Auto-Update: 2025-03-05T23:00:20.893617+00:00

This commit is contained in:
cad-safe-bot 2025-03-05 23:03:50 +00:00
parent 7e5ea7c339
commit 00da308cc4
67 changed files with 2504 additions and 295 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33351",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T22:15:09.480",
"lastModified": "2024-11-21T06:08:44.347",
"lastModified": "2025-03-05T21:15:13.477",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33352",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T22:15:09.537",
"lastModified": "2024-11-21T06:08:44.500",
"lastModified": "2025-03-05T21:15:14.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47480",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-03-10T21:15:14.143",
"lastModified": "2024-11-21T07:32:02.970",
"lastModified": "2025-03-05T21:15:14.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47481",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-03-10T21:15:14.197",
"lastModified": "2024-11-21T07:32:03.103",
"lastModified": "2025-03-05T21:15:15.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47482",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-03-10T21:15:14.250",
"lastModified": "2024-11-21T07:32:03.223",
"lastModified": "2025-03-05T21:15:15.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47483",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-03-10T21:15:14.307",
"lastModified": "2024-11-21T07:32:03.347",
"lastModified": "2025-03-05T21:15:15.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49411",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:17.613",
"lastModified": "2025-02-26T07:01:17.613",
"vulnStatus": "Received",
"lastModified": "2025-03-05T22:15:34.580",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bfq: Aseg\u00farese de que bfqg para el que estamos poniendo en cola las solicitudes est\u00e9 en l\u00ednea. Las BIOS en cola en el programador de E/S de BFQ se pueden asociar con un cgroup que ya estaba fuera de l\u00ednea. Esto puede provocar la inserci\u00f3n de este bfq_group en un \u00e1rbol de servicios. Pero este bfq_group se liberar\u00e1 tan pronto como se complete la \u00faltima bio asociada con \u00e9l, lo que genera problemas de use-after-free para los usuarios del \u00e1rbol de servicios. Solucione el problema asegur\u00e1ndose de que siempre operamos en bfq_group en l\u00ednea. Si el bfq_group asociado con la bio no est\u00e1 en l\u00ednea, elegimos el primer padre en l\u00ednea."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49489",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:25.083",
"lastModified": "2025-02-26T07:01:25.083",
"vulnStatus": "Received",
"lastModified": "2025-03-05T22:15:34.743",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/disp/dpu1: establecer la configuraci\u00f3n de hardware de vbif en NULL para evitar su uso despu\u00e9s de liberar memoria durante la reanudaci\u00f3n del tiempo de ejecuci\u00f3n de pm ERROR: No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 006b6b6b6b6b6be3 Call trace: dpu_vbif_init_memtypes+0x40/0xb8 dpu_runtime_resume+0xcc/0x1c0 pm_generic_runtime_resume+0x30/0x44 __genpd_runtime_resume+0x68/0x7c genpd_runtime_resume+0x134/0x258 __rpm_callback+0x98/0x138 rpm_callback+0x30/0x88 rpm_resume+0x36c/0x49c __pm_runtime_resume+0x80/0xb0 dpu_core_irq_uninstall+0x30/0xb0 dpu_irq_uninstall+0x18/0x24 msm_drm_uninit+0xd8/0x16c Patchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag] "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/134760263f6441741db0b2970e7face6b34b6d1c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49694",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:44.170",
"lastModified": "2025-02-26T07:01:44.170",
"vulnStatus": "Received",
"lastModified": "2025-03-05T22:15:34.923",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: block: deshabilitar el elevador int del_gendisk El elevador solo se usa para solicitudes del sistema de archivos, que se detienen en del_gendisk. Mueva la desactivaci\u00f3n del elevador y la liberaci\u00f3n de las etiquetas del programador al final de del_gendisk en lugar de hacer ese trabajo en disk_release y blk_cleanup_queue para evitar un use-after-free en q->tag_set desde disk_release ya que tag_set podr\u00eda no estar activo en ese punto. Mueva tambi\u00e9n la llamada blk_qos_exit, ya que solo depende de la salida del elevador y ser\u00eda la \u00fanica raz\u00f3n para mantener la congelaci\u00f3n de la cola no exactamente barata en disk_release."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/50e34d78815e474d410f342fbe783b18192ca518",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0030",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-08T23:15:10.963",
"lastModified": "2024-11-21T07:36:25.820",
"lastModified": "2025-03-05T21:15:15.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,13 +32,33 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -48,6 +68,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
@ -115,6 +145,14 @@
{
"url": "https://security.netapp.com/advisory/ntap-20230413-0010/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1161",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-03-06T21:15:10.990",
"lastModified": "2024-11-21T07:38:34.827",
"lastModified": "2025-03-05T21:15:15.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20628",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-03-07T21:15:10.730",
"lastModified": "2024-11-21T07:41:15.213",
"lastModified": "2025-03-05T22:15:35.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20630",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-03-07T21:15:10.787",
"lastModified": "2024-11-21T07:41:15.333",
"lastModified": "2025-03-05T21:15:16.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -215,6 +245,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/bulletins/sb23-072",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20632",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-03-07T21:15:10.847",
"lastModified": "2024-11-21T07:41:15.453",
"lastModified": "2025-03-05T21:15:16.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -215,6 +245,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/bulletins/sb23-072",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22889",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T21:15:10.643",
"lastModified": "2024-11-21T07:45:35.347",
"lastModified": "2025-03-05T21:15:16.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22891",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T21:15:10.760",
"lastModified": "2024-11-21T07:45:35.647",
"lastModified": "2025-03-05T21:15:16.683",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24789",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-06T16:15:10.187",
"lastModified": "2024-11-21T07:48:24.780",
"lastModified": "2025-03-05T21:15:16.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25145",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-03-10T21:15:15.010",
"lastModified": "2024-11-21T07:49:11.720",
"lastModified": "2025-03-05T21:15:16.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-59"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25146",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-03-10T21:15:15.140",
"lastModified": "2024-11-21T07:49:11.830",
"lastModified": "2025-03-05T21:15:17.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-59"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25147",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-03-10T21:15:15.203",
"lastModified": "2024-11-21T07:49:11.940",
"lastModified": "2025-03-05T21:15:17.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25148",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-03-10T21:15:15.257",
"lastModified": "2024-11-21T07:49:12.047",
"lastModified": "2025-03-05T21:15:17.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-59"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26106",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-06T05:15:12.200",
"lastModified": "2024-11-21T07:50:47.253",
"lastModified": "2025-03-05T21:15:17.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26111",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-06T05:15:12.920",
"lastModified": "2024-11-21T07:50:47.830",
"lastModified": "2025-03-05T21:15:18.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50961",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-27T13:15:46.300",
"lastModified": "2024-11-21T08:37:36.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-05T20:50:02.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,22 +71,83 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275939",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7145262",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275939",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7145262",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13869",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T13:15:10.920",
"lastModified": "2025-02-23T04:15:23.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-05T21:28:15.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpvivid:wpvivid_backup_\\&_migration:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "0.9.113",
"matchCriteriaId": "12A92821-C7A2-4C53-97A1-C73DAE8D5D0E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/d0n601/CVE-2024-13869",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3242904/wpvivid-backuprestore",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://ryankozak.com/posts/cve-2024-13869/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Exploit"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0082e46d-fdbe-4ab7-bba3-0681a25d4495?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27270",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-27T13:15:47.213",
"lastModified": "2024-11-21T09:04:13.080",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-05T20:50:02.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,22 +71,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
"versionStartIncluding": "23.0.0.3",
"versionEndExcluding": "24.0.0.4",
"matchCriteriaId": "19AFD9C1-3BDA-415B-8F4E-9186494EDDCC"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284576",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7145231",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284576",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7145231",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30177",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T11:15:47.413",
"lastModified": "2024-11-21T09:11:22.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-05T20:50:02.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "2.6.9",
"matchCriteriaId": "2D965130-2C9B-49DD-8583-1E55F54E5D7E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30232",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T12:15:50.610",
"lastModified": "2024-11-21T09:11:30.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-05T20:50:02.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "0A5BEBE2-AAB8-4961-BABF-BF281E597819"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45774",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-18T19:15:16.387",
"lastModified": "2025-02-18T19:15:16.387",
"lastModified": "2025-03-05T21:15:18.897",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -59,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337461",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-45779",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T15:15:14.660",
"lastModified": "2025-03-03T15:15:14.660",
"vulnStatus": "Received",
"lastModified": "2025-03-05T21:15:19.043",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow flaw was found in the BFS file system driver in grub2. When reading a file with an indirect extent map, grub2 fails to validate the number of extent entries to be read. A crafted or corrupted BFS filesystem may cause an integer overflow during the file reading, leading to a heap of bounds read. As a consequence, sensitive data may be leaked, or grub2 will crash."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla de desbordamiento de enteros en el controlador del sistema de archivos BFS en grub2. Al leer un archivo con un mapa de extensi\u00f3n indirecto, grub2 no puede validar la cantidad de entradas de extensi\u00f3n que se leer\u00e1n. Un sistema de archivos BFS manipulado o da\u00f1ado puede causar un desbordamiento de enteros durante la lectura del archivo, lo que genera una gran cantidad de lecturas de los l\u00edmites. Como consecuencia, se pueden filtrar datos confidenciales o grub2 puede fallar."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345854",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-45780",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T15:15:14.950",
"lastModified": "2025-03-03T15:15:14.950",
"vulnStatus": "Received",
"lastModified": "2025-03-05T21:15:19.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2. When reading tar files, grub2 allocates an internal buffer for the file name. However, it fails to properly verify the allocation against possible integer overflows. It's possible to cause the allocation length to overflow with a crafted tar file, leading to a heap out-of-bounds write. This flaw eventually allows an attacker to circumvent secure boot protections."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en grub2. Al leer archivos tar, grub2 asigna un b\u00fafer interno para el nombre del archivo. Sin embargo, no verifica correctamente la asignaci\u00f3n contra posibles desbordamientos de n\u00fameros enteros. Es posible provocar que la longitud de la asignaci\u00f3n se desborde con un archivo tar manipulado, lo que lleva a una escritura fuera de los l\u00edmites en el mont\u00f3n. Esta falla finalmente permite a un atacante eludir las protecciones de arranque seguro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345856",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53458",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T18:15:37.053",
"lastModified": "2025-03-05T18:15:37.053",
"lastModified": "2025-03-05T21:15:19.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,11 +11,50 @@
"value": "Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/182468/Sysax-Multi-Server-6.99-SSH-Denial-Of-Service.html",
"source": "cve@mitre.org"
},
{
"url": "https://packetstorm.news/files/id/182468",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57174",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T21:15:19.410",
"lastModified": "2025-03-05T21:15:19.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible to access sensitive information."
}
],
"metrics": {},
"references": [
{
"url": "https://chenzw.medium.com/internal-domain-names-f1cd2886c654",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/geo-chen/BSides-SG-2022---Internal-Domain-Names?tab=readme-ov-file#finding-1---cve-2024-57174-alphion-routers",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-58013",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-27T03:15:12.287",
"lastModified": "2025-02-27T03:15:12.287",
"vulnStatus": "Received",
"lastModified": "2025-03-05T22:15:35.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: MGMT: Corregir lectura slab-use-after-free en mgmt_remove_adv_monitor_sync Esto corrige el siguiente fallo: ===================================================================== ERROR: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543 Read of size 8 at addr ffff88814128f898 by task kworker/u9:4/5961 CPU: 1 UID: 0 PID: 5961 Comm: kworker/u9:4 Not tainted 6.12.0-syzkaller-10684-gf1cd565ce577 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Allocated by task 16026: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4314 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296 remove_adv_monitor+0x102/0x1b0 net/bluetooth/mgmt.c:5568 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:726 sock_write_iter+0x2d7/0x3f0 net/socket.c:1147 new_sync_write fs/read_write.c:586 [inline] vfs_write+0xaeb/0xd30 fs/read_write.c:679 ksys_write+0x18f/0x2b0 fs/read_write.c:731 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 16022: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2338 [inline] slab_free mm/slub.c:4598 [inline] kfree+0x196/0x420 mm/slub.c:4746 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259 __mgmt_power_off+0x183/0x430 net/bluetooth/mgmt.c:9550 hci_dev_close_sync+0x6c4/0x11c0 net/bluetooth/hci_sync.c:5208 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline] hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508 sock_do_ioctl+0x158/0x460 net/socket.c:1209 sock_ioctl+0x626/0x8e0 net/socket.c:1328 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f3d05aacbfcf3584bbd9caaee34cb02508dab68",

View File

@ -2,20 +2,24 @@
"id": "CVE-2025-0689",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T15:15:16.147",
"lastModified": "2025-03-03T15:15:16.147",
"vulnStatus": "Received",
"lastModified": "2025-03-05T21:15:19.503",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections."
