diff --git a/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json b/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json index 3717cad83c7..a24aedfdde4 100644 --- a/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json +++ b/CVE-2019/CVE-2019-109xx/CVE-2019-10923.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-150xx/CVE-2019-15002.json b/CVE-2019/CVE-2019-150xx/CVE-2019-15002.json index 0572426289b..1ed785840cd 100644 --- a/CVE-2019/CVE-2019-150xx/CVE-2019-15002.json +++ b/CVE-2019/CVE-2019-150xx/CVE-2019-15002.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@atlassian.com", "published": "2025-02-11T18:15:18.557", "lastModified": "2025-02-11T18:15:18.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable CSRF vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. The login form doesn\u2019t require a CSRF token. As a result, an attacker can log a user into the system under an unexpected account." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad CSRF explotable en Atlassian Jira, desde las versiones 7.6.4 a 8.1.0. El formulario de inicio de sesi\u00f3n no requiere un token CSRF. Como resultado, un atacante puede iniciar sesi\u00f3n en el sistema con un usuario con una cuenta inesperada." } ], "metrics": {}, diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json index 043612f87cf..e35842f8c34 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2020-11-10T16:15:11.807", "lastModified": "2024-11-21T05:02:09.853", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-16xx/CVE-2020-1631.json b/CVE-2020/CVE-2020-16xx/CVE-2020-1631.json index 534d087e6f4..20f03d97150 100644 --- a/CVE-2020/CVE-2020-16xx/CVE-2020-1631.json +++ b/CVE-2020/CVE-2020-16xx/CVE-2020-1631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2020-05-04T10:15:10.890", "lastModified": "2024-11-21T05:11:02.493", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json index fb1e9b9afd8..d2b85813aa5 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-12T00:15:07.670", "lastModified": "2025-02-12T15:15:10.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the uninstaller component of Cisco AnyConnect Secure Mobility Client for Mac OS could allow an authenticated, local attacker to corrupt the content of any file in the filesystem.\r\n The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a symbolic link (symlink) to a target file on a specific path. A successful exploit could allow the attacker to corrupt the contents of the file. If the file is a critical systems file, the exploit could lead to a denial of service condition. To exploit this vulnerability, the attacker would need to have valid credentials on the system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el componente de desinstalaci\u00f3n de Cisco AnyConnect Secure Mobility Client para Mac OS podr\u00eda permitir que un atacante local autenticado corrompa el contenido de cualquier archivo en el sistema de archivos. La vulnerabilidad se debe a la gesti\u00f3n incorrecto de las rutas de directorio. Un atacante podr\u00eda aprovechar esta vulnerabilidad creando un enlace simb\u00f3lico (symlink) a un archivo de destino en una ruta espec\u00edfica. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante corromper el contenido del archivo. Si el archivo es un archivo cr\u00edtico del sistema, la explotaci\u00f3n podr\u00eda provocar una condici\u00f3n de denegaci\u00f3n de servicio. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda tener credenciales v\u00e1lidas en el sistema." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36084.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36084.json index 8f7bfbf5270..357e62287ad 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36084.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:27.180", "lastModified": "2025-02-06T16:15:28.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27017.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27017.json index 51d2c51813c..3cf36c29dba 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27017.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27017.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@puppet.com", "published": "2025-02-07T20:15:31.983", "lastModified": "2025-02-07T20:15:31.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Utilization of a module presented a security risk by allowing the deserialization of untrusted/user supplied data. This is resolved in the Puppet Agent 7.4.0 release." + }, + { + "lang": "es", + "value": "El uso de un m\u00f3dulo presentaba un riesgo de seguridad al permitir la deserializaci\u00f3n de datos no confiables o proporcionados por el usuario. Esto se solucion\u00f3 en la versi\u00f3n 7.4.0 de Puppet Agent." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41527.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41527.json index 0e8fddcbcb8..3763063cc46 100644 --- a/CVE-2021/CVE-2021-415xx/CVE-2021-41527.json +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41527.json @@ -3,12 +3,16 @@ "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2025-02-07T20:15:32.140", "lastModified": "2025-02-07T20:15:32.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An error related to the 2-factor authorization (2FA) on the RISC Platform prior to the\u00a0saas-2021-12-29 release\u00a0can potentially be exploited to bypass the 2FA. The vulnerability requires that the 2FA setup hasn\u2019t been completed." + }, + { + "lang": "es", + "value": "Un error relacionado con la autorizaci\u00f3n de dos factores (2FA) en la plataforma RISC anterior a la versi\u00f3n saas-2021-12-29 podr\u00eda potencialmente aprovecharse para eludir la 2FA. La vulnerabilidad requiere que la configuraci\u00f3n de la 2FA no se haya completado." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41528.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41528.json index 6e9cbc27022..84140089b00 100644 --- a/CVE-2021/CVE-2021-415xx/CVE-2021-41528.json +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41528.json @@ -3,12 +3,16 @@ "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2025-02-07T20:15:32.320", "lastModified": "2025-02-07T20:15:32.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An error when handling authorization related to the import / export interfaces on the RISC Platform prior to the saas-2021-12-29 release can potentially be exploited to\u00a0access the import / export functionality with low privileges." + }, + { + "lang": "es", + "value": "Un error al gestionar la autorizaci\u00f3n relacionada con las interfaces de importaci\u00f3n/exportaci\u00f3n en la Plataforma RISC antes del lanzamiento de saas-2021-12-29 podr\u00eda potencialmente aprovecharse para acceder a la funcionalidad de importaci\u00f3n/exportaci\u00f3n con privilegios bajos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-241xx/CVE-2022-24112.json b/CVE-2022/CVE-2022-241xx/CVE-2022-24112.json index fcfc685ae5f..8c05a110bd3 100644 --- a/CVE-2022/CVE-2022-241xx/CVE-2022-24112.json +++ b/CVE-2022/CVE-2022-241xx/CVE-2022-24112.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2022-02-11T13:15:08.073", "lastModified": "2025-01-29T22:15:27.690", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json b/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json index 18c3eb0080c..b0ceb33b372 100644 --- a/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json +++ b/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2022-04-26T10:15:35.083", "lastModified": "2025-01-29T17:15:17.557", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25768.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25768.json index 76ac3772b43..a93c9c22cc2 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25768.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25768.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T21:15:12.860", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25769.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25769.json index 7d8cc06e926..292aa1747a2 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25769.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25769.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T15:15:13.060", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25770.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25770.json index b4d1bc91533..af66ee1bfa0 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25770.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25770.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T22:15:03.827", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25777.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25777.json index 79578d86646..6f3add81c4c 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25777.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25777.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T16:15:04.980", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26388.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26388.json index 0e304f1ab06..c6cb447a988 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26388.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26388.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productsecurity@baxter.com", "published": "2025-02-07T17:15:21.960", "lastModified": "2025-02-07T17:15:21.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded password vulnerability may allow authentication abuse.This issue affects ELI 380 Resting Electrocardiograph: \n\nVersions 2.6.0 and prior; ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph:\n\nVersions 2.3.1 and prior; ELI 250c/BUR 250c Resting Electrocardiograph:\n\nVersions 2.1.2 and prior; ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: \n\nVersions 2.2.0 and prior." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el uso de contrase\u00f1as codificadas de forma r\u00edgida puede permitir el abuso de la autenticaci\u00f3n. Este problema afecta al electrocardi\u00f3grafo en reposo ELI 380: versiones 2.6.0 y anteriores; al electrocardi\u00f3grafo en reposo ELI 280/BUR280/MLBUR 280: versiones 2.3.1 y anteriores; al electrocardi\u00f3grafo en reposo ELI 250c/BUR 250c: versiones 2.1.2 y anteriores; al electrocardi\u00f3grafo en reposo ELI 150c/BUR 150c/MLBUR 150c: versiones 2.2.0 y anteriores." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26389.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26389.json index 72efab91e3f..310c2bb3b67 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26389.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26389.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productsecurity@baxter.com", "published": "2025-02-07T17:15:22.130", "lastModified": "2025-02-07T17:15:22.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability may allow privilege escalation.This issue affects:\u00a0\n\n * ELI 380 Resting Electrocardiograph:\n\nVersions 2.6.0 and prior;\u00a0\n * ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph:\n\nVersions 2.3.1 and prior;\u00a0\n * ELI 250c/BUR 250c Resting Electrocardiograph:\u00a0Versions 2.1.2 and prior;\u00a0\n * ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: \n\nVersions 2.2.0 and prior." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado puede permitir la escalada de privilegios. Este problema afecta a: * Electrocardi\u00f3grafo en reposo ELI 380: versiones 2.6.0 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 280/BUR280/MLBUR 280: versiones 2.3.1 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 250c/BUR 250c: versiones 2.1.2 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 150c/BUR 150c/MLBUR 150c: versiones 2.2.0 y anteriores." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json b/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json index 117f95423c0..25c47b03736 100644 --- a/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json +++ b/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-06T15:15:10.610", "lastModified": "2025-02-06T17:15:13.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json index f8f9b676938..3ba86273252 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T22:15:24.180", "lastModified": "2025-02-12T15:15:10.