-27T22:15:11.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, macOS Sequoia 15. An app may be able to access contacts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json index 171d8c5f547..c1785921af9 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45479", "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.290", - "lastModified": "2025-01-21T22:15:12.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T21:15:13.410", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,34 @@ "value": "Vulnerabilidad SSRF en la p\u00e1gina Editar servicio de la interfaz de usuario de Apache Ranger en la versi\u00f3n 2.4.0 de Apache Ranger. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.5.0 de Apache Ranger, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4978.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4978.json index 7aaa2b26ede..7aa425e4929 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4978.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4978", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-05-23T02:15:09.257", - "lastModified": "2024-11-21T09:43:59.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T21:42:09.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -151,7 +151,6 @@ "url": "https://twitter.com/2RunJack2/status/1775052981966377148", "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ - "Press/Media Coverage", "Third Party Advisory" ] }, @@ -159,7 +158,7 @@ "url": "https://www.javs.com/downloads/", "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ - "Vendor Advisory" + "Product" ] }, { @@ -174,7 +173,6 @@ "url": "https://twitter.com/2RunJack2/status/1775052981966377148", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Press/Media Coverage", "Third Party Advisory" ] }, @@ -182,7 +180,7 @@ "url": "https://www.javs.com/downloads/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Product" ] }, { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json index 6f0c0fc627d..3fd7870967f 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json @@ -2,13 +2,13 @@ "id": "CVE-2024-51417", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T19:15:10.950", - "lastModified": "2025-01-21T19:15:10.950", + "lastModified": "2025-01-27T22:15:12.080", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in System.Linq.Dynamic.Core Latest version v.1.4.6 allows remote access to properties on reflection types and static properties/fields." + "value": "An issue in System.Linq.Dynamic.Core before 1.6.0 allows remote access to properties on reflection types and static properties/fields." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json new file mode 100644 index 00000000000..a78dcf95256 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-54468", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.187", + "lastModified": "2025-01-27T22:15:12.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to break out of its sandbox." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121838", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json new file mode 100644 index 00000000000..388503db9ad --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54475", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.283", + "lastModified": "2025-01-27T22:15:12.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to determine a user\u2019s current location." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json new file mode 100644 index 00000000000..7053a123956 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-54478", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.377", + "lastModified": "2025-01-27T22:15:12.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54488.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54488.json new file mode 100644 index 00000000000..fd2c72c525e --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54488.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-54488", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.480", + "lastModified": "2025-01-27T22:15:12.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Photos in the Hidden Photos Album may be viewed without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121838", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54497.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54497.json new file mode 100644 index 00000000000..1272154f25b --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54497.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-54497", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.583", + "lastModified": "2025-01-27T22:15:12.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing web content may lead to a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json new file mode 100644 index 00000000000..2fd7ec38fbb --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-54499", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.680", + "lastModified": "2025-01-27T22:15:12.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing a maliciously crafted image may lead to arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json new file mode 100644 index 00000000000..0ac11fad4d9 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54507", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.777", + "lastModified": "2025-01-27T22:15:12.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An attacker with user privileges may be able to read kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54509.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54509.json new file mode 100644 index 00000000000..3165cc63c9a --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54509.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54509", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.867", + "lastModified": "2025-01-27T22:15:12.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54512.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54512.json new file mode 100644 index 00000000000..588e13baf4c --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54512.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54512", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:12.973", + "lastModified": "2025-01-27T22:15:12.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed by removing the relevant flags. This issue is fixed in watchOS 11.2, iOS 18.2 and iPadOS 18.2. A system binary could be used to fingerprint a user's Apple Account." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54516.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54516.json new file mode 100644 index 00000000000..d7708f8dd36 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54516.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54516", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.063", + "lastModified": "2025-01-27T22:15:13.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to approve a launch daemon without user consent." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54517.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54517.json new file mode 100644 index 00000000000..dc818e22118 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54517.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54517", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.160", + "lastModified": "2025-01-27T22:15:13.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json new file mode 100644 index 00000000000..12252bcaf4c --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54518", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.260", + "lastModified": "2025-01-27T22:15:13.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json new file mode 100644 index 00000000000..f686db2bc34 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54519", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.367", + "lastModified": "2025-01-27T22:15:13.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was resolved by sanitizing logging. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to read sensitive location information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json new file mode 100644 index 00000000000..7fd8f9c9973 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54520", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.473", + "lastModified": "2025-01-27T22:15:13.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to overwrite arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54522.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54522.json new file mode 100644 index 00000000000..7cb56508204 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54522.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54522", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.560", + "lastModified": "2025-01-27T22:15:13.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json new file mode 100644 index 00000000000..1252db70366 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54523", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.660", + "lastModified": "2025-01-27T22:15:13.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json new file mode 100644 index 00000000000..7cb469f8a46 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54530", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.753", + "lastModified": "2025-01-27T22:15:13.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 and iPadOS 18.2. Password autofill may fill in passwords after failing authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54536.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54536.json new file mode 100644 index 00000000000..90e470c7268 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54536.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54536", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.853", + "lastModified": "2025-01-27T22:15:13.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.2. An app may be able to edit NVRAM variables." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json new file mode 100644 index 00000000000..13f949a4ed5 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54537", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:13.940", + "lastModified": "2025-01-27T22:15:13.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to read and write files outside of its sandbox." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json new file mode 100644 index 00000000000..dd044b30e5a --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54539", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.037", + "lastModified": "2025-01-27T22:15:14.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to capture keyboard events from the lock screen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json new file mode 100644 index 00000000000..80111191431 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-54541", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.117", + "lastModified": "2025-01-27T22:15:14.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json new file mode 100644 index 00000000000..19904c088e2 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54542", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.217", + "lastModified": "2025-01-27T22:15:14.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication issue was addressed with improved state management. This issue is fixed in Safari 18.2, macOS Sequoia 15.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2. Private Browsing tabs may be accessed without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121846", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54543.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54543.json new file mode 100644 index 00000000000..1c266666228 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54543.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-54543", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.307", + "lastModified": "2025-01-27T22:15:14.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.2, tvOS 18.2, Safari 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to memory corruption." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121846", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json new file mode 100644 index 00000000000..543807d6703 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54547", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.400", + "lastModified": "2025-01-27T22:15:14.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54549.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54549.json new file mode 100644 index 00000000000..b3bcbba7aa0 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54549.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54549", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.490", + "lastModified": "2025-01-27T22:15:14.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.2. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json new file mode 100644 index 00000000000..ce2679ed0cd --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54550", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.580", + "lastModified": "2025-01-27T22:15:14.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An app may be able to view autocompleted contact information from Messages and Mail in system logs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121837", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54557.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54557.json new file mode 100644 index 00000000000..0f070755de4 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54557.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-54557", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.670", + "lastModified": "2025-01-27T22:15:14.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An attacker may gain access to protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121839", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121840", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121842", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0753.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0753.json new file mode 100644 index 00000000000..21457fa2e88 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0753.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0753", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-27T21:15:13.653", + "lastModified": "2025-01-27T21:15:13.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. This vulnerability affects the function AP4_StdcFileByteStream::ReadPartial of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/991", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/18434657/seeds.zip", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293518", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293518", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.483326", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json index cdadc841df6..36effe26532 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json @@ -2,13 +2,13 @@ "id": "CVE-2025-21600", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.960", - "lastModified": "2025-01-09T17:15:18.960", + "lastModified": "2025-01-27T22:15:14.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems configured in\n either of two ways:\n\n \n \n * systems with BGP traceoptions enabled\n\n * systems with BGP family traffic-engineering (BGP-LS)\n configured\n\n\n and can be exploited from a directly connected and configured BGP peer.\u00a0\n\nThis issue affects iBGP and eBGP \n\nwith \n\nany address family\n\n configured, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S2-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\nThis is a similar, but different vulnerability than the issue reported as CVE-2024-39516." + "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems configured in\n either of two ways:\n\n \n \n * systems with BGP traceoptions enabled\n\n * systems with BGP family traffic-engineering (BGP-LS)\n configured\n\n\n and can be exploited from a directly connected and configured BGP peer.\u00a0\n\nThis issue affects iBGP and eBGP \n\nwith \n\nany address family\n\n configured, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * \n\nfrom 21.4 before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * from 21.4-EVO before 21.4R3-S9-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S3-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S2-EVO,\u00a0\n * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue does not affect versions of Junos OS prior to 21.3R1.\n\n\nThis issue does not affect versions of Junos OS Evolved prior to 21.3R1-EVO.\n\n\n\nThis is a similar, but different vulnerability than the issue reported as CVE-2024-39516." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json new file mode 100644 index 00000000000..426c57197f7 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24085", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:14.990", + "lastModified": "2025-01-27T22:15:14.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24086.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24086.json new file mode 100644 index 00000000000..9f9a43df18b --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24086.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2025-24086", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.080", + "lastModified": "2025-01-27T22:15:15.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing an image may lead to a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24087.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24087.json new file mode 100644 index 00000000000..bacc428aff3 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24087.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24087", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.180", + "lastModified": "2025-01-27T22:15:15.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with additional permissions checks. This issue is fixed in macOS Sequoia 15.3. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json new file mode 100644 index 00000000000..4cb21baa82d --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24092", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.267", + "lastModified": "2025-01-27T22:15:15.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read sensitive location information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json new file mode 100644 index 00000000000..1894f92dcb7 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24093", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.350", + "lastModified": "2025-01-27T22:15:15.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3. An app may be able to access removable volumes without user consent." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24094.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24094.json new file mode 100644 index 00000000000..cf62a0cc285 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24094.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24094", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.450", + "lastModified": "2025-01-27T22:15:15.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24096.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24096.json new file mode 100644 index 00000000000..53fdab584de --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24096.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24096", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.533", + "lastModified": "2025-01-27T22:15:15.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. A malicious app may be able to access arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24100.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24100.json new file mode 100644 index 00000000000..e7f52cfb5b2 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24100.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24100", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.627", + "lastModified": "2025-01-27T22:15:15.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access information about a user's contacts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json new file mode 100644 index 00000000000..28cabe4cd80 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24101", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.717", + "lastModified": "2025-01-27T22:15:15.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json new file mode 100644 index 00000000000..8d7f359943d --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-24102", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.807", + "lastModified": "2025-01-27T22:15:15.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user\u2019s current location." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json new file mode 100644 index 00000000000..cf88051b067 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24103", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.900", + "lastModified": "2025-01-27T22:15:15.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24104.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24104.json new file mode 100644 index 00000000000..b26cab46f62 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24104.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24104", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:15.983", + "lastModified": "2025-01-27T22:15:15.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in iPadOS 17.7.4, iOS 18.3 and iPadOS 18.3. Restoring a maliciously crafted backup file may lead to modification of protected system files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json new file mode 100644 index 00000000000..fd4046bd5e1 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24106", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.070", + "lastModified": "2025-01-27T22:15:16.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24107.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24107.json new file mode 100644 index 00000000000..a8e3f031223 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24107.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-24107", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.170", + "lastModified": "2025-01-27T22:15:16.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.3, tvOS 18.3, watchOS 11.3, iOS 18.3 and iPadOS 18.3. A malicious app may be able to gain root privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json new file mode 100644 index 00000000000..afcb515598b --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24108", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.263", + "lastModified": "2025-01-27T22:15:16.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.3. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json new file mode 100644 index 00000000000..d7ed7cea707 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24109", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.347", + "lastModified": "2025-01-27T22:15:16.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access sensitive user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24112.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24112.json new file mode 100644 index 00000000000..ad571d96059 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24112.