},
{
"lang": "es",
"value": "Al leer datos del disco, el m\u00f3dulo de sistema de archivos UDF de grub utiliza los metadatos de longitud de datos controlados por el usuario para asignar sus b\u00faferes internos. En ciertos escenarios, al iterar a trav\u00e9s de los sectores del disco, asume que el tama\u00f1o de lectura del disco siempre es menor que el tama\u00f1o de b\u00fafer asignado, lo que no est\u00e1 garantizado. Una imagen de sistema de archivos manipulado puede provocar un desbordamiento de b\u00fafer basado en el mont\u00f3n que da como resultado la corrupci\u00f3n de datos cr\u00edticos, lo que genera el riesgo de ejecuci\u00f3n de c\u00f3digo arbitrario que pasa por alto las protecciones de arranque seguro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346122",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0690",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-24T08:15:09.503",
"lastModified": "2025-02-24T08:15:09.503",
"lastModified": "2025-03-05T21:15:19.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -59,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346123",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0918",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T13:15:11.687",
"lastModified": "2025-02-22T13:15:11.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-05T21:28:15.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,28 +69,71 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "47DFF634-7BAD-4340-8435-31C67286B4D7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3056461/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3234377/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/smtp-sendgrid/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0953",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T13:15:11.850",
"lastModified": "2025-02-22T13:15:11.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-05T21:28:15.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,28 +69,71 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "95B58D8D-E4C5-41FD-9332-B0DDBB3DD4DF"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Functions.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Helper/Utils.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3234379/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/smtp-sendinblue/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ba65ac-e568-4c13-961d-6453f281d9fc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2025-1125",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T15:15:16.300",
"lastModified": "2025-03-03T15:15:16.300",
"vulnStatus": "Received",
"lastModified": "2025-03-05T21:15:19.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections."
},
{
"lang": "es",
"value": "Al leer datos de un sistema de archivos hfs, el m\u00f3dulo hfs filesystem de grub utiliza par\u00e1metros controlados por el usuario de los metadatos del sistema de archivos para calcular el tama\u00f1o de los b\u00faferes internos, sin embargo, no comprueba correctamente si hay desbordamientos de n\u00fameros enteros. Un sistema de archivos manipulado con fines malintencionados puede provocar que algunos de esos c\u00e1lculos de tama\u00f1o de b\u00fafer se desborden, lo que hace que realice una operaci\u00f3n grub_malloc() con un tama\u00f1o menor al esperado. Como resultado, la funci\u00f3n hfsplus_open_compressed_real() escribir\u00e1 m\u00e1s all\u00e1 de la longitud del b\u00fafer interno. Esta falla puede aprovecharse para corromper los datos cr\u00edticos internos de grub y puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario que elude las protecciones de arranque seguro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346138",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25362",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T21:15:19.803",
"lastModified": "2025-03-05T21:15:19.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/explosion/spacy-llm/issues/492",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25632",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T21:15:19.890",
"lastModified": "2025-03-05T21:15:19.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25634",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T21:15:19.980",
"lastModified": "2025-03-05T21:15:19.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19GetParentControlInfo.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27508",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-05T22:15:35.867",
"lastModified": "2025-03-05T22:15:35.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://github.com/NationalSecurityAgency/emissary/commit/da3a81a8977577597ff2a944820a5ae4e9762368",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-27516",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-05T21:15:20.073",
"lastModified": "2025-03-05T21:15:20.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://github.com/pallets/jinja/commit/90457bbf33b8662926ae65cdde4c4c32e756e403",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pallets/jinja/security/advisories/GHSA-cpwx-vrp4-4pq7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27643",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:35.847",
"lastModified": "2025-03-05T06:15:35.847",
"lastModified": "2025-03-05T21:15:20.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Hardcoded AWS API Key V-2024-006."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la clave API de AWS codificada de forma r\u00edgida V-2024-006."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27644",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:35.990",
"lastModified": "2025-03-05T06:15:35.990",
"lastModified": "2025-03-05T21:15:20.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Local Privilege Escalation V-2024-007."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la escalada de privilegios locales V-2024-007."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27645",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.117",
"lastModified": "2025-03-05T06:15:36.117",
"lastModified": "2025-03-05T21:15:20.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Insecure Extension Installation by Trusting HTTP Permission Methods on the Server Side V-2024-005."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la instalaci\u00f3n de extensiones inseguras al confiar en los m\u00e9todos de permisos HTTP en el lado del servidor V-2024-005."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27646",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.257",
"lastModified": "2025-03-05T06:15:36.257",
"lastModified": "2025-03-05T21:15:20.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Edit User Account Exposure V-2024-001."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite editar la exposici\u00f3n de cuentas de usuario V-2024-001."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27647",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.387",
"lastModified": "2025-03-05T06:15:36.387",
"lastModified": "2025-03-05T21:15:20.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Addition of Partial Admin Users Without Authentication V-2024-002."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite la adici\u00f3n de usuarios administradores parciales sin autenticaci\u00f3n V-2024-002."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27648",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.523",
"lastModified": "2025-03-05T06:15:36.523",
"lastModified": "2025-03-05T21:15:21.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Cross Tenant Password Exposure V-2024-003."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite la exposici\u00f3n de contrase\u00f1as entre inquilinos V-2024-003."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27649",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.667",
"lastModified": "2025-03-05T06:15:36.667",
"lastModified": "2025-03-05T21:15:21.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.893 Application 20.0.2140 allows Incorrect Access Control: PHP V-2023-016."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.893 La aplicaci\u00f3n 20.0.2140 permite un control de acceso incorrecto: PHP V-2023-016."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27650",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.817",
"lastModified": "2025-03-05T06:15:36.817",
"lastModified": "2025-03-05T21:15:21.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Private Keys in Docker Overlay V-2023-013."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite claves privadas en Docker Overlay V-2023-013."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27651",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:36.950",
"lastModified": "2025-03-05T06:15:36.950",
"lastModified": "2025-03-05T21:15:21.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: Elatec V-2023-014."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27652",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:37.077",
"lastModified": "2025-03-05T06:15:37.077",
"lastModified": "2025-03-05T21:15:21.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: rfIDEAS V-2023-015."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27665",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:38.840",
"lastModified": "2025-03-05T06:15:38.840",
"lastModified": "2025-03-05T21:15:21.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Antivirus Protection and thus drivers can have known malicious code OVE-20230524-0009."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una protecci\u00f3n antivirus insuficiente y, por lo tanto, los controladores pueden tener el c\u00f3digo malicioso conocido OVE-20230524-0009."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27666",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:38.970",
"lastModified": "2025-03-05T06:15:38.970",
"lastModified": "2025-03-05T21:15:22.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Authorization Checks OVE-20230524-0010."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite comprobaciones de autorizaci\u00f3n insuficientes OVE-20230524-0010."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27667",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:39.100",
"lastModified": "2025-03-05T06:15:39.100",
"lastModified": "2025-03-05T21:15:22.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la enumeraci\u00f3n de correo electr\u00f3nico de usuario administrativo OVE-20230524-0011."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27668",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:39.237",
"lastModified": "2025-03-05T06:15:39.237",
"lastModified": "2025-03-05T21:15:22.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la inclusi\u00f3n de contenido arbitrario a trav\u00e9s de Iframe OVE-20230524-0012."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27669",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:39.373",
"lastModified": "2025-03-05T06:15:39.373",
"lastModified": "2025-03-05T21:15:22.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite escaneo de red remoto (XSPA)/DoS OVE-20230524-0013."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27670",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:39.537",
"lastModified": "2025-03-05T06:15:39.537",
"lastModified": "2025-03-05T21:15:22.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Signature Validation OVE-20230524-0014."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una validaci\u00f3n de firma insuficiente OVE-20230524-0014."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27671",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:39.903",