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPGateway Plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.5. This allows unauthenticated attackers to create arbitrary malicious administrator accounts." + }, + { + "lang": "es", + "value": "El complemento WPGateway para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 3.5 y incluida. Esto permite que atacantes no autenticados creen cuentas de administrador maliciosas arbitrarias." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json b/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json index 1ebb89b97fd..6cd47ccc229 100644 --- a/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json +++ b/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association." + }, + { + "lang": "es", + "value": "En hostapd 2.10 y versiones anteriores, el c\u00f3digo PKEX permanece activo incluso despu\u00e9s de una asociaci\u00f3n PKEX exitosa. Un atacante que haya iniciado con \u00e9xito claves p\u00fablicas con otra entidad que usa PKEX en el pasado, podr\u00e1 subvertir una futura iniciaci\u00f3n observando pasivamente las claves p\u00fablicas, reutilizando el elemento de cifrado Qi y rest\u00e1ndolo del mensaje capturado M (X = M - Qi). Esto dar\u00e1 como resultado la clave p\u00fablica ef\u00edmera X; el \u00fanico elemento necesario para subvertir la asociaci\u00f3n PKEX." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json b/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json index cd8141f1e6c..c4ff58381b6 100644 --- a/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json +++ b/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:13.640", "lastModified": "2025-02-06T21:15:17.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json b/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json index a1180e9319e..5cc92853836 100644 --- a/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json +++ b/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:13.757", "lastModified": "2025-02-07T19:15:22.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20507.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20507.json index d43e64e457f..2a71d546a26 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20507.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20507.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T21:15:10.620", "lastModified": "2025-02-11T21:15:10.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow in the ASP could allow a privileged attacker to perform an out-of-bounds write, potentially resulting in loss of data integrity." + }, + { + "lang": "es", + "value": "Un desbordamiento de enteros en la ASP podr\u00eda permitir que un atacante privilegiado realice una escritura fuera de los l\u00edmites, lo que podr\u00eda resultar en la p\u00e9rdida de integridad de los datos." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20508.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20508.json index 2ddf60e6888..2cb39d06280 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20508.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20508.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-12T00:15:07.850", "lastModified": "2025-02-12T00:15:07.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the ASP could allow a privileged attacker to perform an out-of-bounds write to a memory location not controlled by the attacker, potentially leading to loss of confidentiality, integrity, or availability." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el ASP podr\u00eda permitir que un atacante privilegiado realice una escritura fuera de los l\u00edmites en una ubicaci\u00f3n de memoria no controlada por el atacante, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad, integridad o disponibilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20515.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20515.json index acffedf0a3b..ce50a08e635 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20515.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20515.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T22:15:26.087", "lastModified": "2025-02-11T22:15:26.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the fTPM driver in the trusted OS could allow a privileged attacker to corrupt system memory, potentially leading to loss of integrity, confidentiality, or availability." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el controlador fTPM en el sistema operativo confiable podr\u00eda permitir que un atacante privilegiado corrompa la memoria del sistema, lo que podr\u00eda provocar una p\u00e9rdida de integridad, confidencialidad o disponibilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20581.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20581.json index 09db1bc4aec..e886afcebdf 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20581.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20581.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T22:15:26.223", "lastModified": "2025-02-11T22:15:26.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the IOMMU may allow a privileged attacker to bypass RMP checks, potentially leading to a loss of guest memory integrity." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en IOMMU puede permitir que un atacante privilegiado evite las comprobaciones de RMP, lo que podr\u00eda provocar una p\u00e9rdida de integridad de la memoria del invitado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20582.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20582.json index 7222d57573c..e92a0603484 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20582.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20582.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T22:15:26.347", "lastModified": "2025-02-11T22:15:26.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of invalid nested page table entries in the IOMMU may allow a privileged attacker to induce page table entry (PTE) faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest memory integrity." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de entradas de tablas de p\u00e1ginas anidadas no v\u00e1lidas en IOMMU puede permitir que un atacante privilegiado induzca fallas en las entradas de tablas de p\u00e1ginas (PTE) para eludir las verificaciones de RMP en SEV-SNP, lo que podr\u00eda llevar a una p\u00e9rdida de integridad de la memoria del invitado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json index 8f0f7fef851..f092e63e87a 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:38.517", "lastModified": "2024-11-21T07:44:30.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json index dc0f0049234..d7d067fd4cd 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_475FB0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload." + }, + { + "lang": "es", + "value": "Se ha descubierto que D-Link DIR878 DIR_878_FW120B05 contiene un desbordamiento de pila en la funci\u00f3n sub_475FB0. Esta vulnerabilidad permite a los atacantes ocasionar una denegaci\u00f3n de servicio (DoS) o ejecutar c\u00f3digo arbitrario mediante unos par\u00e1metros manipulados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json index a444abb3d75..93875d096e4 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json index 56e5198316d..18054882adb 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Prestashop cdesigner v3.1.3 to v3.1.8 was discovered to contain a code injection vulnerability via the component CdesignerSaverotateModuleFrontController::initContent()." + }, + { + "lang": "es", + "value": "Se ha descubierto que Prestashop cdesigner v3.1.3 a v3.1.8 contiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el componente CdesignerSaverotateModuleFrontController::initContent()." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27459.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27459.json index d9a803a26d9..113973b99e4 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27459.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T20:15:08.737", "lastModified": "2024-11-21T07:52:57.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json index 41953fad08f..b5d5a89627e 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2023-04-24T16:15:07.843", "lastModified": "2024-11-21T07:53:05.773", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27630.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27630.json index 84f9876c0b6..8501de2eec5 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27630.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T20:15:08.953", "lastModified": "2024-11-21T07:53:17.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json index a23ab253666..0ccb13de6a1 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:50.477", "lastModified": "2024-11-21T07:55:48.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json index b75574bfbc0..c154558ead8 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:50.693", "lastModified": "2024-11-21T07:56:00.780", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json index 9976c49a135..325c4b66b38 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow an authenticated user to enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el firmware de BMC para Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, anterior a la versi\u00f3n 02.01.0017 e Intel(R) Server Board M50CYP e Intel(R) Server Board D50TNP anterior a la versi\u00f3n R01.01.0009 puede permitir que un usuario autenticado habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json index 9fd9281d4d6..0aedf482f6f 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow a privileged user to enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer basado en mont\u00f3n en el firmware BMC para Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, anterior a la versi\u00f3n 02.01.0017 e Intel(R) Server Board M50CYP e Intel(R) Server Board D50TNP anterior a la versi\u00f3n R01.01.0009 puede permitir que un usuario privilegiado habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31331.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31331.json index fa4353273a4..35d639f7ab9 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31331.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31331.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T22:15:26.643", "lastModified": "2025-02-11T22:15:26.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el firmware DRTM podr\u00eda permitir que un atacante privilegiado realice m\u00faltiples inicializaciones de controladores, lo que genera una corrupci\u00f3n de la memoria de la pila que potencialmente podr\u00eda conducir a la p\u00e9rdida de integridad o disponibilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31342.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31342.json index 0fbe2551608..8749dc12af7 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31342.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31342.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T23:15:08.277", "lastModified": "2025-02-11T23:15:08.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n de entrada incorrecta en el controlador SMM puede permitir que un atacante privilegiado sobrescriba SMRAM, lo que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31343.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31343.json index 965269189eb..a2292a68e75 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31343.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31343.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T23:15:08.407", "lastModified": "2025-02-11T23:15:08.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n de entrada incorrecta en el controlador SMM puede permitir que un atacante privilegiado sobrescriba SMRAM, lo que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31345.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31345.json index 37ccaf15981..131be7d11ae 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31345.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-12T00:15:08.003", "lastModified": "2025-02-12T00:15:08.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n de entrada incorrecta en el controlador SMM puede permitir que un atacante privilegiado sobrescriba SMRAM, lo que podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31352.