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24112", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.433", + "lastModified": "2025-01-27T22:15:16.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24113.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24113.json new file mode 100644 index 00000000000..ad5f9aadcf5 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24113.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-24113", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.530", + "lastModified": "2025-01-27T22:15:16.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24114.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24114.json new file mode 100644 index 00000000000..1444b62a014 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24114.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24114", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.620", + "lastModified": "2025-01-27T22:15:16.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json new file mode 100644 index 00000000000..3387eadded4 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24115", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.713", + "lastModified": "2025-01-27T22:15:16.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24116.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24116.json new file mode 100644 index 00000000000..577e7cd57f5 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24116.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24116", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.803", + "lastModified": "2025-01-27T22:15:16.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24117.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24117.json new file mode 100644 index 00000000000..35c9447622c --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24117.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24117", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:16.900", + "lastModified": "2025-01-27T22:15:16.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json new file mode 100644 index 00000000000..5fa40940b76 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24118", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.033", + "lastModified": "2025-01-27T22:15:17.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24120.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24120.json new file mode 100644 index 00000000000..b309906bd7e --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24120.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24120", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.140", + "lastModified": "2025-01-27T22:15:17.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An attacker may be able to cause unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json new file mode 100644 index 00000000000..be3e654cd1f --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24121", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.230", + "lastModified": "2025-01-27T22:15:17.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json new file mode 100644 index 00000000000..6f84bd45d2e --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24122", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.323", + "lastModified": "2025-01-27T22:15:17.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json new file mode 100644 index 00000000000..5019e49064e --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2025-24123", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.413", + "lastModified": "2025-01-27T22:15:17.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json new file mode 100644 index 00000000000..626a382093d --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2025-24124", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.510", + "lastModified": "2025-01-27T22:15:17.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json new file mode 100644 index 00000000000..8dbc694d628 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24126", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.603", + "lastModified": "2025-01-27T22:15:17.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24127.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24127.json new file mode 100644 index 00000000000..3c0d05e8321 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24127.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24127", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.703", + "lastModified": "2025-01-27T22:15:17.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24128.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24128.json new file mode 100644 index 00000000000..faeccae8735 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24128.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24128", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.793", + "lastModified": "2025-01-27T22:15:17.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Visiting a malicious website may lead to address bar spoofing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24129.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24129.json new file mode 100644 index 00000000000..1e685f46027 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24129.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24129", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.887", + "lastModified": "2025-01-27T22:15:17.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json new file mode 100644 index 00000000000..bac97103cd0 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24130", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:17.977", + "lastModified": "2025-01-27T22:15:17.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24131.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24131.json new file mode 100644 index 00000000000..8dec54f4877 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24131.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24131", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.070", + "lastModified": "2025-01-27T22:15:18.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker in a privileged position may be able to perform a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json new file mode 100644 index 00000000000..7ada5fa448d --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24134", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.153", + "lastModified": "2025-01-27T22:15:18.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json new file mode 100644 index 00000000000..2f502c0ccc7 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24135", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.247", + "lastModified": "2025-01-27T22:15:18.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24136.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24136.json new file mode 100644 index 00000000000..804287a75b0 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24136.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24136", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.340", + "lastModified": "2025-01-27T22:15:18.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious app may be able to create symlinks to protected regions of the disk." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json new file mode 100644 index 00000000000..ab42521fe13 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24137", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.433", + "lastModified": "2025-01-27T22:15:18.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A type confusion issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected application termination or arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json new file mode 100644 index 00000000000..d4257f98680 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24138", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.530", + "lastModified": "2025-01-27T22:15:18.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious application may be able to leak sensitive user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json new file mode 100644 index 00000000000..60a957b76e7 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24139", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.627", + "lastModified": "2025-01-27T22:15:18.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24140.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24140.json new file mode 100644 index 00000000000..8e9c44152f7 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24140.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24140", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.710", + "lastModified": "2025-01-27T22:15:18.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. Files downloaded from the internet may not have the quarantine flag applied." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24141.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24141.json new file mode 100644 index 00000000000..4f3d9100d51 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24141.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24141", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.800", + "lastModified": "2025-01-27T22:15:18.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24143.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24143.json new file mode 100644 index 00000000000..8fab889634c --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24143.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-24143", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.893", + "lastModified": "2025-01-27T22:15:18.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24145.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24145.json new file mode 100644 index 00000000000..4f0184fbb8c --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24145.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24145", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:18.990", + "lastModified": "2025-01-27T22:15:18.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json new file mode 100644 index 00000000000..178799da629 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24146", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.077", + "lastModified": "2025-01-27T22:15:19.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json new file mode 100644 index 00000000000..2ac65a34aec --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2025-24149", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.173", + "lastModified": "2025-01-27T22:15:19.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24150.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24150.json new file mode 100644 index 00000000000..f2befc77b9d --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24150.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24150", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.270", + "lastModified": "2025-01-27T22:15:19.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json new file mode 100644 index 00000000000..a8cf35a4e3c --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24151", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.360", + "lastModified": "2025-01-27T22:15:19.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24152.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24152.json new file mode 100644 index 00000000000..af0606cdaff --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24152.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24152", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.443", + "lastModified": "2025-01-27T22:15:19.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24153.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24153.json new file mode 100644 index 00000000000..17b2cfeae96 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24153.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24153", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.537", + "lastModified": "2025-01-27T22:15:19.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json new file mode 100644 index 00000000000..9e965dfa7b3 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-24154", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.620", + "lastModified": "2025-01-27T22:15:19.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json new file mode 100644 index 00000000000..5690695c7eb --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24156", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.710", + "lastModified": "2025-01-27T22:15:19.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow was addressed through improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to elevate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json new file mode 100644 index 00000000000..4cde2c104e2 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-24158", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.800", + "lastModified": "2025-01-27T22:15:19.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json new file mode 100644 index 00000000000..7352344ca58 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24159", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.897", + "lastModified": "2025-01-27T22:15:19.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json new file mode 100644 index 00000000000..4cfed7d89f3 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24160", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:19.987", + "lastModified": "2025-01-27T22:15:19.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24161.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24161.json new file mode 100644 index 00000000000..37e4372c584 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24161.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24161", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.083", + "lastModified": "2025-01-27T22:15:20.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json new file mode 100644 index 00000000000..f6d635cd714 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-24162", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.167", + "lastModified": "2025-01-27T22:15:20.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json new file mode 100644 index 00000000000..ad1b71a3999 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2025-24163", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.267", + "lastModified": "2025-01-27T22:15:20.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json new file mode 100644 index 00000000000..5f18526f5d8 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2025-24166", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.357", + "lastModified": "2025-01-27T22:15:20.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122067", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122071", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122072", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122073", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24169.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24169.json new file mode 100644 index 00000000000..2371990c00c --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24169.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24169", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.460", + "lastModified": "2025-01-27T22:15:20.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.3, Safari 18.3. A malicious app may be able to bypass browser extension authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122074", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json new file mode 100644 index 00000000000..92fdcaec979 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24174", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.547", + "lastModified": "2025-01-27T22:15:20.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json new file mode 100644 index 00000000000..1d258dd2ce2 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24176", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.643", + "lastModified": "2025-01-27T22:15:20.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122069", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122070", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24177.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24177.json new file mode 100644 index 00000000000..53eb0082952 --- /dev/null +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24177.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-24177", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-01-27T22:15:20.750", + "lastModified": "2025-01-27T22:15:20.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122066", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122068", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b6790a36aac..faaabc241bb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-27T21:00:37.004591+00:00 +2025-01-27T23:00:23.681848+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-27T20:57:04.940000+00:00 +2025-01-27T22:15:20.750000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279136 +279229 ``` ### CVEs added in the last Commit -Recently added CVEs: `25` +Recently added CVEs: `93` -- [CVE-2024-48841](CVE-2024/CVE-2024-488xx/CVE-2024-48841.json) (`2025-01-27T20:15:34.090`) -- [CVE-2024-56947](CVE-2024/CVE-2024-569xx/CVE-2024-56947.json) (`2025-01-27T19:15:16.187`) -- [CVE-2024-56948](CVE-2024/CVE-2024-569xx/CVE-2024-56948.json) (`2025-01-27T19:15:16.290`) -- [CVE-2024-56949](CVE-2024/CVE-2024-569xx/CVE-2024-56949.json) (`2025-01-27T19:15:16.383`) -- [CVE-2024-56950](CVE-2024/CVE-2024-569xx/CVE-2024-56950.json) (`2025-01-27T19:15:16.480`) -- [CVE-2024-56951](CVE-2024/CVE-2024-569xx/CVE-2024-56951.json) (`2025-01-27T19:15:16.583`) -- [CVE-2024-56952](CVE-2024/CVE-2024-569xx/CVE-2024-56952.json) (`2025-01-27T19:15:16.697`) -- [CVE-2024-56953](CVE-2024/CVE-2024-569xx/CVE-2024-56953.json) (`2025-01-27T19:15:16.823`) -- [CVE-2024-56954](CVE-2024/CVE-2024-569xx/CVE-2024-56954.json) (`2025-01-27T19:15:16.933`) -- [CVE-2024-56955](CVE-2024/CVE-2024-569xx/CVE-2024-56955.json) (`2025-01-27T19:15:17.040`) -- [CVE-2024-56957](CVE-2024/CVE-2024-569xx/CVE-2024-56957.json) (`2025-01-27T19:15:17.147`) -- [CVE-2024-56959](CVE-2024/CVE-2024-569xx/CVE-2024-56959.json) (`2025-01-27T19:15:17.247`) -- [CVE-2024-56960](CVE-2024/CVE-2024-569xx/CVE-2024-56960.json) (`2025-01-27T19:15:17.347`) -- [CVE-2024-56962](CVE-2024/CVE-2024-569xx/CVE-2024-56962.json) (`2025-01-27T19:15:17.447`) -- [CVE-2024-56963](CVE-2024/CVE-2024-569xx/CVE-2024-56963.json) (`2025-01-27T19:15:17.547`) -- [CVE-2024-56964](CVE-2024/CVE-2024-569xx/CVE-2024-56964.json) (`2025-01-27T19:15:17.647`) -- [CVE-2024-56965](CVE-2024/CVE-2024-569xx/CVE-2024-56965.json) (`2025-01-27T19:15:17.747`) -- [CVE-2024-56966](CVE-2024/CVE-2024-569xx/CVE-2024-56966.json) (`2025-01-27T19:15:17.850`) -- [CVE-2024-56967](CVE-2024/CVE-2024-569xx/CVE-2024-56967.json) (`2025-01-27T19:15:17.947`) -- [CVE-2024-56968](CVE-2024/CVE-2024-569xx/CVE-2024-56968.json) (`2025-01-27T19:15:18.057`) -- [CVE-2024-56969](CVE-2024/CVE-2024-569xx/CVE-2024-56969.json) (`2025-01-27T19:15:18.157`) -- [CVE-2024-56971](CVE-2024/CVE-2024-569xx/CVE-2024-56971.json) (`2025-01-27T19:15:18.260`) -- [CVE-2024-56972](CVE-2024/CVE-2024-569xx/CVE-2024-56972.json) (`2025-01-27T19:15:18.360`) -- [CVE-2025-0734](CVE-2025/CVE-2025-07xx/CVE-2025-0734.json) (`2025-01-27T19:15:19.130`) -- [CVE-2025-0751](CVE-2025/CVE-2025-07xx/CVE-2025-0751.json) (`2025-01-27T20:15:34.587`) +- [CVE-2025-24138](CVE-2025/CVE-2025-241xx/CVE-2025-24138.json) (`2025-01-27T22:15:18.530`) +- [CVE-2025-24139](CVE-2025/CVE-2025-241xx/CVE-2025-24139.json) (`2025-01-27T22:15:18.627`) +- [CVE-2025-24140](CVE-2025/CVE-2025-241xx/CVE-2025-24140.json) (`2025-01-27T22:15:18.710`) +- [CVE-2025-24141](CVE-2025/CVE-2025-241xx/CVE-2025-24141.json) (`2025-01-27T22:15:18.800`) +- [CVE-2025-24143](CVE-2025/CVE-2025-241xx/CVE-2025-24143.json) (`2025-01-27T22:15:18.893`) +- [CVE-2025-24145](CVE-2025/CVE-2025-241xx/CVE-2025-24145.json) (`2025-01-27T22:15:18.990`) +- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-27T22:15:19.077`) +- [CVE-2025-24149](CVE-2025/CVE-2025-241xx/CVE-2025-24149.json) (`2025-01-27T22:15:19.173`) +- [CVE-2025-24150](CVE-2025/CVE-2025-241xx/CVE-2025-24150.json) (`2025-01-27T22:15:19.270`) +- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-27T22:15:19.360`) +- [CVE-2025-24152](CVE-2025/CVE-2025-241xx/CVE-2025-24152.json) (`2025-01-27T22:15:19.443`) +- [CVE-2025-24153](CVE-2025/CVE-2025-241xx/CVE-2025-24153.json) (`2025-01-27T22:15:19.537`) +- [CVE-2025-24154](CVE-2025/CVE-2025-241xx/CVE-2025-24154.json) (`2025-01-27T22:15:19.620`) +- [CVE-2025-24156](CVE-2025/CVE-2025-241xx/CVE-2025-24156.json) (`2025-01-27T22:15:19.710`) +- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-01-27T22:15:19.800`) +- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-01-27T22:15:19.897`) +- [CVE-2025-24160](CVE-2025/CVE-2025-241xx/CVE-2025-24160.json) (`2025-01-27T22:15:19.987`) +- [CVE-2025-24161](CVE-2025/CVE-2025-241xx/CVE-2025-24161.json) (`2025-01-27T22:15:20.083`) +- [CVE-2025-24162](CVE-2025/CVE-2025-241xx/CVE-2025-24162.json) (`2025-01-27T22:15:20.167`) +- [CVE-2025-24163](CVE-2025/CVE-2025-241xx/CVE-2025-24163.json) (`2025-01-27T22:15:20.267`) +- [CVE-2025-24166](CVE-2025/CVE-2025-241xx/CVE-2025-24166.json) (`2025-01-27T22:15:20.357`) +- [CVE-2025-24169](CVE-2025/CVE-2025-241xx/CVE-2025-24169.json) (`2025-01-27T22:15:20.460`) +- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-01-27T22:15:20.547`) +- [CVE-2025-24176](CVE-2025/CVE-2025-241xx/CVE-2025-24176.json) (`2025-01-27T22:15:20.643`) +- [CVE-2025-24177](CVE-2025/CVE-2025-241xx/CVE-2025-24177.json) (`2025-01-27T22:15:20.750`) ### CVEs modified in the last Commit -Recently modified CVEs: `75` +Recently modified CVEs: `96` -- [CVE-2023-43537](CVE-2023/CVE-2023-435xx/CVE-2023-43537.json) (`2025-01-27T19:33:18.153`) -- [CVE-2023-43538](CVE-2023/CVE-2023-435xx/CVE-2023-43538.json) (`2025-01-27T19:34:53.133`) -- [CVE-2023-43542](CVE-2023/CVE-2023-435xx/CVE-2023-43542.json) (`2025-01-27T19:36:48.193`) -- [CVE-2023-43543](CVE-2023/CVE-2023-435xx/CVE-2023-43543.json) (`2025-01-27T19:40:35.657`) -- [CVE-2023-43544](CVE-2023/CVE-2023-435xx/CVE-2023-43544.json) (`2025-01-27T19:11:15.697`) -- [CVE-2023-43545](CVE-2023/CVE-2023-435xx/CVE-2023-43545.json) (`2025-01-27T19:08:27.157`) -- [CVE-2023-43551](CVE-2023/CVE-2023-435xx/CVE-2023-43551.json) (`2025-01-27T19:04:52.977`) -- [CVE-2023-48788](CVE-2023/CVE-2023-487xx/CVE-2023-48788.json) (`2025-01-27T20:56:34.083`) -- [CVE-2024-1086](CVE-2024/CVE-2024-10xx/CVE-2024-1086.json) (`2025-01-27T20:55:05.757`) -- [CVE-2024-12436](CVE-2024/CVE-2024-124xx/CVE-2024-12436.json) (`2025-01-27T20:15:31.910`) -- [CVE-2024-13052](CVE-2024/CVE-2024-130xx/CVE-2024-13052.json) (`2025-01-27T20:15:32.307`) -- [CVE-2024-13055](CVE-2024/CVE-2024-130xx/CVE-2024-13055.json) (`2025-01-27T20:15:32.747`) -- [CVE-2024-13056](CVE-2024/CVE-2024-130xx/CVE-2024-13056.json) (`2025-01-27T20:15:32.990`) -- [CVE-2024-13057](CVE-2024/CVE-2024-130xx/CVE-2024-13057.json) (`2025-01-27T20:15:33.200`) -- [CVE-2024-13094](CVE-2024/CVE-2024-130xx/CVE-2024-13094.json) (`2025-01-27T20:15:33.390`) -- [CVE-2024-20353](CVE-2024/CVE-2024-203xx/CVE-2024-20353.json) (`2025-01-27T20:56:54.213`) -- [CVE-2024-20359](CVE-2024/CVE-2024-203xx/CVE-2024-20359.json) (`2025-01-27T20:56:58.307`) -- [CVE-2024-20399](CVE-2024/CVE-2024-203xx/CVE-2024-20399.json) (`2025-01-27T20:57:04.940`) -- [CVE-2024-23136](CVE-2024/CVE-2024-231xx/CVE-2024-23136.json) (`2025-01-27T19:15:15.900`) -- [CVE-2024-35140](CVE-2024/CVE-2024-351xx/CVE-2024-35140.json) (`2025-01-27T19:27:14.327`) -- [CVE-2024-35142](CVE-2024/CVE-2024-351xx/CVE-2024-35142.json) (`2025-01-27T19:25:19.840`) -- [CVE-2025-21237](CVE-2025/CVE-2025-212xx/CVE-2025-21237.json) (`2025-01-27T19:15:21.430`) -- [CVE-2025-24367](CVE-2025/CVE-2025-243xx/CVE-2025-24367.json) (`2025-01-27T19:15:29.440`) -- [CVE-2025-24368](CVE-2025/CVE-2025-243xx/CVE-2025-24368.json) (`2025-01-27T19:15:29.540`) -- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-27T19:15:29.637`) +- [CVE-2024-12321](CVE-2024/CVE-2024-123xx/CVE-2024-12321.json) (`2025-01-27T21:15:11.763`) +- [CVE-2024-13176](CVE-2024/CVE-2024-131xx/CVE-2024-13176.json) (`2025-01-27T21:15:11.907`) +- [CVE-2024-1709](CVE-2024/CVE-2024-17xx/CVE-2024-1709.json) (`2025-01-27T21:48:25.323`) +- [CVE-2024-23148](CVE-2024/CVE-2024-231xx/CVE-2024-23148.json) (`2025-01-27T22:15:11.403`) +- [CVE-2024-23149](CVE-2024/CVE-2024-231xx/CVE-2024-23149.json) (`2025-01-27T22:15:11.587`) +- [CVE-2024-23692](CVE-2024/CVE-2024-236xx/CVE-2024-23692.json) (`2025-01-27T21:43:16.410`) +- [CVE-2024-24919](CVE-2024/CVE-2024-249xx/CVE-2024-24919.json) (`2025-01-27T21:42:18.743`) +- [CVE-2024-36971](CVE-2024/CVE-2024-369xx/CVE-2024-36971.json) (`2025-01-27T21:43:21.750`) +- [CVE-2024-37000](CVE-2024/CVE-2024-370xx/CVE-2024-37000.json) (`2025-01-27T21:15:12.133`) +- [CVE-2024-37001](CVE-2024/CVE-2024-370xx/CVE-2024-37001.json) (`2025-01-27T21:15:12.383`) +- [CVE-2024-37002](CVE-2024/CVE-2024-370xx/CVE-2024-37002.json) (`2025-01-27T21:15:12.577`) +- [CVE-2024-37003](CVE-2024/CVE-2024-370xx/CVE-2024-37003.json) (`2025-01-27T21:15:12.767`) +- [CVE-2024-37004](CVE-2024/CVE-2024-370xx/CVE-2024-37004.json) (`2025-01-27T21:15:12.973`) +- [CVE-2024-37005](CVE-2024/CVE-2024-370xx/CVE-2024-37005.json) (`2025-01-27T21:15:13.217`) +- [CVE-2024-38014](CVE-2024/CVE-2024-380xx/CVE-2024-38014.json) (`2025-01-27T21:38:24.900`) +- [CVE-2024-38080](CVE-2024/CVE-2024-380xx/CVE-2024-38080.json) (`2025-01-27T21:35:27.323`) +- [CVE-2024-38094](CVE-2024/CVE-2024-380xx/CVE-2024-38094.json) (`2025-01-27T21:35:36.907`) +- [CVE-2024-38112](CVE-2024/CVE-2024-381xx/CVE-2024-38112.json) (`2025-01-27T21:35:50.827`) +- [CVE-2024-38217](CVE-2024/CVE-2024-382xx/CVE-2024-38217.json) (`2025-01-27T21:38:34.040`) +- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2025-01-27T21:48:42.117`) +- [CVE-2024-4358](CVE-2024/CVE-2024-43xx/CVE-2024-4358.json) (`2025-01-27T21:43:05.630`) +- [CVE-2024-45479](CVE-2024/CVE-2024-454xx/CVE-2024-45479.json) (`2025-01-27T21:15:13.410`) +- [CVE-2024-4978](CVE-2024/CVE-2024-49xx/CVE-2024-4978.json) (`2025-01-27T21:42:09.123`) +- [CVE-2024-51417](CVE-2024/CVE-2024-514xx/CVE-2024-51417.json) (`2025-01-27T22:15:12.080`) +- [CVE-2025-21600](CVE-2025/CVE-2025-216xx/CVE-2025-21600.json) (`2025-01-27T22:15:14.