"lastModified": "2025-03-05T06:15:39.903",
"lastModified": "2025-03-05T21:15:22.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Device Impersonation OVE-20230524-0015."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la suplantaci\u00f3n de dispositivo OVE-20230524-0015."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27672",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:40.043",
"lastModified": "2025-03-05T06:15:40.043",
"lastModified": "2025-03-05T21:15:22.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows OAUTH Security Bypass OVE-20230524-0016."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la omisi\u00f3n de seguridad OAUTH OVE-20230524-0016."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27683",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:41.427",
"lastModified": "2025-03-05T06:15:41.427",
"lastModified": "2025-03-05T21:15:23.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la carga sin restricciones de archivos con el tipo peligroso V-2022-006."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27684",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:41.540",
"lastModified": "2025-03-05T06:15:41.540",
"lastModified": "2025-03-05T21:15:23.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la depuraci\u00f3n El paquete contiene datos confidenciales V-2022-003."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-215"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27685",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-05T06:15:41.663",
"lastModified": "2025-03-05T06:15:41.663",
"lastModified": "2025-03-05T21:15:23.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA & Private Key V-2022-001."
},
{
"lang": "es",
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite el archivo de configuraci\u00f3n que contiene CA y clave privada V-2022-001."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-05T21:00:20.119253+00:00
2025-03-05T23:00:20.893617+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-05T20:50:02.120000+00:00
2025-03-05T22:15:35.867000+00:00
```
### Last Data Feed Release
@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284254
284260
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `6`
- [CVE-2024-31525](CVE-2024/CVE-2024-315xx/CVE-2024-31525.json) (`2025-03-05T19:15:37.340`)
- [CVE-2024-48246](CVE-2024/CVE-2024-482xx/CVE-2024-48246.json) (`2025-03-05T19:15:37.453`)
- [CVE-2024-51144](CVE-2024/CVE-2024-511xx/CVE-2024-51144.json) (`2025-03-05T20:16:05.603`)
- [CVE-2025-2003](CVE-2025/CVE-2025-20xx/CVE-2025-2003.json) (`2025-03-05T19:15:39.630`)
- [CVE-2025-27513](CVE-2025/CVE-2025-275xx/CVE-2025-27513.json) (`2025-03-05T19:15:39.337`)
- [CVE-2025-27515](CVE-2025/CVE-2025-275xx/CVE-2025-27515.json) (`2025-03-05T19:15:39.483`)
- [CVE-2025-27517](CVE-2025/CVE-2025-275xx/CVE-2025-27517.json) (`2025-03-05T20:16:05.960`)
- [CVE-2024-57174](CVE-2024/CVE-2024-571xx/CVE-2024-57174.json) (`2025-03-05T21:15:19.410`)
- [CVE-2025-25362](CVE-2025/CVE-2025-253xx/CVE-2025-25362.json) (`2025-03-05T21:15:19.803`)
- [CVE-2025-25632](CVE-2025/CVE-2025-256xx/CVE-2025-25632.json) (`2025-03-05T21:15:19.890`)
- [CVE-2025-25634](CVE-2025/CVE-2025-256xx/CVE-2025-25634.json) (`2025-03-05T21:15:19.980`)
- [CVE-2025-27508](CVE-2025/CVE-2025-275xx/CVE-2025-27508.json) (`2025-03-05T22:15:35.867`)
- [CVE-2025-27516](CVE-2025/CVE-2025-275xx/CVE-2025-27516.json) (`2025-03-05T21:15:20.073`)
### CVEs modified in the last Commit
Recently modified CVEs: `51`
Recently modified CVEs: `59`
- [CVE-2023-29420](CVE-2023/CVE-2023-294xx/CVE-2023-29420.json) (`2025-03-05T19:15:34.933`)
- [CVE-2023-29854](CVE-2023/CVE-2023-298xx/CVE-2023-29854.json) (`2025-03-05T19:15:35.153`)
- [CVE-2023-36679](CVE-2023/CVE-2023-366xx/CVE-2023-36679.json) (`2025-03-05T20:50:02.120`)
- [CVE-2023-49031](CVE-2023/CVE-2023-490xx/CVE-2023-49031.json) (`2025-03-05T19:15:37.110`)
- [CVE-2024-28784](CVE-2024/CVE-2024-287xx/CVE-2024-28784.json) (`2025-03-05T20:50:02.120`)
- [CVE-2024-53384](CVE-2024/CVE-2024-533xx/CVE-2024-53384.json) (`2025-03-05T19:15:37.560`)
- [CVE-2024-55570](CVE-2024/CVE-2024-555xx/CVE-2024-55570.json) (`2025-03-05T19:15:37.710`)
- [CVE-2025-1470](CVE-2025/CVE-2025-14xx/CVE-2025-1470.json) (`2025-03-05T18:54:18.150`)
- [CVE-2025-1471](CVE-2025/CVE-2025-14xx/CVE-2025-1471.json) (`2025-03-05T18:54:18.150`)
- [CVE-2025-1889](CVE-2025/CVE-2025-18xx/CVE-2025-1889.json) (`2025-03-05T20:16:46.363`)
- [CVE-2025-1891](CVE-2025/CVE-2025-18xx/CVE-2025-1891.json) (`2025-03-05T20:16:46.363`)
- [CVE-2025-1892](CVE-2025/CVE-2025-18xx/CVE-2025-1892.json) (`2025-03-05T20:16:46.363`)
- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-05T19:15:37.870`)
- [CVE-2025-21355](CVE-2025/CVE-2025-213xx/CVE-2025-21355.json) (`2025-03-05T18:54:18.150`)
- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-03-05T18:54:18.150`)
- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-03-05T19:15:38.007`)
- [CVE-2025-25349](CVE-2025/CVE-2025-253xx/CVE-2025-25349.json) (`2025-03-05T19:15:38.180`)
- [CVE-2025-25741](CVE-2025/CVE-2025-257xx/CVE-2025-25741.json) (`2025-03-05T19:15:38.353`)
- [CVE-2025-25742](CVE-2025/CVE-2025-257xx/CVE-2025-25742.json) (`2025-03-05T19:15:38.503`)
- [CVE-2025-25743](CVE-2025/CVE-2025-257xx/CVE-2025-25743.json) (`2025-03-05T19:15:38.693`)
- [CVE-2025-25744](CVE-2025/CVE-2025-257xx/CVE-2025-25744.json) (`2025-03-05T19:15:38.860`)
- [CVE-2025-26182](CVE-2025/CVE-2025-261xx/CVE-2025-26182.json) (`2025-03-05T19:15:39.023`)
- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-05T19:15:39.173`)
- [CVE-2025-27500](CVE-2025/CVE-2025-275xx/CVE-2025-27500.json) (`2025-03-05T20:16:46.363`)
- [CVE-2025-27501](CVE-2025/CVE-2025-275xx/CVE-2025-27501.json) (`2025-03-05T20:16:46.363`)
- [CVE-2025-0690](CVE-2025/CVE-2025-06xx/CVE-2025-0690.json) (`2025-03-05T21:15:19.603`)
- [CVE-2025-0918](CVE-2025/CVE-2025-09xx/CVE-2025-0918.json) (`2025-03-05T21:28:15.293`)
- [CVE-2025-0953](CVE-2025/CVE-2025-09xx/CVE-2025-0953.json) (`2025-03-05T21:28:15.293`)
- [CVE-2025-1125](CVE-2025/CVE-2025-11xx/CVE-2025-1125.json) (`2025-03-05T21:15:19.707`)
- [CVE-2025-27643](CVE-2025/CVE-2025-276xx/CVE-2025-27643.json) (`2025-03-05T21:15:20.240`)
- [CVE-2025-27644](CVE-2025/CVE-2025-276xx/CVE-2025-27644.json) (`2025-03-05T21:15:20.420`)
- [CVE-2025-27645](CVE-2025/CVE-2025-276xx/CVE-2025-27645.json) (`2025-03-05T21:15:20.580`)
- [CVE-2025-27646](CVE-2025/CVE-2025-276xx/CVE-2025-27646.json) (`2025-03-05T21:15:20.757`)
- [CVE-2025-27647](CVE-2025/CVE-2025-276xx/CVE-2025-27647.json) (`2025-03-05T21:15:20.893`)
- [CVE-2025-27648](CVE-2025/CVE-2025-276xx/CVE-2025-27648.json) (`2025-03-05T21:15:21.037`)
- [CVE-2025-27649](CVE-2025/CVE-2025-276xx/CVE-2025-27649.json) (`2025-03-05T21:15:21.180`)
- [CVE-2025-27650](CVE-2025/CVE-2025-276xx/CVE-2025-27650.json) (`2025-03-05T21:15:21.357`)
- [CVE-2025-27651](CVE-2025/CVE-2025-276xx/CVE-2025-27651.json) (`2025-03-05T21:15:21.523`)
- [CVE-2025-27652](CVE-2025/CVE-2025-276xx/CVE-2025-27652.json) (`2025-03-05T21:15:21.677`)
- [CVE-2025-27665](CVE-2025/CVE-2025-276xx/CVE-2025-27665.json) (`2025-03-05T21:15:21.907`)
- [CVE-2025-27666](CVE-2025/CVE-2025-276xx/CVE-2025-27666.json) (`2025-03-05T21:15:22.087`)
- [CVE-2025-27667](CVE-2025/CVE-2025-276xx/CVE-2025-27667.json) (`2025-03-05T21:15:22.247`)
- [CVE-2025-27668](CVE-2025/CVE-2025-276xx/CVE-2025-27668.json) (`2025-03-05T21:15:22.380`)
- [CVE-2025-27669](CVE-2025/CVE-2025-276xx/CVE-2025-27669.json) (`2025-03-05T21:15:22.510`)
- [CVE-2025-27670](CVE-2025/CVE-2025-276xx/CVE-2025-27670.json) (`2025-03-05T21:15:22.647`)
- [CVE-2025-27671](CVE-2025/CVE-2025-276xx/CVE-2025-27671.json) (`2025-03-05T21:15:22.793`)
- [CVE-2025-27672](CVE-2025/CVE-2025-276xx/CVE-2025-27672.json) (`2025-03-05T21:15:22.930`)
- [CVE-2025-27683](CVE-2025/CVE-2025-276xx/CVE-2025-27683.json) (`2025-03-05T21:15:23.060`)
- [CVE-2025-27684](CVE-2025/CVE-2025-276xx/CVE-2025-27684.json) (`2025-03-05T21:15:23.197`)
- [CVE-2025-27685](CVE-2025/CVE-2025-276xx/CVE-2025-27685.json) (`2025-03-05T21:15:23.337`)
## Download and Usage

View File

@ -173384,7 +173384,7 @@ CVE-2021-28247,0,0,8a48528df54b962ad86087a21c67398f7d0a2b31ec145a320eb1e2aafdfab
CVE-2021-28248,0,0,0b8c67dff771f7883e0e0334dd310e67925fa190051a701b2e42d0de04ffdf28,2024-11-21T05:59:24.063000
CVE-2021-28249,0,0,b38b4cdc8a8689f21f1e8dc83fd7f0e679e1810ac11f68a09979ae4176b22902,2024-11-21T05:59:24.283000
CVE-2021-28250,0,0,2ee329a0b0b5971160b5f9632535f7aa84ed88d37d84d2503bf8089406fe2551,2024-11-21T05:59:24.430000
CVE-2021-28254,0,1,7f9d7301ceea6ef75775b405e16bb52f663d67a27ae5fc74bded0fc20c0de32a,2025-03-05T19:15:24.927000
CVE-2021-28254,0,0,7f9d7301ceea6ef75775b405e16bb52f663d67a27ae5fc74bded0fc20c0de32a,2025-03-05T19:15:24.927000
CVE-2021-28269,0,0,807f2466e43a408dfcf578392d0b4be00cc186134c2fa653eb130027f5f96c40,2024-11-21T05:59:24.740000
CVE-2021-28271,0,0,f9af5b693852efd28516810e6693fe68f3ded36ef1187ee7d84eb70d004b2b1c,2024-11-21T05:59:24.883000
CVE-2021-28275,0,0,052ab66b3b935f4def9dd1de20a43a2d6d8aa2cc9d1db052ed84666dd0d727a5,2024-11-21T05:59:25.043000
@ -177212,8 +177212,8 @@ CVE-2021-33339,0,0,029c104574d21eec902b320411bcd0408c6e8e6c3c693914f4e4b16e640ef
CVE-2021-33346,0,0,a8daab26aaed2cce58e08e51dc9dd1e03edd586f6b06884e5a7fd61a32f9da87,2024-11-21T06:08:43.910000
CVE-2021-33347,0,0,d57feb5106894bb611a650a977511367b0102014ebb93bb500c067f5b68d83b5,2024-11-21T06:08:44.067000
CVE-2021-33348,0,0,8bdc260900608e8d82c45b0b21fecdd8e10188f492e8d2615bdc1dfb29eb15b0,2024-11-21T06:08:44.213000
CVE-2021-33351,0,0,f370fe0d6a8289ccc56296db68d4e0bc5ce18771846d15f045f9b4c4b723e2d7,2024-11-21T06:08:44.347000
CVE-2021-33352,0,0,e3342c76a0f6b98a2e94354e252afbca2b229d9c481d909a1d86aecfd13b5f7e,2024-11-21T06:08:44.500000
CVE-2021-33351,0,1,7c9bfc60172aeee121cab9628065e6b6e3c2a84d34acdbba1d52a72612721163,2025-03-05T21:15:13.477000
CVE-2021-33352,0,1,82dcdf89b179eb504ebd392c54183ed4e8e88b2e92c19d4fa8b05d82695fd81b,2025-03-05T21:15:14.600000
CVE-2021-33353,0,0,7c2c4b7896620124533885d6bd3de4e33e6d14b0e7ac5f792a930ee530eb7192,2025-03-04T22:15:34.960000
CVE-2021-33354,0,0,c809b0d19ab7f7969b4f1de78dc5b988bff2c1c93cea1c82f6d27d58f0f657ab,2024-11-21T06:08:44.790000
CVE-2021-33356,0,0,2e117bb974dabca13136cd4702ccf7267b60e0545c77f5bd84e8d8cf5896c37c,2024-11-21T06:08:44.957000
@ -183554,7 +183554,7 @@ CVE-2021-4161,0,0,330cce1d183695fbd38111b6ca9460022c51ce4f359aa65bd579fd4365c44b
CVE-2021-41610,0,0,4383295040357b63b77992dd7785cc62b9b95f8d58dd93cdf697d7c53800b4d5,2023-11-07T03:38:59.180000
CVE-2021-41611,0,0,20e788a9978d5b42bdfb0e861d8a64ecb13ed6a78d656dfa0583ed713b47f4c8,2024-11-21T06:26:31.043000
CVE-2021-41612,0,0,ec4512d7e1eb070ebbb7c50ac4104db7c77bf599d5ee26d0cce1e928eee5bff5,2025-02-06T15:15:08.910000
CVE-2021-41613,0,1,d034769a005bc9bc2a20a3d5a0f08b25a38215f9b91d908bfc334e2f87677780,2025-03-05T19:15:25.660000
CVE-2021-41613,0,0,d034769a005bc9bc2a20a3d5a0f08b25a38215f9b91d908bfc334e2f87677780,2025-03-05T19:15:25.660000
CVE-2021-41614,0,0,c10e24c6ecf57f28c0f86386ef18cf31fe6fa33cdc6e2d53899997cac45a7f83,2025-02-06T15:15:10.313000
CVE-2021-41615,0,0,7c87671866aa995cddeac7c3e59b2984fedac1b9c57107390543115e22bed63f,2024-11-21T06:26:31.737000
CVE-2021-41616,0,0,dd054e38761d9b6ac5dcb4c40cda981ba61676d60f3780bef226a2571a607a44,2024-11-21T06:26:31.947000
@ -211992,10 +211992,10 @@ CVE-2022-47477,0,0,27c1709db353e72d8574008fc997b3c35461453cd114777eee1f13d9902b6