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31352.json index e63c640376e..420fa170ed4 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31352.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31352.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T23:15:08.537", "lastModified": "2025-02-12T00:15:08.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug in the SEV firmware may allow an attacker with privileges to read unencrypted memory, potentially resulting in loss of guest private data." + }, + { + "lang": "es", + "value": "Un error en el firmware SEV puede permitir que un atacante con privilegios lea memoria no cifrada, lo que podr\u00eda resultar en la p\u00e9rdida de datos privados del hu\u00e9sped." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31360.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31360.json index 48a417a5b38..3d9e19cd89e 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31360.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31360.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T20:15:32.950", "lastModified": "2025-02-11T20:15:32.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in the AMD Integrated Management Technology (AIM-T) Manageability Service installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos en la instalaci\u00f3n de AMD Integrated Management Technology (AIM-T) Manageability Service podr\u00edan permitir que un atacante logre una escalada de privilegios, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31361.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31361.json index 98f0b482b81..40dcaa85ecb 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31361.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T20:15:33.120", "lastModified": "2025-02-11T21:15:12.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A DLL hijacking vulnerability in AMD Integrated Management Technology (AIM-T) Manageability Service could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de secuestro de DLL en AMD Integrated Management Technology (AIM-T) Manageability Service podr\u00eda permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json index 757dc391bd0..5c8a3d6644c 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Untrusted Pointer Dereference in I/O subsystem for some Intel(R) QAT software before version 2.0.5 may allow authenticated user to potentially enable information disclosure via local operating system access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero no confiable en el subsistema de E/S para alg\u00fan software Intel(R) QAT anterior a la versi\u00f3n 2.0.5 puede permitir que un usuario autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso al sistema operativo local sistema." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json index fbd5c9c30d9..7377ab9821d 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI para algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37482.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37482.json index ddbf4fc6a49..e9b332e31a7 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37482.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37482.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:11.427", "lastModified": "2025-02-11T11:15:11.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The login functionality of the web server in affected devices does not normalize the response times of login attempts. An unauthenticated remote attacker could exploit this side-channel information to distinguish between valid and invalid usernames." + }, + { + "lang": "es", + "value": "La funcionalidad de inicio de sesi\u00f3n del servidor web en los dispositivos afectados no normaliza los tiempos de respuesta de los intentos de inicio de sesi\u00f3n. Un atacante remoto no autenticado podr\u00eda aprovechar esta informaci\u00f3n del canal secundario para distinguir entre nombres de usuario v\u00e1lidos e inv\u00e1lidos." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39943.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39943.json index 97df4fcf11f..359a548fde3 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39943.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39943.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-04T23:15:08.237", "lastModified": "2025-02-04T23:15:08.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40222.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40222.json index de84b4b69cf..dcefa6e7025 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40222.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-04T23:15:08.413", "lastModified": "2025-02-04T23:15:08.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40721.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40721.json index 77035b74597..4c8fb377152 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40721.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40721.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:21.403", "lastModified": "2025-02-11T17:15:21.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiOS version 7.4.0 through 7.4.1 and before 7.2.6, FortiProxy version 7.4.0 and before 7.2.7, FortiPAM version 1.1.2 and before 1.0.3, FortiSwitchManager version 7.2.0 through 7.2.2 and before 7.0.2 allows a privileged attacker to execute arbitrary code or commands via specially crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de uso de cadena de formato controlada externamente [CWE-134] en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.1 y anteriores a 7.2.6, FortiProxy versi\u00f3n 7.4.0 y anteriores a 7.2.7, FortiPAM versi\u00f3n 1.1.2 y anteriores a 1.0.3, FortiSwitchManager versi\u00f3n 7.2.0 a 7.2.2 y anteriores a 7.0.2 permite a un atacante privilegiado ejecutar c\u00f3digo o comandos arbitrarios a trav\u00e9s de solicitudes especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json index 3ed0406c2b8..a93568d059d 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI para algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json index 2a00e59d071..e2600549297 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "Condici\u00f3n de ejecuci\u00f3n en algunos Intel(R) System Security Report and System Resources Defense puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json index e6db4fc9121..0ab712f3e4e 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Condici\u00f3n de ejecuci\u00f3n en algunos firmware Intel(R) System Security Report and System Resources Defense puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json index e5d3b82d395..1f259d4b4f0 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos Intel(R) System Security Report and System Resources Defense puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json index ba9a0774cd2..d8730ff5eb2 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en algunos fIntel(R) System Security Report and System Resources Defense pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json index 97bd1d9594d..a86c626b840 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-12T08:15:08.013", "lastModified": "2025-02-12T15:15:12.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in acmailer CGI ver.4.0.5 and earlier. An arbitrary script may be executed on the web browser of the user who accessed the management page of the affected product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting en la versi\u00f3n 4.0.5 y anteriores de CGI de acmailer. Se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 a la p\u00e1gina de administraci\u00f3n del producto afectado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json index 718d1c1564a..cc96d7e88e1 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-16T02:15:07.623", "lastModified": "2024-11-21T08:38:13.473", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json index 8c674bfdd32..bd0e95567cb 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-16T02:15:07.817", "lastModified": "2024-11-21T08:38:13.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52924.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52924.json index 774d2991e92..6eaae4b7752 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52924.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-05T10:15:21.073", "lastModified": "2025-02-05T10:15:21.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json index ce5f44a562c..f115b574375 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-05T10:15:21.963", "lastModified": "2025-02-06T16:15:37.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json index 6b37bcd1cfa..e54aaef5576 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:08.110", "lastModified": "2024-11-21T08:42:13.587", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5878.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5878.json index 85e1c25d0ff..56552750440 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5878.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@honeywell.com", "published": "2025-02-06T15:15:12.440", "lastModified": "2025-02-06T15:15:12.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6091.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6091.json index b7520668ec5..a0026079df7 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6091.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6091.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T20:15:09.167", "lastModified": "2024-11-21T08:43:07.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6386.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6386.json index bee2de22721..2cd0853df8e 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6386.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T10:15:22.093", "lastModified": "2025-02-05T10:15:22.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0112.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0112.json index 140f8932b40..2d36419e7ce 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0112.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0112.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T00:15:08.263", "lastModified": "2025-02-12T00:15:08.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA Jetson AGX Orin\u2122 and NVIDIA IGX Orin software contain a vulnerability where an attacker can cause an improper input validation issue by escalating certain permissions to a limited degree. A successful exploit of this vulnerability might lead to code execution, denial of service, data corruption, information disclosure, or escalation of privilege." + }, + { + "lang": "es", + "value": "El software NVIDIA Jetson AGX Orin\u2122 y NVIDIA IGX Orin contiene una vulnerabilidad que permite a un atacante provocar un problema de validaci\u00f3n de entrada incorrecto al aumentar ciertos permisos hasta cierto punto. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, la denegaci\u00f3n de servicio, la corrupci\u00f3n de datos, la divulgaci\u00f3n de informaci\u00f3n o la ampliaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json index 9811bfd89f7..7fb5c4591fd 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T00:15:08.423", "lastModified": "2025-02-12T01:15:08.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering." + }, + { + "lang": "es", + "value": "NVIDIA nvJPEG2000 librer\u00eda contiene una vulnerabilidad en la que un atacante puede provocar un problema de escritura fuera de los l\u00edmites mediante un archivo JPEG2000 manipulado especial. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo y la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json index 2d2ff49c304..0323a78a97d 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.347", "lastModified": "2025-02-12T02:15:09.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering." + }, + { + "lang": "es", + "value": "NVIDIA nvJPEG2000 librer\u00eda contiene una vulnerabilidad en la que un atacante puede provocar un problema de escritura fuera de los l\u00edmites mediante un archivo JPEG2000 manipulado especial. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo y la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json index 0d5ee3c2908..e1edda0c6d1 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.483", "lastModified": "2025-02-12T18:15:20.