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 72721551861..738bb16a1ab 100644 --- a/_state.csv +++ b/_state.csv @@ -54833,7 +54833,7 @@ CVE-2012-3368,0,0,f97c0dfd585e24be74a98db9d235186cd0f5dd328286a5b4e39a8ed5ee6fb4 CVE-2012-3369,0,0,880045d0b49e965b3f5e88c657a499ff9fe932c1eb6a96a5f50ca48eb41d6e7c,2024-11-21T01:40:43.470000 CVE-2012-3370,0,0,b8176f459c92a14580c1ccecb13e2ad725e80edba48d63d8ce72fdea2a04dd85,2024-11-21T01:40:43.623000 CVE-2012-3371,0,0,5283fc3c1c88edbeafb80fe226116a50e4728f5823c962d38bf4a2bfa47dcfa1,2024-11-21T01:40:43.773000 -CVE-2012-3372,0,0,47290dfea52a184a3bf8e6d7a2d137b9ce085c2a2a62e074747aa2d65b652c90,2024-11-21T01:40:43.900000 +CVE-2012-3372,0,1,7f8b5e37de03fd12f8431fdbdaf0ea999787cb50b230a19f9353cd9aed70faa5,2025-01-27T21:15:08.397000 CVE-2012-3373,0,0,a8a470e5b8f93f1604f1d36d168b47a39f2f21db932bc355932f98655c723f4e,2024-11-21T01:40:44.027000 CVE-2012-3374,0,0,3f1096ac9b1e9d17abc06b37a3f79478d339e4274df0b5c7c259267611d93e97,2024-11-21T01:40:44.163000 CVE-2012-3375,0,0,6b832fc030d2280b8066a5ed9dbcbb253af9d5b8ba466ddddbf7dd7a663234b4,2024-11-21T01:40:44.300000 @@ -68698,7 +68698,7 @@ CVE-2014-4604,0,0,59840683f811874276e3b05cb63530143b2253d069729ef95a315b6be0378b CVE-2014-4605,0,0,abb9b27c0b23364275193aecc9aaa5558a953796703a0a8ec9c83bc92f499f62,2024-11-21T02:10:32.893000 CVE-2014-4606,0,0,bd5ff91a0812f72bbb4e6c17fc7ec4e32126a164b2f044075cd8014ca4cb672f,2024-11-21T02:10:33.027000 CVE-2014-4607,0,0,b068137ecceab69c8340b4b2ba139a524aec468ceb58e4347b4e51db20af9e22,2024-11-21T02:10:33.167000 -CVE-2014-4608,0,0,9c071030abf047675b9204e3f0cf83f1eea486447d94d84dfd456a7250321813,2024-11-21T02:10:33.310000 +CVE-2014-4608,0,1,aec83ab0b7a4ff759f6335d9bcc3f73acd73ef51b2c3e7b90278ef5f1e419f3a,2025-01-27T21:15:09.147000 CVE-2014-4609,0,0,71b9e1abf390616635f5e4d1231816af1bdcd12b4bf6999b8e61be5c44d7891b,2024-11-21T02:10:33.510000 CVE-2014-4610,0,0,964c8a3c81082c9361127f54a62ca87fccfba1e9413d9cd751012b34fb68991e,2024-11-21T02:10:33.650000 CVE-2014-4611,0,0,9c3e76e05ab00d6f30026d48c3e437f9606c5bda11d22ef0c334478af4d99ed0,2024-11-21T02:10:33.800000 @@ -83500,7 +83500,7 @@ CVE-2016-10170,0,0,7592044d47a056af104aafc7bfeee0c3044e0380924e41a3869e4a0722939 CVE-2016-10171,0,0,6087bb6f3bfcdc5e2b5ba47fc47415f1659e8ed56dfa8db6ab8c8c1efb22b8c6,2024-11-21T02:43:28.270000 CVE-2016-10172,0,0,4b0b0db17031d1970e7b227ac66fa21b58c0569dbad9ddcc34a71a343ade4bbc,2024-11-21T02:43:28.407000 CVE-2016-10173,0,0,ad94427bfefe214cc24f5d5a3c472d99b99c826dc9343b3c06fcb6345b4e9e5d,2024-11-21T02:43:28.580000 -CVE-2016-10174,0,1,dc7eac526b43e5372417a4f8d437b70373cc93f3d26ca19aaaa6924b4dde042b,2025-01-27T19:46:37.500000 +CVE-2016-10174,0,0,dc7eac526b43e5372417a4f8d437b70373cc93f3d26ca19aaaa6924b4dde042b,2025-01-27T19:46:37.500000 CVE-2016-10175,0,0,03a7281f438ee7c374f7a315a0d5b5f0218d66baf6d2507305a601b11cbe894b,2024-11-21T02:43:28.927000 CVE-2016-10176,0,0,4efa8f83a2cbc7d75e83982787b51433f3aea7f3bbc2a3e11ed356a6d59378c6,2024-11-21T02:43:29.070000 CVE-2016-10177,0,0,a9bd2a596d592ccc0d40fe0dc22f21577bf4eb01b989198a17e22aedb068e81d,2024-11-21T02:43:29.210000 @@ -84413,7 +84413,7 @@ CVE-2016-11017,0,0,34b1ba2067c14f8c683debbedf50e7f57b82bb5c2572fb247b4da8db5295f CVE-2016-11018,0,0,46b7ba23a557b738b8d7c825f1fe06f026f8f9a04635ae34a086af440b461b9c,2024-11-21T02:45:18.797000 CVE-2016-1102,0,0,20dc9024c3fa3054e9f6b9ca8bbeed0a2920a8ec4742a918ecaab03a8e1862ea,2024-11-21T02:45:46.240000 CVE-2016-11020,0,0,5415ccf95fecd802b75e37e815e06c0a96dc472845579eb4228b286fe4d6448b,2024-11-21T02:45:18.940000 -CVE-2016-11021,0,1,1b5e97b8708f56d9c2613201b61b7de7e414302b412ad8af93780dea98c52e92,2025-01-27T19:46:47.113000 +CVE-2016-11021,0,0,1b5e97b8708f56d9c2613201b61b7de7e414302b412ad8af93780dea98c52e92,2025-01-27T19:46:47.113000 CVE-2016-11022,0,0,1923bf727454365e64cce1a52a322fec4a72ea3f6ffc18358d9b523f187ed3eb,2024-11-21T02:45:19.230000 CVE-2016-11023,0,0,59ed52d2c3ab82d81d90617d2330481e496055bcbcfe045bac476f51af98a370,2024-11-21T02:45:19.380000 CVE-2016-11024,0,0,be03e2921dd62eb05ce2cfee871a7c033dc6059389a17af673c097dce1ab0ebe,2024-11-21T02:45:19.530000 @@ -86715,7 +86715,7 @@ CVE-2016-3423,0,0,b818f3800e642d8a1dc24ad05b2ac0351d15d98d68ec112f4ae29367f650dc CVE-2016-3424,0,0,f2a564bfaff9c286c0b9401e35d76cb598b73c3961bef1cf5190b8abae28b1b1,2024-11-21T02:49:58.767000 CVE-2016-3425,0,0,38ae095774ef9fabdcee736398c28bc10c47ce2874442960d9dfcbfd70a488cf,2024-11-21T02:49:58.893000 CVE-2016-3426,0,0,54487d4b235e16096b5efba7b3f574e41dbe517cf1e9fe34131c2000082ea43e,2024-11-21T02:49:59.030000 -CVE-2016-3427,0,0,64372b289dd260d1389623e8d034981127ceb8facb3a7d9fa77660d48d9a488c,2024-11-21T02:49:59.190000 +CVE-2016-3427,0,1,dee4cfbd40efbe04625dbd303e5e0b9b8e40ff008df65fe8963fe1aa03f4a095,2025-01-27T21:29:03.940000 CVE-2016-3428,0,0,cf58498bd13dad6a8c1f3ba79620f40bce24489cf93a2ce8641b8b79c4b0ee70,2024-11-21T02:49:59.513000 CVE-2016-3429,0,0,7d60c760d78d0abc486c21d8e515f0f54d291c0ad33cbc15f775c8cd23a48bec,2024-11-21T02:49:59.613000 CVE-2016-3431,0,0,22b89124cc525d85f97db806c5676dc2ae2b199f5867fd7c6e808a33efd51536,2024-11-21T02:49:59.720000 @@ -89385,8 +89385,8 @@ CVE-2016-6362,0,0,d0ee3ce446ba38d1edc19dd7b8d8c50d306e3b538a4d40557859b9da882e5c CVE-2016-6363,0,0,9ddd391b335298911ccd769693d98909a06a1a437417509c4174ada8b48b0b34,2024-11-21T02:55:59 CVE-2016-6364,0,0,263a30a9b4f5affd5d23d4ef38ab8ca1802e0da638e105353a061d5b9f3342d9,2024-11-21T02:55:59.110000 CVE-2016-6365,0,0,8f0f78c6601509d49f542a9dbdeae42329a1fe84f4d85411997901b9866a2c6f,2024-11-26T16:09:02.407000 -CVE-2016-6366,0,1,e5cc00bb3e5bb359355c50abceef83e7c19a5972fc2f847179b88e3c5fa6784b,2025-01-27T19:22:51.123000 -CVE-2016-6367,0,1,5a862e9af8c71a652a0611b796628a28e6f28f9fdca31649109b27e5f4d14220,2025-01-27T19:23:14.523000 +CVE-2016-6366,0,0,e5cc00bb3e5bb359355c50abceef83e7c19a5972fc2f847179b88e3c5fa6784b,2025-01-27T19:22:51.123000 +CVE-2016-6367,0,0,5a862e9af8c71a652a0611b796628a28e6f28f9fdca31649109b27e5f4d14220,2025-01-27T19:23:14.523000 CVE-2016-6368,0,0,9f50de71e54eaf6d10d2c5774f906471abc349f2a8085d145e2495ac2da355c1,2024-11-26T16:09:02.407000 CVE-2016-6369,0,0,a127d0f68413d2ab2aaba95cfb6064ea34060e43cb3f8394e9b1fcd99da726a0,2024-11-21T02:55:59.783000 CVE-2016-6370,0,0,7e3f65e82f6bec7f9441870438d74611df7014b8b97f91eaa2a511c40af8d225,2024-11-21T02:55:59.903000 @@ -89433,7 +89433,7 @@ CVE-2016-6411,0,0,316263276d49700e1b65b8f27126da3d896cd6a55a59dcc5958ff7223c9512 CVE-2016-6412,0,0,d942fcaede0cf2b21fe31c6b8ac961c3cb3b2fdac0b27be6ff923679d3bc4d58,2024-11-21T02:56:04.863000 CVE-2016-6413,0,0,2edb310bca6e2b39d511dc599de6f2bd68e817d9a3c788744fab98b0889405aa,2024-11-21T02:56:04.973000 CVE-2016-6414,0,0,a4b7e9dde14aaea9b52e5481dae2714b266a49359dc2c476a89a756430b3f088,2024-11-21T02:56:05.077000 -CVE-2016-6415,0,0,af56663f882853f568155b946e13baa5b7a55165014c4f09a5ce15873bd14f18,2024-11-21T02:56:05.187000 +CVE-2016-6415,0,1,cf82e54bcc06a4b40f0ca7e2ec50fa2bded68bb61f32093fd189921ad2117afb,2025-01-27T21:01:18.730000 CVE-2016-6416,0,0,a98ff4dc8c09eb62120f834465da56e974015a7c30c46d39cb1d9a368f01b573,2024-11-21T02:56:05.307000 CVE-2016-6417,0,0,b78845f7d587d6722000276f1709d9d9109628487f02502480e59925e944f5d9,2024-11-21T02:56:05.433000 CVE-2016-6418,0,0,03b697dd7e01e77f756507ba9a235e1c627086a960717d44e208772cdcdf98aa,2024-11-21T02:56:05.557000 @@ -91922,7 +91922,7 @@ CVE-2016-9075,0,0,168f1c59c885f3885bb78fd2b76cf056cff6d12f8c804371db620091355e2b CVE-2016-9076,0,0,81bbcea1c54a439550d043d9e9fa4d0db28232566098ae3cdeaaf4db56235e73,2024-11-21T03:00:33.260000 CVE-2016-9077,0,0,02a16089e3da372270da5309cecf93add178d7b2e43b375026d8852cfe1593f9,2024-11-21T03:00:33.387000 CVE-2016-9078,0,0,2e87a808a06254d0cd5ec71afbdd41530d9c2fa2edf716222104b75bdcd90004,2024-11-21T03:00:33.517000 -CVE-2016-9079,0,0,19af617c64b850787711c28753ac56eb3eae0fa4d7b9f25f99c432669d153b58,2024-11-21T03:00:33.650000 +CVE-2016-9079,0,1,5c2838ebafc98bb7ca998b9c6cd0ec09df46358d5b484be85f10f0e627c79054,2025-01-27T21:55:53.577000 CVE-2016-9080,0,0,dab65143378c210db67d67980bc24a5da53bc6ff28cc71a502428feaa8aff1e8,2024-11-21T03:00:33.793000 CVE-2016-9081,0,0,1968c82cedc463cab8a62fdf2904c701596c0f127bdb89eb362b56688164aaad,2024-11-21T03:00:33.920000 CVE-2016-9082,0,0,f5ef5ef3bda293aebce5b8fd342446d7b79745a97ec244d34e773ee897aa14e9,2024-11-21T03:00:34.097000 @@ -96022,17 +96022,17 @@ CVE-2017-12228,0,0,a94b96395a185c7ccfa83436710c620656f0d2a4ba4231da2f78c92b13566 CVE-2017-12229,0,0,f6ff893af3a440bed7d1ac6f2dbbf4e52edec5cbd934949348223a768a335137,2024-11-21T03:09:04.917000 CVE-2017-1223,0,0,5b8b0a6cbbf48148ada2d0dc2e20aaa67822d19e60059050ac95bc1af1f52ce1,2024-11-21T03:21:32.020000 CVE-2017-12230,0,0,14b86b12d9dcd83f80c4be089d86af612d242701aa05308b19941c547dc562fa,2024-11-21T03:09:05.040000 -CVE-2017-12231,0,1,a012de02088a5faddff6bebb83fa458cd1114f3344361c3316cd6e93d2f4121a,2025-01-27T19:23:23.143000 -CVE-2017-12232,0,1,fd4ea2dd74f2048fdb27ad3ad251616543d233c02e8d959e466c9ced73ecdecc,2025-01-27T19:23:29.077000 +CVE-2017-12231,0,0,a012de02088a5faddff6bebb83fa458cd1114f3344361c3316cd6e93d2f4121a,2025-01-27T19:23:23.143000 +CVE-2017-12232,0,0,fd4ea2dd74f2048fdb27ad3ad251616543d233c02e8d959e466c9ced73ecdecc,2025-01-27T19:23:29.077000 CVE-2017-12233,0,0,c144b2d3ed80b372d1cee9532049bad7c31514d5d0c964bb01617bbee48fcc66,2025-01-27T18:59:51.937000 CVE-2017-12234,0,0,ec4cc782c85720d13be77533daf23d2d0677643cc085c0f1a8b3cf87a32db834,2025-01-27T18:59:57.733000 -CVE-2017-12235,0,1,14196747458a234a07d2a9791b3effa320b406b3110e7c3c967267db364bb88b,2025-01-27T19:00:56.937000 +CVE-2017-12235,0,0,14196747458a234a07d2a9791b3effa320b406b3110e7c3c967267db364bb88b,2025-01-27T19:00:56.937000 CVE-2017-12236,0,0,9a77dfe72bedaac732dcba583747a3b2269964cfdfc1febd018b484e88dac90f,2024-11-21T03:09:05.913000 -CVE-2017-12237,0,1,bb69321c1b79ea86d4ec3c2996fefb0eace0b81a1e9dffc011039df755870e82,2025-01-27T19:01:05.863000 -CVE-2017-12238,0,1,16315bf1a48a780bcfc420c144f49abe4bf1808e393ede2bc2287de3e6f92e78,2025-01-27T19:01:19.677000 +CVE-2017-12237,0,0,bb69321c1b79ea86d4ec3c2996fefb0eace0b81a1e9dffc011039df755870e82,2025-01-27T19:01:05.863000 +CVE-2017-12238,0,0,16315bf1a48a780bcfc420c144f49abe4bf1808e393ede2bc2287de3e6f92e78,2025-01-27T19:01:19.677000 CVE-2017-12239,0,0,57ac99522404812a7cdc04adb43a1841ba4f521098f602cb01e910eae0c7fe17,2024-11-21T03:09:06.343000 CVE-2017-1224,0,0,cbbfb0bfc94cc05aa78e395544e25f4eaddb387bd1a2f4323093288a6374d3ef,2024-11-21T03:21:32.140000 -CVE-2017-12240,0,1,e415167c17e7d0bc854894b1b264cda66174e094542511e325887bc74a9cccd5,2025-01-27T19:02:08.620000 +CVE-2017-12240,0,0,e415167c17e7d0bc854894b1b264cda66174e094542511e325887bc74a9cccd5,2025-01-27T19:02:08.620000 CVE-2017-12243,0,0,d09c0c246a3834eab7dd825e6c909c9c41ccb83375873d028c1ec64d9658d80b,2024-11-21T03:09:06.650000 CVE-2017-12244,0,0,e93d04ff49fc6f7c8bf5222065a96f06b5afbe34e3dd5e5e4f9a52b09556cd06,2024-11-26T16:09:02.407000 CVE-2017-12245,0,0,37e8dcfe25d6b2adff2669204db1aa8988ed61ad2b40f65ac09899c176a8d782,2024-11-26T16:09:02.407000 @@ -96115,7 +96115,7 @@ CVE-2017-12315,0,0,917b10a2a2f300dfca1823914f5937ed45d55793b0ed9bd3c385de198d0ba CVE-2017-12316,0,0,f7e72cf9ee2e185d87f595e730b96995c99c3ac837d4e17185215afe59881f80,2024-11-21T03:09:17.860000 CVE-2017-12317,0,0,368c2be2fddd513807b7279fedeb18d7d3d3480d8db1da394a4c8e95b27b46bc,2024-11-21T03:09:17.973000 CVE-2017-12318,0,0,1101a00e169b61fcf656b12254b8fe688cd9723c08d64671053561e8e6403e0d,2024-11-21T03:09:18.083000 -CVE-2017-12319,0,1,ee16a9848f83814e4e296b9eaec3936fd8ffd74a478a4c2e32d627c1b495e0c2,2025-01-27T19:13:34.663000 +CVE-2017-12319,0,0,ee16a9848f83814e4e296b9eaec3936fd8ffd74a478a4c2e32d627c1b495e0c2,2025-01-27T19:13:34.663000 CVE-2017-1232,0,0,d0693b386e90319e44092bea25b1b0057a2ff8726fc9219e53ccb88aeae8bacb,2024-11-21T03:21:33.113000 CVE-2017-12320,0,0,ed1c60ff18ee251ea0f841935d0bdb1dbc74569ae0f89d502368900a180d3a91,2024-11-21T03:09:18.363000 CVE-2017-12321,0,0,1c359080e1c19304efc1f21a943ace4d550209276e24aae792cc4b55be2c53fd,2024-11-21T03:09:18.483000 @@ -104270,7 +104270,7 @@ CVE-2017-3877,0,0,89305524d6710e38e7a4cd7dc75934cba10bdb398f3ddbc12beeb5e393222d CVE-2017-3878,0,0,35f81ef6eed9528367c35d170230b4490e2647703a349cbba2941b5334c030ff,2024-11-21T03:26:17.967000 CVE-2017-3879,0,0,32c30507154b0c35b5b4bf15fb3ccf87f2899f5dc418ff754053a791b732336f,2024-11-21T03:26:18.090000 CVE-2017-3880,0,0,b07ae31f187ba3bad38a0e3ce2764014ade717432f6ee6bfc600b6d10ef22ea6,2024-11-21T03:26:18.213000 -CVE-2017-3881,0,0,7bcd4f0a41dcca1357c9be74f555f5981f73d4803de78cc3ca1dfccc3c4d4b3e,2024-11-21T03:26:18.337000 +CVE-2017-3881,0,1,1d04883765a106fe47597b5e12b50959f58a7b1470a7aafd4b69096deafb3271,2025-01-27T21:04:25.853000 CVE-2017-3882,0,0,8abb9d2cb2f093d8261f694582485bdaf5700ea2eec673d132e3a90207759c7e,2024-11-21T03:26:18.513000 CVE-2017-3883,0,0,b1dd8dfa5f00f277cfbfc21db43405dcd4e149571939b2c61983118e983a6b75,2024-11-21T03:26:18.640000 CVE-2017-3884,0,0,459a9a7f00ca7fffbd6872871a25f8e853576792bcd579cca307b937cc516f93,2024-11-21T03:26:18.793000 @@ -106739,7 +106739,7 @@ CVE-2017-6623,0,0,6d4774620fcb83c6b322f8e1d664cb13e12d0a339eeb6b0b725e009e440595 CVE-2017-6624,0,0,f76268456841d80cf0030a8d263b6d566268d518ecb486b090483ba7d246d77f,2024-11-21T03:30:09.277000 CVE-2017-6625,0,0,e0115d3c0a3799ef1ad77743639793bf6d16569e1012bfe831019e7e49a8a2df,2024-11-21T03:30:09.410000 CVE-2017-6626,0,0,ce313182f2ec6a10b02eedf83ed19ee7e3f882c7f59df5eb663ef08dbd74085e,2024-11-21T03:30:09.563000 -CVE-2017-6627,0,1,5db812f9964fce533cb2207f60b5c3fb6ffef508903e4bec902aa35a42116a3d,2025-01-27T19:38:29.867000 +CVE-2017-6627,0,0,5db812f9964fce533cb2207f60b5c3fb6ffef508903e4bec902aa35a42116a3d,2025-01-27T19:38:29.867000 CVE-2017-6628,0,0,c54cd19471d8e65cdfbe6267dba07243fc81516dffcbd7dcbd8c7d61fc998130,2024-11-21T03:30:09.880000 CVE-2017-6629,0,0,bcd1c0382e6b9f8f923c5d781e0213c3a9cb536c50a8931b0d178989ca79cca5,2024-11-21T03:30:10.017000 CVE-2017-6630,0,0,f87e0f828fd9fd70cacf59f917a04aa6ef8fcaf453f9e8fc2011b9e59f1e3afb,2024-11-21T03:30:10.177000 @@ -106774,7 +106774,7 @@ CVE-2017-6658,0,0,3b6bb6f51f6f23e010c7f750bdf0aebc00115e7b494a7d81fde94324a503fc CVE-2017-6659,0,0,284165f5fc9e75c0fc49c9392c1f7ba00a5d0ece6e8135901877dc5dcc2a24b1,2024-11-21T03:30:14.680000 CVE-2017-6661,0,0,b0765e3e921f9f41c645fb064ff99e3b90499a074632508c02b61c4726ebdf54,2024-11-21T03:30:14.820000 CVE-2017-6662,0,0,7c8f6806cf1487236ce815b75eb672d840b52393f90a63d8485cf6bdf23dbe4f,2024-11-21T03:30:14.960000 -CVE-2017-6663,0,1,4211a94686a190ff6c0ebac8dc3c75a9487178d7dbccf2705d8e7f2c81d2048e,2025-01-27T20:19:13.787000 +CVE-2017-6663,0,0,4211a94686a190ff6c0ebac8dc3c75a9487178d7dbccf2705d8e7f2c81d2048e,2025-01-27T20:19:13.787000 CVE-2017-6664,0,0,bd78c98aa9961277ccd6d8ff1a0ede709d4fb899d1e41f5778e567b9f114e04e,2024-11-21T03:30:15.293000 CVE-2017-6665,0,0,b3be70c1f6ff699e4e1edcf0fa933602c3bf00a6df840c92674d12111fbeb2df,2024-11-21T03:30:15.440000 CVE-2017-6666,0,0,3d1019e1460279981e82c23c70b1d5b2726368dc05e78c200340eeb9396d3f68,2024-11-21T03:30:15.650000 @@ -106844,15 +106844,15 @@ CVE-2017-6732,0,0,cca57bd88a78791bb8faed26a0b036f8671b523845644c168890faee49153d CVE-2017-6733,0,0,f7d6d7170aacd6eb30659e1d59ba22d21edf59406c58848c001baf7661dd75f8,2024-11-21T03:30:24.193000 CVE-2017-6734,0,0,6e8a4513dcb5dabcf217f3419c1402ae24df0d175c35fc240a33a107002c25e0,2024-11-21T03:30:24.307000 CVE-2017-6735,0,0,efd5a9da2bb9d8afe6c6d3a1c0291b40f80cc626e31f66589fb37a50e66c8ef0,2024-11-21T03:30:24.450000 -CVE-2017-6736,0,1,7fa5dda72b9965264d24fcf10ef45d17c1f4590c9666359745a69dca346798f2,2025-01-27T20:28:34.460000 -CVE-2017-6737,0,1,8b1c99ec2dcabba7950114c8f19293c2a7c5d2fbf387f4032393bd35010392d2,2025-01-27T20:28:42.827000 -CVE-2017-6738,0,1,978e95f72ab4d10b58f24f43dd0dcff8e8db00b1f57585e6de1c685f2e25dea1,2025-01-27T20:46:04.833000 -CVE-2017-6739,0,1,dfef7efba8624818425d836375071aeb14657e0ec211f15ca30a92daa47304c9,2025-01-27T20:46:11.627000 -CVE-2017-6740,0,1,4021b24d67d52ed3e45ab0c55d3a184412f8222db208e9ce4d30a2da64869cde,2025-01-27T20:46:15.127000 +CVE-2017-6736,0,0,7fa5dda72b9965264d24fcf10ef45d17c1f4590c9666359745a69dca346798f2,2025-01-27T20:28:34.460000 +CVE-2017-6737,0,0,8b1c99ec2dcabba7950114c8f19293c2a7c5d2fbf387f4032393bd35010392d2,2025-01-27T20:28:42.827000 +CVE-2017-6738,0,0,978e95f72ab4d10b58f24f43dd0dcff8e8db00b1f57585e6de1c685f2e25dea1,2025-01-27T20:46:04.833000 +CVE-2017-6739,0,0,dfef7efba8624818425d836375071aeb14657e0ec211f15ca30a92daa47304c9,2025-01-27T20:46:11.627000 +CVE-2017-6740,0,0,4021b24d67d52ed3e45ab0c55d3a184412f8222db208e9ce4d30a2da64869cde,2025-01-27T20:46:15.127000 CVE-2017-6741,0,0,4ee950b346f180cd1b6ded67583fbef0635dd2fd6e5ac7341a08f3ea36efcf31,2024-11-21T03:30:25.280000 -CVE-2017-6742,0,1,98649355f611cd19b0b18b3382b58a6c9d96db49d8e2491423d7443cd4f60e9d,2025-01-27T20:46:19.003000 -CVE-2017-6743,0,1,72dd8cdcbbf55cd05f0786f5a4da47b0b1faab2f2433fcec704f1d8c739a9372,2025-01-27T20:18:51.723000 -CVE-2017-6744,0,1,fcf1d4d334db0eddbec98638f122d1bfc4b88f66130611fe1451264bd094d49a,2025-01-27T20:19:05.400000 +CVE-2017-6742,0,0,98649355f611cd19b0b18b3382b58a6c9d96db49d8e2491423d7443cd4f60e9d,2025-01-27T20:46:19.003000 +CVE-2017-6743,0,0,72dd8cdcbbf55cd05f0786f5a4da47b0b1faab2f2433fcec704f1d8c739a9372,2025-01-27T20:18:51.723000 +CVE-2017-6744,0,0,fcf1d4d334db0eddbec98638f122d1bfc4b88f66130611fe1451264bd094d49a,2025-01-27T20:19:05.400000 CVE-2017-6745,0,0,70cd2743432f5d445bfde32d73cb1e75de596af531db3f189a288801ddb97040,2024-11-21T03:30:26.103000 CVE-2017-6746,0,0,83890a40ff162d3136a563fc4394e25d1f1670bc83055d63f2e14e2322b719e9,2024-11-21T03:30:26.230000 CVE-2017-6747,0,0,cc87fca71f09a665941311d96678411db2b2c57d1291a31e7f6904d233be28b7,2024-11-21T03:30:26.350000 @@ -109881,7 +109881,7 @@ CVE-2018-0121,0,0,eaf54fc38863dbec3c498392d510b2c76af7fe881189cddd917cfc625f081c CVE-2018-0122,0,0,9acf1646b20825207ca4c8f7c0a495c0d67d07716c4ec65da6ddc73a939d5c0c,2024-11-21T03:37:33.990000 CVE-2018-0123,0,0,bbf910f91758b09fa4f0f964700d33fccdf1cddbee43bcd532938e40b1e32004,2024-11-21T03:37:34.120000 CVE-2018-0124,0,0,74fdaf518c526527701f311afdac88d7ffc2024e5203395157af378d7cbc2f84,2024-11-21T03:37:34.243000 -CVE-2018-0125,0,1,ae761ab7e909fb984ca973a6a746d937a44ec8773a5e2a0cb077d25157d48cc2,2025-01-27T20:19:20.543000 +CVE-2018-0125,0,0,ae761ab7e909fb984ca973a6a746d937a44ec8773a5e2a0cb077d25157d48cc2,2025-01-27T20:19:20.543000 CVE-2018-0127,0,0,5cf7bc8401b039ad1fdf00b1804da9025a26fe8b35253f38c352f76f82eb5fe7,2024-11-21T03:37:34.500000 CVE-2018-0128,0,0,c4bafb0bb622e6672dddf180bd52ac8f2bfdf3e9d02b33304fb925b5406d3c05,2024-11-21T03:37:34.633000 CVE-2018-0129,0,0,f4423d5c300c3409025ac2a219ba4a273dc39cd73313af7e38a4109978c23ff6,2024-11-21T03:37:34.750000 @@ -109900,37 +109900,37 @@ CVE-2018-0143,0,0,43359daed7186d93a6d137e68f5b4f0bb1e0e668ef696e8c0c77840241ef36 CVE-2018-0144,0,0,48d7879990c0702e36fdac3e2937a02005fc24301ea0304c06e039a265478007,2024-11-21T03:37:36.217000 CVE-2018-0145,0,0,a3b8082e3cee86aed3cb5cf4fa4193628ce43e2897e18a99393b363cdd6ae473,2024-11-21T03:37:36.333000 CVE-2018-0146,0,0,f9b60df6ee3df1350cf829904e962e7939a5c165b6ad8d693ac4da640393906d,2024-11-21T03:37:36.450000 -CVE-2018-0147,0,1,abb8631b176df4de1c7e884891e75c8086440234b9d18723ae173853afdd9b11,2025-01-27T20:19:26.193000 +CVE-2018-0147,0,0,abb8631b176df4de1c7e884891e75c8086440234b9d18723ae173853afdd9b11,2025-01-27T20:19:26.193000 CVE-2018-0148,0,0,3b74b09277071b5d6eccb9d19b54d0ae94f23da1353f85149d1ade3773ea0890,2024-11-21T03:37:36.690000 CVE-2018-0149,0,0,abdc39441c3f3d5650a4a8083f0df5b025c5a317f6803b647d0a642aabb8d8b8,2024-11-21T03:37:36.807000 CVE-2018-0150,0,0,7b4619f80f31abc93e254e532b9e6d0026c40c247bfe7bd8f2dfc852aadb5a7b,2024-11-21T03:37:36.930000 -CVE-2018-0151,0,1,2908f897d2db84d8972f51ddb92ddf6141231451785fe0dd72e6992c28b1f54f,2025-01-27T20:19:34.313000 +CVE-2018-0151,0,0,2908f897d2db84d8972f51ddb92ddf6141231451785fe0dd72e6992c28b1f54f,2025-01-27T20:19:34.313000 CVE-2018-0152,0,0,ce33e07a872b78c4b94b6c3d5022a148420b9720b32d31eb0d707761bac6f1cc,2024-11-21T03:37:37.193000 CVE-2018-0153,0,0,a1c872cfa83725fd851b91d6f55104879503cefbb842761c44d061b1e425b0cc,2023-11-07T02:50:58.977000 -CVE-2018-0154,0,1,1fa50cb3245464c8f3bae5b338b39a5ee466b5c1fbc68787d0aa6a19e2312a4d,2025-01-27T20:09:29.490000 -CVE-2018-0155,0,1,1bae71b15bd8bb1b3d816d1ef51423cc39756842851d2762d41cac9ff8991e9f,2025-01-27T20:10:19.450000 -CVE-2018-0156,0,1,5e0358ac102c537c554200c95cb20465bfe7cb1d68746e63e3021093ace6e38d,2025-01-27T20:10:26.267000 +CVE-2018-0154,0,0,1fa50cb3245464c8f3bae5b338b39a5ee466b5c1fbc68787d0aa6a19e2312a4d,2025-01-27T20:09:29.490000 +CVE-2018-0155,0,0,1bae71b15bd8bb1b3d816d1ef51423cc39756842851d2762d41cac9ff8991e9f,2025-01-27T20:10:19.450000 +CVE-2018-0156,0,0,5e0358ac102c537c554200c95cb20465bfe7cb1d68746e63e3021093ace6e38d,2025-01-27T20:10:26.267000 CVE-2018-0157,0,0,6043788694ddff654c19c1fbd5846c1bec8223107276c85bea03fa93db7af8b8,2024-11-21T03:37:37.793000 -CVE-2018-0158,0,1,72bf9d2667e0ebd22dae88aabe8a88449d147b4e6aa8a9000f61d773471679fa,2025-01-27T20:16:35.513000 -CVE-2018-0159,0,1,49e123f5a4e865f517e4427f282a367eb0d470b5be687d4842b5b37a710faf37,2025-01-27T20:17:00.713000 +CVE-2018-0158,0,0,72bf9d2667e0ebd22dae88aabe8a88449d147b4e6aa8a9000f61d773471679fa,2025-01-27T20:16:35.513000 +CVE-2018-0159,0,0,49e123f5a4e865f517e4427f282a367eb0d470b5be687d4842b5b37a710faf37,2025-01-27T20:17:00.713000 CVE-2018-0160,0,0,99ae8123edbc5ba56c37f156fe106f8ef464fab5cf760983779880e3a391b664,2024-11-21T03:37:38.200000 -CVE-2018-0161,0,1,eb003951ea66862023b5aa513d5f5d81aeb9246a257e6d97b48b264781b3606d,2025-01-27T20:17:38.187000 +CVE-2018-0161,0,0,eb003951ea66862023b5aa513d5f5d81aeb9246a257e6d97b48b264781b3606d,2025-01-27T20:17:38.187000 CVE-2018-0163,0,0,e103e6c2b87fa4abdfb8ef2bcf784bbbc059c22b1ef4bc725759ac41c4e6769b,2024-11-21T03:37:38.443000 CVE-2018-0164,0,0,a420667342fd78e4c46a705df245604ca3287432b79a5984b21129ae806aa406,2024-11-21T03:37:38.590000 CVE-2018-0165,0,0,51bbee1bdfee70e60032c23a83778d72d509bb892cfd424f481d82ac992c57b3,2024-11-21T03:37:38.727000 -CVE-2018-0167,0,1,48a1e3688f0ef373ef552379c4cd0db8c9a71d8b644556fbc48601ce777e704e,2025-01-27T19:58:42.990000 +CVE-2018-0167,0,0,48a1e3688f0ef373ef552379c4cd0db8c9a71d8b644556fbc48601ce777e704e,2025-01-27T19:58:42.990000 CVE-2018-0169,0,0,08d2783e6ae1a541bdfba78455fef87c319a2483558043e0d0396799ee2a94c7,2024-11-21T03:37:39.020000 CVE-2018-0170,0,0,b3a5c634803b50ba9c7181cd86ac33cdae26759d72cc6ae21a09f922ad5e30c7,2024-11-21T03:37:39.147000 -CVE-2018-0171,0,1,9adaaa56430123d6406f7e37d2a8632e36e59a607b4314140ea899bb87b5b642,2025-01-27T19:58:56.117000 -CVE-2018-0172,0,1,f94b6487903e05716d766f334527baf99ffb8fb60cc0224f82e66e5148bcb10b,2025-01-27T20:01:56.580000 -CVE-2018-0173,0,1,e7c62c21b16ea70e03789a1781f97fd9f6a6fbd92380202e535bf53c44e29539,2025-01-27T20:08:20.023000 -CVE-2018-0174,0,1,a68d91e55a26eec25d0daaec38e84379c3deab795ff8337d9ccfc37242c4215b,2025-01-27T20:08:25.223000 -CVE-2018-0175,0,1,4368710c70fd4273b9f5220390040dcb940b4e2e82a71a2ab1e75736554b78f8,2025-01-27T20:08:39.663000 +CVE-2018-0171,0,0,9adaaa56430123d6406f7e37d2a8632e36e59a607b4314140ea899bb87b5b642,2025-01-27T19:58:56.117000 +CVE-2018-0172,0,0,f94b6487903e05716d766f334527baf99ffb8fb60cc0224f82e66e5148bcb10b,2025-01-27T20:01:56.580000 +CVE-2018-0173,0,0,e7c62c21b16ea70e03789a1781f97fd9f6a6fbd92380202e535bf53c44e29539,2025-01-27T20:08:20.023000 +CVE-2018-0174,0,0,a68d91e55a26eec25d0daaec38e84379c3deab795ff8337d9ccfc37242c4215b,2025-01-27T20:08:25.223000 +CVE-2018-0175,0,0,4368710c70fd4273b9f5220390040dcb940b4e2e82a71a2ab1e75736554b78f8,2025-01-27T20:08:39.663000 CVE-2018-0176,0,0,e35f372f5047f48fdc4958b0a23854b1f9428725ec877eca4d6db44b477a3ef5,2024-11-21T03:37:40.057000 CVE-2018-0177,0,0,9678706b1907ae4166539e0f63dac962c46ec823135aaf961df10aee97387a2b,2024-11-21T03:37:40.253000 CVE-2018-0178,0,0,7febd2620d0370a774daad19a4841f98a039ae75fef79ea3185246306ea2ac9b,2023-11-07T02:50:59.347000 -CVE-2018-0179,0,0,cdc9625b205424396cfa17b5e000074666288f01a2f4ec6c37801c606c02cd6d,2024-11-21T03:37:40.420000 -CVE-2018-0180,0,0,bdb0037bf64da41b4213042c698f2f9e9e255b3fa4355ecb3f79013475b769e0,2024-11-21T03:37:40.587000 +CVE-2018-0179,0,1,25cab5ff712dc35471abcc681f70c594b14b0b879883fa529dd99d1e84a00725,2025-01-27T21:04:36.627000 +CVE-2018-0180,0,1,0d04541bac917ac1347b3991523249e2cb51d3f8f12722323a48eed6663af08e,2025-01-27T21:16:17.263000 CVE-2018-0181,0,0,ba177ad2b3339e2eb8ba6a24b139c705d517149a15a501d06ae8ea14ca138944,2024-11-21T03:37:40.750000 CVE-2018-0182,0,0,649d918baa7dfdf88adaf6fe95a9acaa78511114571ade6a3717856e8819a6b0,2024-11-21T03:37:40.887000 CVE-2018-0183,0,0,d8d0388fc48221b82119d1f3bc3125d49a164d739507796034c915a283f65161,2024-11-21T03:37:41.013000 @@ -110043,7 +110043,7 @@ CVE-2018-0292,0,0,b573ef2bdc95066740dbe5b35a7c3c3a8bc7204dcce1d913287168bf357ab3 CVE-2018-0293,0,0,9164a94794213bd5512db8f31b76b177c5851472d8857b9e820a100235232a11,2024-11-21T03:37:54.813000 CVE-2018-0294,0,0,959dc5b4e2bafac41a274d79a3537733c9d2333bf785c36bcd835cac9941b89a,2024-11-21T03:37:54.957000 CVE-2018-0295,0,0,9c2e4161666ad89907c584bb9af3e5be9c0666b2a249d229d3c6ad48cc290c18,2024-11-21T03:37:55.090000 -CVE-2018-0296,0,0,65913c5ce33e5e7f9abe168f0cbefe320888a1f29912d60f49623f9f056d4359,2024-11-21T03:37:55.227000 +CVE-2018-0296,0,1,d1b3a0d4d34c3093e183c43cc92776c906af2cb86d761638279c432d78c2fe7d,2025-01-27T21:31:23.687000 CVE-2018-0297,0,0,27fc04ec1b3ecefca749321cda70cb00ff72277b53a25976ed0da4fe6994396b,2024-11-21T03:37:55.373000 CVE-2018-0298,0,0,0f09cdc9c4d7b4d1890159012a11110600e39df4edcc6398110dd4fcdaefa73c,2024-11-21T03:37:55.500000 CVE-2018-0299,0,0,b1bbea1ef46b3bc96f0f5e61907fea629fa0f3ae387be21b5a9ee6ca6f8f34a0,2024-11-21T03:37:55.623000 @@ -113677,7 +113677,7 @@ CVE-2018-12714,0,0,cd141d2a9f0273e56f060fcfb102f351a2535700f7285c5bc15d99c2e921f CVE-2018-12715,0,0,4a016da125727b8b320f728925710949dc1f6ca4e77f90d32323d87afafe6360,2024-11-21T03:45:43.737000 CVE-2018-12716,0,0,c92b19a2a7af2b6000d3d1df0dd87dc2007e3384b12bafa396aa189cd6d345a3,2024-11-21T03:45:43.903000 CVE-2018-1272,0,0,acf734948d51dd0c4f8935027315e7f2d7df3a2f2bd2a8aa7532b922cc87c2c7,2024-11-21T03:59:30.877000 -CVE-2018-1273,0,0,6a546022835d7df3cd5c5f28df24a2df4b781c802bd1585dc5f67e57af1e2d83,2024-11-21T03:59:31.063000 +CVE-2018-1273,0,1,72872219e5517d40b73a0a220fc8911386655f6d4bb9267b24c17276944aab2b,2025-01-27T21:27:34.937000 CVE-2018-12735,0,0,2a3d0e665591df32512c2617ad1c8efd167fa2b0025484042cab54eba97a59ea,2024-11-21T03:45:44.063000 CVE-2018-12739,0,0,c1531ae8bd165da7d9ae46c00e0eb52bb5622035b7d56dea0e848858185075dc,2024-11-21T03:45:44.203000 CVE-2018-1274,0,0,cf4f68c22bb3a6d88114bf5373ddce7b468dcc524302af25e2b832fdd1f8e746,2024-11-21T03:59:31.210000 @@ -114248,16 +114248,16 @@ CVE-2018-13367,0,0,da02452c390eab7e131ef190aa5f713288a3193bc72eb430bb1ea9e26e65e CVE-2018-13368,0,0,599991ccb96169914173ed521b91e3ff1853fd7bcacba691a6fa415f74184071,2024-11-21T03:46:58.447000 CVE-2018-1337,0,0,1a0c3762cb8cdc0258e66242893bf4bce9057b6f39a834e8870a30e1929a5e03,2024-11-21T03:59:39.153000 CVE-2018-13371,0,0,5798eaf81545d8fdefce2386a42bc8fdbb95a24cc366cc1dc2390885bc44de45,2024-11-21T03:46:58.567000 -CVE-2018-13374,0,0,0410296e88866295286064bdccc9f426322c1d0ef67bf951d82dfa5a9203f996,2024-11-21T03:46:58.687000 +CVE-2018-13374,0,1,0940d184747d9ef392d26f4aec86e284c7806a6d5654687ae5550b381a656d83,2025-01-27T21:30:51.357000 CVE-2018-13375,0,0,39f632d5afe292b7c4cfecca2235512baa287a0de944201f6697da19c0250ef1,2024-11-21T03:46:58.900000 CVE-2018-13376,0,0,67c03a4233fc20590a9daae50f9718a6c701b59b7b214c82c4446827307d36da,2024-11-21T03:46:59.020000 CVE-2018-13378,0,0,a2f6f6c79fa10d82b1d19940324e6ed7cec755e578dde59b5460620af8a6bbf6,2024-11-21T03:46:59.137000 -CVE-2018-13379,0,0,a1c456ac2d9fd5666b46a0f5150e7e8af61c831f4ade34ba82f6a1bf575166d7,2024-11-21T03:46:59.250000 +CVE-2018-13379,0,1,7cc80d22730db6eb61ad969e860620f9d60e663c6f4e019c44c005f7715217bf,2025-01-27T21:30:45.517000 CVE-2018-1338,0,0,834b2bc6267c275ca8915b0462fc62bc44bca250b3ddc4144ce5c5bca07da53f,2024-11-21T03:59:39.283000 CVE-2018-13380,0,0,f2a05655b527e91f688c04dcfa5c0f702d33cebefa6beb95d6d3216c7962235b,2024-11-21T03:46:59.383000 CVE-2018-13381,0,0,9078054143be03fe17cea43bcc2db84e57915ac373e4bd60eb0f44147927964d,2024-11-21T03:46:59.530000 -CVE-2018-13382,0,0,2b03a89e67b642628bfa2d9627fc82832507da1a93ecf746472b8e504ca4608a,2024-11-21T03:46:59.660000 -CVE-2018-13383,0,0,a3a943fabc24e9fd8edefdeb6eefba634f0909ddcf301f72c68757f36ee5ad5d,2024-11-21T03:46:59.807000 +CVE-2018-13382,0,1,3ea07ad714b4d0c081c9883565bb39bbbbfd9da90afd7cf9e2a3715d71c4ffc8,2025-01-27T21:30:41.457000 +CVE-2018-13383,0,1,486c0c5a2ed49708e1f219e3bca841e356762ef583871664753e2f0f3c63e25f,2025-01-27T21:30:37.930000 CVE-2018-13384,0,0,46275e730029a6ea8cee6c09ebf0f75c186ad7792df7ec4f2f419ab587b098ae,2024-11-21T03:46:59.950000 CVE-2018-13385,0,0,accd721cc22be15b35ce306f59e5ee54ddb357dfc13fae8f5fd5d284404413d6,2024-11-21T03:47:00.070000 CVE-2018-13386,0,0,5866aca09a2c5ab6d8b586d939abcde6f7d1a2f2a1680a450e78d22ec297accb,2024-11-21T03:47:00.193000 @@ -115357,7 +115357,7 @@ CVE-2018-14663,0,0,3b13ce69e552d1e341f0a6135f1c1da2b9ca7d062ad152ef1d59ce5a2088c CVE-2018-14664,0,0,d39730f8033a2ee7a627fba81a3b8019307724436543d9d2cb40d88008e52fab,2024-11-21T03:49:32.650000 CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000 CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000 -CVE-2018-14667,0,0,0c747d51af09f59a0adf61c9d5c6cd79bcb80b0c69fba4f92a0c96e0ea2e4034,2024-11-21T03:49:33.110000 +CVE-2018-14667,0,1,18c36a55cb980d64c9740e6163f509c46ab1d042f2ae71d44b133966d6b42286,2025-01-27T21:56:01.393000 CVE-2018-14668,0,0,b1224362594016e9bbdbb4731219426a0c57ec4849dc9b392662fa54f08dadf0,2024-11-21T03:49:33.270000 CVE-2018-14669,0,0,4fba42e06892797b986b766bd6423f896c6635396fd8c7891f00085665e52e9e,2024-11-21T03:49:33.407000 CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000 @@ -117676,7 +117676,7 @@ CVE-2018-17459,0,0,01667fcf40f4afd58354e38c26130af139dcd0605eb3148ed6ff5b403fe9c CVE-2018-17460,0,0,101fb371c6a177f13942684b9b8431c334fa9b769774866138f9caaa7f94fff3,2024-11-21T03:54:28.183000 CVE-2018-17461,0,0,08e94a9f8b2c0e111cba3b1e993843050bfee9e16729fcee062cac3c222c1ef0,2024-11-21T03:54:28.300000 CVE-2018-17462,0,0,0f38ee64ade5675c8c7659e22612dee11f0c46a14e4775d4e46cf17fd01feff6,2024-11-21T03:54:28.417000 -CVE-2018-17463,0,0,b440d1647a3507833d9247458ad6dd32d6172f0530e606f21cdbe0ae9c131ca6,2024-11-21T03:54:28.550000 +CVE-2018-17463,0,1,34065d7175ff87d1721e12f3472a917d6ebe8288f7d2f5a19e1390c91828e9b5,2025-01-27T21:56:05.117000 CVE-2018-17464,0,0,c548efa1995e58d97e68bdebda14642d2421e787b72731d7c363a5950c5dfebc,2024-11-21T03:54:28.703000 CVE-2018-17465,0,0,61bf7c13a28fb91b007e833a8b545f7c7406cab9cef3d683611550623b865d06,2024-11-21T03:54:28.840000 CVE-2018-17466,0,0,2deb66fce5ef461e44fedc1d7c2744ce380a5a1a5eea9b876e97a1c96a3fd0ca,2024-11-21T03:54:28.967000 @@ -117694,7 +117694,7 @@ CVE-2018-17476,0,0,b82e2586d31ff96e7ed50d9b32856cbcf064f3fc9c20e2d0340fb82cfd8cb CVE-2018-17477,0,0,62c76d413d0f58ae5f5b2bee9a0114cda8658fe7ab93ec9845c2b5dba5ee3fa3,2024-11-21T03:54:30.373000 CVE-2018-17478,0,0,57f313c3ffbf31c83ffe86b2f8a6c7aae3a147584a1a7cad9f105ca5e1111d8d,2024-11-21T03:54:30.493000 CVE-2018-17479,0,0,c76681d8118fafc2babcee23dcfa90a9c1484876a611e662828819ad714ffe25,2024-11-21T03:54:30.610000 -CVE-2018-17480,0,0,bb42631b9156fdab49a5eea3ad70e339b1481e22337fdc1dbc6f21bd8f8a77a9,2024-11-21T03:54:30.727000 +CVE-2018-17480,0,1,f87afbfccd159bf4dcccac9b60cad3183a09af4d4421c53c1850d208a9c027fd,2025-01-27T21:54:14.727000 CVE-2018-17481,0,0,9741e539125e44a47705c78676f45007a9687377dca966576cd1dbdcb1fc73bc,2024-11-21T03:54:30.877000 CVE-2018-17482,0,0,499d51e536f5d530705788d87899b5e2e8ba06842bd8f6d2e456e0c8448fa49f,2024-11-21T03:54:31.010000 CVE-2018-17483,0,0,a70a6e7d0433cb2df7f68c5a06051d6c4e07fa9f804e81f0166a2b0eb1829002,2024-11-21T03:54:31.133000 @@ -118741,7 +118741,7 @@ CVE-2018-18805,0,0,2db81a01612ed9e3856f356a3c3acc08d34cd7fc3cde4b581bcd34fbfedf1 CVE-2018-18806,0,0,73874c1f55650c40c9168d198e4836e0f63cefb447851013592ce8a915a8755a,2024-11-21T03:56:39.300000 CVE-2018-18807,0,0,b1989c9fe62e7e09dd964f1d78e89e460ce9aeabc99e266ef78548b2dd93bbfc,2024-11-21T03:56:39.450000 CVE-2018-18808,0,0,448721dd4dd376be6c2c2ac2714db93123c38306ceb5b77980ed8091dea0390c,2024-11-21T03:56:39.583000 -CVE-2018-18809,0,0,139f5f471c0597fca7109ddc1f62ed4ce5a7082ceea16430e3ff08dbad3b02d4,2024-11-21T03:56:39.727000 +CVE-2018-18809,0,1,77ecab68100262ebd1352477d9794ab2d37d291441732c0a268fcfbe1f251bcf,2025-01-27T21:54:23.987000 CVE-2018-18810,0,0,dbacb0866951533402200f938befb045e87532480da01c1259ecd77a7e5bf78e,2024-11-21T03:56:39.890000 CVE-2018-18811,0,0,5432be0ac9513880419f866c84d31f792d10091b9b65e0385e612badf8a3a45e,2023-11-07T02:55:22.050000 CVE-2018-18812,0,0,65337f9ba540463ab0da5797a8618af9d81acece865b0cad227cb9e09724139e,2024-11-21T03:56:40.053000 @@ -119987,7 +119987,7 @@ CVE-2018-20247,0,0,1aa9f73e868d5b4182c2523c233a326dbecd7d167ce294be4707146c94d51 CVE-2018-20248,0,0,f7f470a33e49c7d8a830f2f6f780416a9da9e949f404da2c889d116426d9918c,2024-11-21T04:01:09.903000 CVE-2018-20249,0,0,f21f8dfc9ae09288fe76bfdd5984670d27a6285ef8d0858c5bcda32f2a576cc0,2024-11-21T04:01:10.033000 CVE-2018-2025,0,0,1e2822877d7f64481dc14a7a7dda6c0ceba3e09659de889e577a3bb3b9bf6bca,2024-11-21T04:03:36.230000 -CVE-2018-20250,0,0,6d1454ba7b4c15e2c07ecf5c4c9a638c2d62f0115528af52a65a12446e6bc4a4,2024-11-21T04:01:10.173000 +CVE-2018-20250,0,1,e5ffecec97528812bf3f504a996bfdf9cecb364d03d0f2fae0a035abc2fc26c5,2025-01-27T21:54:18.093000 CVE-2018-20251,0,0,fa48c85f9a766b854bdaae5980a1ced0c613a22842cce70ca106ab155c903eaf,2024-11-21T04:01:10.330000 CVE-2018-20252,0,0,bf31c40ead6518c6af4a8457a5839fbc23e0c55686b6c90f69d7a1b566097aae,2024-11-21T04:01:10.453000 CVE-2018-20253,0,0,d32db67480bee21b73d266099074610d87d7d7daddc004dbe18dda1d413248c9,2024-11-21T04:01:10.580000 @@ -121503,7 +121503,7 @@ CVE-2018-2624,0,0,0bad5cf3579d8c8dc2e67322de6e75a5bb2cb8677da7b17bd8d912013721b2 CVE-2018-2625,0,0,b529c5259606b8f293e5f00cd0e86a25635c5986ab6b7337de022a76ea2f2f29,2024-11-21T04:04:04.653000 CVE-2018-2626,0,0,90846e77ccffafb8b7ee748b9089e8268e27e6bbe4091dee3dc1b2d17cc0c48e,2024-11-21T04:04:04.780000 CVE-2018-2627,0,0,233b58cb61a9f4583c9f9fc21b9dbb655e5b82b1cf57769e010859a2e7eda59e,2024-11-21T04:04:04.910000 -CVE-2018-2628,0,0,40efa0c04120f20564f25b42916dd7904a068a029c0b9f8877883878fa07e47d,2024-11-21T04:04:05.160000 +CVE-2018-2628,0,1,f28aa30ee48512529d8c0320bf047af0d156f3bb5d9c0403db19ee78a57ea46e,2025-01-27T21:55:49.377000 CVE-2018-2629,0,0,0f67ff2b80904d9e581c846cda0ab6c3ec976c073885b224f9486a6f199270e6,2024-11-21T04:04:05.390000 CVE-2018-2630,0,0,cc428b44ca6f5724dedc36f1c0ba9840affedb7197e122b085691a87c3955789,2024-11-21T04:04:05.560000 CVE-2018-2631,0,0,6c7e93390ee00519f947b38ac488aa2e47ae9b1ad9bb2014f639fd4bce706075,2024-11-21T04:04:05.697000 @@ -123932,7 +123932,7 @@ CVE-2018-5426,0,0,5c86f78c95d64d99ee13bc0eb04558a03181c21ae0ccd76d03a3e95e1f4840 CVE-2018-5427,0,0,eff3de2d29d9c27066ecf833c6aea084dc430b5f16c6fe51710c41318079d04c,2023-11-07T02:58:46.400000 CVE-2018-5428,0,0,4eb683e6a458eebbda39355ee8a6fb9e9587aab9cdea4049bc3104b1e4ceab91,2024-11-21T04:08:46.903000 CVE-2018-5429,0,0,1e246edbac1f486e528309fddf4b0247ed6dbdfb97630f02a8bd73f4e12b5260,2024-11-21T04:08:47.023000 -CVE-2018-5430,0,0,d1c45f8051aef085d6069d97d50266cbc1fc2e7517f100ffa5915cd63e42275e,2024-11-21T04:08:47.187000 +CVE-2018-5430,0,1,b1cfae1bd3411237a36ed49b9953796196b34544ecb5b614804f429c6c270096,2025-01-27T21:55:46.050000 CVE-2018-5431,0,0,8cb99d2762d255d097c5085085f866ae2cd363570ee5478f727325bb38f8f36d,2024-11-21T04:08:47.320000 CVE-2018-5432,0,0,6622b09a3493c525f62a4518e9a638198e465f706e141a41e8920aa672f76d11,2024-11-21T04:08:47.450000 CVE-2018-5433,0,0,dbe836c4b4af21ebb7dfbee3c3186cca4bd884900129667d6bbeacfe8fb5a327,2024-11-21T04:08:47.570000 @@ -124423,7 +124423,7 @@ CVE-2018-6061,0,0,2d43e310d9cb4c04f837626c227d605f15283eeda2a2a0ce40da7a7a941dc5 CVE-2018-6062,0,0,9b244e273723ea987a1b0cf9396b13addc0abbe5b29d4be46cae516c01fff65e,2024-11-21T04:09:59.043000 CVE-2018-6063,0,0,65836325c5988636894a478f4bec5898abd92107eaf8f399c71d6a42d699e1e8,2024-11-21T04:09:59.163000 CVE-2018-6064,0,0,c91f752d811e2b1c719ce568c69e993886ee660bf0bb285e784c68667a46ca8b,2024-11-21T04:09:59.297000 -CVE-2018-6065,0,0,7fe5d12253f5ba06e95dcbe06d0b17a7c662b27a3b0901d3cf9bde4d428b0d6a,2024-11-21T04:09:59.423000 +CVE-2018-6065,0,1,b7e8ef8f9ce86d740ca1d75d7d6d95fd49d559793163ee5fdb6f559aa384acfa,2025-01-27T21:54:09.917000 CVE-2018-6066,0,0,ff301b7645cdb8bc19c94296c88dd15016d902c957a6d39827e9922202ec877d,2024-11-21T04:09:59.560000 CVE-2018-6067,0,0,db9787d1c8c53cbf1a7b1a53204c39a5f848ab1f33d57ceef18d09d871d60077,2024-11-21T04:09:59.680000 CVE-2018-6068,0,0,f4c5582f347f0de6353f004bcdd64689471fac4fdbd510b68fd890f77dbcc402,2024-11-21T04:09:59.813000 @@ -125088,7 +125088,7 @@ CVE-2018-6957,0,0,f8ef43e0ab44cd9a14ef94c4bf28b549e2549864125d99232c5ed00240a81e CVE-2018-6958,0,0,5058115ce9c91397d4a976d0ea7a9bde5c7b101b9c6933e5339ccc74ad9781ec,2024-11-21T04:11:28.967000 CVE-2018-6959,0,0,2fababa30e235648e63ff7e79db99507b7a3d1f3b1656b7f39a1efebe678e214,2024-11-21T04:11:29.077000 CVE-2018-6960,0,0,33c162acc4b1bed97886ac651edef2e0087336cc559b952caaea18585560ad25,2024-11-21T04:11:29.180000 -CVE-2018-6961,0,0,fde5d372cdb2087e642eb015240a9ba37b447b219fc4e4f663b13b7caadb87de,2024-11-21T04:11:29.293000 +CVE-2018-6961,0,1,933ddea86dc3a7b7f70584e84fc67056656f13213838987a34a4594780c37f0a,2025-01-27T21:55:57.763000 CVE-2018-6962,0,0,e2d66a14bc85c71a8afa4e0ad442df178fb31c9b106ccf4a037fdf4334ebd7a2,2024-11-21T04:11:29.413000 CVE-2018-6963,0,0,2f6e7504c38564122d43d832765c2a860c200abd390ca1dfe1607704fb0f596f,2024-11-21T04:11:29.537000 CVE-2018-6964,0,0,e4aae838a8dad98ed0585bb3ce05202cc701c4593b5faf5f3f99df3f566dcf99,2024-11-21T04:11:29.643000 @@ -125589,8 +125589,8 @@ CVE-2018-7587,0,0,65de8a533f00aac33af41e5a397719e1b6de1ea8f52a209c0a7d2f108f4c48 CVE-2018-7588,0,0,b390cd43115c9252d0414ec4cb22bc684aa30a50381d52885a73c66140733938,2024-11-21T04:12:25.473000 CVE-2018-7589,0,0,1eaa016bf4f23cbe26a95663d6fd069bcdab777d3601a8a526d85c7e13ebcd10,2024-11-21T04:12:25.620000 CVE-2018-7590,0,0,87f2e7a5a4f36886dc8e443efb322587ad117e6a420422d1d16f90cf4078da00,2024-11-21T04:12:25.750000 -CVE-2018-7600,0,0,ee23506f12835025bbc56cb5b634f79cbc6c39fb2eff68facd0aa0ecf2045e08,2024-11-21T04:12:25.880000 -CVE-2018-7602,0,0,178db653e60017499ed2bcc3d29ccde1173bb888d654630c32ed338b33171ed3,2024-11-21T04:12:26.023000 +CVE-2018-7600,0,1,e75fb45bf0e402dabea62bef4ff95cb2aaf0bc1a0e4b5be717d66ace0b44938d,2025-01-27T21:25:54.487000 +CVE-2018-7602,0,1,7887725da01cff0aba59eed679c8621285ff47083b9a2302c6d71d69d068cac5,2025-01-27T21:31:30.510000 CVE-2018-7603,0,0,f8f72c2910a98a6c3a28400485620f1ef3fe9a970329cf7b536630a8936b2dd9,2024-11-21T04:12:26.150000 CVE-2018-7631,0,0,e212ef8a0681fb691d7c4f99741ce57ca581e6d8db598df3560b23819da494c2,2024-11-21T04:12:26.253000 CVE-2018-7632,0,0,9bbfda3b4277b47535b07a9289cb5eefd273afc98b5388cef9a20ac243751294,2024-11-21T04:12:26.387000 @@ -125776,7 +125776,7 @@ CVE-2018-7837,0,0,ffad73203c6130b5acdfc40d107384215dbb8b25c8751613d632919e9c1cbc CVE-2018-7838,0,0,3225e1833cdfed2d1995884d8af16d3c9fc9a453fc66a5c9a2abb83c3b3a9e68,2024-11-21T04:12:51.240000 CVE-2018-7839,0,0,8bf10ec39b509fb3dac2ed212ec90df38bc0825a726088a4185c3cec75f9cb0b,2024-11-21T04:12:51.377000 CVE-2018-7840,0,0,d0f9ecd9980c937719a6e2adc5f16efcfa040e7aa577be012037a3aaf2da4dbc,2024-11-21T04:12:51.487000 -CVE-2018-7841,0,0,2ef1d3395e8fe566e146b329044e5438f70248d28fcefe1ff225c6d36825c2a3,2024-11-21T04:12:51.587000 +CVE-2018-7841,0,1,9d5e5c9e4b108eccc4422af883644e6cce93e9984336ac1b7f0a21cd0b3097e5,2025-01-27T21:44:08.170000 CVE-2018-7842,0,0,a4fa053504795e2b7465d7226d30935fd1797f1ae30fabd9b69a097135fb684f,2024-11-21T04:12:51.697000 CVE-2018-7843,0,0,cd06c23a0db25479fda182631f95ec584adb2fcd8a98820eac1152dc16a5473c,2024-11-21T04:12:51.810000 CVE-2018-7844,0,0,5b8905f4a610d68367ac80d96f33373b32cf1b39e86b07fafb58e8bab3835500,2024-11-21T04:12:51.913000 @@ -127554,7 +127554,7 @@ CVE-2019-0338,0,0,365b99f658f18ccf1e63ef15dd961bd32f61be27341cd7fdb456c797ee3d00 CVE-2019-0340,0,0,cfb5bc87a25a756a9c2983640cf39db12eff139c2c7381ff362b3ce054a52a93,2024-11-21T04:16:42.640000 CVE-2019-0341,0,0,99ff18be6dc0a87a23abb4049efed6c596ae60298c3a6f5d30154aa1ee774e72,2024-11-21T04:16:42.753000 CVE-2019-0343,0,0,46444930507b2e98779edd9715d1dd6e0bca7fcd1d98d5d093d546330de1c42b,2024-11-21T04:16:42.873000 -CVE-2019-0344,0,0,c751046d42f51b93387925cc012d3b471e2b2f3e560b2e45237775328040d1ac,2024-11-21T04:16:42.990000 +CVE-2019-0344,0,1,ef0f1e5b997843dcd4fc2afd138d8f62708e2022b6881cddd650e0834b95b3f6,2025-01-27T21:44:13.570000 CVE-2019-0345,0,0,d0e861193ccfa8235c6f7e29abc062586658004be1b78cb86b4a2745ab15d8e2,2024-11-21T04:16:43.190000 CVE-2019-0346,0,0,9eae8e4c7678ba98fe244e0490089b377c686613d0d5fb8d6730be5206a77c1e,2024-11-21T04:16:43.307000 CVE-2019-0348,0,0,511916c8d4ad36e69748a7d3ffd9be7a03b59eab838bf1c4a3180c3d76da8875,2024-11-21T04:16:43.420000 @@ -127772,7 +127772,7 @@ CVE-2019-0704,0,0,6eb0e97661a92aacffa526f241faf955d24dde8cb8f750ef9bc345c97757fa CVE-2019-0705,0,0,b641d29fa3ee6e51add602d57290db31e1158c4df07cf80f62876394e7c764e4,2023-11-07T03:01:59.500000 CVE-2019-0706,0,0,989359194e9c4b740182fb426d52576c77ae6a8834be180f4f4876ea6fec9bb3,2023-11-07T03:01:59.717000 CVE-2019-0707,0,0,a4d44730a23b821ef3bc2eb865da8f5fb90e6f28888dcafc6c1508f81b1fecb3,2024-11-21T04:17:08.370000 -CVE-2019-0708,0,0,37234b6d5c494af0e675017fc90f573b90c97001f80796223714faab330b71b7,2024-11-21T04:17:08.487000 +CVE-2019-0708,0,1,0cd8c1add7ecd1de1d0033a147d9e054a5d794ee3411ff8502d4e30341a91cbd,2025-01-27T21:54:40.617000 CVE-2019-0709,0,0,833cc84683f891a5f07117c7f6237587eb6255f65d3967bbcf710df766321403,2024-11-21T04:17:08.680000 CVE-2019-0710,0,0,38db405941bcf4db02c4b084bbf2d881eb7d0757a5b2e6b98ff9b6921a80ed5a,2024-11-21T04:17:08.787000 CVE-2019-0711,0,0,e06f51f9abc514a26cea00013da3f4715f377b2a809b32e5c6f6ae97ba953e8f,2024-11-21T04:17:08.900000 @@ -127872,7 +127872,7 @@ CVE-2019-0804,0,0,5feeb7b73a8234d96b11bd96a457253d4093c1ac883ba47dde91a1af9fff22 CVE-2019-0805,0,0,14f16fdebed423439e9f4a34eb333849b816135d64745fcc6ebf561545b36c08,2024-11-21T04:17:18.780000 CVE-2019-0806,0,0,bb268c3e5fc396e56be6f50af2eb5bcb8fe7b694edbea1237582a2e63e85d1cf,2024-11-21T04:17:18.900000 CVE-2019-0807,0,0,7f61e8cf377df686f7c9e89aea30597f1635e4599e3a6dd7674d0ddcbf1ea9bf,2023-11-07T03:02:04.083000 -CVE-2019-0808,0,0,8f7dc33139792675a5c8758ca9db640deed4807b04f91098d2da4944cf7d95db,2024-11-21T04:17:19.013000 +CVE-2019-0808,0,1,acaf0a15c38cb568bf7cd8011ce6e7c670b19d2489931737e792a7ab3153145f,2025-01-27T21:54:35.293000 CVE-2019-0809,0,0,6f8be398fcbb862afec9ba85c5e4df55888f8fbb203f38cbafd7471152d6fde4,2024-11-21T04:17:19.127000 CVE-2019-0810,0,0,55e076ed465127552fac6a6a13468431a7cd9c6c696c3ba1bac451d4b299c4f4,2024-11-21T04:17:19.223000 CVE-2019-0811,0,0,dee8e97db7166d722247017238b13ce185c414e6f52a1638d2f83b7dfa2fbe48,2024-11-21T04:17:19.340000 @@ -128151,7 +128151,7 @@ CVE-2019-1003025,0,0,9af42893769b7fc06499fcc1553335da2ed9c5949155c884cbfc8509bc1 CVE-2019-1003026,0,0,8926b54c91d67008cbe059a9263a943e0ddb50ec72a565a1e25d2ea17035ca1d,2024-11-21T04:17:45.863000 CVE-2019-1003027,0,0,56f161009556c27505aec3dea316a43730f99659e895f1e3bd5a5f2f8aba6713,2024-11-21T04:17:45.977000 CVE-2019-1003028,0,0,d92a32bceca5f379cfee172d48634f5adb98c1a57b20664042f547930ce377e2,2024-11-21T04:17:46.087000 -CVE-2019-1003029,0,0,950dad9ee71126a7eb2a0fcae02a5f61489431e7618233f58bf0849156efe268,2024-11-21T04:17:46.197000 +CVE-2019-1003029,0,1,472141f43ec4aee0cd574e48712b42b06eac49abb6d5203ea51244f4406f25e1,2025-01-27T21:54:29.273000 