CVE-2022-47478,0,0,aa28bc26cae78f6924e17ded517950cde9059d1b892de98854c670291561d6ba,2024-11-21T07:32:02.717000
CVE-2022-47479,0,0,a426ed8be78132bfd5aa325fff4c075b2b22e3501cc75035b596563396c74056,2024-11-21T07:32:02.840000
CVE-2022-4748,0,0,ef3280be296917f093d7b5252769d8875b626bc3bcad498f72668da48999a400,2024-11-21T07:35:51.937000
CVE-2022-47480,0,0,66858131aa22cf0e3508af207968f9bb28fbae90ef55c2f553c42fe343c51b51,2024-11-21T07:32:02.970000
CVE-2022-47481,0,0,072bed160efe1946057d40d4bdf9af2bed0116fb51202061337233938be48a3a,2024-11-21T07:32:03.103000
CVE-2022-47482,0,0,bba60f47d2c4b14e5e60bc809caf93734e38c1bd1d297867ae40bb729f81dfbd,2024-11-21T07:32:03.223000
CVE-2022-47483,0,0,db9be835628e60778bc7c7bdc9b6e53d3d9c0458990254351b7137c6b5b9e146,2024-11-21T07:32:03.347000
CVE-2022-47480,0,1,76a40e4c0a09df9bf69b4b9ade9ab4eabfc98c306705734307952abd63fc7c1f,2025-03-05T21:15:14.917000
CVE-2022-47481,0,1,1d68dd0cd9aacffdb0a0015ab0415ef87ad1def43a11f0aea071156b30b36afa,2025-03-05T21:15:15.067000
CVE-2022-47482,0,1,79559e0adae66df2fdac95963c81030d7ed140ce52e148d4e90153e44da7fa51,2025-03-05T21:15:15.223000
CVE-2022-47483,0,1,f10a7fd53e3cda42f85b206be3acbdf83fd7911074099195c61788785df412a6,2025-03-05T21:15:15.373000
CVE-2022-47484,0,0,95cdc3653454b17f6b32a877606b56ec144381ab971b9c79d156105dbc65645e,2024-11-21T07:32:03.470000
CVE-2022-47485,0,0,eecb5b3928cede1970d9d92d33ff0363db96bd500ebfeeb15737e71a65f95750,2025-01-28T17:15:09.557000
CVE-2022-47486,0,0,16c88cf26b6dc32923811585704a2b8521c7471c6728a414e2a58ac5c4fde9ac,2025-01-28T21:15:10.753000
@ -213566,7 +213566,7 @@ CVE-2022-49408,0,0,3f630e9961e9428352bd3400eb6b1c17b9026d6a4d39ffd25b029cded3415
CVE-2022-49409,0,0,1403f9424e749837e3589b93ec7654cdec1cc3dbdd6e5cfd051eb019c27cbf77,2025-02-26T07:01:17.420000
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
CVE-2022-49410,0,0,c18473af2ca54d8ab7e7b0d50f0360cc1887ae6c728a97a1ceec088f1f818f13,2025-02-26T07:01:17.517000
CVE-2022-49411,0,0,056b55e10971df741871db15e89623cc59d67bbbdb78daf01c8748dbbd1e22d9,2025-02-26T07:01:17.613000
CVE-2022-49411,0,1,9a87687b3917e12a5da60325ede95267e6847db22ab27942e0104f4544b3485c,2025-03-05T22:15:34.580000
CVE-2022-49412,0,0,6d4ca15780a7cd9a5f121f12a1882d0c233ea095afc5591db73caa6d48b41156,2025-02-27T19:15:43.770000
CVE-2022-49413,0,0,7f92cdb76e3c2292c0568f99092868df0fb8a3ff3dd65826cb5e2523e437b0f0,2025-02-27T19:15:43.910000
CVE-2022-49414,0,0,45e06079d8e9a9e537f215e34f1fed2304341cb0e6033235818624411329e401,2025-02-26T07:01:17.890000
@ -213650,7 +213650,7 @@ CVE-2022-49485,0,0,55408f62d96c503da8d80d02e172ff89c29e334d29f84b592bf7605d1edca
CVE-2022-49486,0,0,92823d7976f50da17cd777fbb9ac1f222f4fc7354d089bfff5d4d2b720d958f8,2025-02-26T07:01:24.803000
CVE-2022-49487,0,0,670c8e7fd77f420124d9f33151d8db1a1561389191b7671359395e07d83e0a24,2025-02-26T07:01:24.897000
CVE-2022-49488,0,0,bc4b1661dce83f2333ac1621e48c267bd4dada2757d49ef2469fd051a59d0c8b,2025-02-26T07:01:24.990000
CVE-2022-49489,0,0,50fd24f75b64b227e272110436a3c2de7c1c1a7bf901f0dbfb0e542e9d979f07,2025-02-26T07:01:25.083000
CVE-2022-49489,0,1,3ae95e28ed50c5f36ebc0501c87fbf6f5b23e2b31eaf5c24145b28a31ca89680,2025-03-05T22:15:34.743000
CVE-2022-4949,0,0,20ecd66c665d4a7df211e25b3128a2f7367a36b316ae054ac00474cadd4e5062,2024-11-21T07:36:18.687000
CVE-2022-49490,0,0,16cc7f0c1b99ea1efe29c128cae67f5242bed1be9df4b551bc23b2af0ce4d248,2025-02-26T07:01:25.183000
CVE-2022-49491,0,0,2a9aa1e883e016a3d43e38e6172aada1c5506731d8d72b9fa1d461654a8a6b58,2025-02-26T07:01:25.280000
@ -213875,7 +213875,7 @@ CVE-2022-49690,0,0,793e057a79f8adbe5af54106dfc25e8729a6e63e0dfc223f4e86a9a491eb7
CVE-2022-49691,0,0,be83e6d1f5b196817aff5a660e5567a57e0a51ae02d2bbac201addee1b2e75da,2025-02-26T07:01:43.893000
CVE-2022-49692,0,0,58eeeb8716066b4a8c51d2d5f51b81b9b58a9b96a5f09dc63d72e92c3005438d,2025-02-26T07:01:43.990000
CVE-2022-49693,0,0,d3cea9b886c7577caa46a8fb6a08d9c5c0c03a59f43c0227f2e124c8df3dd9c2,2025-02-26T07:01:44.080000
CVE-2022-49694,0,0,ecb497ea73e4d474d2d5f6965026c15a6a3da7c5a5a59d91911e1ee658295d1f,2025-02-26T07:01:44.170000
CVE-2022-49694,0,1,de83bfbc380ba4c16c75660600cee6c65039e4359b92339ab9012e688ede9092,2025-03-05T22:15:34.923000
CVE-2022-49695,0,0,6c59848c28b791220cd5f00f895a2651f6a09013e783dc4fb29f1844d6e6d99d,2025-02-27T19:15:46.573000
CVE-2022-49696,0,0,b9644e5562f79cc2fc332aad6b0e6a056e9eef7fe74f2200c6847ba48e046c19,2025-02-27T19:15:46.720000
CVE-2022-49697,0,0,9131c713e6cdf9d74b79f7ca68d3eca3ab0576898f710c48cb6fe2d287aec574,2025-02-26T07:01:44.450000
@ -213949,7 +213949,7 @@ CVE-2023-0026,0,0,165616398c1e329eb5878a4a88862384fb9166fdb6d3f5e292a49f7fd62bb6
CVE-2023-0027,0,0,bc53fb53bbb7beed0401095261d25d291c5d2f0b093ba79342629e17271bff21,2024-11-21T07:36:25.453000
CVE-2023-0028,0,0,47d182e40157ebd1ecf5b4238fd19dca5e0f64a3001fe1a633dafe0960c2c751,2024-11-21T07:36:25.567000
CVE-2023-0029,0,0,d38cd0e3f9819bc32b5462ca193486d2f74abcf8c764d856c0eefcb8d1141f0b,2024-11-21T07:36:25.690000
CVE-2023-0030,0,0,5927d506b1e5c0c66f04eabed8ea9fb437bf1e30d7c12b2b5b96f0496d6c03e1,2024-11-21T07:36:25.820000
CVE-2023-0030,0,1,3530a0a64d7682ad133789fd6de90a7d2034eab862291636b7a1033fd692878e,2025-03-05T21:15:15.520000
CVE-2023-0033,0,0,3f31d98dc6a02a5fe0c12542ad722e671705102d4ef3a7618e635bce79d5ba3e,2024-11-21T07:36:25.933000
CVE-2023-0034,0,0,d387fa9af6d7d785ee7ba793bbd11ca5e52b1fc1852afd6facf88d071296a814,2025-01-14T22:15:25.297000
CVE-2023-0035,0,0,1c3fd6e2650d47058756c534ed838961e3bbdd97ca3a82ac0aa7e5fd57a7441c,2024-11-21T07:36:26.143000
@ -213986,7 +213986,7 @@ CVE-2023-0065,0,0,1af42c9630237adefe532d5e7d6c03134844119157520f1dae4aad3d5003e3
CVE-2023-0066,0,0,66abd1188955921a4f586244d11ac2aed7ba37215a66a107b40ed1984614d870,2025-02-27T21:15:16.620000
CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed0036,2024-11-21T07:36:29.547000
CVE-2023-0068,0,0,09b587937209aec78ff4e464b77cb9d1b780912e276b385bb5b75adb2cb8a003,2024-11-21T07:36:29.650000
CVE-2023-0069,0,1,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000
CVE-2023-0069,0,0,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000
CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000
CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000
CVE-2023-0072,0,0,d333d59260663a0b5930bb992584a27415216729bc2149a3935b4f3b91fe9ce7,2024-11-21T07:36:30.050000
@ -214657,7 +214657,7 @@ CVE-2023-0761,0,0,1c12e966a31ab5fa981f27f6779c348b172a92660c02ef6161d5e68d0643b7
CVE-2023-0762,0,0,b352c77f507f218efecdfba3d0204deb48d60e35cf3d46c52cf2dd283cb2f84e,2025-01-24T21:15:09.020000
CVE-2023-0763,0,0,66b09a9c98c73290507e7116bff86b7079976cc6357472573cf9f15e006e8dde,2025-01-24T21:15:09.187000
CVE-2023-0764,0,0,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000
CVE-2023-0765,0,1,6b52002814929eaa820d36a0b1f7124300b13ac41153e1f8eb2dc73ceb0ce3bc,2025-03-05T19:15:27.347000
CVE-2023-0765,0,0,6b52002814929eaa820d36a0b1f7124300b13ac41153e1f8eb2dc73ceb0ce3bc,2025-03-05T19:15:27.347000
CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000
CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000
CVE-2023-0768,0,0,854944641b4c5c80838898ca164f46cd13b5eb87a809afca93532e5fd701927a,2025-01-29T15:15:11.710000
@ -215035,7 +215035,7 @@ CVE-2023-1157,0,0,0402ab37e7e5f6cbc939cc04841734e527335666105adf7e868a1727c804fd
CVE-2023-1158,0,0,9bda3659fb2a24636d54cc854ecc564094fc9221be088ca217d92967214f10e3,2024-11-21T07:38:34.460000
CVE-2023-1159,0,0,d8d4c558a2fd4d03b8edbe3de78a5a2e03ba4e24f50fdd0613853204c30f0dbc,2024-11-21T07:38:34.577000
CVE-2023-1160,0,0,17ebdb5003486d1c4d90853a16e3b5b1acfbee4d84661bdc34ed15516bb36105,2024-11-21T07:38:34.707000
CVE-2023-1161,0,0,caed5525e44804667a0e43c07767d142ae3927c4805771f07d800552af812071,2024-11-21T07:38:34.827000
CVE-2023-1161,0,1,16af76231cbad01fe4bc5b46c577c7c8a23978fc46565653946bca044b85493c,2025-03-05T21:15:15.793000
CVE-2023-1162,0,0,f87e6d602a26d561f5ac0f9865f63a6282fda0d5309d6afa2567e124cbbaa025,2024-11-21T07:38:34.957000
CVE-2023-1163,0,0,bf08d3ee50431d81cd5c5eb1e4c9baa2cb5766d918b772d2670e302297d8a5ba,2024-11-21T07:38:35.093000
CVE-2023-1164,0,0,cd95affe38dd1da2f7cad384d131dc6e2f344aeca6455a3e27db16e3090a52d7,2024-11-21T07:38:35.230000
@ -215193,7 +215193,7 @@ CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3b
CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000
CVE-2023-1323,0,0,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000
CVE-2023-1324,0,0,00d5f367721a8f873edf46f7e2845f04eda266f6dab94ac034683dc84d5e71f8,2025-02-04T19:15:27.863000
CVE-2023-1325,0,1,3ff3723565214c557ecea7b3557f725999e31dde6f993620e8d608bc76eb6bc6,2025-03-05T19:15:27.500000
CVE-2023-1325,0,0,3ff3723565214c557ecea7b3557f725999e31dde6f993620e8d608bc76eb6bc6,2025-03-05T19:15:27.500000
CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000
CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67dfb,2024-11-21T07:38:55.873000
CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000
@ -216245,13 +216245,13 @@ CVE-2023-20624,0,0,e47a264375b13e017fe5366d70086802e9ceccccc26e33fa7308b00b95aff
CVE-2023-20625,0,0,e30f7cae43d7c99f52a9f3eaa98ebc9690730ea46f3f31fe7a005dbb756bf8c1,2024-11-21T07:41:14.870000
CVE-2023-20626,0,0,d6ae1489f257693bb3520b235021ea213311498e9344453b0e2ab8e56fc20917,2024-11-21T07:41:14.990000
CVE-2023-20627,0,0,1dfbf563926de15415545782801ae81f813aa7c6a71a5ad0d3f3bb578f705c51,2024-11-21T07:41:15.110000
CVE-2023-20628,0,0,e5710a34158d53c9d684f1777f2d7c4104e14ea3fc90581212ec17a5ab3b0e04,2024-11-21T07:41:15.213000
CVE-2023-20628,0,1,a43f94bc27655b93099f567fd284ae00b065686b39b9054c4862b72cea71753f,2025-03-05T22:15:35.140000
CVE-2023-2063,0,0,0aaf862838d3fc48a28b566a8ceaf8291ae1040d19422d9eb9fde272cb92f0f5,2024-11-21T07:57:51.990000
CVE-2023-20630,0,0,4e220cfad559ee04582d407cd8391bfd570f01397ba72260d786060edc88d2b0,2024-11-21T07:41:15.333000
CVE-2023-20632,0,0,47be8e71f5a563ce91919f8442033d40dbb4522e3ef7af5135844efec3823f27,2024-11-21T07:41:15.453000
CVE-2023-20630,0,1,373bf469509103d35ae343d6f2ea99e063d089c4b291ca1aedb51787a3d30c6a,2025-03-05T21:15:16.050000
CVE-2023-20632,0,1,dbf315d861e3e5ca6a2602ca35016bde2eb440a8f2e0b22336c02aeb45f5da3d,2025-03-05T21:15:16.213000
CVE-2023-20633,0,0,9197731104a2b6109350b0d564f4bb04b2c3792f8862636eb8cc18ce6e5d2d65,2024-11-21T07:41:15.570000
CVE-2023-20634,0,0,b0b1c5908cb36423248ecc504db659e09cae32845206be6f448f99a3e9062f1f,2024-11-21T07:41:15.690000
CVE-2023-20635,0,1,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000
CVE-2023-20635,0,0,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000
CVE-2023-20636,0,0,7969ffb97886082c6a56452f4bd27bb421515913b292c77bae030e782a2f8d07,2024-11-21T07:41:15.943000
CVE-2023-20637,0,0,8f038e57aa78ece48451171f04153fb424960afef9c2b2d699b66084c7dcf21c,2024-11-21T07:41:16.050000
CVE-2023-20638,0,0,682bb7f5f889f3c8e2845ecb7f3268c10614777581011e1531d7a44568da3706,2024-11-21T07:41:16.160000
@ -216262,13 +216262,13 @@ CVE-2023-20641,0,0,66afd76ab5e3cab0364e8ba13a5eff296c3abe942f408ca92dfd55e801388
CVE-2023-20642,0,0,ab42154c747b6570707a2a6e302e1d7356412038014a0a3e86e15a95727d6b82,2024-11-21T07:41:16.630000
CVE-2023-20643,0,0,29baeeea0d83d636cbe7387d2e7a6ff6d1b6ca73019c6a0fa1aaca17b82ecd5e,2024-11-21T07:41:16.737000
CVE-2023-20644,0,0,47e77d5e6c7673ac7afc319e6bd16df66831e94df9a4c5108b5e1f129213c770,2024-11-21T07:41:16.850000
CVE-2023-20645,0,1,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000
CVE-2023-20646,0,1,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000
CVE-2023-20647,0,1,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000
CVE-2023-20648,0,1,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6dbd,2025-03-05T19:15:28.157000