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering." + }, + { + "lang": "es", + "value": "NVIDIA nvJPEG2000 librer\u00eda contiene una vulnerabilidad que permite a un atacante provocar un problema de desbordamiento de b\u00fafer mediante un archivo JPEG2000 manipulado especialmente manipulado. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json index e3ecfcf32e4..1d78afe9236 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.630", "lastModified": "2025-02-12T18:15:20.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a heap-based buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering." + }, + { + "lang": "es", + "value": "NVIDIA nvJPEG2000 librer\u00eda contiene una vulnerabilidad en la que un atacante puede provocar un problema de desbordamiento de b\u00fafer basado en el mont\u00f3n mediante un archivo JPEG2000 manipulado especialmente manipulado. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo y la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0179.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0179.json index a89b5107e1d..fb9375f858c 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0179.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0179.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T21:15:12.280", "lastModified": "2025-02-11T21:15:12.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SMM Callout vulnerability within the AmdCpmDisplayFeatureSMM driver could allow locally authenticated attackers to overwrite SMRAM, potentially resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "La vulnerabilidad de llamada SMM dentro del controlador AmdCpmDisplayFeatureSMM podr\u00eda permitir que atacantes autenticados localmente sobrescriban SMRAM, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0683.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0683.json index 19800658f80..e11c744cc8b 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0683.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0683.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.973", "lastModified": "2024-11-21T08:47:08.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10083.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10083.json index 99959ef119f..df3d6e1413b 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10083.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10083.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T06:15:19.210", "lastModified": "2025-02-13T06:15:19.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause denial of service of engineering\nworkstation when specific driver interface is invoked locally by an authenticated user with crafted input." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda causar la denegaci\u00f3n de servicio de una estaci\u00f3n de trabajo de ingenier\u00eda cuando un usuario autenticado invoca localmente una interfaz de controlador espec\u00edfica con una entrada manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json index 10702c7f397..cdaa4f1d41a 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10322.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T13:15:07.997", "lastModified": "2025-02-12T13:15:07.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de las cargas de archivos SVG de la API REST en todas las versiones hasta 2.6.8 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida insuficientes. Esto hace posible que los atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10334.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10334.json index 07e4d65e9bd..778d1901671 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10334.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10334.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-02-10T15:15:12.010", "lastModified": "2025-02-10T15:15:12.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in the VideONet product included in the listed System 800xA versions, where VideONet is used.\u00a0\n\nAn attacker who successfully exploited the vulnerability could, in the worst case scenario, stop or manipulate the video feed.\nThis issue affects System 800xA: 5.1.X; System 800xA: 6.0.3.X; System 800xA: 6.1.1.X; System 800xA: 6.2.X." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en el producto VideONet incluido en las versiones System 800xA mencionadas, donde se utiliza VideONet. Un atacante que aproveche con \u00e9xito la vulnerabilidad podr\u00eda, en el peor de los casos, detener o manipular la transmisi\u00f3n de video. Este problema afecta a System 800xA: 5.1.X; System 800xA: 6.0.3.X; System 800xA: 6.1.1.X; System 800xA: 6.2.X." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10383.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10383.json index 1453d1e0909..a23a1574a6f 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10383.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10383.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-07T15:15:16.703", "lastModified": "2025-02-07T15:15:16.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in the gitlab-web-ide-vscode-fork component distributed over CDN affecting all versions prior to 1.89.1-1.0.0-dev-20241118094343and used by all versions of GitLab CE/EE starting from 15.11 prior to 17.3 and which also temporarily affected versions 17.4, 17.5 and 17.6, where a XSS attack was possible when loading .ipynb files in the web IDE" + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en el componente gitlab-web-ide-vscode-fork distribuido a trav\u00e9s de CDN que afecta a todas las versiones anteriores a 1.89.1-1.0.0-dev-20241118094343 y utilizado por todas las versiones de GitLab CE/EE a partir de 15.11 antes de 17.3 y que tambi\u00e9n afect\u00f3 temporalmente a las versiones 17.4, 17.5 y 17.6, donde era posible un ataque XSS al cargar archivos .ipynb en el IDE web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10644.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10644.json index 2af20ddb132..d90ffd28f65 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10644.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10644.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:38.360", "lastModified": "2025-02-11T16:15:38.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de c\u00f3digo en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.4 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.3 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10649.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10649.json index 4cf6e687b30..6ee21939428 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10649.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10649.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-02-10T19:15:37.117", "lastModified": "2025-02-11T00:15:27.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are '/v1/share/{id:str}' for uploading and '/v1/share/{id:str}' for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information." + }, + { + "lang": "es", + "value": "El ultimo commit c945bb859979659add5f490a874140ad17c56a5d de wandb/openui contiene una vulnerabilidad en la que los endpoints no autenticados permiten la carga y descarga de archivos desde un dep\u00f3sito S3 de AWS. Esto puede provocar m\u00faltiples problemas de seguridad, como denegaci\u00f3n de servicio, XSS almacenado y divulgaci\u00f3n de informaci\u00f3n. Los endpoints afectados son '/v1/share/{id:str}' para la carga y '/v1/share/{id:str}' para la descarga de archivos JSON. La falta de autenticaci\u00f3n permite que cualquier usuario cargue y sobrescriba archivos, lo que puede provocar que el dep\u00f3sito S3 se quede sin espacio, inyecte scripts maliciosos y acceda a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json index d691957634e..498d232e403 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:12.943", "lastModified": "2025-02-13T05:15:12.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Campress theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.35 via the 'campress_woocommerce_get_ajax_products' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included." + }, + { + "lang": "es", + "value": "El tema Campress para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 1.35 incluida, a trav\u00e9s de la funci\u00f3n 'campress_woocommerce_get_ajax_products'. Esto permite que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se pueda cargar e incluir un tipo de archivo php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json index 99642548525..38997b8b353 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.027", "lastModified": "2025-02-12T12:15:28.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'storeUploads' function in all versions up to, and including, 2.6.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'storeUploads' en todas las versiones hasta la 2.6.4 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json index 1cc64bf23a9..6122273b88b 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.023", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json index c14887be5d8..53a081fdfc9 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.217", "lastModified": "2024-11-21T22:15:07.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json index 5c9d69e370a..5f04c1e6bed 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T16:15:39.100", "lastModified": "2025-02-12T16:15:39.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access." + }, + { + "lang": "es", + "value": "En Progress\u00ae Telerik\u00ae Document Processing Libraries, versiones anteriores a 2025 Q1 (2025.1.205), descomprimir un archivo puede generar un acceso arbitrario al archivo sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11344.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11344.json index e7524c5c837..cde2a831dc4 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11344.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11344.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de confusi\u00f3n de tipos en el int\u00e9rprete Postscript de varios dispositivos Lexmark. Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11345.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11345.json index a142779caf1..9c217019cb2 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11345.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11345.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A heap-based memory vulnerability has been identified in the Postscript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de memoria basada en el mont\u00f3n en el int\u00e9rprete Postscript de varios dispositivos Lexmark. Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11346.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11346.json index 91b1d32755b..e3496fd8573 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11346.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11346.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Resource Injection.This issue affects CX, XC, CS, et. Al.: from 001.001:0 through 081.231, from *.*.P001 through *.*.P233, from *.*.P001 through *.*.P759, from *.*.P001 through *.*.P836." + }, + { + "lang": "es", + "value": ": La vulnerabilidad de acceso a recursos mediante un tipo incompatible ('Confusi\u00f3n de tipos') en Lexmark International CX, XC, CS, et. Al. (m\u00f3dulos de int\u00e9rprete Postscript) permite la inyecci\u00f3n de recursos. Este problema afecta a CX, XC, CS, et. Al.: desde 001.001:0 hasta 081.231, desde *.*.P001 hasta *.*.P233, desde *.*.P001 hasta *.*.P759, desde *.*.P001 hasta *.*.P836." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11347.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11347.json index d61395717a2..e766af1ce11 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11347.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11347.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Integer Overflow or Wraparound vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Forced Integer Overflow.The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de enteros o envolvente en Lexmark International CX, XC, CS, et. Al. (m\u00f3dulos de interpretaci\u00f3n Postscript) permite un desbordamiento de enteros forzado. Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario como un usuario sin privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11467.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11467.json index 054b154db46..b98772badc6 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11467.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", "published": "2025-02-04T23:15:08.580", "lastModified": "2025-02-05T15:15:20.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11468.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11468.json index 1d9068ce1fd..e260687e4fd 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11468.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", "published": "2025-02-04T23:15:08.717", "lastModified": "2025-02-05T16:15:40.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json index fa5a3b74cc3..e3c66b73414 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@devolutions.net", "published": "2025-02-10T14:15:29.490", "lastModified": "2025-02-10T16:15:36.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing certificate validation in Devolutions Remote Desktop Manager on macOS, iOS, Android, Linux allows an attacker to intercept and modify encrypted communications via a man-in-the-middle attack.\n\nVersions affected are :\nRemote Desktop Manager macOS 2024.3.9.0 and earlier\nRemote Desktop Manager Linux 2024.3.2.5 and earlier\nRemote Desktop Manager Android 2024.3.3.7 and earlier\nRemote Desktop Manager iOS 2024.3.3.0 and earlier\n\nRemote Desktop Manager Powershell 2024.3.6.0 and earlier" + }, + { + "lang": "es", + "value": "La falta de validaci\u00f3n de certificados en Devolutions Remote Desktop Manager en macOS, iOS, Android y Linux permite que un atacante intercepte y modifique las comunicaciones cifradas mediante un ataque de intermediario. Las versiones afectadas son: Remote Desktop Manager macOS 2024.3.9.0 y anteriores Remote Desktop Manager Linux 2024.3.2.5 y anteriores Remote Desktop Manager Android 2024.3.3.7 y anteriores Remote Desktop Manager iOS 2024.3.3.0 y anteriores Remote Desktop Manager Powershell 2024.3.6.0 y anteriores" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json index 4d91e870363..16a31e4dd0d 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T17:15:22.067", "lastModified": "2025-02-12T17:15:22.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Kendo UI for Vue versions v2.4.0 through v6.0.1, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection." + }, + { + "lang": "es", + "value": "En Progress\u00ae Telerik\u00ae Kendo UI para Vue versiones v2.4.0 a v6.0.1, un atacante puede introducir o modificar propiedades dentro de la cadena de prototipos global, lo que puede resultar en una denegaci\u00f3n de servicio o inyecci\u00f3n de comandos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json index dfb5506f329..6ae68cc1698 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T17:15:22.200", "lastModified": "2025-02-12T17:15:22.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), using .NET Standard 2.0, the contents of a file at an arbitrary path can be exported to RTF." + }, + { + "lang": "es", + "value": "En Progress\u00ae Telerik\u00ae Document Processing Libraries, versiones anteriores a 2025 Q1 (2025.1.205), que utilizan .NET Standard 2.0, el contenido de un archivo en una ruta arbitraria se puede exportar a RTF." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11746.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11746.json index 47b5afe9f99..0f8fce642e5 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11746.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.307", "lastModified": "2025-02-12T05:15:11.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Discover the Best Woocommerce Product Brands Plugin for WordPress \u2013 Woocommerce Brands Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'product_brand' shortcode in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Discover the Best Woocommerce Product Brands Plugin for WordPress \u2013 Woocommerce Brands Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'product_brand' del complemento en todas las versiones hasta 1.3.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11771.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11771.json index ac95b57d97e..066d90aff1a 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11771.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11771.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:38.520", "lastModified": "2025-02-11T16:15:38.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in Ivanti CSA before version 5.0.5 allows a remote unauthenticated attacker to access restricted functionality." + }, + { + "lang": "es", + "value": "Path traversal en Ivanti CSA anterior a la versi\u00f3n 5.0.5 permite que un atacante remoto no autenticado acceda a funcionalidad restringida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11780.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11780.json index de78f9b3ed6..49cde6fdc00 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11780.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11780.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:29.523", "lastModified": "2025-02-01T04:15:29.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json index 0d1b35bcb08..41d506fa36d 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-13T16:15:43.750", "lastModified": "2025-02-13T16:15:43.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-126 \u201cBuffer Over-read\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The information disclosure can be triggered by leveraging a memory leak affecting the web server. A remote unauthenticated attacker can exploit this vulnerability in order to leak valid authentication tokens from the process memory associated to users currently logged to the system and bypass the authentication mechanism." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad CWE-126 de \u201csobrelectura de b\u00fafer\u201d que afectaba a la puerta de enlace TCP/IP 130.8005 con la versi\u00f3n de firmware 12h. La divulgaci\u00f3n de informaci\u00f3n se puede desencadenar aprovechando una fuga de memoria que afecta al servidor web. Un atacante remoto no autenticado puede explotar esta vulnerabilidad para filtrar tokens de autenticaci\u00f3n v\u00e1lidos de la memoria de proceso asociada a los usuarios que est\u00e1n conectados actualmente al sistema y eludir el mecanismo de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json index ca980baaad6..13a1f2d328c 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-13T16:15:43.913", "lastModified": "2025-02-13T16:15:43.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-598 \u201cUse of GET Request Method with Sensitive Query Strings\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. Both the SHA-1 hash of the password as well as the session tokens are included as part of the URL and therefore exposed to information leakage scenarios. An attacker capable of accessing such values (e.g., victim browser, network traffic inspection) can exploit this vulnerability to leak both the password hash as well as session tokens and bypass the authentication mechanism using a pass-the-hash attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad CWE-598 \u201cUso del m\u00e9todo de solicitud GET con cadenas de consulta confidenciales\u201d que afectaba a la puerta de enlace TCP/IP 130.8005 con la versi\u00f3n de firmware 12h. Tanto el hash SHA-1 de la contrase\u00f1a como los tokens de sesi\u00f3n se incluyen como parte de la URL y, por lo tanto, est\u00e1n expuestos a escenarios de fuga de informaci\u00f3n. Un atacante capaz de acceder a dichos valores (por ejemplo, el navegador de la v\u00edctima, inspecci\u00f3n del tr\u00e1fico de red) puede aprovechar esta vulnerabilidad para filtrar tanto el hash de la contrase\u00f1a como los tokens de sesi\u00f3n y eludir el mecanismo de autenticaci\u00f3n mediante un ataque de paso del hash." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json index bdba72ef2b3..40820b1b1e1 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-13T16:15:44.050", "lastModified": "2025-02-13T16:15:44.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-1392 \u201cUse of Default Credentials\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The device exposes an FTP server with default and easy-to-guess admin credentials. A remote attacker capable of interacting with the FTP server could gain access and perform changes over resources exposed by the service such as configuration files where password hashes are saved or where network settings are stored." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un error CWE-1392 \u201cUso de credenciales predeterminadas\u201d que afectaba al gateway TCP/IP 130.8005 con la versi\u00f3n de firmware 12h. El dispositivo expone un servidor FTP con credenciales de administrador predeterminadas y f\u00e1ciles de adivinar. Un atacante remoto capaz de interactuar con el servidor FTP podr\u00eda obtener acceso y realizar cambios en los recursos expuestos por el servicio, como los archivos de configuraci\u00f3n donde se guardan los hashes de contrase\u00f1as o donde se almacenan las configuraciones de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json index feba8ab21b4..2a92b763dde 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:29.527", "lastModified": "2025-02-01T06:15:29.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12058.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12058.json index f83602e0020..4610d004f28 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12058.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12058.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:38.663", "lastModified": "2025-02-11T16:15:38.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "External control of a file name in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to read arbitrary files." + }, + { + "lang": "es", + "value": "El control externo de un nombre de archivo en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.6 e Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.3 permite que un atacante remoto autenticado con privilegios de administrador lea archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json index 3f935eba5ab..034f07efecc 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-10T16:15:37.260", "lastModified": "2025-02-10T16:15:37.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack." + }, + { + "lang": "es", + "value": "Una falla en libtasn1 provoca un manejo ineficiente de datos de certificados espec\u00edficos. Al procesar una gran cantidad de elementos en un certificado, libtasn1 tarda mucho m\u00e1s de lo esperado, lo que puede ralentizar o incluso bloquear el sistema. Esta falla permite que un atacante env\u00ede un certificado especialmente manipulado, lo que provoca un ataque de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12164.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12164.json index 8ba1bb3969a..80c786143d2 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12164.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12164.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.483", "lastModified": "2025-02-12T05:15:11.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPSyncSheets Lite For WPForms \u2013 WPForms Google Spreadsheet Addon plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsslwp_reset_settings() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento WPSyncSheets Lite For WPForms \u2013 WPForms Google Spreadsheet Addon para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n wpsslwp_reset_settings() en todas las versiones hasta la 1.6 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, restablezcan la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12171.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12171.json index 52ec812aa2a..2f0f681f597 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12171.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.303", "lastModified": "2025-02-01T04:15:30.