CVE-2019-1003030,0,0,a91cfeea6e2888a021abbd9844cee968fd07290a7c14e20e4e95b6604df02604,2024-11-21T04:17:46.357000 CVE-2019-1003031,0,0,f5c1957a31b1c62b3f5e059f8af14b086fbd7d3d41e8b72f4ccf5ee6bbd32c59,2024-11-21T04:17:46.473000 CVE-2019-1003032,0,0,e1f996b3969bba4e9c31f9343af2bc586fb9daa6067802944375227975e629de,2024-11-21T04:17:46.590000 @@ -204165,7 +204165,7 @@ CVE-2022-36929,0,0,29af1ad95a8d37d48ce293d5e440e8b09f4a786dff5b4040015a7ba25eb3e CVE-2022-3693,0,0,a51df62a82405286e0f05f66f8c4d3fc1b6c11721aa9d137c08d87f452d0ca6b,2024-11-21T07:20:02.680000 CVE-2022-36930,0,0,0e5563378a6c5d0f15e7f225d19b09636c28b39e17c567c67edcccfab8998e67,2024-11-21T07:14:06.597000 CVE-2022-36934,0,0,615727681332b74a0014d27cd9af78ff1f4cb1e235b7158782452a21249b6548,2024-11-21T07:14:06.713000 -CVE-2022-36937,0,1,c59696a639b5ad6b402790b1a9f1766d44500acea2a26e52a2252c71eeec13da,2025-01-27T19:15:13.297000 +CVE-2022-36937,0,0,c59696a639b5ad6b402790b1a9f1766d44500acea2a26e52a2252c71eeec13da,2025-01-27T19:15:13.297000 CVE-2022-36938,0,0,335d99e21a307a500c3503f5a75fbf646b37d59b4dd03a8378bbfa66d12668b3,2024-11-21T07:14:06.943000 CVE-2022-3694,0,0,765b2f2d3ba82bb8a09bd67ce5a0276fc7a520287e453f6eaffaaaa2c868f072,2024-11-21T07:20:02.843000 CVE-2022-36943,0,0,1130b611557efe7570608d04f0b1aedcc50aacbbccc3c32c1bbc542215f199fc,2024-11-21T07:14:07.063000 @@ -214205,7 +214205,7 @@ CVE-2023-1092,0,0,c95010b1f4e248f04a2dcca345e3caa5bd3d28bc70fc9801b61bf85c51ca72 CVE-2023-1093,0,0,013ca17f4d96202a29badf2b31b2bbd22c2221ef8aa1c9a1fba474aca21771e2,2024-11-21T07:38:26.673000 CVE-2023-1094,0,0,5f4c52fad6d7e7b8c684acad9a30e4e69dd9b7b0f033d4283d9263c5af92a9ca,2024-11-21T07:38:26.770000 CVE-2023-1095,0,0,558f2a036a0b0a2e819582a51740e472d06e69bb014f4579990a955403cd0444,2024-11-21T07:38:26.880000 -CVE-2023-1096,0,1,10de65de0487fe9ed676022ccea3b2512ca19c2bed610c034452e6b6d3620b95,2025-01-27T19:15:14.237000 +CVE-2023-1096,0,0,10de65de0487fe9ed676022ccea3b2512ca19c2bed610c034452e6b6d3620b95,2025-01-27T19:15:14.237000 CVE-2023-1097,0,0,42dd918e8e58f1d2ed7de3a397688cccb30c2a849bb017b2637d6910ed633e59,2024-11-21T07:38:27.123000 CVE-2023-1098,0,0,ae3acfb9b0df6eb8cdaa5db64061401c555e4f5c88d2bee85e703e0d90fe6b96,2024-11-21T07:38:27.287000 CVE-2023-1099,0,0,0d036afd273439a92ab810d4aedb86c1c91f3270b90e25d0ff8e998837e8d9f9,2024-11-21T07:38:27.417000 @@ -220254,7 +220254,7 @@ CVE-2023-26121,0,0,6acac4867b184248847e8a70e7b7946cb506283827685f3d295373d266f2b CVE-2023-26122,0,0,bebb2e4a79493fbe4410e6a53caa22908ea165d484bb2b29f12259acd6926546,2024-11-21T07:50:49.300000 CVE-2023-26123,0,0,72d3db70cef1eac062ff0ee869f2c511cc888464913c57cdb456c6bf15dfd147,2024-11-21T07:50:49.430000 CVE-2023-26125,0,0,bd9c697a3446ae3b9b4a89712b4289995288645eb677547e31d0636f30fb7611,2024-11-21T07:50:49.567000 -CVE-2023-26126,0,1,6f1b735e65924c391766eea8273f37d5531533572d16cbfd378be09d01116b72,2025-01-27T19:15:14.747000 +CVE-2023-26126,0,0,6f1b735e65924c391766eea8273f37d5531533572d16cbfd378be09d01116b72,2025-01-27T19:15:14.747000 CVE-2023-26127,0,0,7833633a1cae5d9a69364a46782d36c7a397f91243b8d25f5c7b992bc40d1d45,2025-01-13T22:15:09.033000 CVE-2023-26128,0,0,e52baa4656747ad20ffa067872176671c6017ba95225ce9e6463e591f73613aa,2025-01-13T22:15:09.220000 CVE-2023-26129,0,0,0c986a927222f4574e5c77af05c1dbb1530cec822c03461a737b21750ca0e8f3,2025-01-13T22:15:09.370000 @@ -220291,7 +220291,7 @@ CVE-2023-26157,0,0,8b83cf159b81160cedab9f6aaf50aa863d342b43e6cb523c42c71a3c82555 CVE-2023-26158,0,0,acbfd92fe23cfaa59ed3a613860edc6bd4931867af976e60f80ced7fc40c2969,2024-11-21T07:50:54.213000 CVE-2023-26159,0,0,baab2483055ea747795a8cf7dd43f0d27e81e82c2d9ab065429f7d10893fcaa5,2024-11-21T07:50:54.353000 CVE-2023-2616,0,0,dd52d98f9b76f9828df44a46e15d0fa4867969194d4400ff3ab472f51861f291,2024-11-21T07:58:56.310000 -CVE-2023-2617,0,1,7c79469ebab1f525a2f832703a3f4f7a6637fb34e4f79a2c84bc41db70bd444d,2025-01-27T19:15:15.070000 +CVE-2023-2617,0,0,7c79469ebab1f525a2f832703a3f4f7a6637fb34e4f79a2c84bc41db70bd444d,2025-01-27T19:15:15.070000 CVE-2023-2618,0,0,10be3f8673ec5d8f884b83060a3db45b52f4c565651509d5297864cd808ef8ba,2024-11-21T07:58:56.557000 CVE-2023-2619,0,0,783986a758e06a34c825f45f8aaad4555400a46afcb035515ea5dbc41d0ffb48,2024-11-21T07:58:56.687000 CVE-2023-2620,0,0,8ba8c5f6b4486c6ba6e49f3e8175bd62cc5a9af26c2a2c478472688894a538e4,2024-11-21T07:58:56.817000 @@ -221324,9 +221324,9 @@ CVE-2023-27559,0,0,a95fb2c9519b07561cbc91859398ede0b753e741bbbae0368f98b792bcac7 CVE-2023-2756,0,0,8491c4c4fac565c83d6f0f3f908fc914fb99c8f08aa7a8aee2a77c48a8131aa8,2024-11-21T07:59:13.830000 CVE-2023-27560,0,0,da184c4e29c8ac799e8f8eb7b2ad64de582e82163eb95ac663600ce797c4c839,2024-11-21T07:53:08.773000 CVE-2023-27561,0,0,cc938c97b78df35a11cb554397a0774a390b7256ecd5fb69409e93ff6b318c50,2024-12-06T14:15:19.037000 -CVE-2023-27562,0,0,cf9130320a887d434c9c7ba753d649391c25a39ef5cb9667af6fa7579ac30078,2024-11-21T07:53:09.210000 -CVE-2023-27563,0,0,0175a9e3fc1fdd0bb7ab6c691667362eab37149a6166b0395ce22dcb29b49578,2024-11-21T07:53:09.367000 -CVE-2023-27564,0,0,e9c831f823b6500c936e2fc2c0412b0f72bcd5dbedbc9febfb4eae433ae9ea89,2024-11-21T07:53:09.513000 +CVE-2023-27562,0,1,02aaf69009c5868c27182c47816fc008f7a8a0de1090d6b5ba61af000201d706,2025-01-27T22:15:10.530000 +CVE-2023-27563,0,1,67a3d59b5a20d3eb85cf287c56fcd025386cd683108d3a9c95939840486f9c63,2025-01-27T22:15:10.730000 +CVE-2023-27564,0,1,2a39219f90001ea5b6f0d4e90096c2619009a5852031e492e1348901c3cc374e,2025-01-27T21:15:09.593000 CVE-2023-27566,0,0,f10ab8e0b7d4d116a52a66dc38e37d7b8d17b6f95eb30a8352a16094944dceb2,2024-11-21T07:53:09.667000 CVE-2023-27567,0,0,360d050fab4e5c8c22c7fdf0f2e6e7fb5030310ba206a0a9d9dcdfc14aa42f2d,2024-11-21T07:53:09.820000 CVE-2023-27568,0,0,60cefb06736ccbe8fb434111c08c775946d9381e067c59aa7769a8c6ce2b668c,2024-11-21T07:53:09.973000 @@ -221561,8 +221561,8 @@ CVE-2023-27881,0,0,5e5df1282e2368badebdd03e7c464b99eea09213cf33bb9fb05db0dc45151 CVE-2023-27882,0,0,d398850e4ab23b052f58f4f554a2a1259c388cb2a3a1dd4f0a2205cce6e09290,2024-11-21T07:53:37.790000 CVE-2023-27886,0,0,66ce66d188ff462026b599bb57fd160981f92a6e4e443068d4948e1f59c2e03b,2024-11-21T07:53:37.923000 CVE-2023-27887,0,0,fb7f6b2b87f38b5d8070b9f04fd2311efae2c1782c7ed622ca7beaf885be8f5e,2024-11-21T07:53:38.040000 -CVE-2023-27888,0,0,fc2276f67826ee45240886c5aa8ccb1615892e41451b4b1a05e67d392763f36b,2024-11-21T07:53:38.207000 -CVE-2023-27889,0,0,f370378d792ded025c4ff1f13513c3151ec832b2297200dd0b70f75cbd472813,2024-11-21T07:53:38.327000 +CVE-2023-27888,0,1,be1c1819ab5d09bac6e5a2912abbbc642b5ede755a9dc80276662ecc36fd5320,2025-01-27T21:15:09.860000 +CVE-2023-27889,0,1,12a613ee721183a0bd989302d07262ce93adca618db26176527ce3ed539a20fb,2025-01-27T21:15:10.047000 CVE-2023-2789,0,0,b231f03ea6e7943c98628259e06785e8637b22cbd60f03a1f2edcf522315cc16,2024-11-21T07:59:17.610000 CVE-2023-27890,0,0,33bc5222ce2742a6b62691753a7e4eec718d3eb31e0acc934301d64fe15bcd72,2024-11-21T07:53:38.437000 CVE-2023-27891,0,0,9370e6595c0c8d9468c5fc60bb30b7bb7d62d675a90a701bbe238047bf410afc,2024-11-21T07:53:38.593000 @@ -221594,8 +221594,8 @@ CVE-2023-27914,0,0,d1c3237f28c2aa03a316b9215c5adcde401a0dce25020c22312124ef54a9d CVE-2023-27915,0,0,58b10501f9378ef735c1bcc2813e6dc40f2f0ec612f6c786c457e7e046ada6b8,2024-11-21T07:53:41.463000 CVE-2023-27916,0,0,80bd3bb2e7fa5dfd32c0c9d8af033b63f7baba731a6ac4e8ffac89609e53b532,2024-11-21T07:53:41.590000 CVE-2023-27917,0,0,e4a363a32ef8b88330f6c16266601884466bfd5aab7614c5da0c75aaed4c60dc,2024-11-21T07:53:41.717000 -CVE-2023-27918,0,0,a8381679e9827b330e97cfac6588c640d82ba1213b79db7d920f0928fb42aad8,2024-11-21T07:53:41.867000 -CVE-2023-27919,0,0,36adb647f001d1263e3ed870e675efebde231017f79b5b01e9c48aa87e0150c6,2024-11-21T07:53:41.990000 +CVE-2023-27918,0,1,dcc8f902b8aa8fe1dfaa440bf695dbd03f595a68fdd64c883a2c739bd8a4c4da,2025-01-27T21:15:10.247000 +CVE-2023-27919,0,1,f8b7a06ed27edf07766b664c05581c51d81df8e97c866dbb6ba7ca4bcd9fe9fc,2025-01-27T21:15:10.433000 CVE-2023-2792,0,0,fef13f732773d0e431073564ea7df3b9b2f07f8206a8b84cf0ecccbd55e32b26,2024-11-21T07:59:17.977000 CVE-2023-27920,0,0,9d81864437507c8b8a361728c9a02b9737429af055acb54d59da6c86619da664,2024-11-21T07:53:42.113000 CVE-2023-27921,0,0,0085c6f81f0b41ea4c17a31a5a9e61d59be8e76b29f5ff83e41d87884f7ef722,2024-11-21T07:53:42.243000 @@ -223346,7 +223346,7 @@ CVE-2023-29926,0,0,0fc5a5c7e162aa1931de3d07986f865b067670f4f73d390bac0db8bb5dfb2 CVE-2023-29927,0,0,8c0ed9e92ee795f740bcdf7c131e3d0960c5a2e682f158e2b7aef95cb928028e,2025-01-23T17:15:08.900000 CVE-2023-29929,0,0,89689cc0d589b548565776a1f9c20a9242bc552fbd3ea504259e60f206c4df26,2024-10-24T20:35:02.040000 CVE-2023-2993,0,0,d09ce493716b6c2ceed43ad84793268baefda5e0740c034c26ea1ce6004043d2,2024-11-21T07:59:42.997000 -CVE-2023-29930,0,1,56e267fd536804d484e5dd8a89784fc3b5dfd035d8bf5be58c773cca693b441a,2025-01-27T20:15:26.460000 +CVE-2023-29930,0,0,56e267fd536804d484e5dd8a89784fc3b5dfd035d8bf5be58c773cca693b441a,2025-01-27T20:15:26.460000 CVE-2023-29931,0,0,6df71253847b34b7539f678584f4261252c41f30c30122ebdb15731e2485a21c,2024-12-06T22:15:18.470000 CVE-2023-29932,0,0,b56973b408cf4c3e3b52a141e484af594438e5b8204070b29712b136cae3d95c,2024-11-21T07:57:41.033000 CVE-2023-29933,0,0,9c07e377f546e11bb58a54d11da846b88ed98d1300492de1afb3fa0c4b8fc451,2024-11-21T07:57:41.160000 @@ -223459,7 +223459,7 @@ CVE-2023-30189,0,0,bdf0f5a2ef0f70b767678ad27e05737c73c5e89f432a67f5d1894b312d6ba CVE-2023-3019,0,0,3f2eae215750afa5621e4e308f7ca75563ffc785802895ca3b7c64fecccce699,2024-11-21T08:16:15.360000 CVE-2023-30191,0,0,affd8afbdd3a1ff86c0284e22b7c40ba550b3c3af6460f8ab59c55f9734edd57,2025-01-22T18:15:16.863000 CVE-2023-30192,0,0,00df9b0cf612befd5850335068a6875ba0c131c650f8045e17fe4c98fce31dec,2025-01-27T17:15:13.077000 -CVE-2023-30194,0,1,7d80f2340cb66a90c0ed8ddf8c0b20ffc07608d653ccaf46ac47ff40eaf6aa8f,2025-01-27T20:15:30.053000 +CVE-2023-30194,0,0,7d80f2340cb66a90c0ed8ddf8c0b20ffc07608d653ccaf46ac47ff40eaf6aa8f,2025-01-27T20:15:30.053000 CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000 CVE-2023-30196,0,0,d8afa1205a2ac923a0a6e9d60cd8b3febd3d3155dd6bbfd812d986f0a2f4474f,2025-01-13T20:15:26.557000 CVE-2023-30197,0,0,17f3733ff2a8b5b05caf98b060d2a37a716d0eed944dc24c0593a712b78aa10f,2025-01-09T21:15:23.083000 @@ -223544,11 +223544,11 @@ CVE-2023-30347,0,0,6dc7261a09afb36ce62ac40d69cd182dc7a94ada3554e09acd765abbe246c CVE-2023-30349,0,0,7aff4c2475e1e0fb7cae36e209c6d1fe045f912a3665916f741d3c107c247714,2024-11-21T08:00:03.877000 CVE-2023-3035,0,0,544f82c0afcfc0d48cc784fb1b7d2029be9824da6798ae6d17dd9c22ffbdc200,2024-11-21T08:16:17.460000 CVE-2023-30350,0,0,ce9e3fad6ea4c84ff8c28dd38d746fb8b7699de13a52df16156f225d94da878d,2025-01-14T19:15:29.577000 -CVE-2023-30351,0,1,9e328e13cdd7a2d089d989b27dcf44a56e7d16200c4da17baa435538a343b89e,2025-01-27T20:15:30.277000 -CVE-2023-30352,0,1,87e53501948a104c6f14a2ae658c601cb9268eb097d195f9b3293d28a2bb3959,2025-01-27T20:15:30.483000 -CVE-2023-30353,0,1,cb2cdc6eb661f91536b59ad87a253b9c42fa07279ba5fce228518e7a0fd80655,2025-01-27T20:15:30.703000 -CVE-2023-30354,0,1,17546a2ca3fc2dfa7b6541beaab76f1f99e360d11583012cc346ee9b7ed82e90,2025-01-27T20:15:30.920000 -CVE-2023-30356,0,1,ae1818b93a8e918d291b36e7e2ff402c5e588b2b54d04f7a805751898379a7ea,2025-01-27T20:15:31.130000 +CVE-2023-30351,0,0,9e328e13cdd7a2d089d989b27dcf44a56e7d16200c4da17baa435538a343b89e,2025-01-27T20:15:30.277000 +CVE-2023-30352,0,0,87e53501948a104c6f14a2ae658c601cb9268eb097d195f9b3293d28a2bb3959,2025-01-27T20:15:30.483000 +CVE-2023-30353,0,0,cb2cdc6eb661f91536b59ad87a253b9c42fa07279ba5fce228518e7a0fd80655,2025-01-27T20:15:30.703000 +CVE-2023-30354,0,0,17546a2ca3fc2dfa7b6541beaab76f1f99e360d11583012cc346ee9b7ed82e90,2025-01-27T20:15:30.920000 +CVE-2023-30356,0,0,ae1818b93a8e918d291b36e7e2ff402c5e588b2b54d04f7a805751898379a7ea,2025-01-27T20:15:31.130000 CVE-2023-3036,0,0,b10e815841e1b04ce639c3175a5f04cf82b3c495540d473e6da289cd44f62c1f,2024-11-21T08:16:17.623000 CVE-2023-30362,0,0,7be66632735d36c1f4639acb6a6b90bcae893ee45e50e9a827693c7a010466ad,2024-11-21T08:00:04.930000 CVE-2023-30363,0,0,2cb6ea4dc2465c2a7eb539d75b0abe95550008cff9b57c855a6d2525bd530676,2024-11-21T08:00:05.093000 @@ -224471,7 +224471,7 @@ CVE-2023-31468,0,0,f5a1f6999de9f6620fa087c3295dfd25cf92014b79bc320ffc38acef87af2 CVE-2023-31469,0,0,e2ed88be9004039ca0daea185383b327532781f1edfdadfcb9b53d89e36a0a10,2024-11-21T08:01:55.840000 CVE-2023-3147,0,0,56604f93dd20b44d8140c36ba767f07bd6ce689a7788f3df02be30ad8c574a22,2024-11-21T08:16:33.767000 CVE-2023-31470,0,0,6b71c2b980ed5d5dbc3b91dfa2ea1ede13ad6f5048623bf9c4020495f5186c9e,2024-11-21T08:01:56.047000 -CVE-2023-31471,0,1,deed1dee14a8a8f371f8a12f6ed70f0aaf06d061dec752d35f7e8a5ad4d5d5cd,2025-01-27T20:15:31.320000 +CVE-2023-31471,0,0,deed1dee14a8a8f371f8a12f6ed70f0aaf06d061dec752d35f7e8a5ad4d5d5cd,2025-01-27T20:15:31.320000 CVE-2023-31472,0,0,5645b9370a1f7e00e7b726c063c97dfd0116c47968a74e53567c3ecbd08a5068,2024-11-21T08:01:56.373000 CVE-2023-31473,0,0,92dce06491f3cf73c105ca654129799b1f28b48e831ec76f37a65ef951aaa511,2025-01-27T18:15:33.730000 CVE-2023-31474,0,0,6618e639f18b59368089da0a7a07e9e3ac46d59fc20022c2ef8a65ecff0dc29d,2024-11-21T08:01:56.720000 @@ -224515,7 +224515,7 @@ CVE-2023-31546,0,0,faa5a82d881c7bb84a5271c0c1fb9420fe48cae8e3c55c72e84bb201bd4b5 CVE-2023-31548,0,0,9dd2a298b5b8dea10ec4226d5dde96f71c0e8b4f05bb1ebc8e2aa6ec30b19886,2025-01-10T17:15:11.603000 CVE-2023-3155,0,0,48b61c646a094e90dc253ab9dbdf79b89fa98b30fb0d402353d971cb0c2ce10f,2024-11-21T08:16:35.090000 CVE-2023-31554,0,0,6330173d0cbdf170bffe3fbc80fdb4ff353d1952fb70eceef5ca3949c269d3c8,2023-11-07T04:14:20.517000 -CVE-2023-31555,0,1,a69263e4d5c35d2d255d36b55be3497bbfe7849fe114a8d552f9cf57fb67032c,2025-01-27T19:15:15.430000 +CVE-2023-31555,0,0,a69263e4d5c35d2d255d36b55be3497bbfe7849fe114a8d552f9cf57fb67032c,2025-01-27T19:15:15.430000 CVE-2023-31556,0,0,3884f7acfa61bdc761a1bfd3338fded9cc64e8a797002678a76950268c6f8932,2025-01-27T18:15:35.040000 CVE-2023-31557,0,0,9ff81c72e5c99944b40baf92f5efc70583af95408712da3d96dd75bda624b581,2023-11-07T04:14:20.870000 CVE-2023-31566,0,0,23f9a558f62176fad46bfba0a706692f45e587d0a62799dd72ad569e0c19a50e,2025-01-27T18:15:35.240000 @@ -224530,7 +224530,7 @@ CVE-2023-31580,0,0,0d698d354edef704879d11b6b21192f278ab3311fe6b238bd05a103bc08b7 CVE-2023-31581,0,0,df7987a6e06fcef2f25e9447b0858950065f1567f03eb18d9a52d33d943c11cb,2024-11-21T08:02:03.010000 CVE-2023-31582,0,0,53bee5eb9a34eb73c1c7a38822c5ac3a32ac49834d612f98056b62053966731b,2024-11-21T08:02:03.167000 CVE-2023-31584,0,0,155b0a30f3f11e374bef299243e3e412dc9503a1a14d09c73b4f1546380031fa,2025-01-21T22:15:10.063000 -CVE-2023-31587,0,0,e3e9fa62a3bcdaae5be5ba07108774f22c24f16b19946c6231450e8e366c5288,2024-11-21T08:02:03.490000 +CVE-2023-31587,0,1,eab98a15477b46dffea0ff6b9fd4ecc54241f32fc558dbe6e5a09776dece0b71,2025-01-27T21:15:10.623000 CVE-2023-3159,0,0,9807e6d823aeb3a21864e69407a3985c2540754f15da81cf40cfb1f6730d0a44,2024-11-21T08:16:35.373000 CVE-2023-31594,0,0,2ce3e386965dea1f61dddc297872812c537c7c3578bf01ba97d20e1959ccf4a0,2025-01-16T15:15:10.397000 CVE-2023-31595,0,0,2026436fcd8bf62d8ba7fed6d43e84eb30b5d83d2404d7bba01566f62966490b,2024-11-21T08:02:03.823000 @@ -224688,10 +224688,10 @@ CVE-2023-31890,0,0,0fbb25b32d9994e27c8010778db11222ad40666b24a6dbc796221e0731d11 CVE-2023-31893,0,0,21ba3fe4129e701a3557352f945cc0417a22c044d81b30613e43c14f9ebc4b4f,2024-11-21T08:02:22.007000 CVE-2023-3190,0,0,7db86e04544f8eba511b6d963d5edd9521b55a2eef0f5beead6ede415eae6a3c,2024-11-21T08:16:39.573000 CVE-2023-31902,0,0,4970407b0151e647b1b82c1825347a6db8937a2ca6f3d25b0a873338c17dd0bd,2025-01-22T17:15:11.717000 -CVE-2023-31903,0,0,672e71598928bc83de5d90e02af4d013d4e062df79b7b118e381bc8f2a470b10,2024-11-21T08:02:22.280000 +CVE-2023-31903,0,1,a3023f52d7e22480a288e446117b00904a8b5413bd2b31816281c6bab2ecbdde,2025-01-27T21:15:10.907000 CVE-2023-31904,0,0,f318ebe4f1e995c606297cf984e3deb2bb7dae615c713345d091fe18a45204b8,2025-01-21T20:15:30.193000 CVE-2023-31906,0,0,aadab67cf767d0d7f94f9b2c6c9fcb1cc155aada60b8b6a419a0d0846b6786da,2025-01-27T18:15:35.793000 -CVE-2023-31907,0,1,9fe5dbd79634a9bf43f4e546c4e8c73a027608e875e37a97a027eba41bfaf8a9,2025-01-27T19:15:15.597000 +CVE-2023-31907,0,0,9fe5dbd79634a9bf43f4e546c4e8c73a027608e875e37a97a027eba41bfaf8a9,2025-01-27T19:15:15.597000 CVE-2023-31908,0,0,139c39aa0c7ae32cb32a7959314a2ee90226dedf13a661887cbe2b480137f543,2024-11-21T08:02:22.823000 CVE-2023-3191,0,0,6d5b8163594269d541d9b945b744164903108dc6d9fb58a1266c95089a1b3503,2024-11-21T08:16:39.710000 CVE-2023-31910,0,0,2972f57939109c9c1176101cd18f38750de45e0e257675e8f82afa08e2633400,2024-11-21T08:02:22.953000 @@ -225342,7 +225342,7 @@ CVE-2023-32569,0,0,d6b9bae9b3c4eb94354882bc9fa141696546622ccd5e7ff303745011c1797 CVE-2023-32570,0,0,1a1ee02218f84d3f8f62a376ce6c3dcf84497e7066d7437194a67436cd308025,2024-11-21T08:03:37.430000 CVE-2023-32571,0,0,1014efdf87437be49397d72af75e29ed93957fc73be6bc4c6eaf7c7e362bb8ee,2024-11-21T08:03:37.590000 CVE-2023-32572,0,0,9a61e2958a4814e7739c5bca06ec91ce656d578c176075880f69c1b3ad5a82b6,2024-11-21T08:03:37.737000 -CVE-2023-32573,0,0,0b93274d5c0b493e0b7488b00bb6c813d4ec9ba0504609c618c6d7559f156553,2024-11-21T08:03:37.877000 +CVE-2023-32573,0,1,a1532dcaac2f177cf96f0e0d15e4ce0b45ae7dbe247505f8db1e4bc642cf5590,2025-01-27T21:15:11.243000 CVE-2023-32574,0,0,c581c7cec5de94d1b0a4e7ffd0453939b51b8b0bcb2da5e40262d7468f6a07e7,2024-12-13T15:15:12.053000 CVE-2023-32575,0,0,8637d050172f163fe1b8b18d0b55264c36af59750b0104efe065b69df93041d8,2024-11-21T08:03:38.027000 CVE-2023-32576,0,0,b9c271a35221523525cb262a1b0ea8fa90214c6dffaee640d1dcd202eeb64505,2024-11-21T08:03:38.163000 @@ -225718,9 +225718,9 @@ CVE-2023-33005,0,0,11233cc2aed617d34892cd10b6cd285e42b1642984ce6ebb8ceff57ede826 CVE-2023-33006,0,0,c61f6a83fed5c84dac3c5856e32d1c1a30fa553051d617857ae2ae547ce1f2d6,2025-01-23T16:15:32.103000 CVE-2023-33007,0,0,9ca1ed3257db236ca4f5f1e2792c485b257fe17dccc1d01196ea86f616f8cbf3,2025-01-23T16:15:32.277000 CVE-2023-33008,0,0,5192f4ead374e87889057d3b47378b1e56cc84bf09249148fbed08294fc98773,2024-11-21T08:04:23.530000 -CVE-2023-33009,0,0,c4483f4f0db02f5d9215ee1e11bb102a6cc5eeaac063153e6d4707fc89944aca,2024-11-21T08:04:23.717000 +CVE-2023-33009,0,1,6547f82a521d0e7dcba17bed0d4b14aaf7b953bc18d29cd80237c9de773e95b8,2025-01-27T21:44:27.713000 CVE-2023-3301,0,0,082ada9f68e33f6990dc7650a566577b9bbab90718aa744587a91daf839f6744,2024-11-21T08:16:57.723000 -CVE-2023-33010,0,0,3c5f2e093f7151e89ed628a838efaf418063dda3996df54283e6e2d4daeea5bb,2024-11-21T08:04:23.920000 +CVE-2023-33010,0,1,3f198e874a558aa3c9ff7ac5c05dd155111b9b22e4eaa10b3f8f8d091967efd0,2025-01-27T21:44:33.503000 CVE-2023-33011,0,0,9062a67a71ea7080270c8f78ac8e63617c57c8981537bd29cfe9e28ba674d55b,2024-11-21T08:04:24.097000 CVE-2023-33012,0,0,c66772027ccf16bbc882c9c348695859837a3bddca61686ad858fdc1f0b8a7a0,2024-11-21T08:04:24.260000 CVE-2023-33013,0,0,90616c7af42743b2ac17aa7c2774f67f56b8f5af147c62ee4d89ca4ac88be26e,2024-11-21T08:04:24.430000 @@ -225775,7 +225775,7 @@ CVE-2023-3306,0,0,c7e6cac564624da4379828e5625e8ff69618a59063d1564a5a40639527f7cc CVE-2023-33060,0,0,78b802866202ff10c7b107979e3a18fffe67489a8c6c0052f6132f14ccbb0134,2024-11-21T08:04:38.347000 CVE-2023-33061,0,0,200720cb9bddebcfaf35bfb03f9d71f9f6f34826465a8cfaa34e37211c211f71,2024-11-21T08:04:38.573000 CVE-2023-33062,0,0,23a773a2f1e8db86f6e136c232083362c4da6701e4cc0fe3183d225249e2bc14,2024-11-21T08:04:38.850000 -CVE-2023-33063,0,0,ea9f121ee2b8fead06ab999580350ec42218c79503b929dce8c16eb0da5032e4,2024-11-21T08:04:39.350000 +CVE-2023-33063,0,1,72035baa2630d471bee2e4747e325e6ee262812b0e408c3a5df6e0c78ec60422,2025-01-27T21:46:41.253000 CVE-2023-33064,0,0,ac5181ec9c2000b026edb8c10889972b63e0192347d364c09e13c71bbaf231e4,2024-11-21T08:04:40.300000 CVE-2023-33065,0,0,cc20cb2909b65f1ace3d79a41f379103380e7c7e9c64eefbd5ef4b944c60ed23,2024-11-21T08:04:40.547000 CVE-2023-33066,0,0,8e3d1ae14b54abbab9408a2ca108eb901c429edfbc89382e022563accdb23793,2025-01-10T17:47:09.180000 @@ -225817,8 +225817,8 @@ CVE-2023-33101,0,0,ba3ffcf83af0edbc56d7febe5559080bc395ff6e409d0107b86145aadc947 CVE-2023-33103,0,0,c305191ece7f010de62be8f0c04a3fa08e9047365c07e7da124617ad07495653,2025-01-10T17:49:53.227000 CVE-2023-33104,0,0,ad744b90a2f6252debeae540f84ed774971f67d362d8625207801eef4ca63f71,2025-01-10T17:50:09.057000 CVE-2023-33105,0,0,1d8147cd4ca05abbc46aa022d7d4c1ae36e1d41b8ed7f4ada074d3580a8039f7,2025-01-10T17:50:21.293000 -CVE-2023-33106,0,0,d04a75d01823c6b93b02366b9945f75ff134c8889de57cd9bceaa1a3b3957d2a,2024-11-21T08:04:50.597000 -CVE-2023-33107,0,0,893f103e35ee56097428a36a7649fdd8d0f63a407315180a2ea11d2da8397026,2024-11-21T08:04:50.990000 +CVE-2023-33106,0,1,1a8f559fe8e5a0e0f0f36816ad2cbd74a002139e65a680db4baf9be520aaf2bb,2025-01-27T21:46:44.567000 +CVE-2023-33107,0,1,a67c489402d0383647c6cdce09b1405ecd3e151d060121c55c81d33834aedf6b,2025-01-27T21:46:48.337000 CVE-2023-33108,0,0,bbfee09a95ac73fb523a36dd592efd9298dc6262dceb5817999a83af6ab519de,2024-11-21T08:04:51.520000 CVE-2023-33109,0,0,37368388c3169338c10bf0bd44a2b926f27a0f227723e7587f5a945876fda9b4,2024-11-21T08:04:51.680000 CVE-2023-3311,0,0,0866648adf435d32ee42ce7653e738ccc0b13653665a64aafff9168828cd425f,2024-11-21T08:16:59.160000 @@ -227352,7 +227352,7 @@ CVE-2023-35186,0,0,2330c3077b83f9f6fae9e0eda93500aac3bc9bbd15b777050c1b9b248cf93 CVE-2023-35187,0,0,d435c3fc1573652bac9b174ccf4e3f4282700228ab093cbb54d11cb6634e9fde,2024-11-21T08:08:07.393000 CVE-2023-35188,0,0,f7484a9f80903acc1f5631e4ba0314823cc65c814c8490c44d8e146eb3d5c937,2024-11-21T08:08:07.530000 CVE-2023-35189,0,0,0c013e229c8b320febe8b95a5660110014abdf3b654e065846aefefa2b1eaf76,2024-11-21T08:08:07.667000 -CVE-2023-3519,0,0,b65db05e8cad5d551dff516df95f418104a61648a93f704532eedf3a9934fba8,2024-11-21T08:17:26.603000 +CVE-2023-3519,0,1,517c09e460a5d8ab6ca06f280f7d8d19ce094e6ecbc56a8e89e825b4da23d411,2025-01-27T21:55:10.533000 CVE-2023-35191,0,0,57e2cd323ea5812b05a092bdd798fc25e60bb2f356c1b70cf60026944fad7439,2024-11-21T08:08:07.793000 CVE-2023-35192,0,0,20b85c2be1afce08117fbec37ea7ba8ad0c365657a4a1990271826475914f270,2025-01-23T18:32:53.320000 CVE-2023-35193,0,0,e9a6b5ccac2268d637286d7a1bdb9433afc1109bf4ebb9b8f76e19c20e797054,2024-11-21T08:08:08.043000 @@ -228517,15 +228517,15 @@ CVE-2023-36840,0,0,76c76384ad90d19795c6cf45c9767a6a9180adcc6efd7cf55165f4bd79c45 CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d4170e,2024-11-21T08:10:43.433000 CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000 CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000 -CVE-2023-36844,0,0,e3e4cc6909025f93b6cfb9b162b7aa1d71b1bc5a8435f55bced6707d32e0b2b7,2024-11-21T08:10:43.983000 -CVE-2023-36845,0,0,ae85ece9bad1a08abb7369f6b6eb1f55588e13fa4de893c9baf778937ba1803d,2024-11-21T08:10:44.177000 -CVE-2023-36846,0,0,1808ad70a845305286ad12f42b8103428487d7a3f0dd8548923981444ef094a6,2024-11-21T08:10:44.370000 -CVE-2023-36847,0,0,5bf09883fdb54ca8cf2a15e3706a3defea5b79a751adb03af59825e603948f36,2024-11-21T08:10:44.533000 +CVE-2023-36844,0,1,bd2bc78f38dd5a559e849c9876b458e8dcba3a5c0dc67df6826901413d748335,2025-01-27T21:55:22.947000 +CVE-2023-36845,0,1,168043a259f0639f424b320f27e091bec27c952d7baba2aa1e6fc4d29a06737e,2025-01-27T21:39:24.743000 +CVE-2023-36846,0,1,ae88cd80d04139e6b1a510162d2c6f860203585d0845556d88e7071bc8ac4bd4,2025-01-27T21:39:36.497000 +CVE-2023-36847,0,1,25a370ae476c8b79b231d68f1c47f3c904d0254a33745580d09b933561d43032,2025-01-27T21:40:15.840000 CVE-2023-36848,0,0,a2151c8586ba65daa2e8cb4be03b6c633a7c5c083fda49d9a275029509f8e399,2024-11-21T08:10:46.410000 