CVE-2023-20649,0,1,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000
CVE-2023-20645,0,0,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000
CVE-2023-20646,0,0,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000
CVE-2023-20647,0,0,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000
CVE-2023-20648,0,0,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6dbd,2025-03-05T19:15:28.157000
CVE-2023-20649,0,0,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000
CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000
CVE-2023-20650,0,1,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000
CVE-2023-20650,0,0,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000
CVE-2023-20651,0,0,c931350452b735a23e9229b569e270a5f54d60e0e2263fb39c061c2250efc655,2024-11-21T07:41:17.647000
CVE-2023-20652,0,0,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000
CVE-2023-20653,0,0,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000
@ -216289,7 +216289,7 @@ CVE-2023-20666,0,0,c5d2c0fe4d9f9ffdbe1d4fa83d8991d3bf44101616c65a6e41eb579627dba
CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000
CVE-2023-20670,0,0,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000
CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000
CVE-2023-20674,0,1,1d7150870f73731e427b98bc692b8c9d2962bd27caafe479a90e35c1f0c08671,2025-03-05T20:15:43.900000
CVE-2023-20674,0,0,1d7150870f73731e427b98bc692b8c9d2962bd27caafe479a90e35c1f0c08671,2025-03-05T20:15:43.900000
CVE-2023-20675,0,0,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000
CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35
CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000
@ -218415,10 +218415,10 @@ CVE-2023-22885,0,0,2f0912bee282864da45fe9a8cfc9d03fb4e1df60f2665b9327dad841ca415
CVE-2023-22886,0,0,deca26cbd59ff4ad06ee92feefc7369951dfff2be007df24addbfc14d2089e99,2024-11-21T07:45:34.853000
CVE-2023-22887,0,0,9500df946dba5534f211144e9851e9d48e0ee8ec0c089e042d11b59806b35ea6,2024-11-21T07:45:35.050000
CVE-2023-22888,0,0,21f2ad7126398dfecc421c82eb979bf0052bbe2538451b515afd03d68cbb392e,2024-11-21T07:45:35.207000
CVE-2023-22889,0,0,6716b509ed5c405bd04ae933068b80977723c43438fbe0730e49946a4c10f433,2024-11-21T07:45:35.347000
CVE-2023-22889,0,1,241077d378418bf49cd96b0992e3ad40d3865f77d263511f96593e26b5fd40cc,2025-03-05T21:15:16.410000
CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3f4,2024-11-21T07:58:19.060000
CVE-2023-22890,0,0,f0d3730f64c477dba58781dd1df246a96dfbef568d6cada5ee7da87752d9dba8,2025-03-05T15:15:11.563000
CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000
CVE-2023-22891,0,1,3a92e12f4d2abab6cdcec3ce715e0f5388925cb7a23b8935a97c17cdd48e3dc5,2025-03-05T21:15:16.683000
CVE-2023-22892,0,0,c963711bf8dff126d953038745e504027e8bd2d954a24cb7a184225e893f5abe,2025-03-04T21:15:11.610000
CVE-2023-22893,0,0,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000
CVE-2023-22894,0,0,83a9bc4d6f652a5da819c8e1af0fc9a362d82f490b3fc0d16b028bb916c464fe,2025-02-05T17:15:18.590000
@ -219475,7 +219475,7 @@ CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd141854
CVE-2023-24278,0,0,8b3a10f640b076cc06894b9a7323e5d52321fe3fe7263648e751cafc218009d8,2025-02-26T19:15:16.663000
CVE-2023-24279,0,0,bcb401ecd54952a6b3fa7d3e1dff47a3cf63506b6a5303515865dd9711fad82d,2024-11-21T07:47:39.133000
CVE-2023-2428,0,0,bdb844c56d8c8e00f4a260fc6fd9b038fd6ebce6e031ea2559d7741b54fc28eb,2025-01-30T17:15:15.810000
CVE-2023-24282,0,1,e05ded1b01d4352cf39683a7553627f8b8f9510288b442e8eb44071210e3679b,2025-03-05T19:15:29.053000
CVE-2023-24282,0,0,e05ded1b01d4352cf39683a7553627f8b8f9510288b442e8eb44071210e3679b,2025-03-05T19:15:29.053000
CVE-2023-2429,0,0,58ff0d99261c61eba5cceeb08e9f29525f122d7e4d766ca6a31dc201179e1aae,2025-01-30T17:15:15.950000
CVE-2023-24294,0,0,3e42f9b86751e812a6b22510e56d8d1be93e046cdaadd881a9a597ba3368c39c,2024-11-21T07:47:39.450000
CVE-2023-24295,0,0,ef678c92680f783e4697256b62662f890905cb8a683c3e297ed97c828d80ca05,2024-11-21T07:47:39.600000
@ -219792,7 +219792,7 @@ CVE-2023-24653,0,0,08283d9ae8aab4f26e31d58418abb36bbc8972bfa560b4473ca5aa391721a
CVE-2023-24654,0,0,86a74b36ab0aa56ef60565de904d15cc8aaea147de483e6f86904c7816bdaf7e,2024-11-21T07:48:16.957000
CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000
CVE-2023-24656,0,0,7690104318d4516fbb5cb79df2d9f2678e1757e7786f00ff38000419ec12c2a1,2024-11-21T07:48:17.240000
CVE-2023-24657,0,1,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
CVE-2023-24657,0,0,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000
CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000
CVE-2023-24671,0,0,285987de08d208e85df027c33ab5d1dccd3ffbde353c9b8020b34641113c0956,2024-11-21T07:48:17.537000
@ -219845,19 +219845,19 @@ CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2
CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4bc2,2024-11-21T07:48:23.160000
CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000
CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000
CVE-2023-24773,0,1,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000
CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000
CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000
CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000
CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000
CVE-2023-24777,0,1,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000
CVE-2023-24777,0,0,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000
CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000
CVE-2023-24780,0,0,a70e6811128672d0ff689b485eeaa75ae829acf7b17513334d6f6cc6f8dadc0a,2024-11-21T07:48:24.097000
CVE-2023-24781,0,0,7a997d3dc41a9eaad892ecad59650364a4b3147ccd6d11b4f9bafcd21fd34e03,2024-11-21T07:48:24.223000
CVE-2023-24782,0,1,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000
CVE-2023-24782,0,0,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000
CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000
CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000
CVE-2023-24788,0,0,868ff4d8e88aff25ad543e70a65b697e1d178d63050b1ca143aa0decdb797d27,2024-11-21T07:48:24.640000
CVE-2023-24789,0,0,478a774a25a83944ccf6fe2be0a5de598b6e51ea788134ed3d69cefa03b9080d,2024-11-21T07:48:24.780000
CVE-2023-24789,0,1,367ace39fad6b1e514677c41a0ac737a131d93a7d1eb6bac3d0992b13a458a1d,2025-03-05T21:15:16.840000
CVE-2023-2479,0,0,4801134ef77265136ffc1bb85eb06ca5e6918eec27800c07ac6e0c5e0435b44f,2024-11-21T07:58:41.860000
CVE-2023-24795,0,0,50c263ab5cfb37ef26a3b5605f966902dfc5978a6d9b8282427d790bae59e9be,2025-02-26T17:15:18.970000
CVE-2023-24796,0,0,0811d8124e097273749efb44bf056e7530d4475a682a12a8354f5594791213f6,2025-02-03T18:15:28.627000
@ -220206,10 +220206,10 @@ CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b
CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000
CVE-2023-25143,0,0,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000
CVE-2023-25144,0,0,ab7d84d2f165ab21b0b1f9ed1abfd79fb52c70cb16fd0a8455b22ed951ca3fc4,2024-11-21T07:49:11.603000
CVE-2023-25145,0,0,40e2cd226835d090403bef22f34c90db08cbb0e894597d8e9f9a4de5cd90b761,2024-11-21T07:49:11.720000
CVE-2023-25146,0,0,add1fb2292e87ec0b9dfd9045fc9df0890a4f23ca5a928d3819c099dbd73b58c,2024-11-21T07:49:11.830000
CVE-2023-25147,0,0,11a0e76dac7c834658f0865a244fe627170300ba5ec165ff394d1e39f5afe2d4,2024-11-21T07:49:11.940000
CVE-2023-25148,0,0,1115f06638b5047a6227fcf805ef26d4fd61954d8d2a6fc089903a94608d757b,2024-11-21T07:49:12.047000
CVE-2023-25145,0,1,71e62e20409077ec917ec9a494564df62e5a03e10fab96fa74817a2db3525c8c,2025-03-05T21:15:16.993000
CVE-2023-25146,0,1,b2d7efa3a19c0ed8ead8336e6b5ebce9a7c3889978c9ca6185fc1f12a51279dc,2025-03-05T21:15:17.160000
CVE-2023-25147,0,1,3f3be06805fca693d13306572db1e19af0d3aa94905d692b5b0da8ba725aecc4,2025-03-05T21:15:17.313000
CVE-2023-25148,0,1,6e7ba91a2525e84786f37c0a4c7d95d5628bd9d51f76ca254dc62b8114c417e6,2025-03-05T21:15:17.473000
CVE-2023-25149,0,0,e9bb6d9aa56c18e334787a808284695e66bdf7db05900703a5591057d72d8810,2024-11-21T07:49:12.163000
CVE-2023-2515,0,0,4303abefd7834f0f6df01f17d0aac47a21a27a2e901943a7f1a02e11dc2b6a29,2024-11-21T07:58:45.357000
CVE-2023-25150,0,0,ef547c3b3a66117cbe0f0d2e1a36b17bc6dfeacf2110fc847c78c4852f3a4bac,2024-11-21T07:49:12.283000
@ -221010,13 +221010,13 @@ CVE-2023-26102,0,0,ad48db17daa5813c2c603727ba9c9458d6a541fdeff41ece33be20080052b
CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4fc1,2024-11-21T07:50:46.877000
CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47
CVE-2023-26105,0,0,7cc2762bb92da835a09938bd30ea450932cc3a111ca4007596fe1bf509cfbdd5,2024-11-21T07:50:47.137000
CVE-2023-26106,0,0,3b589f2ca9941f574c87aed5e414b2940d6d860604b41f19a3df7a66de8eec77,2024-11-21T07:50:47.253000
CVE-2023-26107,0,1,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
CVE-2023-26106,0,1,5aec010201382e2cd4ddda8f70104650c3355d4509e17262f2080cc54e5810ea,2025-03-05T21:15:17.863000
CVE-2023-26107,0,0,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000
CVE-2023-26109,0,0,1df13cce9e658344e9fee3b1a3ec2cce78326cb9ab178edcf615a984859539e2,2024-11-21T07:50:47.597000
CVE-2023-2611,0,0,e40fc44e8c0f9f87f6cc648583f7f82c9d48ab56bdd345e0bf13e41c1ddb4a27,2024-11-21T07:58:55.813000
CVE-2023-26110,0,0,52cbdd7c87defb2f21d4206b43844829ebddb989d6b77d2cc4a83440fa39975e,2024-11-21T07:50:47.710000
CVE-2023-26111,0,0,181c90b7ba7969dc443ccde547bb4942d1d4abb2232346f393537cf4ee6ddbad,2024-11-21T07:50:47.830000
CVE-2023-26111,0,1,980199ad3235df2bd802ec86d5d9b5531930a8a3cd2e4f65d9af1e1d82899799,2025-03-05T21:15:18.010000
CVE-2023-26112,0,0,ca3318453a5a7976f1c04dfb59326cfc6cf9d7d5298decf39a9aec06a65b4cad,2025-02-13T17:16:11.327000
CVE-2023-26113,0,0,06877511e2cc6bc44a83f319880c7a1f3a7440c37b239acc930562be29d6672b,2024-11-21T07:50:48.090000
CVE-2023-26114,0,0,00b77af39a7e708e039ae4adcf8a1ec9cf3a0042ea9106767ebfa8ab25834dd6,2025-02-25T20:15:32.393000
@ -221116,7 +221116,7 @@ CVE-2023-26257,0,0,651ae83f9b566794a14a3a87e0cadbdea81d8eb5e63fa2a4d16d316ec3fef
CVE-2023-26258,0,0,ff9e8234c9784e7a294e94b80683256ffdc02c595f084313493ac6d35cf02eac,2024-11-21T07:50:59.670000
CVE-2023-2626,0,0,ca17b69e5784d9a3dc3563acb8287618e374689f2a0fbc11c0a942570d2465a9,2024-11-21T07:58:57.490000
CVE-2023-26260,0,0,682c3aa32ac3b1e2f0244b618bddb4144dc1da5d6c899d092a4c4361550bec51,2025-02-11T16:15:35.347000
CVE-2023-26261,0,1,fb6d7637bc853116d89ddd08b2b147d96ef06217c33e5f4e8d240f7283abccd0,2025-03-05T19:15:30.133000
CVE-2023-26261,0,0,fb6d7637bc853116d89ddd08b2b147d96ef06217c33e5f4e8d240f7283abccd0,2025-03-05T19:15:30.133000
CVE-2023-26262,0,0,5393ce589cf1c921932aa694df325bb2f0c0a9cb4e3b8aeaa04b9961173c31f7,2025-02-27T21:15:18.663000
CVE-2023-26263,0,0,ea8263e453191214d08a39c61ed1efe7b14d89219c29343eb5d7a37fbed09b47,2025-02-07T17:15:25.293000
CVE-2023-26264,0,0,e65f8a2927b958d250904011d8e5d0e2d529de3c6397de687a045325585a616b,2025-02-07T16:15:34.490000
@ -221605,14 +221605,14 @@ CVE-2023-26943,0,0,40224a5889d9a9d46f084ff88f91a23a22a2c393975db40c4df8c233b1253
CVE-2023-26948,0,0,385254368d76362ed022a3338e9a32f9da4c64e597dcc2197c790fa2beaed98b,2025-02-28T17:15:14.537000
CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e6a0,2024-11-21T07:52:05.803000
CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000
CVE-2023-26950,0,1,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a79b,2025-03-05T19:15:31.957000
CVE-2023-26950,0,0,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a79b,2025-03-05T19:15:31.957000
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
CVE-2023-26956,0,1,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000