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json index 23dcbbbf71d..597c2427be3 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.443", "lastModified": "2025-02-01T04:15:30.443", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json index 741e7426657..1612efa2191 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:08.737", "lastModified": "2025-02-12T10:15:08.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites." + }, + { + "lang": "es", + "value": "El complemento WP Job Board Pro para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.2.76 incluida. Esto se debe a que el complemento permite que un usuario proporcione el campo \"rol\" al registrarse. Esto hace posible que atacantes no autenticados se registren como administradores en sitios vulnerables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12243.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12243.json index 51e14e22d7c..f43de647072 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12243.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12243.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-10T16:15:37.423", "lastModified": "2025-02-10T16:15:37.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en GnuTLS, que depende de libtasn1 para el procesamiento de datos ASN.1. Debido a un algoritmo ineficiente en libtasn1, la decodificaci\u00f3n de ciertos datos de certificados codificados en DER puede llevar demasiado tiempo, lo que genera un mayor consumo de recursos. Esta falla permite que un atacante remoto env\u00ede un certificado especialmente manipulado, lo que hace que GnuTLS deje de responder o funcione lentamente, lo que resulta en una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json index 968d732d885..ac613612fff 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T15:15:12.370", "lastModified": "2025-02-12T15:15:12.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements." + }, + { + "lang": "es", + "value": "En las versiones de Progress\u00ae Telerik\u00ae UI para WinUI anteriores a 2025 Q1 (3.0.0), es posible un ataque de inyecci\u00f3n de comandos a trav\u00e9s de la neutralizaci\u00f3n incorrecta de elementos de hiperv\u00ednculo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json index 9f83c7dce5e..ac3a04ca70c 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.230", "lastModified": "2025-02-12T10:15:10.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apus Framework plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'import_page_options' function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento Apus Framework para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una escalada de privilegios debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'import_page_options' en todas las versiones hasta la 2.3 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json index eddf640699f..bc0405f2dde 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T09:15:08.247", "lastModified": "2025-02-12T15:15:12.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data." + }, + { + "lang": "es", + "value": "El complemento Export All Posts, Products, Orders, Refunds & Users para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta 2.9.3 incluida, a trav\u00e9s del directorio de exportaciones. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/smack_uci_uploads/exports/ que pueden contener informaci\u00f3n como datos de usuario exportados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12366.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12366.json index bb93cfa5ee6..7a4001850fa 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12366.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cret@cert.org", "published": "2025-02-11T13:15:29.193", "lastModified": "2025-02-11T20:15:33.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PandasAI uses an interactive prompt function that is vulnerable to prompt injection and run arbitrary Python code that can lead to Remote Code Execution (RCE) instead of the intended explanation of the natural language processing by the LLM." + }, + { + "lang": "es", + "value": "PandasAI utiliza una funci\u00f3n de solicitud interactiva que es vulnerable a la inyecci\u00f3n de solicitudes y ejecuta c\u00f3digo Python arbitrario que puede llevar a la ejecuci\u00f3n remota de c\u00f3digo (RCE) en lugar de la explicaci\u00f3n prevista del procesamiento del lenguaje natural por parte del LLM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json index 8346abe1e03..1d22e53089a 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T15:15:12.707", "lastModified": "2025-02-12T15:15:12.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability in GitLab CE/EE affecting all versions from 14.1 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to impact the availability of GitLab via unbounded symbol creation via the scopes parameter in a Personal Access Token." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de denegaci\u00f3n de servicio en GitLab CE/EE que afecta a todas las versiones desde la 14.1 anterior a la 17.6.5, la 17.7 anterior a la 17.7.4 y la 17.8 anterior a la 17.8.2 permite a un atacante afectar la disponibilidad de GitLab mediante la creaci\u00f3n de s\u00edmbolos ilimitados por medio del par\u00e1metro scopes en un token de acceso personal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json index ed8e50a69e5..baa06f6f6fd 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.470", "lastModified": "2025-02-12T12:15:28.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Abstracts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.3. This is due to missing nonce validation on multiple functions. This makes it possible for unauthenticated attackers to delete arbitrary accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Abstracts para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.7.3 y incluida. Esto se debe a la falta de validaci\u00f3n de nonce en varias funciones. Esto hace posible que atacantes no autenticados eliminen cuentas arbitrarias a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json index 5e50861c0c2..604c63da1de 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.400", "lastModified": "2025-02-11T20:15:33.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tungsten Automation Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JPF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25560." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto fuera de los l\u00edmites en el an\u00e1lisis de archivos JPF de Tungsten Automation Power PDF. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Tungsten Automation Power PDF. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JPF. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25560." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json index 9264377f1f3..0ab2a510f5b 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.537", "lastModified": "2025-02-11T20:15:33.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tungsten Automation Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files.The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25564." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Use-After-Free en el an\u00e1lisis de archivos JP2 de Tungsten Automation Power PDF. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas de Tungsten Automation Power PDF. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JP2. El problema es el resultado de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones en el objeto. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25564." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json index 9d22a3f03ed..be9e2f139c7 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.673", "lastModified": "2025-02-11T20:15:33.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25565." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en el an\u00e1lisis de archivos JP2 de Tungsten Automation Power PDF fuera de los l\u00edmites. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Tungsten Automation Power PDF. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JP2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede resultar en una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25565." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json index 494c378dda6..0e7de01f9e1 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.800", "lastModified": "2025-02-11T20:15:33.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25566." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos JP2 de Tungsten Automation Power PDF. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Tungsten Automation Power PDF. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JP2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25566." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12551.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12551.json index 2c11b98d2cd..6d3c8625f65 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12551.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12551.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.940", "lastModified": "2025-02-11T20:15:33.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25567." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en el an\u00e1lisis de archivos JP2 de Tungsten Automation Power PDF fuera de los l\u00edmites. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Tungsten Automation Power PDF. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JP2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede resultar en una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25567." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json index 9e3ef5229dc..88165647511 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.607", "lastModified": "2025-02-13T15:15:17.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Chalet-Montagne.com Tools de WordPress hasta la versi\u00f3n 2.7.8 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json index a1ee10c92c7..978c9a8e52a 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T05:15:12.790", "lastModified": "2025-02-11T05:15:12.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget Countdown del complemento en todas las versiones hasta la 2.8.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12602.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12602.json index 3095ecca6ab..4d2dc24af31 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12602.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:38.907", "lastModified": "2025-02-06T13:15:38.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json index 98f7e877107..b6f131cd6f2 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.583", "lastModified": "2025-02-01T04:15:30.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json index fc9217f07d4..3f7352aef92 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T16:15:39.810", "lastModified": "2025-02-12T16:15:39.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae KendoReact versions v3.5.0 through v9.4.0, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection." + }, + { + "lang": "es", + "value": "En las versiones v3.5.0 a v9.4.0 de Progress\u00ae Telerik\u00ae KendoReact, un atacante puede introducir o modificar propiedades dentro de la cadena de prototipos global, lo que puede resultar en una denegaci\u00f3n de servicio o una inyecci\u00f3n de comandos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json index 8c8537b7259..88a85e1cb77 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper privilege vulnerability was reported in a BIOS customization feature of Lenovo Vantage on SMB notebook devices which could allow a local attacker to elevate privileges on the system.\n\nThis vulnerability only affects Vantage installed on these devices:\n\n * Lenovo V Series (Gen 5)\n * ThinkBook 14 (Gen 6, 7)\n * ThinkBook 16 (Gen 6, 7)\n * ThinkPad E Series (Gen 1)" + }, + { + "lang": "es", + "value": "Se inform\u00f3 de una vulnerabilidad de privilegios indebidos en una funci\u00f3n de personalizaci\u00f3n del BIOS de Lenovo Vantage en dispositivos port\u00e1tiles SMB que podr\u00eda permitir que un atacante local elevara los privilegios en el sistema. Esta vulnerabilidad solo afecta a Vantage instalado en estos dispositivos: * Lenovo V Series (Gen 5) * ThinkBook 14 (Gen 6, 7) * ThinkBook 16 (Gen 6, 7) * ThinkPad E Series (Gen 1)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12755.