CVE-2023-36849,0,0,3f498bb4de26c6ac20f6ce42d88bca6554b3f202e4f21731f4d4aa5b1c4b3bef,2024-11-21T08:10:46.580000 CVE-2023-3685,0,0,2bc5158e2d5de8b42230fd188ee80a26cb38cc07771585ab9a4d7184e2c1e757,2024-11-21T08:17:50.210000 CVE-2023-36850,0,0,bda080f8f395becb2e374050f4c338eb8cadcabe779d62195ea438ee1e884255,2024-11-21T08:10:46.723000 -CVE-2023-36851,0,0,2ca06f76f4d928a881f7fc5c353087608267a57f935ec303d68eae1de1a80b3b,2024-11-21T08:10:46.897000 +CVE-2023-36851,0,1,992d40771964eaf54a91009d0e36862489734a167403be2fe9e940e08a9e2250,2025-01-27T21:40:19.750000 CVE-2023-36853,0,0,ef168e1ea7ed9601c6c697e719157e7634825efd1c6a4b2909d0f7c256820ba6,2024-11-21T08:10:47.060000 CVE-2023-36854,0,0,61c60c71baedefe438b230b767e6d1ec37607c4060296b9e417bed7a2ead8625,2024-11-21T08:10:47.190000 CVE-2023-36857,0,0,62ab83218c0ae8d6d9b597fbde71dd843bf8922665b4254e9e61d1ece96228e6,2024-11-21T08:10:47.327000 @@ -228640,11 +228640,11 @@ CVE-2023-37005,0,0,c0ff9ba23fffadec58ff0f25731e8c471a2bd159f41d4edc5b724eb64cba4 CVE-2023-37006,0,0,053a9a073b7bf6fba39169fe89766057e067a1af40f3e39ac50d11ce0265d6c3,2025-01-22T15:15:10.170000 CVE-2023-37007,0,0,d0ca3e9bbe320bc80ad5bd87cbbad4eda4d4b53ffef2c09847c584abc6d3b5d2,2025-01-22T15:15:10.270000 CVE-2023-37008,0,0,4dca7cab7dac0c40e8327e37f4e041a3a0b8931669d521ca804153a13cb584b3,2025-01-22T15:15:10.373000 -CVE-2023-37009,0,0,18d24884d9132039abfaa223ee03462fa1937ea3a31362f84b6df04ad6cd62ce,2025-01-22T15:15:10.473000 +CVE-2023-37009,0,1,746c07754a5e2ce734caaa9d0d209d365d6e349aa07166c793e9bbde64168605,2025-01-27T22:15:10.977000 CVE-2023-3701,0,0,50c60623ffa7110070b51e3894d8b141f7b048bb1af146331e25664835932475,2024-11-21T08:17:52.610000 -CVE-2023-37010,0,0,5fa9e5eec855d0c9d60db4b551cc5c8b945859a72ba91f164bbcf756e5b6709e,2025-01-22T15:15:10.580000 -CVE-2023-37011,0,0,1ffc20299139e890c69678834f0ddb07e6753b755f745032c0f8766f6027d6ec,2025-01-22T15:15:10.683000 -CVE-2023-37012,0,0,f990d23d0c499906ffea5f3f92707328ce5d15074d14291721426f97632696fd,2025-01-22T15:15:10.783000 +CVE-2023-37010,0,1,d908b07ff15efd3f112b312845b37df564cac1595d68dddbec6d27befcaec0e2,2025-01-27T22:15:11.113000 +CVE-2023-37011,0,1,8ef172c8f270160d95f6c8946320c7bbffb7bc6d29cf79cc06e1171d30930d4e,2025-01-27T22:15:11.250000 +CVE-2023-37012,0,1,791b66423b5a42c5ed66bffbd584c29223f4c6949367e47134edb760f0ccbf62,2025-01-27T21:15:11.507000 CVE-2023-37013,0,0,77cc3e1f4fbca40dbe484004bc6dcfcfe35adb5942ae9200d894529eefa1540e,2025-01-23T22:15:12.007000 CVE-2023-37014,0,0,9ba68854eeaa55275918210ab87201f24858744a2381ff8d22c919791e7bacbe,2025-01-23T15:15:09.280000 CVE-2023-37015,0,0,a0a2bf020f37afa1548272e3ef41577eee25dfc5d4537336d4a815249b707531,2025-01-22T15:15:11.100000 @@ -229114,7 +229114,7 @@ CVE-2023-37577,0,0,b0fd59cabf196c2dce306a3dfd18b0e7769f587e98763971c0f69d8f47120 CVE-2023-37578,0,0,db1d011239168d2f0753523137a605241d87dd361fa246b7536264b2cfd1972e,2024-11-21T08:11:59.510000 CVE-2023-37579,0,0,4619aa08d1ce28c3366bb44966075d308cc27715f020dfd6296b225d60c0dab2,2024-11-21T08:11:59.647000 CVE-2023-3758,0,0,f4fa867af72bffdef9c54aabd6acada956a42693d6b3cc9f1676334a04831f11,2024-11-24T16:15:03.767000 -CVE-2023-37580,0,0,112eb18f76b91d17143a539ac09678e958abd495a2bf5da0dbcd745f790a3967,2024-11-21T08:11:59.773000 +CVE-2023-37580,0,1,8d275160b93ac9ce8ee9bc0d58aec68c130469746723ee6767d328399913bc21,2025-01-27T21:55:19.183000 CVE-2023-37581,0,0,093be304138d0cca6e8decef8cb1e83d94e4f8751f573ee26489914f63ec252d,2024-11-21T08:11:59.950000 CVE-2023-37582,0,0,83f623ea677c4e03b8b7f4d8be4b6877901642b17d5bbd39e639c2f5c032e28f,2024-11-21T08:12:00.090000 CVE-2023-3759,0,0,e99e81156d6b104b2e078d75cf4c33ae1aef27bc0d50c9c844090c25ea87b21c,2024-11-21T08:18:00.007000 @@ -231099,7 +231099,7 @@ CVE-2023-40040,0,0,3f0f5b5a49b077592c19d66c28b8663ac6b131e5e630485bb5cc47d1f9472 CVE-2023-40041,0,0,0f11e9858a34d472a1c0a2761368dcab1b86c026e37567cc77e2eef57d8136b3,2024-11-21T08:18:34.917000 CVE-2023-40042,0,0,02cc6b6d7f0f8d99b35b97fc4aaa74da4d879c8ea2d2a813def81e280356d977,2024-11-21T08:18:35.063000 CVE-2023-40043,0,0,e6e3b1652d04e45dd01a00b692714fc2d7fc4320e17fc563f04510f03243ddd0,2024-11-21T08:18:35.230000 -CVE-2023-40044,0,0,3158e2d3eb017e1dd6330ac6c774cff9d1cc63dce812243d8163030a15df5126,2024-11-21T08:18:35.380000 +CVE-2023-40044,0,1,05408067b98d1da0f3be37826550d98af840a9944bc2e49c82426a9fd02c2eeb,2025-01-27T21:52:43.590000 CVE-2023-40045,0,0,43781d4d06011b7cb9a008f4a0a4b20ebfbf9da03c65a9c98cfad9979bfbd212,2024-11-21T08:18:35.550000 CVE-2023-40046,0,0,9dca0c7c22c2cba01540a6032b47009c83c32bed6d9548f249a8c2fb7b691bbb,2024-11-21T08:18:35.697000 CVE-2023-40047,0,0,163df9c00ca68663e2cc908fd250aa16e79170a6ad54237c242891bee26589e1,2024-11-21T08:18:35.837000 @@ -233744,23 +233744,23 @@ CVE-2023-43533,0,0,a611b6a340de89cc503738d64605edbf181ab9c92baf2edc0682a19fb5802 CVE-2023-43534,0,0,de5d57ee7c2064e28688ce2748d9b4168eaea4001442b3f12171f8db0ba10e56,2024-11-21T08:24:17.440000 CVE-2023-43535,0,0,bd198a99fac75f8da40b81e58e0e07a09cdc3859220f8c36ce31b9d1349868df,2024-11-21T08:24:17.650000 CVE-2023-43536,0,0,0d385bd18e2c883f504f528dbe6f90ee76e0cb828bc5c6e7e4b56975970af971,2024-11-21T08:24:17.820000 -CVE-2023-43537,0,1,90a370ac1af18bd1c624fc962f9e32456636faf9501c41ad34109c57776e6346,2025-01-27T19:33:18.153000 -CVE-2023-43538,0,1,e79a3111178d5a2a2ba36d713d1880949c687e6e609f0fb2f373534c3282f2b7,2025-01-27T19:34:53.133000 +CVE-2023-43537,0,0,90a370ac1af18bd1c624fc962f9e32456636faf9501c41ad34109c57776e6346,2025-01-27T19:33:18.153000 +CVE-2023-43538,0,0,e79a3111178d5a2a2ba36d713d1880949c687e6e609f0fb2f373534c3282f2b7,2025-01-27T19:34:53.133000 CVE-2023-43539,0,0,3e84f5d47fc1a857fc947d8fbcce08b05e4262de2de44bcd131b6800f0e3bc2b,2025-01-10T17:50:40.333000 CVE-2023-4354,0,0,f4d89b45e8cfe461b9cef176f9a11aa5ff8b50124e1dbb741c3fca33c06f1b22,2024-11-21T08:34:54.997000 CVE-2023-43540,0,0,a8ba104ce80b9c262224d5409ca6f18feea66c33f3793c474e6365db345b76f6,2025-01-10T17:50:54.310000 CVE-2023-43541,0,0,c76cd0c395a4eead194924d75fa86b223b4e99a5b052a87cb5efce97c8e01af6,2025-01-10T20:14:42.990000 -CVE-2023-43542,0,1,2f0e5b155c59a8abd11001860f7fd5f0e523a43089857b115a70aa3b85597caf,2025-01-27T19:36:48.193000 -CVE-2023-43543,0,1,d4123d6917dfabaaa5dddc191b012827f35781c6ff6ff0db4ba2d1c97f1ce9e8,2025-01-27T19:40:35.657000 -CVE-2023-43544,0,1,94da77e46439e872cbe2485af7606a7576a1c41d7816a4ba1f667a7c33ed94dc,2025-01-27T19:11:15.697000 -CVE-2023-43545,0,1,2aadac2cea7d2a0d8f363c0259e0a3051a6f6e82094f660529ad83a15e233d09,2025-01-27T19:08:27.157000 +CVE-2023-43542,0,0,2f0e5b155c59a8abd11001860f7fd5f0e523a43089857b115a70aa3b85597caf,2025-01-27T19:36:48.193000 +CVE-2023-43543,0,0,d4123d6917dfabaaa5dddc191b012827f35781c6ff6ff0db4ba2d1c97f1ce9e8,2025-01-27T19:40:35.657000 +CVE-2023-43544,0,0,94da77e46439e872cbe2485af7606a7576a1c41d7816a4ba1f667a7c33ed94dc,2025-01-27T19:11:15.697000 +CVE-2023-43545,0,0,2aadac2cea7d2a0d8f363c0259e0a3051a6f6e82094f660529ad83a15e233d09,2025-01-27T19:08:27.157000 CVE-2023-43546,0,0,430c8219ff2c74bcb4afd7c38bcb47bd0ad0633e3663b058833833dc31dd442d,2025-01-10T20:07:06.970000 CVE-2023-43547,0,0,f0c5610fd83111fef427abd875ecb84930961d986dda57b78855ad177af56e03,2025-01-10T20:07:18.177000 CVE-2023-43548,0,0,56e173ce476d1e701b7b3cf219a520c0cc3a93446f759c9f0a4f39e645eaa76e,2025-01-10T20:07:40.580000 CVE-2023-43549,0,0,4a69fce9292d3793579bfa454b583974d46a2e38ba7ebf37c75ea83947ae7a3e,2025-01-10T20:07:59.390000 CVE-2023-4355,0,0,31e03f4e6ed9da3337f02df7b2a36e634a929103c7b5b7f716c88e82351c6277,2024-11-21T08:34:55.120000 CVE-2023-43550,0,0,f3dbcf69b026e5a8fe6d29ad39f52db5ed0fa500aa4696d8297b461e398d7277,2025-01-10T20:08:17.080000 -CVE-2023-43551,0,1,2b6e9ef4039c2cc4a7e25b9b3bf274ad3fb7f96388df0bef427f3a34f838e734,2025-01-27T19:04:52.977000 +CVE-2023-43551,0,0,2b6e9ef4039c2cc4a7e25b9b3bf274ad3fb7f96388df0bef427f3a34f838e734,2025-01-27T19:04:52.977000 CVE-2023-43552,0,0,38cb56d152a8d870254bc3eaa790755a27f71e97952a9344763e34f6f72fbb94,2025-01-10T20:08:31.010000 CVE-2023-43553,0,0,682f7d23ef8b45bcf50fdf913eb41bf598d75002eaef8d47d9fc2f3b01a78ee5,2025-01-09T16:13:46.290000 CVE-2023-43554,0,0,ff9e342df67acc361772ce756ca6aa590135fd661810b5be1b959abd99f4154d,2024-11-21T08:24:21.780000 @@ -234876,7 +234876,7 @@ CVE-2023-45245,0,0,a27164f3bcb8f61f8cb08b26f8ae68db72eb14f78843f63434347deba5778 CVE-2023-45246,0,0,37066887c8dea655db46dde332ad889760cf3f4c4bd823effa4fdfb20f064ace,2025-01-02T16:15:07.270000 CVE-2023-45247,0,0,19aa9e298c5e78038456e66e030b338cfc9be9ab166e3b7e278734e85e2d959c,2025-01-02T16:15:07.420000 CVE-2023-45248,0,0,6429680a50b85c0767a4e68585413dc76bd62903f085b92efbed7b6d24b6d598,2024-11-21T08:26:38.847000 -CVE-2023-45249,0,0,44c3dc88938e05eaa6729d67129c6a0fdc368de6bf373e891d6e1f5857cfce5b,2024-11-21T08:26:38.977000 +CVE-2023-45249,0,1,accb801d60ca8173aebdb55896dab1ea63ec1924305ba95d94e3dcb359db51b4,2025-01-27T21:36:02.257000 CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000 CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000 CVE-2023-45252,0,0,c4429af5bbcc0f38722165d9e25377b431700efa19e0449574864122d73d0cde,2024-11-21T08:26:39.170000 @@ -236013,8 +236013,8 @@ CVE-2023-46743,0,0,67af7436fa58919abf1ac06eb8bea04953a09b03557e964215312a4544787 CVE-2023-46744,0,0,c8bfcff9cb60d3e88cea5a011bef3f5928cc49bd58d85f507ba57e4b751fe77c,2024-11-21T08:29:12.707000 CVE-2023-46745,0,0,72bfe8dee9904993308c31f30bd1d6ac69903497bda35b8c59700b0f3e449556,2024-11-21T08:29:12.850000 CVE-2023-46746,0,0,8d9a465bcf637aaa981540fd97a6cea502730f35264a8fc185ce78699ac4ecc1,2024-11-21T08:29:12.980000 -CVE-2023-46747,0,0,20898c2823189f870cef8c4d06d89164da6e9093bfff02e6e5f60f0c89235962,2024-11-21T08:29:13.103000 -CVE-2023-46748,0,0,5718436f2e6c38d549862de0ba6e0e69633886598a842667f5f5198c63d0048b,2024-11-21T08:29:13.267000 +CVE-2023-46747,0,1,643600371e4b69cf4593d9b86bd2e5a147f6c1fa1c7eb1ab8b470751a5fec8f1,2025-01-27T21:31:36.860000 +CVE-2023-46748,0,1,a2883aa8b0a754434719df500d544794c1ba14f4eea71e433b2061a478a93ddc,2025-01-27T21:31:47.437000 CVE-2023-46749,0,0,2f19e4464f8f3f0ce00e69ecab410ba07b6b6caed2514a926b7dd21c13238728,2024-11-21T08:29:13.427000 CVE-2023-4675,0,0,dced6548a59893b388f5ce9e332c65ba7c13334f5303c10edca1fdcf7123be5b,2024-11-21T08:35:39.720000 CVE-2023-46750,0,0,d212e9aff8e22f166a90193a951981d98cb16eeeb45bad369b7481336a5a32f5,2024-11-21T08:29:13.547000 @@ -236077,7 +236077,7 @@ CVE-2023-46801,0,0,68c2ea22dd4afaeb08b34d2022609702824916ac59af2fae84f44c70e73b4 CVE-2023-46802,0,0,86a05daf4eab1b56acdb35c2a68198383fd1f5e674134cff044f6c419ba6e277,2024-11-21T08:29:20.250000 CVE-2023-46803,0,0,0e8a85b706d4b0450ab8ea7b5be6bd9a53a2fcb6c9130fe6e61790e095aa4c92,2024-11-21T08:29:20.437000 CVE-2023-46804,0,0,bb2bf975251ddcff446a4dd6e795c201e80d958a6008c316fb125e5eac9d2bb2,2024-11-21T08:29:20.557000 -CVE-2023-46805,0,0,a9b671901a9ecae3c4bae22521610373c721603763274e264e38d252a39d000f,2024-11-21T08:29:20.677000 +CVE-2023-46805,0,1,71fde3d16f2af8485e67dd452d05a6d7d1e6037de5197296c376807e149876fa,2025-01-27T21:53:11.007000 CVE-2023-46806,0,0,3eb38eb237d4e9d14f3ad248dfc2abb87014978efaec9ca8f2ae43af7ec7d3de,2024-11-21T08:29:20.830000 CVE-2023-46807,0,0,f9f5e1f47c51aaf1a5a927f5d9922ceb386546562da74d21b6208a467759bb04,2024-11-21T08:29:20.957000 CVE-2023-46808,0,0,1a969c48a44a1e158d5cdef1224bdb142afd6c220f610e1481ca4e3e5a9431c3,2024-11-21T08:29:21.070000 @@ -236597,7 +236597,7 @@ CVE-2023-47561,0,0,44dbeed77c0b29b52799825d598d7e082467aea9da67e5354b4b4114c4763 CVE-2023-47562,0,0,2ac6e7f51fef717199262d24a539adcda5c323acf43c2584e86548ce0ed8ec8e,2024-11-21T08:30:27.777000 CVE-2023-47563,0,0,605b163aaff1479b0e904f8c6445a4e7c403c8d219a86de4bd904a3d6ffec453,2024-09-28T23:47:40.683000 CVE-2023-47564,0,0,07c685b48e6d054bbf6b789468f4d5c55972e45eb34352120ca1f8270db3e994,2024-11-21T08:30:27.967000 -CVE-2023-47565,0,0,e094a15910087a58739d1f69b346b2263afeece54cafc28306f23605e2b88bc8,2024-11-21T08:30:28.093000 +CVE-2023-47565,0,1,2737834698f33316a35d5e97c0bda8797ad9004939afd7cd24de840c6b71240d,2025-01-27T21:52:58.293000 CVE-2023-47566,0,0,e2dc782755e66ce49f423c8a72ecae9210dce64431090e238bdb0b97d068035a,2024-11-21T08:30:28.247000 CVE-2023-47567,0,0,5abc9fbc38a0ae0ff71add58fe370e332e4b58b96334d569bde2b3924fc1e3cb,2024-11-21T08:30:28.390000 CVE-2023-47568,0,0,c628cae3dba1c0f032cdc00d32131073473df6e0191538925b9cfbc1867b8c11,2024-11-21T08:30:28.537000 @@ -237597,7 +237597,7 @@ CVE-2023-48781,0,0,443c0eaace84c8a3023340ca81970964577a0302cfc23bcb008a36d2a89d8 CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382cba,2024-11-21T08:32:26.063000 CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000 CVE-2023-48784,0,0,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd6241e,2025-01-17T17:19:51.033000 -CVE-2023-48788,0,1,2db98462fc8ef2fb921267e516a454b300a71aa8f3c35868beb3a33fd3cb277a,2025-01-27T20:56:34.083000 +CVE-2023-48788,0,0,2db98462fc8ef2fb921267e516a454b300a71aa8f3c35868beb3a33fd3cb277a,2025-01-27T20:56:34.083000 CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000 CVE-2023-48791,0,0,31c96e4e1869546f12717fd141d38efd00e2ed04c54f4d96999394432c372674,2024-11-21T08:32:26.740000 @@ -237784,7 +237784,7 @@ CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764 CVE-2023-49107,0,0,15c6c78af987ac1a6fd2af8dde2078bdc1b6490a345e2093e4f040090109db7c,2024-11-21T08:32:50.550000 CVE-2023-49108,0,0,13fce593a34fb8b794d3785a1e07d4047563aba128c4a14dfb0063d6834d5fe3,2024-11-21T08:32:50.673000 CVE-2023-49109,0,0,d24f1b062c7374dc4a3f590776289df1295d25bb04895432e6814d72bd7567a1,2024-11-21T08:32:50.783000 -CVE-2023-4911,0,0,ca676b758f03eae26d2ba8713400187fd31024002059c9f750318edc87660c15,2024-11-21T08:36:14.780000 +CVE-2023-4911,0,1,8c7d09f1688a467d8fb9e5ce9f82cfd37b0f6673c8f041439a6fa24021dc3309,2025-01-27T21:45:46.857000 CVE-2023-49110,0,0,a1bbb45f4a96757275295f97a0674fb7c93e72998d5eb9340d7f0c83127b7f17,2024-11-21T08:32:50.980000 CVE-2023-49111,0,0,5d69d06a2c7e1a6f756073bf456e5d1dbac3d4b05a2908316cf5f6c8ca69aebb,2024-11-21T08:32:51.160000 CVE-2023-49112,0,0,5b3cd8afd3302cc3c9d30e56b0e97435448a49fecf53f906a8f1c24822ed55b3,2024-11-21T08:32:51.343000 @@ -238171,7 +238171,7 @@ CVE-2023-49655,0,0,bffdf23ec59894a90df425d05dbe913c39ef82459a4853449095fcd009e19 CVE-2023-49656,0,0,2a9cae76ea38f722b1f0b2217cb1803d2760c1e7b4d596df631fe2ca70459128,2024-11-21T08:33:40.253000 CVE-2023-49657,0,0,0e0cde122039f0f677438ec6cf162f965162dd31c8f34d0aadd64c6d571cb84c,2024-11-21T08:33:40.370000 CVE-2023-49658,0,0,ac56b51c2b9cd517511e38c48e3a0d1f4a79a275191ed99303752013c0a35d65,2024-11-21T08:33:40.500000 -CVE-2023-4966,0,0,476f07360926fbf61de67b08cde3e15eacd47df09240421e38121051dabe764f,2024-11-21T08:36:21.617000 +CVE-2023-4966,0,1,96cce3941a491e970a81b73f219ab55df5f2c6953d3bad66c7e88fc6b094106a,2025-01-27T21:46:22.720000 CVE-2023-49665,0,0,ae77a95610944e63507c555888b6a55ceb549ac455fd67c9e0364ed38e83bdf2,2024-11-21T08:33:40.623000 CVE-2023-49666,0,0,83d53d7d2dbc76f7de1733d74b5e8570a33154e33cf47d249a6ec0314e2ab273,2024-11-21T08:33:40.743000 CVE-2023-4967,0,0,a42a27877fd9254c6f3fc246c32299c779c2e7bf82e6e561e623fa7669c935ae,2024-11-21T08:36:21.797000 @@ -238365,7 +238365,7 @@ CVE-2023-49877,0,0,48f6fa2bc6931840571d53152197191986c112c85b88dde218bda847c0cd1 CVE-2023-49878,0,0,0a84b54924844b6e9ecf8d83afaaabc6803091f06d329c42c79061cc1127123b,2024-11-21T08:33:58.633000 CVE-2023-4988,0,0,a4efcb75a011770681c2cfd5444a7c73af0b55e1daacbbe7fa49f88c021c4f15,2024-11-21T08:36:24.840000 CVE-2023-49880,0,0,4f9194672fbc1a7b006cda17dd716a3c8be1af4dc0d3ac2afaf72d120f796f3c,2024-11-21T08:33:58.773000 -CVE-2023-49897,0,0,8b03930b391991267945a8d09275d1b0798bfd26703e2c7e99a0c3f13819121b,2024-11-21T08:33:58.940000 +CVE-2023-49897,0,1,b4b138f11abe8a658e7ad1531e35ef5262fd4337ae07ee8a6c6de14cc8b5a754,2025-01-27T21:31:55.987000 CVE-2023-49898,0,0,6e07e5e2cda7dda9a9d728957a1086adc06517850aa158c4a50ff9cda4932774,2024-11-21T08:33:59.070000 CVE-2023-4990,0,0,95d7a1e8390f9efee067b27ad4cf474e8fc1287972ec3e5172a11c7306905c6c,2024-11-21T08:36:24.970000 CVE-2023-49906,0,0,c328e8133384f78bfd7d1902211cf563211cea3707da23df7ffa97a88af9f605,2024-11-21T08:33:59.197000 @@ -240930,7 +240930,7 @@ CVE-2023-5626,0,0,89b8ebd4d1c7f1942a37b00475974736d9eac2863a1608fa4432891f3ffefa CVE-2023-5627,0,0,7b0bcde2fc0123738866cf0fb88f9c984cb3778e0474460a09010dbb618fe56d,2024-11-21T08:42:08.887000 CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000 CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000 -CVE-2023-5631,0,0,55f35fa2d02cbbeedc88ab07992d2b8b05e7188a1f1a06deaa8469df3df1e153,2024-11-21T08:42:09.390000 +CVE-2023-5631,0,1,d5047e605cf2ecae5b9d3dcd54b942e411b26871b6543030d99089daf16ff4b8,2025-01-27T21:46:27.600000 CVE-2023-5632,0,0,fda3526a3a02979d0ebc9569e1e9cb2dc81968e1a0812f08b0421c2c14221fa1,2024-11-21T08:42:09.573000 CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000 CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000 @@ -241680,7 +241680,7 @@ CVE-2023-6442,0,0,039f356490ba21737d0637d3585b8f0cb39a9dbea5ce5d94663966bac35f3b CVE-2023-6444,0,0,4f153a29ea5ccc0658b2982cf1f3f48133ca1ca4a8a4473e3909ffaffe8027a3,2024-11-21T08:43:52.570000 CVE-2023-6446,0,0,3fb2608a7d2227a8009188176dcb3fbb6899c8c4c439e7336690fac0d0b63c8d,2024-11-21T08:43:52.740000 CVE-2023-6447,0,0,baa35d8c97eaf94b47b556e2d66301885fb42321a160e3313c101cd07ff630ee,2024-11-21T08:43:52.870000 -CVE-2023-6448,0,0,94628a3ff85b4dd845a3816fdddab4434b8753f6f3d7508406d804e2a4facae5,2024-11-21T08:43:52.990000 +CVE-2023-6448,0,1,1567953113b8e9350a6698af9843f43336c4a4ea3829daf3f026215dd542c09a,2025-01-27T21:52:49.177000 CVE-2023-6449,0,0,298d83ff1fdf0ab4c481fc476ec85fd0b07f999107230aeef4c9d231b7aeb5e4,2024-11-21T08:43:53.150000 CVE-2023-6450,0,0,fac4da1df5b1f2a713490686a9163699c2c6616fd46f4ec68039f7fb07f2b229,2024-11-21T08:43:53.283000 CVE-2023-6451,0,0,9797d34627c62035cd154a9f63308c25804ad877d7ea19c00bd86644f8e1d49a,2025-01-09T14:56:51.713000 @@ -241764,8 +241764,8 @@ CVE-2023-6544,0,0,e02b2f2c6755e366cf3ec75ed97bc401e148790730e82c2991efaf0aae4d2a CVE-2023-6545,0,0,e795cea5338daa3d8180c2be0e6c7bb2e738e54c502773b45653b3afa54419a9,2024-11-21T08:44:04.020000 CVE-2023-6546,0,0,98b68a3af0a15a0068638f07b644dc53746c858334baf86a98026fd937105ea0,2024-11-21T08:44:04.170000 CVE-2023-6547,0,0,c4ff98e3248f31fa63347423d773a8919d562297a8c0e91051d8ff227b9aa16c,2024-11-21T08:44:04.430000 -CVE-2023-6548,0,0,d2eaad3adfa55aedce3323a19047f6ff92989e7d98134bb825aeaff74669c172,2024-11-21T08:44:04.570000 -CVE-2023-6549,0,0,73f658437fc8605e0129f1232eb4c67ded250bc7a57186b7838df8ae651fab2c,2024-11-21T08:44:04.727000 +CVE-2023-6548,0,1,b0563c71e3ad8eb527a1874d973561f03f4bf45cc435c7c128fb5597bc1e0276,2025-01-27T21:48:11.423000 +CVE-2023-6549,0,1,7e11c8fad52973603e3179d94ee1a295e8e310b2e5cd407c1b678726c90dfeca,2025-01-27T21:48:20.317000 CVE-2023-6551,0,0,5e214e3aa8ff5e3f715af97a368a9a2e558b8da4056b867a432250e33fd7a623,2024-11-21T08:44:04.863000 CVE-2023-6552,0,0,2535623c1e1f75343899fd2bc780b13d7fb21de4c52a2d7bc0cf8baad59599d8,2024-11-21T08:44:05.010000 CVE-2023-6553,0,0,9fe6ba65a0d77010f186caeb0187c109a6bf56b37171f408dec2a79762549a40,2024-11-21T08:44:05.137000 @@ -242261,7 +242261,7 @@ CVE-2023-7097,0,0,bab463a157a0ec4c86b8d05086d020c8321cb0e2ddfa748238550f6301bba5 CVE-2023-7098,0,0,fb45e550044e716b2cd60264b1407659634acf1d3e7cc58f963426aa4635aad8,2024-11-21T08:45:15.690000 CVE-2023-7099,0,0,e5a2b72389968a01cc4f6096c3e1ce4ac890861a6e3386a7275b06db2e27cf70,2024-11-21T08:45:16.090000 CVE-2023-7100,0,0,20a8a7c633d2e22493d410430d2c093151c16dddbb9e608da8319a1412a54e3b,2024-11-21T08:45:16.293000 -CVE-2023-7101,0,0,83ccebc45a95ad93beb41029839a2aab8fd03a3f5333dc8c94bd9e39879a3343,2024-11-21T08:45:16.463000 +CVE-2023-7101,0,1,bb2181e8690cf1e1701ec8e11b4fb8d544434a683777fa98b0d32645ebfee055,2025-01-27T21:53:06.563000 CVE-2023-7102,0,0,eda46931e4d5cc965a4562425a4a4a96d50c0b667307576457f7ed3697edc4a3,2024-11-21T08:45:16.750000 CVE-2023-7103,0,0,b2b8227ac2e0796238c704873dbc5543721fca2e7ab91f34fb3c87b288acac1b,2024-11-21T08:45:16.913000 CVE-2023-7104,0,0,685626b29f6edd04d4660abe291361929ccac331b20f76b48a7d8dd8219b4857,2024-11-21T08:45:17.067000 @@ -244077,7 +244077,7 @@ CVE-2024-10855,0,0,ae24b9251832889f0ab5093466f5bbce4d7ad6d8dd4bf7a8321d2155c2606 CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6150,2024-12-24T11:15:07.260000 CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000 CVE-2024-10858,0,0,42b123ba3b0529f7fcd2fe96eb2bcf8b1478b777f663ea90f1bede156318a16a,2024-12-26T20:15:20.080000 -CVE-2024-1086,0,1,83147d6a6eb473a54f362870484dd2693323ca442073606a548b60ff5d9c6aa3,2025-01-27T20:55:05.757000 +CVE-2024-1086,0,0,83147d6a6eb473a54f362870484dd2693323ca442073606a548b60ff5d9c6aa3,2025-01-27T20:55:05.757000 CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000 @@ -245189,7 +245189,7 @@ CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf28394 CVE-2024-12116,0,0,4a2ceff80336184e35d0f53deaa453232f189dd136149b8e8e0cd03d307eb4c7,2025-01-11T08:15:24.867000 CVE-2024-12117,0,0,5c2bbc39fb5b6d6401c07a64822b77288aeec30fc2cbad0cd60835722d462264,2025-01-24T19:05:36.597000 CVE-2024-12118,0,0,ee58a49c25bedce06c1bf31023acaf9667a0932e3ac867ecf009da866e28dd62,2025-01-23T12:15:26.890000 -CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000 +CVE-2024-1212,0,1,52e4474344b365aa8515919611aaaf23e114280be5e50b84140b93ffe9041ce9,2025-01-27T21:48:30.333000 CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000 CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000 CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000 @@ -245347,7 +245347,7 @@ CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b60524 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 -CVE-2024-12321,0,0,460c283c3cf6f19aa162b8a2a52092e97da6ae8836c1ebd1417a5a7a1eec31d2,2025-01-27T06:15:22.473000 +CVE-2024-12321,0,1,748f591377b6b8cf6cbb2660f92634f56c6fbfdcecc2cf9954a29294f469c112,2025-01-27T21:15:11.763000 CVE-2024-12322,0,0,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000 CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000 CVE-2024-12324,0,0,6830cc1a3ef0ca57459dc571e7789d8a61e3029bcc4a1783bed9fd0b020fb5a4,2025-01-07T05:15:18.267000 @@ -245442,7 +245442,7 @@ CVE-2024-12430,0,0,0c8a563bb6bc403b10276a981acccd2883fb8e64f72cd343170d116fbae88 CVE-2024-12431,0,0,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000 CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000 CVE-2024-12435,0,0,65c9febfd7a98604817f1773ea0e55d32e0aa4a74e94909e5aac719a650b91da,2025-01-07T05:15:18.887000 -CVE-2024-12436,0,1,6456b982add18d7963985c0b10cc280f6a5089770077368544880336ca86d88a,2025-01-27T20:15:31.910000 +CVE-2024-12436,0,0,6456b982add18d7963985c0b10cc280f6a5089770077368544880336ca86d88a,2025-01-27T20:15:31.910000 CVE-2024-12437,0,0,eee25a62335cf81a7c9a591afa711efa0cfca8bc43291f7331a8326f931a6036,2025-01-07T07:15:27.127000 CVE-2024-12438,0,0,4b77ccb0533c5ed87a6d598bb0daf15b07da9a8e043e091d8369445fa75dc83a,2025-01-07T06:15:16.183000 CVE-2024-12439,0,0,420a25774a9855a1359464fcce67f5e77708758c4ce4e8a4cf01d7827cdef6e0,2025-01-07T06:15:16.430000 @@ -245910,10 +245910,10 @@ CVE-2024-13049,0,0,2d2507515be5458df46966a9b46d7f8d93676a0df14e2574f8b8c0b1de3c0 CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000 CVE-2024-13050,0,0,2f95f49a98ee2b927873c8a4799939050fe5a4ead743b8ced8639ef709fc00cc,2025-01-03T17:41:08.837000 CVE-2024-13051,0,0,e2bfef788998fb155c81675dd1f28141983b9837968453cab2c4ec820298fc19,2025-01-03T17:41:21.100000 -CVE-2024-13052,0,1,4738356d96d1ee5d8c51fc0f926016b7a8b9c418748002f964955e7cc6873adc,2025-01-27T20:15:32.307000 -CVE-2024-13055,0,1,9bf2a0ddf46ffe982a656d9bc6cc648b00b61cfe5ec7e084a43f9f057c6d2676,2025-01-27T20:15:32.747000 -CVE-2024-13056,0,1,2ce3d21b1019ed77b9cff5c615e0980b1ee426c1614ba2f2a1b4947c1fb0efcb,2025-01-27T20:15:32.990000 -CVE-2024-13057,0,1,8db87d4a379baf6825c9c7921cfd306f087214f11c3faec086158e4b3d093027,2025-01-27T20:15:33.200000 +CVE-2024-13052,0,0,4738356d96d1ee5d8c51fc0f926016b7a8b9c418748002f964955e7cc6873adc,2025-01-27T20:15:32.307000 +CVE-2024-13055,0,0,9bf2a0ddf46ffe982a656d9bc6cc648b00b61cfe5ec7e084a43f9f057c6d2676,2025-01-27T20:15:32.747000 +CVE-2024-13056,0,0,2ce3d21b1019ed77b9cff5c615e0980b1ee426c1614ba2f2a1b4947c1fb0efcb,2025-01-27T20:15:32.990000 +CVE-2024-13057,0,0,8db87d4a379baf6825c9c7921cfd306f087214f11c3faec086158e4b3d093027,2025-01-27T20:15:33.200000 CVE-2024-13058,0,0,abdb337edf72c5329320ede11c3fbd3acf68763ab2a7c2b467362f2f7d36268c,2024-12-30T22:15:05.957000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-13061,0,0,f0d229ddc53c34e4105e6b89d4e6cbe6fcae50e1fc38e3eb92bb7d84d07d1623,2025-01-02T02:15:19.897000 @@ -245940,7 +245940,7 @@ CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,8a150593dbe1f180e29b1c2e3ea75cd720a3d6f50bb74cd3f244a3b1730f66a4,2025-01-06T21:15:14.273000 CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2e71,2025-01-06T21:15:14.427000 -CVE-2024-13094,0,1,ff89d51df0f55e55e053e6eb04680580a78be0201255f2c5e137b3c57d192608,2025-01-27T20:15:33.390000 +CVE-2024-13094,0,0,ff89d51df0f55e55e053e6eb04680580a78be0201255f2c5e137b3c57d192608,2025-01-27T20:15:33.390000 CVE-2024-13095,0,0,8b2839bbacb79c90817a06f59822177134d9ef3183ef241268f00c156b68d4a9,2025-01-27T06:15:23.440000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 CVE-2024-13102,0,0,2b3c51e550e0e3ae0feed858b8e9db25b6ba6af497f98896174a6e376c50dc7b,2025-01-02T18:15:16.517000 @@ -245997,7 +245997,7 @@ CVE-2024-13170,0,0,64bb0fa3762d809dad101b4ba885fcca0dd1d305c82c02d70bc824e02b59a CVE-2024-13171,0,0,699657c265d040f82de898618a447265bb42e4c5f15629b32474eb0a58331d80,2025-01-14T18:15:28.913000 CVE-2024-13172,0,0,4be3076bfc8edd49ff4de334b04e8f62cacb071216b0af58069e07996765e5eb,2025-01-14T18:15:29.110000 CVE-2024-13173,0,0,052d5e11a0e6d41f18ffe50cc98d7e8fa992f332fedcf8acc482d2ed982cfbb4,2025-01-08T15:15:16.577000 -CVE-2024-13176,0,0,688a5544ed6d5367fbc75e2da5ad54b6de313aa96b38efe207c8c73df66ca729,2025-01-24T20:15:32.150000 +CVE-2024-13176,0,1,340b96476d730e42eee1dd1075312dca4c914d63d751e8f2b22a69479242ab7c,2025-01-27T21:15:11.907000 CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f25f,2025-01-16T21:01:38.177000 CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 @@ -246555,7 +246555,7 @@ CVE-2024-1705,0,0,ad32b21169f7c0aec2508592ac71c9a3cbc133038583310c8d0382d12d1f6d CVE-2024-1706,0,0,bb2fa26be71c93f252750ad503aa5f22cf00468ca8b87351c6c26fbbe19a743a,2024-11-21T08:51:07.893000 CVE-2024-1707,0,0,a9020d35f22c4489f7cfd2297cfe28080eadd0f70b288122f51ccc5023ec8af1,2024-11-21T08:51:08.030000 CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000 -CVE-2024-1709,0,0,bdcbefcd2cea797f900bb3e17e86543061d7717b5594f55f1f46cac7942030c4,2024-11-21T08:51:08.320000 +CVE-2024-1709,0,1,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 CVE-2024-1710,0,0,1e40e71747a8b12de39d769c827824fe24840a5de6160030b181cc2a6ca82e52,2024-11-21T08:51:08.487000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 CVE-2024-1712,0,0,bdb3e0c816aad12a5ffb83e96d47614474081689b77384ea123451ea94b467f7,2024-11-25T21:15:12.783000 @@ -247113,13 +247113,13 @@ CVE-2024-2035,0,0,62f67efe3bff80d7eeb666947202c8eb3b1462042806276c31fd899b7244c6 CVE-2024-20350,0,0,722c34b38db3d24c9df5aa7e4608d92421cb6d77d11257327514c99d146757b3,2024-09-26T13:32:02.803000 CVE-2024-20351,0,0,1fbae8efd22d51d5a49adf6ef1f73727465a1156a9d0a6fed3972bc290a977b9,2024-10-25T12:56:36.827000 CVE-2024-20352,0,0,6db7ecc361b42b365eb47e0632a9ca4f01d5ac8c788709f957e9fb7efb268190,2024-11-21T08:52:26.143000 -CVE-2024-20353,0,1,8b3a400b65d462be9dd0e1d4e1b1ce185cb79be851e8f38a3aee4f9102f7f228,2025-01-27T20:56:54.213000 +CVE-2024-20353,0,0,8b3a400b65d462be9dd0e1d4e1b1ce185cb79be851e8f38a3aee4f9102f7f228,2025-01-27T20:56:54.213000 CVE-2024-20354,0,0,86958fcb35d1d5e4184932239b1fbaf8ede8ec4dd0c93ef81b2764f1ebfd85a2,2024-11-21T08:52:26.567000 CVE-2024-20355,0,0,d8bf94417bf9a508c0abc16d98f7596493be5d633c7c5a31c4f1a71b43a34209,2024-11-21T08:52:26.693000 CVE-2024-20356,0,0,71834e73863730f09ca066514676e74b9356c8487e0b1bae8a72859c2a232946,2024-11-21T08:52:26.907000 CVE-2024-20357,0,0,d920ce6d535e37f833ef0d2f9c9ebbc5be7a1cb91f3ebb2cec23a50901503c8b,2024-11-21T08:52:27.070000 CVE-2024-20358,0,0,f7a6de631c6351582c731e2be6aad77084995daf762db4ac931fbdcc1703a24a,2024-11-21T08:52:27.227000 -CVE-2024-20359,0,1,aef3c54a673623ad3cfa6c37c9aedab2127ab133547dac24265283a9ec3840f7,2025-01-27T20:56:58.307000 +CVE-2024-20359,0,0,aef3c54a673623ad3cfa6c37c9aedab2127ab133547dac24265283a9ec3840f7,2025-01-27T20:56:58.307000 CVE-2024-2036,0,0,cce5dc1cdbaac5f6eff2f1180a36f4b6cbaa96401b6764188556d1bc2f216085,2024-11-21T09:08:53.750000 CVE-2024-20360,0,0,1cc6cb730bd37f0c290f98d17250280a800acbad17e369ef22e9e1de646a0421,2024-11-26T16:09:02.407000 CVE-2024-20361,0,0,9e93cdb9263e9a217a71aed7440962e851abd8d5c957e8d5e2d6a28bc2963f7e,2024-11-21T08:52:27.917000 @@ -247162,7 +247162,7 @@ CVE-2024-20395,0,0,05c9b3bbe9b1c76536006da61a830671343ebdd5500b0dbb7197429cb514d CVE-2024-20396,0,0,2fa46557b15efcb086664f649b28cd615ce050d3699b2dd562d33c582e15f606,2024-11-21T08:52:32.730000 CVE-2024-20397,0,0,aa4896e89ee908718eecc98e40b69e64acb07e6a64db55a63dfd8f439e37d14c,2024-12-04T17:15:11.913000 CVE-2024-20398,0,0,ad94ddbee337fdbedef878aafe901697326ecfd5c44018c2989edc63738be41d,2024-10-03T01:47:52.180000 -CVE-2024-20399,0,1,3ed3d43a389807a2f0884cefe7355910f05d56c7c29e7aca8c5215809db9fef6,2025-01-27T20:57:04.940000 +CVE-2024-20399,0,0,3ed3d43a389807a2f0884cefe7355910f05d56c7c29e7aca8c5215809db9fef6,2025-01-27T20:57:04.940000 CVE-2024-2040,0,0,fe2c4a8cd2b76f197f22c1f39fe3e9aeb3f40523d47d262db413af0b6d066a4b,2024-11-21T09:08:54.640000 CVE-2024-20400,0,0,7b1dc2e034227256f41c23cdf5d45d55baa77437912361b0c9fa21d0ec1b122e,2024-11-21T08:52:33.397000 CVE-2024-20401,0,0,9f30a31d3cf086d83fe7e825007ce5be32058e573c8fc6bbb6a9596974e3ef30,2024-11-21T08:52:33.533000 @@ -249336,7 +249336,7 @@ CVE-2024-23132,0,0,e9248c2178f8f63a22b7c15ed27370a3b934315488dfa0e209d25147e3c49 CVE-2024-23133,0,0,b1474dd84eb3c446392a0992a388c8841a35971de2a3b30c91010470ea4fea78,2025-01-27T18:15:38.187000 CVE-2024-23134,0,0,b9e291ffb9b9998ed77706252f7c72546698bc932f4e15f37f1161fd8d53e531,2024-11-21T08:57:01.287000 CVE-2024-23135,0,0,1c8ff4eb793abf6bcefbc0298485ccba7517f2f24b525939fa1ae9cfa5c974b6,2025-01-27T18:15:38.410000 -CVE-2024-23136,0,1,0046a6fd6fa44480b309f723d133fe296b6446f9789a2ab6ce58b95a26a887ef,2025-01-27T19:15:15.900000 +CVE-2024-23136,0,0,0046a6fd6fa44480b309f723d133fe296b6446f9789a2ab6ce58b95a26a887ef,2025-01-27T19:15:15.900000 CVE-2024-23137,0,0,5eb4322ca9c3d91bbd12e65d7c5d4deade1e92c1c7916f4d296c1483278699e3,2024-11-21T08:57:01.937000 CVE-2024-23138,0,0,5f1cf6df53872d96cd81f8d3d5f642840af9c940a03c8f7b6fa2400eef2671cd,2024-11-21T08:57:02.143000 CVE-2024-23139,0,0,cf479d99920f9cda76655ef30f4e950ff9932853a7d815d66918624961b44631,2024-11-21T08:57:02.360000 @@ -249349,8 +249349,8 @@ CVE-2024-23144,0,0,8bd5b2ce4cc9fd218bed6de0ad674bd03382b4417b9a5f78c15bb29d9b619 CVE-2024-23145,0,0,b5c9151f08d0eb657f1572934d23396bdbfb38b794d2bfa930772950c7456341,2024-11-21T08:57:03.543000 CVE-2024-23146,0,0,1b92d7eda026ce04b2782f0fe1862b24d42be74a0adfc0f070bff443ec892d6c,2024-11-21T08:57:03.743000 CVE-2024-23147,0,0,aede8e252c39549496d51b533e25b618f39be49320c7cd082a4248e6c79119b1,2024-11-21T08:57:03.933000 -CVE-2024-23148,0,0,90bc02038ff25770c07aa220d07eb7776d4474b30763317376bf45ea4b52e7de,2024-11-21T08:57:04.127000 -CVE-2024-23149,0,0,5fed52f48d138707921e24a46ead7fbe6984baeaf9893df495fffa629a2c98cc,2024-11-21T08:57:04.323000 +CVE-2024-23148,0,1,4281c2dd379ac2da7616044d57baa1d5fab351ae30cdd886610a8d8e479a32d0,2025-01-27T22:15:11.403000 +CVE-2024-23149,0,1,067da6c5103bf07504b09ad4e1728b9e2355d7f106956174e8c46db5319838fd,2025-01-27T22:15:11.587000 CVE-2024-2315,0,0,3fdbc8f67f2f12bb5cfbb7c5abc541b94d2aa7c9aae376fbe2a623d354e495d1,2024-11-21T17:15:12.817000 CVE-2024-23150,0,0,7a7406ed617865b1b8f7660dd599d5eed1fc28ad5fd282f5238ab1b2e370e2b1,2024-11-21T08:57:04.517000 CVE-2024-23151,0,0,b17c0fdb77e6f4b45e85cc27b353b53ccc11fe1caaf3f38183945b65353acb1d,2024-11-21T08:57:04.723000 @@ -249870,7 +249870,7 @@ CVE-2024-23687,0,0,cddc185324aeacb6827c4b6d838475827c51f9b8ce212d0d3fb833f97a103 CVE-2024-23688,0,0,c659042598645c0c0fe5f9aca9a8b934e5ec750f56491cd83f91b6f1b5a4fb4a,2024-11-21T08:58:10.720000 CVE-2024-23689,0,0,e6b0f4cd27f0b28e80b35d8eec6ff10d357cb4712a691dea5fdf4ee6cf0168d1,2024-11-21T08:58:10.850000 CVE-2024-2369,0,0,eab708bdb3030a9091cd2f82435a394416d6e76814dcc673d1fb843dae51dc2d,2024-11-21T09:09:36.597000 -CVE-2024-23692,0,0,7d07c6d1bfbd08f95e5aaf65278eb34ddda4e83f859da08c679a824409690f2a,2024-11-21T08:58:10.980000 +CVE-2024-23692,0,1,35e01d17f2522bee02c27fbb176fc1c2ffc8f44ac6474aacb00c52c4e115a298,2025-01-27T21:43:16.410000 CVE-2024-23695,0,0,a416c243a4115ab74e222722bc0324c0d332df39bfb3ccb986ed5ec6237a05a7,2024-12-17T16:52:47.107000 CVE-2024-23696,0,0,678f8b53e63e26ed90afc5803fa458e4881112fb33c3e850d458b8dc68e8772f,2024-12-17T16:52:14.557000 CVE-2024-23697,0,0,14b85d09f7c85af608359a821d23f0c3476d155ead1e9e1397c3827e42da3f2b,2024-12-17T16:45:51.077000 @@ -250679,7 +250679,7 @@ CVE-2024-2491,0,0,89f0ea744341245ddf2590c596f0d2277cd047aba3e8200dedbe9df25ac553 CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b57b,2024-11-21T08:59:57.760000 CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 -CVE-2024-24919,0,0,9aadd2e9c854a8a67a60668d9c22590b064c978b0416a05db6ed866127604e0a,2024-11-21T08:59:58.267000 +CVE-2024-24919,0,1,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000 CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000 CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000 CVE-2024-24921,0,0,8f706e27290a72f00e99beb011183b58fc2c1911b4de017a35ddd13c318006b9,2024-11-21T08:59:58.550000 @@ -258402,9 +258402,9 @@ CVE-2024-35136,0,0,7f9b2bcfec1e00e4c5448e8eb34d153823c83bc999a69fb0df8058180c228 CVE-2024-35137,0,0,8a304cdbaf59bb986c8c3f32bdf1739c04b00c7f60b0a646c085f118d8cde7a8,2024-11-21T09:19:49.143000 CVE-2024-35139,0,0,be4c987cfcddfe8d90c735ee236dc1ac4502531a983ac5f6945739f9557c9cc3,2024-11-21T09:19:49.280000 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 -CVE-2024-35140,0,1,770c8244045ddd75036b0b1cda33ebba5d78723f4407acc629cbd1e3a77e1329,2025-01-27T19:27:14.327000 +CVE-2024-35140,0,0,770c8244045ddd75036b0b1cda33ebba5d78723f4407acc629cbd1e3a77e1329,2025-01-27T19:27:14.327000 CVE-2024-35141,0,0,06b8aa52c2298990aa93ebe433e9abdadb53fa0de866da999a18dc6b50cfe5f1,2024-12-19T02:15:22.810000 -CVE-2024-35142,0,1,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000 +CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000 CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000 CVE-2024-35144,0,0,65bfff25065dc06e7ed3ffa2c7e9ed55e23f7e474c71c541e867327945cd230e,2025-01-25T15:15:07.633000 CVE-2024-35145,0,0,8d8b40b9515a5e67e9a273cb2dbf15ac7a0e7e8f6cb7f4063639fb909d26b9da,2025-01-25T15:15:08.440000 @@ -259830,7 +259830,7 @@ CVE-2024-36968,0,0,b51e2dc68c2824dcef3d9ab6950e2622baf141d6d50669e83aad56533abb9 CVE-2024-36969,0,0,19398af1a45dda3d9c920cf795c9977020937f8b3790bf11297b97110d9de854,2024-11-21T09:22:56.150000 CVE-2024-3697,0,0,ae376834ca7793bc1d2fd7b5b455bd65f44069ca4e3464905d80fb76e7393d01,2024-11-21T09:30:11.900000 CVE-2024-36970,0,0,a896f863cf840c54b9557a57f370f0e3fcc4b63118d7192d81d9a5fe12e81955,2024-11-21T09:22:56.290000 -CVE-2024-36971,0,0,ed0268628fea760e0b3df653781009dea4cb6d23d1ec85587a7ff3b2f21223fb,2024-11-21T09:22:56.410000 +CVE-2024-36971,0,1,989c5efec4869e265f1c9ad6d4bc877a7c4d888aa90d466274612b57a3cfa6e4,2025-01-27T21:43:21.750000 CVE-2024-36972,0,0,a776155922d5b636bf6506240846b6f1c39e0467d33ac02856b88db045a46650,2024-11-21T09:22:56.643000 CVE-2024-36973,0,0,7371c46602970a8ec577a7dad6a33fe76ddb619ac0b2a27daa62e8ec7d54ade4,2025-01-10T18:03:24.737000 CVE-2024-36974,0,0,68c7ce936cd80bad18d0ae23bc046f59f55193e2ad6c93b48c318cca6332508c,2024-11-21T09:22:56.983000 @@ -259860,12 +259860,12 @@ CVE-2024-36996,0,0,59bb280a47ec504c1079da292d01df99037a869afd9838585b9a937a0dfbe CVE-2024-36997,0,0,d16bf8b387fe3b9d665adcd4b222a22e88b0512aa442c11d99217d1cc1ac56c9,2024-11-21T09:23:00.207000 CVE-2024-36999,0,0,2ccd748c12f15b23e8d526f3427efa5084f5baee1c11016752134395fa382fea,2024-11-21T09:23:00.340000 CVE-2024-3700,0,0,d05b82826d9dc216b860cfbf1b80f09e4468bcf111716f15838ac5b3fb9e0e8d,2024-11-21T09:30:12.350000 -CVE-2024-37000,0,0,0f2c5e816a80da15a243b1f79500e06f35798928b580070eafdaf724c00a83c4,2024-11-21T09:23:00.530000 -CVE-2024-37001,0,0,97be40eb3c685fb6c66d87b15805dedd3a5ee09f036eab8aa6dd1a532cc9d70a,2024-11-21T09:23:00.710000 -CVE-2024-37002,0,0,0a26a15cb2cb35283e319892ab6a7994698e3f0a6f56b7a6555025d4fb7728c1,2024-11-21T09:23:00.910000 -CVE-2024-37003,0,0,82b6cd7d2bc5d58dbe6fc20ca3c24aa4ccee8d41ff12b1b4de5aa372fef69beb,2024-11-21T09:23:01.083000 -CVE-2024-37004,0,0,d21f503e1308e0b9d033a5a859244ca884924b532d5b528c7e442732aec8f0aa,2024-11-21T09:23:01.267000 -CVE-2024-37005,0,0,1d8924c7c48bc703c1c3dea452e982d0e3d54f1bae7fb801180bbdc2bd4a714d,2024-11-21T09:23:01.450000 +CVE-2024-37000,0,1,f4c69baf3a5167528d99b97f298822f7b3831e8369b08557282b4a963e5e0dc2,2025-01-27T21:15:12.133000 +CVE-2024-37001,0,1,2c84f978525013a7d418029b4b19c236ae1ff209fc73fb8632d645bf32626a99,2025-01-27T21:15:12.383000 +CVE-2024-37002,0,1,5c670b9148983042db1e3696ae823f25f41bf7873c365ce24917d9b8094ccca8,2025-01-27T21:15:12.577000 +CVE-2024-37003,0,1,a92d4468a09e278f819ce222b9234998501138b7ac1859d76b31f373d8d38030,2025-01-27T21:15:12.767000 +CVE-2024-37004,0,1,77870d70de7e488a3423fa7176c2ca24f3c9d6636145c526155d5e133b9e804a,2025-01-27T21:15:12.973000 +CVE-2024-37005,0,1,be2fba9211215a590daefa973e4b1599e2a8f6293ccd238df544621ba0784f7f,2025-01-27T21:15:13.217000 CVE-2024-37006,0,0,e22749bbceec4022fce5265128160e358b9420e9582491628443c9374d6e31a9,2024-11-21T09:23:01.623000 CVE-2024-37007,0,0,864ffcca07b778a8f93d3caf82450ede66896131fdd26b523d8b0d4d1b43a6cb,2024-11-21T09:23:01.823000 CVE-2024-37008,0,0,833b012e544d4550e0b54fe6115ca18d43b3ee222c8725c7bb3c9244627f8f83,2024-08-23T16:57:34.547000 @@ -260379,6 +260379,7 @@ CVE-2024-37520,0,0,c2601772804e1cfee195894ab6b7cf60b06b0ebb1999f0d1b12743ce6abf1 CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c838af,2024-11-21T09:23:59.870000 CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000 CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000 +CVE-2024-37526,1,1,fceb1320eec4344ad55d53250fb396b22b0e27e2609a36a5deef3232fe6612cb,2025-01-27T22:15:11.770000 CVE-2024-37527,0,0,a5af77d7b6365e6adc04f6e4c32c4fce6880d7fd833ee45fe5914d4fb64fb502,2025-01-27T16:15:30.840000 CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000 CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000 @@ -260693,7 +260694,7 @@ CVE-2024-3801,0,0,0f8bfa58ad160c9f71633ed43875c383317300520d9a57afb022ce56593990 CVE-2024-38010,0,0,738538b21364387fdf533aba47443ed1eb58bd43ab96778d2e27a558178da55f,2024-11-21T09:24:41.133000 CVE-2024-38011,0,0,36a42c1107d1e04c268b3d9879d9ba8cd10e71d7fb8849da71f609adece6ec99,2024-11-21T09:24:41.290000 CVE-2024-38013,0,0,e2961e7b73e1033f6526920d45050502392cf1527875517a4edf6e1d87b63bc6,2024-11-21T09:24:41.453000 -CVE-2024-38014,0,0,838d04f0ea958c02373d428a2979e224cd61c80013501fda7dfe02ac805a17aa,2024-11-21T09:24:42.923000 +CVE-2024-38014,0,1,a02876bb58e757c7d64f3de3461f597ecaf7556e1c9662364767a4957651fd32,2025-01-27T21:38:24.900000 CVE-2024-38015,0,0,4006a9b5a4188527daa76d23cff5fcc23e630a70aa0217f1692c73c7b0c46d0e,2024-11-21T09:24:43.110000 CVE-2024-38016,0,0,833b8679d0e7108def7db104f77c8729baf99e01b00b5bf558e9f32fe2215bc0,2024-09-24T11:11:06.247000 CVE-2024-38017,0,0,a1291e504b6787dbfc473e5f1198d884626dae6afde471366db2534adb5e42b8,2024-11-21T09:24:43.327000 @@ -260761,7 +260762,7 @@ CVE-2024-38077,0,0,77518772d0189599e1eb91a75f98dc94f6889b5fc7c06b3fe3c5bcb9dfea8 CVE-2024-38078,0,0,1a1d2c83bd847951d9f6b58b676e8e9ec7c6495b1b7552c30d869d07409c077f,2024-11-21T09:24:51.520000 CVE-2024-38079,0,0,437c995000a20a279f2ad60a875252ba219e34ee7f9f883d9c57b37ef458df3d,2024-11-21T09:24:51.650000 CVE-2024-3808,0,0,d6eefe6b29ce8f99926803f447004725916066b1418a86714a9a0ee2cda0270d,2024-11-21T09:30:26.523000 -CVE-2024-38080,0,0,8a7987e9c084908047eb22c3dd0517fbc3dd8120dac530c7b2ba2808f213dad5,2024-11-21T09:24:51.827000 +CVE-2024-38080,0,1,ff094b0092fa0ff16f5e03d10ae7206734c760d13d37b5b47e2384cd520c7409,2025-01-27T21:35:27.323000 CVE-2024-38081,0,0,adecd67e96198ceb084323867562a624008ea4d3d50d2310b4c2c1c9881fcc3c,2024-11-21T09:24:51.970000 CVE-2024-38082,0,0,5c39a835fdc447dd79343a2fe5eca324da4e41e683206fe001ef52c7d107ec3a,2024-11-21T09:24:52.167000 CVE-2024-38083,0,0,f90f1f3167d84e1e359ab7b0827055ef27848b39572f59663c2deeac93d8de6e,2024-11-21T09:24:52.300000 @@ -260775,7 +260776,7 @@ CVE-2024-3809,0,0,61604afb35e5d625352c20258f59dd0bf56230cfadd8bc0e5bb10a9bdb7f47 CVE-2024-38091,0,0,4405abe1115ba8e4252fdf2011d77cd2f56675ee2d685c72a6342131a6052333,2024-11-21T09:24:53.253000 CVE-2024-38092,0,0,e212b001ab8134723010f02469d16371b767b692b5b98bd423a5d8c064db8a48,2024-11-21T09:24:53.417000 CVE-2024-38093,0,0,564027640864cb6a66f81183c5a2e27716b51dce4cb9559bea31c9ae9c081fa5,2024-11-21T09:24:53.580000 -CVE-2024-38094,0,0,237be7b093d2509a50e00c69139ab20c7c63aa5a30ec744be8602f1c7a86fc0c,2024-11-21T09:24:53.710000 +CVE-2024-38094,0,1,3c0792ac2c97a9508e66d87158e25000f4880e321c49a7cded320403a5941a55,2025-01-27T21:35:36.907000 CVE-2024-38095,0,0,14c2a5b9e85f2e8c3abb673f989749b979c7005633de0f754c238f3146dc6e41,2024-11-21T09:24:53.863000 CVE-2024-38097,0,0,1dab4a5649c68801be2bcbe030d31a0274dd59eff7ad7675eaff81f85377cf74,2024-10-16T19:28:08.227000 CVE-2024-38098,0,0,814d6cca5c48da45586f2449700036657e6e3cdb87c6378b39024f2013c62fea,2024-08-16T20:38:02.817000 @@ -260792,7 +260793,7 @@ CVE-2024-38107,0,0,942689cf5864a2282b5c2793aa6fe881bddbfdcaaa9edcedf578838489655 CVE-2024-38108,0,0,7e553a19aa826d73478b21d9b1e009abc46deb4893e9a267a69d8e7b9e952e68,2024-08-16T20:38:43.893000 CVE-2024-38109,0,0,955f6f6f55e17f0646d432fddd310222eaf31f01d66f47bc1e85b109c881efc7,2024-08-16T20:37:34.397000 CVE-2024-3811,0,0,aa70716b140370857be7fcc142657c91ac248f35d70aa6cc39278015ea435572,2024-11-21T09:30:26.880000 -CVE-2024-38112,0,0,b9e63f106e4bd4434b0d69f38e4d217f70d065122f221442c9f24e7c97a95d87,2024-11-21T09:24:55.587000 +CVE-2024-38112,0,1,b4bf57bbcce22f17cbdd11a1f216b4b8851c6e12fd32279f40883a421e4afde1,2025-01-27T21:35:50.827000 CVE-2024-38114,0,0,f1d311c98fd1a816525b73540e4ffe1f45ca5573144ddde0dabf4905e179bd3e,2024-08-16T20:54:28.887000 CVE-2024-38115,0,0,64b72549499c09af8af041ee53568dfcbde837dd4c58a3eaf8778fc03e61a287,2024-08-16T16:32:49.573000 CVE-2024-38116,0,0,21ba1bdb441dd51cde686035568432dfb32b554e22109c472e0d0545e357ff07,2024-08-16T16:36:12.337000 @@ -260902,7 +260903,7 @@ CVE-2024-38213,0,0,2dcfe75ba5929ae8ac2ccdb0032dafcc8a142d478b90513a0522754510077 CVE-2024-38214,0,0,30f99573272bb70824618bb71ff5b70aaae21681681724afd1a359a954f6c56c,2024-08-15T20:28:25.893000 CVE-2024-38215,0,0,6c70370c2e603e39444a7fb8ab8591e807ce4f98aeea791ca0b52508e27a2626,2024-08-16T19:02:41.517000 CVE-2024-38216,0,0,9b093a106d5fd0d02a2e9c94614cfe22ee0f0cfb522c3c7774659c5e003c6b62,2024-09-17T17:00:29.123000 -CVE-2024-38217,0,0,c772eeb7eb91ef799ed23410f431c2116c109cf376f079f1969c7146a9143a28,2024-11-21T09:25:04.820000 +CVE-2024-38217,0,1,6dec72e6fed75b177a153844b4dc65f9b8bf4257c874352af90fadaedbe43f0f,2025-01-27T21:38:34.040000 CVE-2024-38218,0,0,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000 CVE-2024-38219,0,0,1cb1c7d90c1b0adb344a54b96084a8d918de46bca695ac4e743598772e7ef545,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,779d52ad248a43b7f0b2350ab4f001c9b17cb4419f53eebc20cfa50e7d11cad4,2024-11-21T09:30:28.323000 @@ -262422,7 +262423,7 @@ CVE-2024-40392,0,0,c0b77c26788071b7626fa98f4e81fdc538f14d2fb4ca29bf5074b6ada32ce CVE-2024-40393,0,0,3b44967cb25d23b8b23843ecd05fe5d68c3aaf1715aa83da6d262f0d8bd96461,2024-11-21T09:31:02.303000 CVE-2024-40394,0,0,6a806ad13b0b957b004ff001266d3d838dbee3781b6df4b4ede2482e22f8910a,2024-11-21T09:31:02.443000 CVE-2024-40395,0,0,444181edd8fbdbfe2dad76fb4c605403f032cf53cc6f648e298d9707c22326f0,2024-08-30T14:35:38.087000 -CVE-2024-4040,0,0,4d2cdf7ce6e636f6bc8e86bacedb126e9e73e5c35f5a2f246d1228698eed4812,2024-11-21T09:42:05.023000 +CVE-2024-4040,0,1,d38ec785e98441ff91237e81e981d9a49540c014ed0b0d7c075c012b69e8f310,2025-01-27T21:48:42.117000 CVE-2024-40400,0,0,b87d73f1984034b4b8241ac45475e50f2c45a9ea07071297da20505939a4092f,2024-11-21T09:31:02.747000 CVE-2024-40402,0,0,0986023852d78f31f0f59aebb7b3b0736b93b95505e85bccade4a134f20ebf3b,2024-11-21T09:31:02.957000 CVE-2024-40404,0,0,55775f15b7fdbe52ee2d6ae7edcc793ba42adbb117ddc3772696b4945f1bb02a,2024-11-25T20:15:06.890000 @@ -264864,7 +264865,7 @@ CVE-2024-43576,0,0,226ed8f442f81adac9fde327d8e05ef6b12943509a4e7657f1f66a4231834 CVE-2024-43577,0,0,efd0b7f12f1a1e0a2dc8940b892f4cdee42da314932618cf607507c408e2efe1,2025-01-07T17:14:49.983000 CVE-2024-43578,0,0,68de9c2fcd1167d879fdbd4c652aac964c08875cc8742eafc4500af2fb1b4aca,2024-10-18T16:59:29.557000 CVE-2024-43579,0,0,2ce859cd52dc4a97ac81cddf07dd72a9a5c901d7a0d24c1dba0fa40bea4cdd93,2024-10-18T16:54:06.810000 -CVE-2024-4358,0,0,d375da0ccda66b536e55f5f5f94ec71dcf0db33fbb63706af62a0cde4ce8d5a2,2024-11-21T09:42:41.593000 +CVE-2024-4358,0,1,409cafbbaa902ccef0d763f12541e08bdba5aeb06adebc180dc745d6fd21f0be,2025-01-27T21:43:05.630000 CVE-2024-43580,0,0,578dcd1b350b9fd81334110f26d5d064d5661f87134eea1071e0f880d33affe0,2024-10-18T16:49:06 CVE-2024-43581,0,0,53e723cd36ca94380d9a266ffe5c0c585597d8e53099dfe3880019506d280c56,2024-10-16T21:54:44.573000 CVE-2024-43582,0,0,1fa32536a02dd051541af52f298c1866a0bc95cc534c6669697fd0359b801dc8,2024-10-16T21:35:49.927000 @@ -265438,6 +265439,7 @@ CVE-2024-44169,0,0,8e659cce58d9a53d0497d3730dec7575b8a3d2351d4de051efdd53f958a4e CVE-2024-4417,0,0,4e3d6204cd6966eb0d27497c2863f9921840677a5ed28df1c16d852d537c8a4f,2024-11-21T09:42:47.380000 CVE-2024-44170,0,0,4d2a800695872f7abc00b41c3e1d9ae1548d65569627bdeeb9ef0e31c2a1724b,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,61d23c156cb013a8a8af9a10b8da0c4d43b13a26cab640993f3b36fb5e09e5ab,2024-09-24T16:22:38.880000 +CVE-2024-44172,1,1,6ff5fd7f36da624a8e4d5ae9fe38d09821bf81d42d627f5a88b0bfd7c0aec890,2025-01-27T22:15:11.930000 CVE-2024-44174,0,0,9fef131a05569228953753a69bb54c67406d2be203d34e38f490d828de204009,2024-10-30T16:35:20.507000 CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12daa4,2024-10-30T17:14:55.127000 CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 @@ -266258,7 +266260,7 @@ CVE-2024-45475,0,0,68995e1629edebb8d3330a3b1d200226acbfabb2fa93e2ed19b4655f8a034 CVE-2024-45476,0,0,859e02ec2c22061098797b59104d4e97661513720f365aeb3958aee1139eb6f3,2024-12-10T14:30:43.853000 CVE-2024-45477,0,0,e64486945a7233685155bac32e1cee1ee1baed194f1170f1d979f1137af05eea,2024-11-21T09:37:50.293000 CVE-2024-45478,0,0,99c07afb847401c98c810bd2882233327f48f13d0f6118f043fecd9bb200ef99,2025-01-22T19:15:10.113000 -CVE-2024-45479,0,0,f15fc4d63b3570a6d33249a5f9be6e83af869b13791a4791e0181deb2ca8650d,2025-01-21T22:15:12.290000 +CVE-2024-45479,0,1,10a097aa1f38ae27b9dce835055ce97b51c979c56261891503022bbea490276c,2025-01-27T21:15:13.410000 CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000 CVE-2024-45488,0,0,ddcd8f59134f72a3b8f90701a24a7b63e03f1137fb0934f505028ece59a798e5,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,a2cf2fd403c4bd00e429c9a5fe6d6c61964af511aacc863239e18e8a252f2626,2024-09-26T13:32:55.343000 @@ -268387,7 +268389,7 @@ CVE-2024-48838,0,0,f9928082f7e75f60d980a85efcc837d4c9a18b8b51ce8a8a581c5ac7a277e CVE-2024-48839,0,0,52c09bdcf3835a3667a250c9bd276dddff115e5d86158092bdd957d586746170,2024-12-05T13:15:06.123000 CVE-2024-4884,0,0,dba36cc78e853ec323d8e68576b6df88852c47e1b903865158b463995ab9ebbd,2024-11-21T09:43:47.303000 CVE-2024-48840,0,0,2c207ba06dc975424126bf2375e2216b5241bc6996789a9756621df0432878ef,2024-12-05T13:15:06.343000 -CVE-2024-48841,1,1,3d7244a73b83dd3889a4b0f4d2f84184526d31d94e98b4abe09299dd9092f643,2025-01-27T20:15:34.090000 +CVE-2024-48841,0,0,3d7244a73b83dd3889a4b0f4d2f84184526d31d94e98b4abe09299dd9092f643,2025-01-27T20:15:34.090000 CVE-2024-48843,0,0,e1dfc1d7fa6d369981e1a0e5246622a3d9492aa546350910a4d34b7c5d92424c,2024-12-05T13:15:06.500000 CVE-2024-48844,0,0,be2c16b0769a1d78f14247421f6d4a6f42ee99daaacaddcf09e5bf9f39ce1f0d,2024-12-05T13:15:06.667000 CVE-2024-48845,0,0,a643a94c17f0ebbcf0348838f1295e9b966d7133e50b049e18aff662aa7b2aeb,2024-12-05T13:15:06.820000 @@ -269116,7 +269118,7 @@ CVE-2024-49775,0,0,f7b107fd90967d0f5ebc9cc515008c8fdf5fb3cf128e6b60db0d23183670b CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 -CVE-2024-4978,0,0,201c9e11d7966e2ff18e4c4242d116c7a008068b070b2496c2220d3d01e21eba,2024-11-21T09:43:59.780000 +CVE-2024-4978,0,1,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49803,0,0,3d17c64dfa44a309f0956e2f80441fab8adbfd788223cf7d4d00fdb1c300ae97,2024-11-29T17:15:08.180000 @@ -270255,7 +270257,7 @@ CVE-2024-51407,0,0,93182ccc1b00077d8adc2e38926051ab4a291bb0f8537bd782b970d50b4a6 CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000 CVE-2024-51409,0,0,084b944bc571cbe682a95858718ef89eef5aff4f21cc9a356c9712b68f4a5fa8,2024-11-08T19:01:25.633000 CVE-2024-5141,0,0,ef1fc3a8abb2248dc1075aaa92c468f9b71ed2a6f95f513df5e167bd1a7726ac,2024-11-21T09:47:03.473000 -CVE-2024-51417,0,0,cc4d7445f89d764b826ddb7a9e9a270b1e6add879ef01a32345efb9a2472dde9,2025-01-21T19:15:10.950000 +CVE-2024-51417,0,1,c32b44e414e15cca7282799c0b5e8da407b765c954e162afa94ef4ddd58e4d1c,2025-01-27T22:15:12.080000 CVE-2024-51419,0,0,98a28979982a6ebbf942e483f64a66dcbb5943a8a4d7c3ddbfd245760ff332d6,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,f22ae7f46fb9912f1b5aa95d591e960fe9755fe6ab06f8b9867977c897d9332e,2024-11-21T09:47:03.607000 CVE-2024-51424,0,0,1f71d6224f9befbfc3f88ae1ebc8a838b12024ea8e79eff1bdf093cb107029be,2024-11-04T06:15:03.767000 @@ -272432,17 +272434,21 @@ CVE-2024-54457,0,0,da0353a7ec7d859fd477580e7c54e31a24aeea86ab2c2ac2e00b7a1eda59c CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 +CVE-2024-54468,1,1,5687fb341836ab93985b35cb02979643d0533af2aedf3024930cb613ae5b2cc9,2025-01-27T22:15:12.187000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 +CVE-2024-54475,1,1,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 +CVE-2024-54478,1,1,ca9222501c8ff71998fe35f19a222058c9cf55bc86a2bf0f4510fee0bf6b8a8e,2025-01-27T22:15:12.377000 CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 CVE-2024-54485,0,0,982a0baa0ac099695fc21f36de9b06236d26b846e1534a93622dae435e1fc457,2024-12-13T19:15:09.380000 CVE-2024-54486,0,0,5df005d0d8864aa5a133b3a90c1c09a871b54e236cb0257a1e40ecfc6e05f5a4,2024-12-20T19:15:07.897000 +CVE-2024-54488,1,1,0f8f47e331ea5f6f147f266a6f0c059fd08f24407dfcf74d3bb6a360a6b41185,2025-01-27T22:15:12.480000 CVE-2024-54489,0,0,1ce8b5ab65a55735f38feb96fae54ecbe9c5aa5b683277170ac859678b8dcc0a,2024-12-13T19:15:09.570000 CVE-2024-5449,0,0,1d8d63580d1cb9064d797bded58f9169ad76c503e92c814880090cdd281d631c,2024-11-21T09:47:42.400000 CVE-2024-54490,0,0,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 @@ -272451,7 +272457,9 @@ CVE-2024-54492,0,0,85af0b7e8310e62bdbb661f9396591c8a16f77bd78856ca16684e2e340586 CVE-2024-54493,0,0,fa153b7b9aa4539638e8a2a5a8a0f6bc0ba6e98aa0e9ed776ffdda5b5b98dbb4,2024-12-13T18:30:16.170000 CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d056236b8,2024-12-16T19:15:08.730000 CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000 +CVE-2024-54497,1,1,6c931e88af4ef1b6e785f08151bbc21af8defbb5ea02edf8fcb1c5cf3270c15d,2025-01-27T22:15:12.583000 CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 +CVE-2024-54499,1,1,1587a813e75a49803d367936d691c19e3eeb984364f69f6aabb295d83310b09d,2025-01-27T22:15:12.680000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000 CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 @@ -272460,25 +272468,46 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000 +CVE-2024-54507,1,1,41b68f670df8d592abf37382aa9998423dab14e12876b2aa44eeafbe2a355fc3,2025-01-27T22:15:12.777000 CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 +CVE-2024-54509,1,1,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 CVE-2024-54510,0,0,dff09d19d4956196d4a463b8d2bc4d60d0285ffe6cf366aa3f34a0cc4cb339a9,2024-12-20T19:15:08.667000 +CVE-2024-54512,1,1,6af3811641496a535658a2ddb810d85dfda216134490a34a556734b1be89fc88,2025-01-27T22:15:12.973000 CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000 CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 +CVE-2024-54516,1,1,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000 +CVE-2024-54517,1,1,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000 +CVE-2024-54518,1,1,7411ea9a68e200c83720e5af50b2272219e991e23b0c824cc594dd4c274931e5,2025-01-27T22:15:13.260000 +CVE-2024-54519,1,1,ca67072233fa48a610cf937e58682a242acd977aafc923d31a31345ed7800be8,2025-01-27T22:15:13.367000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 +CVE-2024-54520,1,1,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000 +CVE-2024-54522,1,1,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000 +CVE-2024-54523,1,1,99b867f52d51b534bffec672c1deb43f18457bee1964fb07df8adadfe170068d,2025-01-27T22:15:13.660000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 +CVE-2024-54530,1,1,da8332735200c0a6f862416fece7f7fc7e57b57e342ec63f5a3515be83c84585,2025-01-27T22:15:13.753000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 +CVE-2024-54536,1,1,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000 +CVE-2024-54537,1,1,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 +CVE-2024-54539,1,1,d28c340ca6d55c0526182ae66e2e4d8dd88614a5d079ef3088c377bc3597911b,2025-01-27T22:15:14.037000 CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 +CVE-2024-54541,1,1,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000 +CVE-2024-54542,1,1,b595df3e83392fa393fa516edf28b5df358cc28f5c3be33ee006fc5cdb1520f3,2025-01-27T22:15:14.217000 +CVE-2024-54543,1,1,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000 +CVE-2024-54547,1,1,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000 +CVE-2024-54549,1,1,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 +CVE-2024-54550,1,1,e813c3b2e30fbc9af78a93fcf3f62083567d452d1e62ce7ff0c3c5068da641a6,2025-01-27T22:15:14.580000 +CVE-2024-54557,1,1,0497db03b589d583d836efddd0e32b6368ca6e56450d80e21c65082431a6c35b,2025-01-27T22:15:14.670000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 @@ -273558,31 +273587,31 @@ CVE-2024-56923,0,0,be73f26a48655a6c99b484271ed1e42d7600b948c1a837d43e3410b428c3f CVE-2024-56924,0,0,2dfd0f4cb2cee49ddeeea2a79bc2fa0288c3fc810897b51482d81940308871b9,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56947,1,1,9a9ff1c384355028517e35a9ac38a44304d235cd73d0f938d164a32e8baa7747,2025-01-27T19:15:16.187000 -CVE-2024-56948,1,1,25f87c7c2ba1caacad9e5234e28324bb5ca965da621473879a59063f0e808b7d,2025-01-27T19:15:16.290000 -CVE-2024-56949,1,1,e902849d182e03f6db1f736a6600a166fa344bcb17ae9a8d921e48a905c85333,2025-01-27T19:15:16.383000 +CVE-2024-56947,0,0,9a9ff1c384355028517e35a9ac38a44304d235cd73d0f938d164a32e8baa7747,2025-01-27T19:15:16.187000 +CVE-2024-56948,0,0,25f87c7c2ba1caacad9e5234e28324bb5ca965da621473879a59063f0e808b7d,2025-01-27T19:15:16.290000 +CVE-2024-56949,0,0,e902849d182e03f6db1f736a6600a166fa344bcb17ae9a8d921e48a905c85333,2025-01-27T19:15:16.383000 CVE-2024-5695,0,0,561e6cb4d08160ed6fafa90e521f897721e64759a362dc9a8276e2a94b600bf4,2024-11-21T09:48:11.110000 -CVE-2024-56950,1,1,6c6aa617d71efdfb51ac5205f4aad1ada41aecd154005449fd8e6c951aaa91cd,2025-01-27T19:15:16.480000 -CVE-2024-56951,1,1,a85d7d32676dfdc2cfb57563c7e810724bda2c4ccba8578d4dba52fce4550ece,2025-01-27T19:15:16.583000 -CVE-2024-56952,1,1,97c9ab7f9aaf278bb8b04c4ddf3e50704c5f7a5aefc808907ffc6e14999bf56f,2025-01-27T19:15:16.697000 -CVE-2024-56953,1,1,bac427badaa7947c1021195eedb836d70c51b747ebb9429a211e0e8760f8f29b,2025-01-27T19:15:16.823000 -CVE-2024-56954,1,1,ead9f8d98f66eaea523aadc50f5b9e49c2b6547118d5299547d27bb19d631d73,2025-01-27T19:15:16.933000 -CVE-2024-56955,1,1,3987b051596397bcb7ce9cddff0a47fb800f24737c6a7920cb1530e926ccf5b5,2025-01-27T19:15:17.040000 -CVE-2024-56957,1,1,184931a0e01c78eab3fe1ca5e3f8e8cebcfaae6cb1a8facbc717718f59fa367f,2025-01-27T19:15:17.147000 -CVE-2024-56959,1,1,f1ada030fc2fa25ac17f8e142a51b257092cc5fdc049839245ead5a8521e378c,2025-01-27T19:15:17.247000 +CVE-2024-56950,0,0,6c6aa617d71efdfb51ac5205f4aad1ada41aecd154005449fd8e6c951aaa91cd,2025-01-27T19:15:16.480000 +CVE-2024-56951,0,0,a85d7d32676dfdc2cfb57563c7e810724bda2c4ccba8578d4dba52fce4550ece,2025-01-27T19:15:16.583000 +CVE-2024-56952,0,0,97c9ab7f9aaf278bb8b04c4ddf3e50704c5f7a5aefc808907ffc6e14999bf56f,2025-01-27T19:15:16.697000 +CVE-2024-56953,0,0,bac427badaa7947c1021195eedb836d70c51b747ebb9429a211e0e8760f8f29b,2025-01-27T19:15:16.823000 +CVE-2024-56954,0,0,ead9f8d98f66eaea523aadc50f5b9e49c2b6547118d5299547d27bb19d631d73,2025-01-27T19:15:16.933000 +CVE-2024-56955,0,0,3987b051596397bcb7ce9cddff0a47fb800f24737c6a7920cb1530e926ccf5b5,2025-01-27T19:15:17.040000 +CVE-2024-56957,0,0,184931a0e01c78eab3fe1ca5e3f8e8cebcfaae6cb1a8facbc717718f59fa367f,2025-01-27T19:15:17.147000 +CVE-2024-56959,0,0,f1ada030fc2fa25ac17f8e142a51b257092cc5fdc049839245ead5a8521e378c,2025-01-27T19:15:17.247000 CVE-2024-5696,0,0,9ae6c44d348ef9d24ec8ca5439b37c50da2ca251572759d1d18bb2a62c7efe3a,2024-11-21T09:48:11.303000 -CVE-2024-56960,1,1,c9e2a9d34a57958a6fb9dd22eeb857e81128df1eea38f98d5c3edceb99de1f01,2025-01-27T19:15:17.347000 -CVE-2024-56962,1,1,9d349cda956d5179fa2d0d19e6464658b4e00d574677d357b46925df7762cefc,2025-01-27T19:15:17.447000 -CVE-2024-56963,1,1,bf283975452725de1438f7cc8349d5c7db3720ead5dca570042c3fe273c3a1ca,2025-01-27T19:15:17.547000 -CVE-2024-56964,1,1,85a6a617ae30235bbbd98b354ec3b2cb4d5beb499d4221a52725a58bbc18e55a,2025-01-27T19:15:17.647000 -CVE-2024-56965,1,1,d88540ea7ca3d689715552d646fffb98468513c038d62b7aac782c6df2bdd0eb,2025-01-27T19:15:17.747000 -CVE-2024-56966,1,1,c99c5de572a8b507ecbc008212175b7bb2b8499749c2ec0d7a61b913ae7d3920,2025-01-27T19:15:17.850000 -CVE-2024-56967,1,1,8f2f35a42d51fad82691bd518338ac421e21236b0f219221ac9b2ea900a57dcc,2025-01-27T19:15:17.947000 -CVE-2024-56968,1,1,5b61c8b8b0e709a5084c46fc6e1484bea976a8d0efc38e5d3e235d5018cc2cb3,2025-01-27T19:15:18.057000 -CVE-2024-56969,1,1,0324b8b21f1c3019d19b9b9c6bf0c6a821e8fc8d868487d3eb285d66d0019886,2025-01-27T19:15:18.157000 +CVE-2024-56960,0,0,c9e2a9d34a57958a6fb9dd22eeb857e81128df1eea38f98d5c3edceb99de1f01,2025-01-27T19:15:17.347000 +CVE-2024-56962,0,0,9d349cda956d5179fa2d0d19e6464658b4e00d574677d357b46925df7762cefc,2025-01-27T19:15:17.447000 +CVE-2024-56963,0,0,bf283975452725de1438f7cc8349d5c7db3720ead5dca570042c3fe273c3a1ca,2025-01-27T19:15:17.547000 +CVE-2024-56964,0,0,85a6a617ae30235bbbd98b354ec3b2cb4d5beb499d4221a52725a58bbc18e55a,2025-01-27T19:15:17.647000 +CVE-2024-56965,0,0,d88540ea7ca3d689715552d646fffb98468513c038d62b7aac782c6df2bdd0eb,2025-01-27T19:15:17.747000 +CVE-2024-56966,0,0,c99c5de572a8b507ecbc008212175b7bb2b8499749c2ec0d7a61b913ae7d3920,2025-01-27T19:15:17.850000 +CVE-2024-56967,0,0,8f2f35a42d51fad82691bd518338ac421e21236b0f219221ac9b2ea900a57dcc,2025-01-27T19:15:17.947000 +CVE-2024-56968,0,0,5b61c8b8b0e709a5084c46fc6e1484bea976a8d0efc38e5d3e235d5018cc2cb3,2025-01-27T19:15:18.057000 +CVE-2024-56969,0,0,0324b8b21f1c3019d19b9b9c6bf0c6a821e8fc8d868487d3eb285d66d0019886,2025-01-27T19:15:18.157000 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 -CVE-2024-56971,1,1,53538b1ba98bab8fe87e3a886c9c4c64d5f063e2d12d95d2360a76ebc3086b2e,2025-01-27T19:15:18.260000 -CVE-2024-56972,1,1,613b9f21a6c0306685399b60d5c41b029cc25348b539c06ff3248528139c90fc,2025-01-27T19:15:18.360000 +CVE-2024-56971,0,0,53538b1ba98bab8fe87e3a886c9c4c64d5f063e2d12d95d2360a76ebc3086b2e,2025-01-27T19:15:18.260000 +CVE-2024-56972,0,0,613b9f21a6c0306685399b60d5c41b029cc25348b539c06ff3248528139c90fc,2025-01-27T19:15:18.360000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43f66,2025-01-21T16:15:13.947000 @@ -277828,8 +277857,9 @@ CVE-2025-0729,0,0,921b2f4b743018938aaac745dfd23ae197bb3fa3df98fe7275ddb03429898a CVE-2025-0730,0,0,ff571bf1b5fc50ceacf3144befdfbc155d7ea48230259284ae81068fcad94b71,2025-01-27T17:15:17.133000 CVE-2025-0732,0,0,26a5f94ce02cc96eea758a704667aea8c69a327e5d298e23b9658a1917d5ba73,2025-01-27T18:15:40.550000 CVE-2025-0733,0,0,c170d90349bafcc8945875f4b3d3674bb49d9022b735f6bc487d0020af50e491,2025-01-27T18:15:40.760000 -CVE-2025-0734,1,1,2b0fbea7bc08e89f2b572e3c6521a570d94025a1015e33909cf99289b073792e,2025-01-27T19:15:19.130000 -CVE-2025-0751,1,1,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c062b,2025-01-27T20:15:34.587000 +CVE-2025-0734,0,0,2b0fbea7bc08e89f2b572e3c6521a570d94025a1015e33909cf99289b073792e,2025-01-27T19:15:19.130000 +CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c062b,2025-01-27T20:15:34.587000 +CVE-2025-0753,1,1,29a68c520c1ada30651b7f7625e23d6a168a36c3acded86be6c51a51e40dbdd7,2025-01-27T21:15:13.653000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277903,7 +277933,7 @@ CVE-2025-21233,0,0,50fe98bf5fb6919344c6a706a232a330143e358df5598da5887a256e4ea77 CVE-2025-21234,0,0,39b7a883302863e97b1984635aac276f51137179aaf964166708ac90b0cdc623,2025-01-24T21:52:23.483000 CVE-2025-21235,0,0,571b335c736c6fe30347aa23a471a8c1111fdf0537e5c0815b190eb00e18b4ef,2025-01-24T21:52:14.377000 CVE-2025-21236,0,0,4ab7395767f66e640ba671bc020e209da00d10ee161ba19b4d1b644c370503a9,2025-01-24T21:52:41.783000 -CVE-2025-21237,0,1,11653c949cbd3585a25917c8ac2dfbaba89a1cf9d8b017a468062806f70e8ce6,2025-01-27T19:15:21.430000 +CVE-2025-21237,0,0,11653c949cbd3585a25917c8ac2dfbaba89a1cf9d8b017a468062806f70e8ce6,2025-01-27T19:15:21.430000 CVE-2025-21238,0,0,bbafcc84b17d3ba745e62a1b736beb2c69efc328b3988ffb424ff75109e87b47,2025-01-24T21:53:02.610000 CVE-2025-21239,0,0,02558797fb44637e38231493b2afb2dfa0ba4b861eea69a45110f600d310034c,2025-01-24T21:53:18.177000 CVE-2025-21240,0,0,922b74c1cad1eab348c09d362bb8918ae16ee66011d0fff5873c4685194531dd,2025-01-24T21:53:10.267000 @@ -278118,7 +278148,7 @@ CVE-2025-21593,0,0,9b3446b9a612891bc98169a3bb8c97e2abea25024522a1368e878da109404 CVE-2025-21596,0,0,aa7c0fc4f0d758bf67e3e13a54dacfc1fc5b4b975f6328e6068299303dc7e966,2025-01-09T17:15:18.593000 CVE-2025-21598,0,0,9fb2094f8a2031f7ed7d32c76791306da83c38ae082d9be985e264eed6f54a73,2025-01-09T19:15:20.123000 CVE-2025-21599,0,0,0293dfa10687534db0b6808ece4e509d0ea336805aec2c2cd4d5c7bc2313cce0,2025-01-09T17:15:18.770000 -CVE-2025-21600,0,0,0511e8e443940a54ef072ec82b613cd606986ba56f640dd75add7234169397a8,2025-01-09T17:15:18.960000 +CVE-2025-21600,0,1,6546b4477e56caefc379634bff976c32b929cdaf971c22ccce538429b6251ef3,2025-01-27T22:15:14.873000 CVE-2025-21602,0,0,98fe9b608a65f60bdad3939961d20a9c1558362795b914622d82bfabf6cfafaa,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000 @@ -278963,6 +278993,69 @@ CVE-2025-24027,0,0,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bd CVE-2025-24030,0,0,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 +CVE-2025-24085,1,1,c14028dc84daee9d90020a98a98eab2b31ec934ec9b6933876856177a5f6f4b0,2025-01-27T22:15:14.990000 +CVE-2025-24086,1,1,7c5dca39e6ccd2231eef6bf1dd5f599552abe1ede3ec1541e3a2ac0474eb97aa,2025-01-27T22:15:15.080000 +CVE-2025-24087,1,1,835732cf3eefe74b8ac13f2a4025988b418c0a20b7f315efff16a3050e6ed224,2025-01-27T22:15:15.180000 +CVE-2025-24092,1,1,d9a8d44da95886fec6e8ccce9614e643a214860b6ea08f6de6640d3577ec027b,2025-01-27T22:15:15.267000 +CVE-2025-24093,1,1,95657131e09c206793fd530c0fc80d357c2b135e7c8257f69d778887a02ee6c8,2025-01-27T22:15:15.350000 +CVE-2025-24094,1,1,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46b2e,2025-01-27T22:15:15.450000 +CVE-2025-24096,1,1,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000 +CVE-2025-24100,1,1,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000 +CVE-2025-24101,1,1,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000 +CVE-2025-24102,1,1,5c4a84a122c29025995eba7d95b97d930375890c4a75d2d7918884442f5c8787,2025-01-27T22:15:15.807000 +CVE-2025-24103,1,1,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000 +CVE-2025-24104,1,1,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000 +CVE-2025-24106,1,1,b245e38c1f94d7b46ca1b3f515a5a13ed160b150bbff059be2d801d4ea2f7ac7,2025-01-27T22:15:16.070000 +CVE-2025-24107,1,1,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000 +CVE-2025-24108,1,1,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000 +CVE-2025-24109,1,1,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000 +CVE-2025-24112,1,1,1d2969d6d80d7a4b29f11c091a804966e89ceb608d695ab0187a156e13995338,2025-01-27T22:15:16.433000 +CVE-2025-24113,1,1,e3165632c8b4ddab1258ba856efb494e13b0ebef36ddf947b35aaf4ec3db0771,2025-01-27T22:15:16.530000 +CVE-2025-24114,1,1,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000 +CVE-2025-24115,1,1,c95e3395453557e5b431aefc85034f76f0c8b1b69d0a1fcb1a61c73ba0c35f9c,2025-01-27T22:15:16.713000 +CVE-2025-24116,1,1,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000 +CVE-2025-24117,1,1,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000 +CVE-2025-24118,1,1,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000 +CVE-2025-24120,1,1,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000 +CVE-2025-24121,1,1,fe209164caf65ae125cf4039035b5825ca59d466cf68f29e85f4fe986422b336,2025-01-27T22:15:17.230000 +CVE-2025-24122,1,1,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000 +CVE-2025-24123,1,1,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000 +CVE-2025-24124,1,1,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000 +CVE-2025-24126,1,1,1ca267086598e6d13484388122418c9e1026dc7b8bc4026384b3d1ef931801ef,2025-01-27T22:15:17.603000 +CVE-2025-24127,1,1,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000 +CVE-2025-24128,1,1,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000 +CVE-2025-24129,1,1,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000 +CVE-2025-24130,1,1,4866392f6c0e1eb81decc004ed98cd38de37862d801a3eb7fcd60a37aaf44138,2025-01-27T22:15:17.977000 +CVE-2025-24131,1,1,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000 +CVE-2025-24134,1,1,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000 +CVE-2025-24135,1,1,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000 +CVE-2025-24136,1,1,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000 +CVE-2025-24137,1,1,5b657031fc0d48278d9bcd3c281388e4962e50effbbb855d3f7f9bc7f3ab725c,2025-01-27T22:15:18.433000 +CVE-2025-24138,1,1,71fd490bb69478196eafb3b55c96daeb767ba26484dc123dd17ce73d9d828684,2025-01-27T22:15:18.530000 +CVE-2025-24139,1,1,699ab002de103a9fc6370545e2866b9dc1d733dd6b9058c60c5b4f122324b8d4,2025-01-27T22:15:18.627000 +CVE-2025-24140,1,1,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000 +CVE-2025-24141,1,1,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000 +CVE-2025-24143,1,1,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000 +CVE-2025-24145,1,1,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000 +CVE-2025-24146,1,1,770bc8c733ea70c0b9a3beecc559ce8c7ca03653ce71daa08e03b7f15296a298,2025-01-27T22:15:19.077000 +CVE-2025-24149,1,1,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000 +CVE-2025-24150,1,1,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000 +CVE-2025-24151,1,1,ab646694adf5efce849ec3bc02e5553fbff81ec9e6260a5844c257e0ce332077,2025-01-27T22:15:19.360000 +CVE-2025-24152,1,1,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000 +CVE-2025-24153,1,1,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000 +CVE-2025-24154,1,1,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000 +CVE-2025-24156,1,1,b31e860ae0f287a4e55d80ce5295e8b216141d9744778e55fcbf70961f9196e0,2025-01-27T22:15:19.710000 +CVE-2025-24158,1,1,958ab24a351c08ae2d37d82aa9a58131653fdda58ef39d0038d1a6bcd29d13cb,2025-01-27T22:15:19.800000 +CVE-2025-24159,1,1,1b9aba57afa1c7268c6f0a356b044e00ee89cb5b596c74f23398ec84262146ee,2025-01-27T22:15:19.897000 +CVE-2025-24160,1,1,1b6ff2d4bc9c9beb4ec9901d4c44f5db885014d9dffe1fb867c9b5f4c3925fc6,2025-01-27T22:15:19.987000 +CVE-2025-24161,1,1,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000 +CVE-2025-24162,1,1,9463e44df647b566fdc6d77ad9aa2961be851ffbe1b612e2da53bb5785b9c7b6,2025-01-27T22:15:20.167000 +CVE-2025-24163,1,1,91fc2f170654ac01d435f8f1dbaf7034d0eee62c47dae1f32a2cb5960eca0c04,2025-01-27T22:15:20.267000 +CVE-2025-24166,1,1,9ca035738a2e0b4c88133f181378b4ebabcfdd0e45c248150891735b95780aa9,2025-01-27T22:15:20.357000 +CVE-2025-24169,1,1,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000 +CVE-2025-24174,1,1,c4428cb0ae7d4247d293b4a79c4936682809d79d5f83a3777284666b7ed6f45f,2025-01-27T22:15:20.547000 +CVE-2025-24176,1,1,093d4bc1cead3fb3eb26eee3735d4f5a8e3bd4316b3fc0d2d6afa3b52cddf359,2025-01-27T22:15:20.643000 +CVE-2025-24177,1,1,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 CVE-2025-24354,0,0,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000 @@ -278976,8 +279069,8 @@ CVE-2025-24362,0,0,bd0008c19e13cbed43d9a180a0c8a1357e3b6112b693da2df160b4b2a8f31 CVE-2025-24363,0,0,39d368ed8bf973713f2f52722001ed32dc19782f4926a08e8694d7826f6928da,2025-01-24T19:15:13.633000 CVE-2025-24364,0,0,f7dcd518da07800d85dff61a054420a867b9ac42fb1cac1f51f60d1e528debaa,2025-01-27T18:15:41.690000 CVE-2025-24365,0,0,d6342940809c27d9918f0aa477a7b2f50186c8429dabb272c8726a06897b52a0,2025-01-27T18:15:41.847000 -CVE-2025-24367,0,1,2dde85784ec9629d596d7bcf8877ef61ab7a77a4d03b902c93b772a1e0c8bf52,2025-01-27T19:15:29.440000 -CVE-2025-24368,0,1,761affe4f81311650725b2d0afa011960bd8f2b1d46ad3a802c200945d7bb31c,2025-01-27T19:15:29.540000 +CVE-2025-24367,0,0,2dde85784ec9629d596d7bcf8877ef61ab7a77a4d03b902c93b772a1e0c8bf52,2025-01-27T19:15:29.440000 +CVE-2025-24368,0,0,761affe4f81311650725b2d0afa011960bd8f2b1d46ad3a802c200945d7bb31c,2025-01-27T19:15:29.540000 CVE-2025-24389,0,0,703cd148aa55fffbc38e036ef55c06da66449ab5152579e3986444865088b5ce,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,31dccc33f27efa697a88d53c2bd0e3339846722442ec6537bda6f0c65832dee4,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000 @@ -279132,6 +279225,6 @@ CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651f CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 -CVE-2025-24783,0,1,3767ef322fc0c20fd082201a2ac0c7b57ed64f90c79baef6c1c88b7b021b0a09,2025-01-27T19:15:29.637000 +CVE-2025-24783,0,0,3767ef322fc0c20fd082201a2ac0c7b57ed64f90c79baef6c1c88b7b021b0a09,2025-01-27T19:15:29.637000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000