CVE-2023-26957,0,1,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000
CVE-2023-26956,0,0,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000
CVE-2023-26957,0,0,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000
CVE-2023-26958,0,0,1b26350389205ca0e46cfdac6f76150e5a95bb023d56c1b5b2a4a4a1011448ab,2024-11-21T07:52:07.167000
CVE-2023-26959,0,0,3256c10cc44d1ea908179ee6646c2f1d21949e7f041fefc54308e21873c039a8,2024-11-21T07:52:07.317000
CVE-2023-2696,0,0,80c166f4bb66cbe0e082d20ccd7f4b1fe89761e6fcf75764df81daccdc3a9638,2024-11-21T07:59:06.300000
@ -221696,7 +221696,7 @@ CVE-2023-27082,0,0,2c40f95e8d41178b94dd847ebecb5d6ca70900da105b9be54ff9bd9eda4c6
CVE-2023-27083,0,0,f52240e94afb722f2a0c557f9dfb89c9e41d5209858d5fe1be554d2aa3a26983,2024-11-21T07:52:17.457000
CVE-2023-27084,0,0,35ab801ad3bda4ff85fccaa78f55fd32dbc2a00babecfb93007934955146f638,2025-02-26T20:15:13.003000
CVE-2023-27087,0,0,13db924c9808b9c4671f5e5a124311e49f06005723090df2ee6d54267087f848,2025-02-26T19:15:17.373000
CVE-2023-27088,0,1,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000
CVE-2023-27088,0,0,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000
CVE-2023-27089,0,0,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000
CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08
CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000
@ -223795,10 +223795,10 @@ CVE-2023-29414,0,0,995f6dfbce7b6373c94f8f4446e5c1ab9db1d57586ede22a39a9b94d2ae5e
CVE-2023-29415,0,0,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000
CVE-2023-29416,0,0,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000
CVE-2023-29417,0,0,af1671cdf04819caefb52843b9d73da01d07e147abbd4c3ea9e6ae4d1237e052,2024-11-21T07:57:01.327000
CVE-2023-29418,0,1,7d389d5fb1dc5aa1639d68772bcff9c03b108fc27db7e98f305442d0b248e227,2025-03-05T20:16:04.403000
CVE-2023-29419,0,1,6abe52bacd06d4b2f2be7bc0e77c7ca4cf8eba041f711b8392428cf819cbd45c,2025-03-05T20:16:05.020000
CVE-2023-29418,0,0,7d389d5fb1dc5aa1639d68772bcff9c03b108fc27db7e98f305442d0b248e227,2025-03-05T20:16:04.403000
CVE-2023-29419,0,0,6abe52bacd06d4b2f2be7bc0e77c7ca4cf8eba041f711b8392428cf819cbd45c,2025-03-05T20:16:05.020000
CVE-2023-2942,0,0,3095d00f007f08736781ffefa009546288f761e162006b66520cb0c1c690f4ed,2024-11-21T07:59:36.943000
CVE-2023-29420,0,1,12b4664e50d577149765f1c033b0e1aca31b1c1cfce0c6b7d8d47cc96b99ce1a,2025-03-05T19:15:34.933000
CVE-2023-29420,0,0,12b4664e50d577149765f1c033b0e1aca31b1c1cfce0c6b7d8d47cc96b99ce1a,2025-03-05T19:15:34.933000
CVE-2023-29421,0,0,236c15b9df269a365b5f51c706496c8acb4d0d8259ecec17ee326a2d13e3e41e,2025-02-12T17:15:18.467000
CVE-2023-29422,0,0,11d0b8b362c579a59640a4a88f42bc430b3c71c051a72869a1511f4e9f51cbf1,2024-12-09T13:15:27.020000
CVE-2023-29423,0,0,a22c9b9b0fb58e0c90c58921099d165cb9cd3c801aa1e31e81cc43f769d64193,2024-11-21T07:57:02.053000
@ -224085,7 +224085,7 @@ CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda
CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000
CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000
CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000
CVE-2023-29854,0,1,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
CVE-2023-29854,0,0,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000
CVE-2023-29856,0,0,b07bbd6f3df18d3f0c08e71dffe9eeaab7b72b9f25dad866594c7cca7b9f8a6d,2024-11-21T07:57:35.347000
CVE-2023-29857,0,0,0760939b20d3d88a77d487b55a7da2f82fabbe0bc7d6bfc81ea34e8a82edb139,2025-01-22T17:15:10.550000
@ -229165,7 +229165,7 @@ CVE-2023-36675,0,0,cd44e51a9a6eb9c4e63b6fc73dfefe41e5846b7e217f12e6824cfd331ebc1
CVE-2023-36676,0,0,6dff4ed2de3be120c14b2d1cd7e8d5f80ea91e6988a53bad20c9c6d2d9c42bd4,2024-11-21T08:10:20.200000
CVE-2023-36677,0,0,87352cc7cc9fa1d06edebf5b59591f05cddf73fd4ad4323770390a266b8a240e,2024-11-21T08:10:20.430000
CVE-2023-36678,0,0,8e2ca3757ab8e217491173421c97f12fc5198222fd34c6f6238eae9d9ed45354,2024-11-21T08:10:20.730000
CVE-2023-36679,0,1,ba7857da83546fa4db5bb8b1bd93a8a67fe327e5ba5ccf47b4ac55c3dd546b53,2025-03-05T20:50:02.120000
CVE-2023-36679,0,0,ba7857da83546fa4db5bb8b1bd93a8a67fe327e5ba5ccf47b4ac55c3dd546b53,2025-03-05T20:50:02.120000
CVE-2023-3668,0,0,ee0fc8a117dff3c229840274c7d57f54273ddbff69a341d8dbdb2bd6060e7e7f,2024-11-21T08:17:47.787000
CVE-2023-36680,0,0,b9be5117546aa41ea1b0775680cd0c31aaaddfcf395655d1742c642ab34f3467,2024-12-13T15:15:17.740000
CVE-2023-36681,0,0,b11a813f807650ef99ed1aeb70071d7ef02b7a8c18f90e2475ff7637b316f608,2024-12-13T15:15:17.880000
@ -238560,7 +238560,7 @@ CVE-2023-49028,0,0,1fe6cffd82021764ce68fd3a53c4875910ce33e674fe2677a56e372e5a7b2
CVE-2023-49029,0,0,c614567def59347336438740b811220368c65599cc4c871c14425dc96c92f919,2024-11-21T08:32:42.833000
CVE-2023-4903,0,0,4e15f764aaa4b079f24341cacdb9f278af35d9bba3f5d8eb18a330cc8e32e94b,2024-11-21T08:36:13.627000
CVE-2023-49030,0,0,05a1c83003c2661094ba87a267d63d6f1ebc1176bdaa7cc3b41d9bda2fa7cad0,2024-11-21T08:32:42.990000
CVE-2023-49031,0,1,3a1898c6166f0e4f546c41396b3dfdfdcaeadd674967e2c103e6c1f470c937cb,2025-03-05T19:15:37.110000
CVE-2023-49031,0,0,3a1898c6166f0e4f546c41396b3dfdfdcaeadd674967e2c103e6c1f470c937cb,2025-03-05T19:15:37.110000
CVE-2023-49032,0,0,bf0051df9f823bcff03622a71e492c2e2c8f0b2e1823ce4c4a928e1018ed932e,2024-11-21T08:32:43.220000
CVE-2023-49034,0,0,1d1efe3d808290b90ce8e37a8c591816f90907f686b935dadde78588546b498b,2024-11-21T08:32:43.363000
CVE-2023-49038,0,0,c9ba25652a66916f2762c9c471fc85f429fa7f7f0cea2238a2047f0c789b591f,2024-11-21T08:32:43.590000
@ -239875,7 +239875,7 @@ CVE-2023-50956,0,0,10dbe6455689250a2de365cb32b1211e944628def03c2a4b0bf422999c285
CVE-2023-50957,0,0,ab69caad2028c44273e1d8a1b6e510f9cab85ce3e69786cd2afdcb47074d77d4,2024-11-21T08:37:36.500000
CVE-2023-50959,0,0,a65991072a7be5e9bfc6dd105f3e29b24f202d07a14ac774359e6246211d7ee4,2024-11-21T08:37:36.643000
CVE-2023-5096,0,0,b339725eb66ec0962e11912446b66cd850e228ed170101209b480782ef995e44,2024-11-21T08:41:03.100000
CVE-2023-50961,0,0,4ed2cb92e3d2defaa8e3e74714c3c25274c2e4c159cdbda7bf03b0e172916bd0,2024-11-21T08:37:36.783000
CVE-2023-50961,0,1,7545038ec9d0d49b9d0cc2e06874bdb2fa73382c326ecfb24343cf4e12c3ca12,2025-03-05T20:50:02.120000
CVE-2023-50962,0,0,bfd9f5a4ad1424d7a1cf5b3db0b702b9736d0e0eb70ef84e63b401d6f05355e4,2024-11-21T08:37:36.913000
CVE-2023-50963,0,0,048c774e65664cc2dd04bbd2bb0bf5e5a8b33087c54a2292c3e70ba4f76d1eaf,2024-11-21T08:37:37.070000
CVE-2023-50964,0,0,549af7f5da0e21621df175ef0896772987500a2810b5c1dbe76aa4da3e042b22,2024-11-21T08:37:37.223000
@ -247755,7 +247755,7 @@ CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13869,0,0,0918273a7ae15011be1debf6016e48d8cf14f846fa38b8a2ca6e7c9fb94375dd,2025-02-23T04:15:23.797000
CVE-2024-13869,0,1,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
@ -254155,7 +254155,7 @@ CVE-2024-27267,0,0,a5d8693bf68d611ea6b320a17ddd770102a308dc1e0715bd0f998cd807a76
CVE-2024-27268,0,0,2dcbf6964ce8e8841ebc29f79e8d8a5330f19a8a65f2e49de73dbb87cd15e97e,2025-02-27T17:58:20.883000
CVE-2024-27269,0,0,52ebdbf805213627c28de793c9dc09dbda04abee28bda6abc5aa430114512ce8,2024-11-21T09:04:12.937000
CVE-2024-2727,0,0,2dee61faac028e2733757e135f6a6c2d9e9cd5dd69c05078e33394419bac0651,2024-11-21T09:10:23.127000
CVE-2024-27270,0,0,ee5297b5c486baef68caedbf92c34d8bca8e622c9288c2e6680ad4daefb32f3d,2024-11-21T09:04:13.080000
CVE-2024-27270,0,1,2f2b3c81c6031ac3faa2d4527642a4829f4370c56c5937f1b30ad912da7769f8,2025-03-05T20:50:02.120000
CVE-2024-27273,0,0,1e870f69a6eba4fe402f69b8b2086b21dbadf40baccbcf7a5482142f0a1f5afc,2024-11-21T09:04:13.197000
CVE-2024-27275,0,0,fe661a9e941d5dafabb7909ae7d62cd1b965cde9d21e932e51d238ab5bff32e2,2024-11-21T09:04:13.333000
CVE-2024-27277,0,0,904a77a3c7015f2f6c511c853241ff243f6c05fe3641e8abd7aa5faad6cd9814,2025-02-14T15:54:30.470000
@ -255205,7 +255205,7 @@ CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae8235
CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000
CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000
CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000
CVE-2024-28784,0,1,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3411,2025-03-05T20:50:02.120000
CVE-2024-28784,0,0,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3411,2025-03-05T20:50:02.120000
CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000
CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000
CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000
@ -256247,7 +256247,7 @@ CVE-2024-30170,0,0,ed60f0d302cd151d50df6d1bb62de9bb721767f8db7fef2c2cb93566e3243
CVE-2024-30171,0,0,6ebe5e9eae1a7ad2da52de3f79b45587d88b57791a58fe5821737eae0455762c,2024-11-21T09:11:21.590000
CVE-2024-30172,0,0,690673599610e6fc17fcb2b0d34b3d19b36c3a3e806e4a07a5cc646c8560a2e6,2024-11-21T09:11:21.817000
CVE-2024-30176,0,0,aa066c55eeeca0fd6bb4beb9ec423ba6486b66e97848e6e3c1974ce9983157d0,2024-11-21T09:11:22.050000
CVE-2024-30177,0,0,44c797d5a3808fe7f3d09ed56fa89cae0d3f4a517c94d374e7585b27408ea653,2024-11-21T09:11:22.287000
CVE-2024-30177,0,1,0cc5342193d0c0a684de8d9bfc121f1b2cd449b1b90ad80867fdb7108a37f8c2,2025-03-05T20:50:02.120000
CVE-2024-30178,0,0,a5c303cfe3274dddc07583df103192092e5bee518dfa7fb8388fe33b5060991d,2024-11-21T09:11:22.410000
CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000
CVE-2024-3018,0,0,04adb6daf55ce952c118b13379d47e77b2b270495205816344abb7282ca20f00,2025-01-08T19:35:58.073000
@ -256308,7 +256308,7 @@ CVE-2024-30229,0,0,618b341ddde842ab963dd32e5b58768f172ceaac30eeec0dbf9d1f8b20aa5
CVE-2024-3023,0,0,263153a293163fa286e9c101f6bafff3237bb13b48d4d071321a37d0a1fdd8bd,2024-11-21T09:28:42.340000
CVE-2024-30230,0,0,9ae9ce9e1df99b9edb0b3840d298f6742d8d81c2fa9cbc5be63ce42438c755d5,2024-11-21T09:11:29.843000
CVE-2024-30231,0,0,68fd351a4c37be841f842b0166a1b15234ac7b80a2d9bb89976da51bdd09f04f,2024-11-21T09:11:29.970000
CVE-2024-30232,0,0,911985794127ded209b846eded6891442778eccc3fe3f3b88307778577dc1dba,2024-11-21T09:11:30.090000
CVE-2024-30232,0,1,cb4ba1f0c953f5530e82efb5a6283e946b5575664e80c37efadf1d45825da04a,2025-03-05T20:50:02.120000
CVE-2024-30233,0,0,f1d9cba1fef6a20f771e2e1821d5ed146e740ade1e79062f0b361b5e672abd33,2024-11-21T09:11:30.203000
CVE-2024-30234,0,0,fc7aa33bf67a605070883714eea380c59e25f899a3a6c90caaacb9b95ffca289,2024-11-21T09:11:30.333000
CVE-2024-30235,0,0,5611b3121f2d724007ecaf4abbe7979de2204e273ca82520d2e3f5a4d917850f,2025-02-07T16:54:26.067000
@ -257367,7 +257367,7 @@ CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7b
CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000
CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000
CVE-2024-3152,0,0,232a7ab8a6c5151aba1982b503cbcc7bcb30e91652e2552e7d49e1b5852760ca,2024-11-21T09:29:00.820000
CVE-2024-31525,1,1,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000
CVE-2024-31525,0,0,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000
CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000
CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000
CVE-2024-31544,0,0,b0bccc451dcee5903b366441bb39b229e4ec0f92cdbfeddcea663568e3c62a9a,2024-11-21T09:13:40.747000
@ -268239,14 +268239,14 @@ CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf
CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000
CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000
CVE-2024-45773,0,0,fa133c6be41b30498db96f8cc8924c7e28e5e1652411403fbf684ea7526e1df8,2024-09-30T12:45:57.823000
CVE-2024-45774,0,0,4d2c75ba8338553ee4a278a85581b6e2db4424169927a3758eac6b06d727bf07,2025-02-18T19:15:16.387000
CVE-2024-45774,0,1,0f073f588f71078dc679e01261e0d33f3593000f90e73943a466ec500a25e59b,2025-03-05T21:15:18.897000