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12755.json index 544e9260c8c..6c1e46fb9cb 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12755.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12755.json @@ -3,12 +3,16 @@ "sourceIdentifier": "securityalerts@avaya.com", "published": "2025-02-11T17:15:21.610", "lastModified": "2025-02-11T17:15:21.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Scripting (XSS) vulnerability in Avaya Spaces may have allowed unauthorized code execution and potential disclose of sensitive information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Avaya Spaces puede haber permitido la ejecuci\u00f3n de c\u00f3digo no autorizado y la posible divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12756.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12756.json index ec4350ec8aa..65402e9c118 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12756.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12756.json @@ -3,12 +3,16 @@ "sourceIdentifier": "securityalerts@avaya.com", "published": "2025-02-11T17:15:21.730", "lastModified": "2025-02-11T17:15:21.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An HTML Injection vulnerability in Avaya Spaces may have allowed disclosure of sensitive information or modification of the page content seen by the user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n HTML en Avaya Spaces puede haber permitido la divulgaci\u00f3n de informaci\u00f3n confidencial o la modificaci\u00f3n del contenido de la p\u00e1gina vista por el usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12825.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12825.json index e46f74f8144..2d7f1b1cde5 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12825.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12825.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T08:15:07.337", "lastModified": "2025-02-01T08:15:07.337", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12833.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12833.json index e28ca076b0b..4fb0bf11f3a 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12833.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12833.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:34.077", "lastModified": "2025-02-11T20:15:34.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability.\n\nThe specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-23371." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante Cross-Site Scripting SNMP en Paessler PRTG Network Monitor. Esta vulnerabilidad permite a los atacantes adyacentes a la red omitir la autenticaci\u00f3n en las instalaciones afectadas de Paessler PRTG Network Monitor. Se requiere cierta interacci\u00f3n del usuario por parte de un administrador para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la interfaz web de PRTG Network Monitor. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede llevar a la inyecci\u00f3n de una secuencia de comandos arbitraria. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n en el sistema. Era ZDI-CAN-23371." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json index 4cbd441ceea..9e2e3761e4c 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T07:15:10.967", "lastModified": "2024-12-26T07:15:10.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json index aea8e884f9c..6b9ea9bc224 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T19:15:07.710", "lastModified": "2024-12-26T19:15:07.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json index 6d8b8357c77..882f2bbd6ba 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T04:15:05.603", "lastModified": "2024-12-27T04:15:05.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json index 5a4a0d6e9b5..1d8103b6413 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T05:15:07.130", "lastModified": "2024-12-27T05:15:07.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json index 1f22d362ceb..08b05a3aaf6 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T05:15:07.353", "lastModified": "2024-12-27T05:15:07.353", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13010.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13010.json index 51e74fbce9e..ab8de45f570 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13010.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13010.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-10T19:15:37.283", "lastModified": "2025-02-10T19:15:37.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Foodbakery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on the 'search_type' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Foodbakery para WordPress es vulnerable a Cross-Site Scripting Reflejado en versiones hasta la 4.7 incluida debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en el par\u00e1metro 'search_type'. Esto hace posible que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13011.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13011.json index b5ff978b685..531d4af9936 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13011.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13011.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-10T19:15:37.440", "lastModified": "2025-02-10T19:15:37.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Foodbakery plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'upload_publisher_profile_image' function in versions up to, and including, 4.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento WP Foodbakery para WordPress es vulnerable a la carga de archivos arbitrarios debido a una validaci\u00f3n insuficiente del tipo de archivo en la funci\u00f3n 'upload_publisher_profile_image' en versiones hasta la 4.7 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json index 4193fb59b42..cde67b8cf31 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T12:15:04.970", "lastModified": "2024-12-29T12:15:04.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json index 12c84e5e1bf..86a80a9c1f4 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-02-10T19:15:37.587", "lastModified": "2025-02-11T00:15:28.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in mintplex-labs/anything-llm prior to version 1.3.1 allows for path traversal due to improper handling of non-ASCII filenames in the multer library. This vulnerability can lead to arbitrary file write, which can subsequently result in remote code execution. The issue arises when the filename transformation introduces '../' sequences, which are not sanitized by multer, allowing attackers with manager or admin roles to write files to arbitrary locations on the server." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en mintplex-labs/anything-llm anterior a la versi\u00f3n 1.3.1 permite path traversal debido a la gesti\u00f3n inadecuada de nombres de archivos que no son ASCII en la librer\u00eda multer. Esta vulnerabilidad puede provocar escrituras arbitrarias en archivos, lo que posteriormente puede provocar la ejecuci\u00f3n remota de c\u00f3digo. El problema surge cuando la transformaci\u00f3n de nombres de archivos introduce secuencias '../', que no son depuradas por multer, lo que permite a los atacantes con roles de administrador o gerente escribir archivos en ubicaciones arbitrarias en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json index 19445c62fb6..988652173bb 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.763", "lastModified": "2025-02-13T15:15:17.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versi\u00f3n 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json index 139355c92dd..08a1b3a2592 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.917", "lastModified": "2025-02-13T15:15:17.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versi\u00f3n 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13121.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13121.json index 33f136ffc3c..b7169f076b9 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13121.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13121.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:21.050", "lastModified": "2025-02-13T06:15:21.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versi\u00f3n 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13125.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13125.json index c20239e9dc2..659ce3bbefd 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13125.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13125.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:21.210", "lastModified": "2025-02-13T06:15:21.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Everest Forms WordPress plugin before 3.0.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Everest Forms para WordPress anterior a la versi\u00f3n 3.0.8.1 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json index a4d240fd1bf..2fe32aca6a8 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T13:15:08.290", "lastModified": "2025-02-13T13:15:08.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Directorybox Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_parse_request' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator." + }, + { + "lang": "es", + "value": "El complemento WP Directorybox Manager para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 2.5 incluida. Esto se debe a una autenticaci\u00f3n incorrecta en la funci\u00f3n 'wp_dp_parse_request'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json index 5e81369ead1..8cbfc247904 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:13.727", "lastModified": "2025-02-13T05:15:13.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Rank Math API in all versions up to, and including, 1.0.235 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la API Rank Math del complemento en todas las versiones hasta 1.0.235 incluida, debido a la entrada insuficiente desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13229.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13229.json index 585f8807e5d..f342a8d02f7 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13229.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13229.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:13.930", "lastModified": "2025-02-13T05:15:13.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the update_metadata() function in all versions up to, and including, 1.0.235. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete any schema metadata assigned to any post." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n update_metadata() en todas las versiones hasta la 1.0.235 incluida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, eliminen cualquier metadato de esquema asignado a cualquier publicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13341.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13341.json index 4e1a33ab229..32aa338fa9d 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13341.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T07:15:07.900", "lastModified": "2025-02-01T07:15:07.900", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json index 2eb50c9e3e8..1e4c6514378 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.717", "lastModified": "2025-02-01T04:15:30.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13345.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13345.json index c6c3a6ad492..655445aea5a 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13345.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T07:15:08.177", "lastModified": "2025-02-13T07:15:08.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Avada Builder plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.11.13. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento Avada Builder para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de c\u00f3digos cortos en todas las versiones hasta la 3.11.13 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13346.