CVE-2024-45775,0,0,5e285262d1706cab5ca05a7725649dadf6185a7492d72f859f11f2cece394355,2025-02-18T20:15:19.177000
CVE-2024-45776,0,0,6ff331300b63b0445c4a33993b39c621dc4140ea58408c74e411ebee541079c0,2025-02-18T20:15:19.313000
CVE-2024-45777,0,0,381f048bca6c71d068d001bd4e22e7b202a5aa1ffd4c67366bc2225f24d010f7,2025-02-19T18:15:23.210000
CVE-2024-45778,0,0,4a788605efb9b4cb4a9d6b761519c855051768041e43218264b80f4c5b038d32,2025-03-03T17:15:12.700000
CVE-2024-45779,0,0,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
CVE-2024-45779,0,1,ef9c7579abe7cc86ad6d3bbf7c0d85a638308ff189f521d9ba5bde61fb1d8868,2025-03-05T21:15:19.043000
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
CVE-2024-45780,0,0,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
CVE-2024-45780,0,1,cf48978da48bec73dddc393fa912333a5f584e7103712d9a48b5fcac961a7f62,2025-03-05T21:15:19.167000
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
CVE-2024-45782,0,0,9a6d58c808594661629c2038d537df1d03a760fc3efa15bba0bd203537e988b6,2025-03-03T17:15:12.900000
CVE-2024-45783,0,0,26ae80ac76949a820b287a710d857e419cd80f84fb3ed37275ecee208bfb63de,2025-02-18T20:15:19.560000
@ -270003,7 +270003,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000
CVE-2024-48246,1,1,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000
CVE-2024-48246,0,0,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000
CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
@ -272077,7 +272077,7 @@ CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c38655
CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000
CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000
CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000
CVE-2024-51144,1,1,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000
CVE-2024-51144,0,0,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000
CVE-2024-5115,0,0,63ee4189b26772fc1ce56914807ff994899a5055d7b3d38de495f2ee77931e2d,2025-02-21T20:51:40.910000
CVE-2024-51151,0,0,6043d48b8e54694a9f5dd0791c6e07ebb911ecfc7547aac1163aaf1a70efd3d4,2024-11-22T17:15:09.190000
CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f9037d5,2024-11-13T20:03:06.083000
@ -273697,7 +273697,7 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065
CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000
CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000
CVE-2024-53382,0,0,2488076516d1ebcfd2ad12e680a94caed7283ef6a09ea27a43a166505c7166e8,2025-03-03T22:15:35.637000
CVE-2024-53384,0,1,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000
CVE-2024-53384,0,0,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000
CVE-2024-53386,0,0,7f05252fb8b0d166f1c2ba66ecc4b7344953d98b8f75dafbb0948fe4c267094e,2025-03-03T22:15:36.583000
CVE-2024-53387,0,0,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d896,2025-03-04T17:15:13.043000
CVE-2024-53388,0,0,8b8dacfab9439ff4969bd847d9389950511a224c15ee4c724e3aaa2186354ee1,2025-03-04T17:15:13.217000
@ -273720,7 +273720,7 @@ CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db166141872
CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000
CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000
CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000
CVE-2024-53458,0,0,97d39f76361f25c42034c95d8b9ccf092d5a81242cf9c168f96b864a3e5ef49e,2025-03-05T18:15:37.053000
CVE-2024-53458,0,1,641859a5600bbf3f0e54a9968e7e6b822daf3d47438a24462013c8b12042fd66,2025-03-05T21:15:19.270000
CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000
CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28
CVE-2024-5347,0,0,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000
@ -274876,7 +274876,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000
CVE-2024-55570,0,1,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000
CVE-2024-55570,0,0,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000
CVE-2024-55573,0,0,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000
CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000
CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000
@ -275855,6 +275855,7 @@ CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8
CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
CVE-2024-57174,1,1,ea5f915b58d7c215b8fa5efcc7c90eee7ccc1e3a45af4848031dc2d74daa2bea,2025-03-05T21:15:19.410000
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
CVE-2024-57176,0,0,6d9c6c6cbdd40045d42d7eb3b163498a343556fdd692d1bfd43f815afbfe5382,2025-02-21T18:15:18.877000
CVE-2024-57177,0,0,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f217a2,2025-02-10T22:15:36.257000
@ -276333,7 +276334,7 @@ CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add
CVE-2024-58010,0,0,7890f0fc518a397a6f3394be59f08277a93d5e6d2c7bea10037599ec5ef4e93d,2025-02-27T03:15:11.980000
CVE-2024-58011,0,0,1e5ed1e9dbbfdfc9c4e1f83ef735602eb4423be5efad22020690bcd20febf463,2025-02-27T03:15:12.087000
CVE-2024-58012,0,0,a87781614600ca02d98d4520ab570199bd055ca58f903501e236e127b34cd233,2025-02-27T03:15:12.187000
CVE-2024-58013,0,0,1ced2f9163c7fb110b65337e31022048526b187402b205b937ea44447b006cbe,2025-02-27T03:15:12.287000
CVE-2024-58013,0,1,db720d7ccdda587cf86c812bf9a23ff3242ad2c6818001578519aa3e1096cd28,2025-03-05T22:15:35.690000
CVE-2024-58014,0,0,c7b2aa63e8b7bec392f61441db5b82d30877f13fd011c4249345a8e6613810f5,2025-02-27T03:15:12.390000
CVE-2024-58015,0,0,408dce73f62364b52ba252950975a281e1135fb7b4b23b2ccae7c773ad3c39ca,2025-02-27T03:15:12.493000
CVE-2024-58016,0,0,4b26c1146b2a0dfbe10569fbb6f1cac4750ac1fe03a88c36d84acf78d6c876e6,2025-02-27T03:15:12.590000
@ -280414,8 +280415,8 @@ CVE-2025-0683,0,0,656748caff6fec701396e9f78e84e971ce5f7b02979f679e43ad5dbf6778d8
CVE-2025-0684,0,0,08cf09aadd4265d9f17fc91e7ffa365e4af4b017983ec1ff0167ffac235b59e4,2025-03-03T18:15:30.537000
CVE-2025-0685,0,0,36f03222d9846bb79813c677d1ef99c125061b51820965038a411e4d83039174,2025-03-03T18:15:30.733000
CVE-2025-0686,0,0,c1cd4659b63910dd911bbe910efe568d44b2d78dc5d45dcca3ca5f7d1cf3b4cc,2025-03-03T18:15:30.930000
CVE-2025-0689,0,0,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
CVE-2025-0690,0,0,09027ea6c3bed8670e162224b0d482e5f3ab1012b1f296c54e49592e0794bc03,2025-02-24T08:15:09.503000
CVE-2025-0689,0,1,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c4316,2025-03-05T21:15:19.503000
CVE-2025-0690,0,1,bbbcb650d9130b5dd35bdfc4d8287eb5fdbb2a723c8cda9af36e91d7165433a0,2025-03-05T21:15:19.603000
CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000
CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000
CVE-2025-0695,0,0,5a6f397a6b64075e37b58670bef347904c3201da024fb297d91e9e2cec2630c8,2025-01-27T11:15:11.087000
@ -280559,7 +280560,7 @@ CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8f
CVE-2025-0912,0,0,7d91fe8bdf75dc10fc3a6ee045af78f6d8511b1dffa7e9ab755c8337b5808dd8,2025-03-04T04:15:11.390000
CVE-2025-0914,0,0,9e1fc990beb9632007c48895ab7342f6dbef3aadc843d2d68815604598633e4c,2025-02-27T16:15:38.237000
CVE-2025-0916,0,0,b3e2dfc1a782ae4e58fd745e6dc8ce9f3019ca5ca64e71e978c066cc4fb2d49f,2025-02-25T20:19:48.457000
CVE-2025-0918,0,0,bf7ea5d39eee8251bb807510dd4b154e6c47cd25d1f1b7d645bbb739c9503983,2025-02-22T13:15:11.687000
CVE-2025-0918,0,1,3b7ea2206360604d42b031bd9cb0adecc5bc1a42f350443e778efc86f1a584a6,2025-03-05T21:28:15.293000
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
CVE-2025-0924,0,0,f098c8869b022dbda442e50477571fe8e89ac3ff2ff9ea7bd16e8bb1ca9eb537,2025-02-17T05:15:09.410000
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
@ -280579,7 +280580,7 @@ CVE-2025-0947,0,0,54992aef26727e095f19651dace58e0751a58da1d32b3005bb44e21372f29d
CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c849,2025-02-03T18:15:41.580000
CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
CVE-2025-0953,0,0,921a82da6ab0ef8d3d98803db3946d447f0517778af0c3f71c90d1c8292a158b,2025-02-22T13:15:11.850000
CVE-2025-0953,0,1,13d291258e4c30c78d80b709e158097d095b4eb5e4d1fb760e2f7e371f933aaf,2025-03-05T21:28:15.293000
CVE-2025-0954,0,0,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000
CVE-2025-0956,0,0,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
@ -280682,7 +280683,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4
CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000
CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000
CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000
CVE-2025-1125,0,0,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
CVE-2025-1125,0,1,2f04992a8811506ffd86df04ce8fd4c4eaf818b2350c9b37d99c1e9008bb7d98,2025-03-05T21:15:19.707000
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000
CVE-2025-1128,0,0,3e3abcd3f96edb2abceed71a856737fc42627c92bf399c3000e0a443d77fce4c,2025-02-25T07:15:18.480000
@ -280864,8 +280865,8 @@ CVE-2025-1463,0,0,d248ef273a3b5e888e172d8fd07cc9fd97f2fb7f97e8edd42c6b6898096b1d
CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000
CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000
CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000
CVE-2025-1470,0,1,3848028ffff60fd580115e36417f30f6dc535781a178d2b984e388a8c98d4795,2025-03-05T18:54:18.150000
CVE-2025-1471,0,1,ce8174d2ec3ea90fee94fa4dcc9877166339de4d02332b4e10279e4dda90d352,2025-03-05T18:54:18.150000
CVE-2025-1470,0,0,3848028ffff60fd580115e36417f30f6dc535781a178d2b984e388a8c98d4795,2025-03-05T18:54:18.150000
CVE-2025-1471,0,0,ce8174d2ec3ea90fee94fa4dcc9877166339de4d02332b4e10279e4dda90d352,2025-03-05T18:54:18.150000
CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000
CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e53733175,2025-02-24T11:15:10.193000
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
@ -281062,10 +281063,10 @@ CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9
CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000
CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000
CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000
CVE-2025-1889,0,1,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000
CVE-2025-1889,0,0,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000
CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000
CVE-2025-1891,0,1,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000
CVE-2025-1892,0,1,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000
CVE-2025-1891,0,0,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000
CVE-2025-1892,0,0,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000
CVE-2025-1893,0,0,9be412d2514b9be0790e5a4193b6955597746daf900e90c81d514cf9ccc312d7,2025-03-04T17:15:15.890000
CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000
CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000
@ -281099,7 +281100,7 @@ CVE-2025-1935,0,0,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997
CVE-2025-1936,0,0,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000
CVE-2025-1937,0,0,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000
CVE-2025-1938,0,0,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000
CVE-2025-1939,0,1,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000
CVE-2025-1939,0,0,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000
CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
CVE-2025-1942,0,0,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000
@ -281130,7 +281131,7 @@ CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543
CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
CVE-2025-2003,1,1,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000
CVE-2025-2003,0,0,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
@ -281454,7 +281455,7 @@ CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced
CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000
CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000
CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000
CVE-2025-21355,0,1,7a3bd7c08e7fa8cfe7141fb458e4393082fe5fb614b47716a343605b5ca5af95,2025-03-05T18:54:18.150000
CVE-2025-21355,0,0,7a3bd7c08e7fa8cfe7141fb458e4393082fe5fb614b47716a343605b5ca5af95,2025-03-05T18:54:18.150000
CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0b95,2025-01-21T19:37:28.987000
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
@ -281497,7 +281498,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
CVE-2025-21399,0,0,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
CVE-2025-21401,0,1,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000
CVE-2025-21401,0,0,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000
CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000
@ -283633,14 +283634,15 @@ CVE-2025-25330,0,0,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070
CVE-2025-25331,0,0,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000
CVE-2025-25333,0,0,48db7a0795e1d6c60f3c9b54235bb299f37a35fd06d70db1a48b26f45e2b3776,2025-02-27T20:16:05.073000
CVE-2025-25334,0,0,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000
CVE-2025-25343,0,1,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000
CVE-2025-25349,0,1,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000
CVE-2025-25343,0,0,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000
CVE-2025-25349,0,0,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000
CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6d06,2025-02-14T19:39:33.147000
CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000
CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000
CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000
CVE-2025-25362,1,1,5c20b711ac79c6c4af2730be6aa1167252eca84ac8131f5fab860a3a20cb8bc1,2025-03-05T21:15:19.803000
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
@ -283689,6 +283691,8 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
CVE-2025-25632,1,1,2837e6eed05a75825d3a0a65aeefc087cd911ab22aba5f61b34c77158f2cb8fb,2025-03-05T21:15:19.890000
CVE-2025-25634,1,1,ba7c6e4c7202e5cc51c3a3e35603315845cc8c4c900719372b556ce21832c21b,2025-03-05T21:15:19.980000
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000
CVE-2025-25663,0,0,2c66463e17f0da9d9b59da03f32234807a5e0504a922f80726e5f203d3e2d884,2025-02-21T18:15:41.693000
@ -283709,10 +283713,10 @@ CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314b
CVE-2025-25729,0,0,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000
CVE-2025-25730,0,0,5698d9d4b3d086c1c265c033d8b8d6ebf52c1e553b08fab79bfe6eec41adf00a,2025-02-28T20:15:46.803000
CVE-2025-25740,0,0,773eb69d9fa04e004e72a74faf22d133a852d69f49836b1bbebb7a8b7833c66c,2025-02-14T15:15:13.190000
CVE-2025-25741,0,1,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000
CVE-2025-25742,0,1,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000
CVE-2025-25743,0,1,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000
CVE-2025-25744,0,1,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
CVE-2025-25741,0,0,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000
CVE-2025-25742,0,0,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000
CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000
CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
@ -283795,7 +283799,7 @@ CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
CVE-2025-26182,0,1,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
CVE-2025-26182,0,0,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
CVE-2025-26202,0,0,faf1da73f05d445d952dd532cee33fae2a2ae5a854a8d484ad2405b4354fa0d8,2025-03-05T16:15:40.130000
@ -283812,7 +283816,7 @@ CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
CVE-2025-26318,0,0,954b8e579069ffbba2c1644cd56a790bd60e4a5ad19eb604706c56f01984d999,2025-03-05T17:15:16.180000
CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a721,2025-03-05T17:15:16.340000
CVE-2025-26320,0,1,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
@ -284190,13 +284194,15 @@ CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a
CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000
CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369f59,2025-03-04T17:15:20.250000
CVE-2025-27500,0,1,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
CVE-2025-27501,0,1,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
CVE-2025-27508,1,1,021b134ab746fdb21c1b6afba20d8b4449f142dd50a7aeaf2a0e333d5dbea12b,2025-03-05T22:15:35.867000
CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000
CVE-2025-27513,1,1,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
CVE-2025-27515,1,1,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
CVE-2025-27517,1,1,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
CVE-2025-27516,1,1,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000
CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
@ -284210,16 +284216,16 @@ CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3
CVE-2025-27640,0,0,b630dc974545d9f67fba85dfa1922285fca382bf7c8ef944014c9ef5e7da0dae,2025-03-05T17:15:17.250000
CVE-2025-27641,0,0,e00fcfcdda4ca65f506722aa33e3fc2808ef53a5c2f863874f47768f8a9a6a18,2025-03-05T17:15:17.427000
CVE-2025-27642,0,0,5b8e208a9248521650816b22a37509c58dc012b954572086c7bae255201add83,2025-03-05T17:15:17.603000
CVE-2025-27643,0,0,1e7e42e492f06ba614ed9e1c5091ad093090fe50a4868cf449f85baaf4ea0949,2025-03-05T06:15:35.847000
CVE-2025-27644,0,0,aceda647f9fba77bd6fd5bdb575ee6502574725ea989be8bcb7964e672dbac85,2025-03-05T06:15:35.990000
CVE-2025-27645,0,0,79335b2d00fc3b81c5d00789938fc04e8f3525330ebb50ceab6a6dc7cdef01d0,2025-03-05T06:15:36.117000
CVE-2025-27646,0,0,cdbc489563ce86b498e897be1ad51d8f773102accaef7988d995503f91f710c6,2025-03-05T06:15:36.257000
CVE-2025-27647,0,0,0697fc74d80d6535a37a6807865700aa57cfe2feb17485b9ee527253df01bc51,2025-03-05T06:15:36.387000
CVE-2025-27648,0,0,af84b41c48767982114cc636935a3c68f1a33a8301cb722c298fce892e4f4b86,2025-03-05T06:15:36.523000
CVE-2025-27649,0,0,1269208457b870adba1c11dbd8f7cfa18f4eb40e81bc0b649bbc903a5d7441f3,2025-03-05T06:15:36.667000
CVE-2025-27650,0,0,442b478fb9f5a720296498b0972185371516b40aad684692d6f2704c9c1b08fc,2025-03-05T06:15:36.817000
CVE-2025-27651,0,0,2268f00520bf4992136d976faa8dc8169a6a419db2460587b8c479b3e1d43453,2025-03-05T06:15:36.950000
CVE-2025-27652,0,0,5148740c543bf87d5b1166b079693a23ac8922c32846a4339e8b98d0bbf9af12,2025-03-05T06:15:37.077000
CVE-2025-27643,0,1,6568a9113f59086f66524c9c6940973d1f9db034fafd5740d4369aec86fd613c,2025-03-05T21:15:20.240000
CVE-2025-27644,0,1,96c7cea48b973516fb70109b8895aa3c7ce75815b7016d2db8d462dd77e9ebec,2025-03-05T21:15:20.420000
CVE-2025-27645,0,1,14f10c13826d858dcbb28aa9ef92def3863950dd3112094015db8461f9f5006c,2025-03-05T21:15:20.580000
CVE-2025-27646,0,1,1d326e7ecc76695cd522b222a45ea15a8222f613aa17e992bceba21ecdfad65d,2025-03-05T21:15:20.757000
CVE-2025-27647,0,1,e66f96bc9bdcd5def7c528621ccb2b03fe386092bb44ba6f69a7ec673203e87d,2025-03-05T21:15:20.893000
CVE-2025-27648,0,1,e07ff029f0ef36e16bd3a27e9294be54a2cb6a621c1df4fccdf40fd031b01a31,2025-03-05T21:15:21.037000
CVE-2025-27649,0,1,c48716efc0678bf11a4b059addfe2d52d2bd5f208d0f6a29e8858d440fe5aa44,2025-03-05T21:15:21.180000
CVE-2025-27650,0,1,1c8aa1a505a09a50e69bcbd6ecbf77b51726aeb80f762e609cef966aee0a0de1,2025-03-05T21:15:21.357000
CVE-2025-27651,0,1,e70d96159ccbed6f468ff4a4f45faef8d504372c15f4f0f19a52f47d3a7341e3,2025-03-05T21:15:21.523000
CVE-2025-27652,0,1,be80a2a079c4591e17b7a91e759b9872ff409121fedd5975433265957c8ec4ac,2025-03-05T21:15:21.677000
CVE-2025-27653,0,0,c5dbd899dc4e9b32ebd02b603edfdedde4876912e079c638e2ef2e2a12af53bd,2025-03-05T16:15:40.880000
CVE-2025-27654,0,0,71bd2de24a90bbf3394e7753a34a6c0e91a286c50c9892093c8520514154b9bb,2025-03-05T16:15:41.043000
CVE-2025-27655,0,0,09df5001fb7d473c43f0502d38dbd2679fe2955d2231dcc9c0a973db780aec1c,2025-03-05T17:15:17.763000
@ -284232,14 +284238,14 @@ CVE-2025-27661,0,0,077e0a7c9f0328c4a8804f90f903f07a90ac4b28f56f68d85b06a8b026cf7
CVE-2025-27662,0,0,26de84e5d6d05c1ade03ac48d67a789bfae45aae7ac630e401e4cff30f3687c2,2025-03-05T17:15:18.933000
CVE-2025-27663,0,0,b7f0aadd4cd6e28b1095cd15329f2e0e2629014cd6ac45c04843ac7b6fb8012c,2025-03-05T17:15:19.090000
CVE-2025-27664,0,0,2783c537a522312ab4b34337c2271a824caf7a36c61210c1e66b329e00e34a74,2025-03-05T16:15:41.217000
CVE-2025-27665,0,0,a1c30f1d141bf5a0c772b56c1d2031c79a2728572211947b83e103825d5cf842,2025-03-05T06:15:38.840000
CVE-2025-27666,0,0,6c9cc4a29e2417a709d6ef0cd4cd75ec3ebb86d235a3f6c61ace5d7f64120945,2025-03-05T06:15:38.970000
CVE-2025-27667,0,0,77a0a85ba07a0c48e31e3155f9f361de02ec86231b7979adc7d07b91c2cccc66,2025-03-05T06:15:39.100000
CVE-2025-27668,0,0,59c279a2fe34cdc2f916e91c4e7eb0dae68531fb2d49d7b3c9f6c0654efacfbc,2025-03-05T06:15:39.237000
CVE-2025-27669,0,0,3a89060ddc9c398015cd128a3fb63131337f980375ffac91a014eccfd91017ec,2025-03-05T06:15:39.373000
CVE-2025-27670,0,0,76aa85bad4babd0ebfa11c0c6a087e8e6070c146dca39075cb0bf06776882c4c,2025-03-05T06:15:39.537000
CVE-2025-27671,0,0,decd4150960a8b3c792cacd9073ee5659cc99638afb3ecb2f8efb6bccc24f08f,2025-03-05T06:15:39.903000
CVE-2025-27672,0,0,acd49e0df9fc0da4d4bd584e363cd2373f8b266a039327189d8219454a1ce995,2025-03-05T06:15:40.043000
CVE-2025-27665,0,1,6d5cab7710e0b441aed71c54a776a429f1f97d68878cdc37707e5e2f3b7b038e,2025-03-05T21:15:21.907000
CVE-2025-27666,0,1,15139f49696811d323c30fef33e944c03b2dd7d43d20f81036983c71666b570d,2025-03-05T21:15:22.087000
CVE-2025-27667,0,1,4fa810680e30aaf742ef965f2caac3b7cf8e8a0984efc472005cbc46ca97d6b3,2025-03-05T21:15:22.247000
CVE-2025-27668,0,1,5bc78bed271786da3744cbd6a3db0a18beaaa1aa1052a91ec6737bcb18f643c0,2025-03-05T21:15:22.380000
CVE-2025-27669,0,1,411965c096608e3a4e451d59b7ff665c281cb912074bc6a48b65a57871577c1f,2025-03-05T21:15:22.510000
CVE-2025-27670,0,1,57cadf73849d3103372d7d3becb73c43d1997d51f0692c7bd5820b816d343e82,2025-03-05T21:15:22.647000
CVE-2025-27671,0,1,cdbc3c3ae7fa70c66bcc84a7e95060a0bee561e5fcbed5fdeeb25ef7fedba72d,2025-03-05T21:15:22.793000
CVE-2025-27672,0,1,f8aef0303d5f34effa4664d6a8f105db11bb49b7cb780f8892bc07e946b4cc03,2025-03-05T21:15:22.930000
CVE-2025-27673,0,0,4c1f358b78269c41e8c493cec0c297a47520f604604b8e2d04a064180d029c74,2025-03-05T16:15:41.377000
CVE-2025-27674,0,0,d8fc23610bcb24a915473f82731daddbc0f8128bbc64155dc28c05f76f1629d1,2025-03-05T16:15:41.537000
CVE-2025-27675,0,0,88fe38f78b5c227dd0fb838c2bc395c16043de26bdf8d95f709edf11fe023d17,2025-03-05T16:15:41.700000
@ -284250,6 +284256,6 @@ CVE-2025-27679,0,0,c3477c4348b04a45d06ce63488e43254eae962776a041ca86955406c1debe
CVE-2025-27680,0,0,062f918e0746cc120a47d40b4cb35ee63e42fcaf6533382d4ae3a88ae16c2385,2025-03-05T15:15:18.790000
CVE-2025-27681,0,0,1e12361dcfb3de67956cc3fb5eef999d9e22cb46ceaa1217bcc9c81dd2bc3d92,2025-03-05T15:15:18.970000
CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dcd4c,2025-03-05T15:15:19.130000
CVE-2025-27683,0,0,7c3d9658bc9f46e359a510e69c5232639532e74fbe2a541d01814d0e35fcd5a8,2025-03-05T06:15:41.427000
CVE-2025-27684,0,0,16ea9daa2771b0c33d2babe4c0a47130eb590a6bc45f6fcd1c3c34c301925ec3,2025-03-05T06:15:41.540000
CVE-2025-27685,0,0,5438163b1e96d31de8dab5cde2ed9c114f6c34fffe05c690c30fa9e87c5161d3,2025-03-05T06:15:41.663000
CVE-2025-27683,0,1,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
CVE-2025-27684,0,1,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
CVE-2025-27685,0,1,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000

Can't render this file because it is too large.