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13346.json index a02b42d8d23..fe88bf82c98 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13346.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13346.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T07:15:09.760", "lastModified": "2025-02-13T07:15:09.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.11.13. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El tema Avada | Website Builder For WordPress & WooCommerce para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta 7.11.13 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13352.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13352.json index 18dbec57282..63d80f3a6b5 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13352.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13352.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-07T06:15:29.607", "lastModified": "2025-02-07T16:15:35.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Legull WordPress plugin through 1.2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Legull para WordPress hasta la versi\u00f3n 1.2.2 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json index ee1b9c989f4..2fd846250f3 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.547", "lastModified": "2025-02-12T15:15:12.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Security & Malware Scan de CleanTalk para WordPress es vulnerable a la carga de archivos arbitrarios debido a que el complemento carga y extrae archivos .zip cuando los escanea en busca de malware a trav\u00e9s de la funci\u00f3n checkUploadedArchive() en todas las versiones hasta la 2.149 y incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json index f1b66409a00..0028ed040b4 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.303", "lastModified": "2025-02-12T06:15:19.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Table Manager plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on thewptm_getFolders AJAX action in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary file names and directories." + }, + { + "lang": "es", + "value": "El complemento WP Table Manager para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n AJAX wptm_getFolders en todas las versiones hasta la 4.1.3 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, lean nombres de archivos y directorios arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json index 688f6118c57..123d94530e0 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-02-06T19:15:19.220", "lastModified": "2025-02-06T19:15:19.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json index 479774f18b4..ceca133d4d8 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-02-06T20:15:39.273", "lastModified": "2025-02-06T20:15:39.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13421.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13421.json index 41a9e77d43e..1afd6580a3e 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13421.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13421.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.653", "lastModified": "2025-02-12T05:15:11.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Real Estate 7 WordPress theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.5.1. This is due to the plugin not properly restricting the roles allowed to be selected during registration. This makes it possible for unauthenticated attackers to register a new administrative user account." + }, + { + "lang": "es", + "value": "El tema Real Estate 7 WordPress para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta incluida, 3.5.1. Esto se debe a que el complemento no restringe correctamente los roles que se pueden seleccionar durante el registro. Esto hace posible que atacantes no autenticados registren una nueva cuenta de usuario administrativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json index 15ea501be45..c53502d8f3b 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.727", "lastModified": "2025-02-12T15:15:13.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ebook Downloader plugin for WordPress is vulnerable to SQL Injection via the 'download' parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Ebook Downloader para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'download' en todas las versiones hasta 1.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13437.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13437.json index bf7a1727b73..be72aee7378 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13437.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.920", "lastModified": "2025-02-12T10:15:10.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Book a Room plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9. This is due to missing or incorrect nonce validation on the 'bookaroom_Settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Book a Room para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.9 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la p\u00e1gina 'bookaroom_Settings'. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13456.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13456.json index c76b2e6d238..f8da3804c21 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13456.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13456.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.240", "lastModified": "2025-02-12T10:15:11.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Quiz Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wqt-question' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easy Quiz Maker para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'wqt-question' del complemento en todas las versiones hasta 2.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13459.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13459.json index a8b82701043..015d7124bd9 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13459.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13459.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.440", "lastModified": "2025-02-12T10:15:11.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusedesk_newcase' shortcode in all versions up to, and including, 6.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento FuseDesk para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'fusedesk_newcase' del complemento en todas las versiones hasta 6.6.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json index af2a9b8b38e..7b8e5e89041 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.610", "lastModified": "2025-02-12T15:15:13.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LTL Freight Quotes \u2013 Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameter in all versions up to, and including, 5.0.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 Worldwide Express Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'dropship_edit_id' y 'edit_id' en todas las versiones hasta la 5.0.20 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json index 48d9f292ae4..13ccd9cdad7 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.777", "lastModified": "2025-02-12T10:15:11.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Small Package Quotes \u2013 UPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 4.5.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Small Package Quotes \u2013 UPS Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'edit_id' en todas las versiones hasta la 4.5.16 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json index 52df8d812d1..351e91f82e5 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.660", "lastModified": "2025-02-12T12:15:28.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LTL Freight Quotes \u2013 Unishippers Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 2.5.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 Unishippers Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'edit_id' en todas las versiones hasta la 2.5.8, y incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json index 2db89fe8411..dd1b5f86d3c 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.840", "lastModified": "2025-02-12T12:15:28.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LTL Freight Quotes \u2013 For Customers of FedEx Freight plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 For Customers of FedEx Freight para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.4.1, y incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13487.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13487.json index 6ebcdd97a8e..12677cc749e 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13487.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-06T07:15:15.357", "lastModified": "2025-02-06T15:15:12.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json index c7271028659..b955ecb168a 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.973", "lastModified": "2025-02-12T10:15:11.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LTL Freight Quotes \u2013 XPO Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 XPO Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 4.3.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13492.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13492.json index af19551bcaf..138b772e88b 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13492.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13492.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-07T06:15:30.237", "lastModified": "2025-02-07T16:15:36.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Guten Free Options WordPress plugin through 0.9.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Guten Free Options para WordPress hasta la versi\u00f3n 0.9.5 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13506.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13506.json index f38e6e2cf3f..762cbb9c757 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13506.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13506.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T11:15:12.263", "lastModified": "2025-02-11T11:15:12.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GeoDirectory \u2013 WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the display_name profile parameter in all versions up to, and including, 2.8.97 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento GeoDirectory \u2013 WP Business Directory Plugin y Classified Listings Directory para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro de perfil display_name en todas las versiones hasta incluida, 2.8.97 debido a un escape de entrada depuraci\u00f3n y de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json index 74479913376..a68ad67be6d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:12.130", "lastModified": "2025-02-12T10:15:12.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.9.5. This is due to the presence of a shortcode that will generate a confirmation link with a placeholder email. This makes it possible for authenticated attackers, with Contributor-level access and above, to generate a verification link for any unverified user and log into the account. The 'Fine tune placement' option must be enabled in the plugin settings in order to exploit the vulnerability." + }, + { + "lang": "es", + "value": "El complemento Customer Email Verification for WooCommerce para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 2.9.5 incluida. Esto se debe a la presencia de un c\u00f3digo corto que generar\u00e1 un enlace de confirmaci\u00f3n con un correo electr\u00f3nico de marcador de posici\u00f3n. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, generen un enlace de verificaci\u00f3n para cualquier usuario no verificado e inicien sesi\u00f3n en la cuenta. La opci\u00f3n \"Ajustar la ubicaci\u00f3n\" debe estar habilitada en la configuraci\u00f3n del complemento para aprovechar la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json index 823039c4d1a..cf183b7dba8 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:12.317", "lastModified": "2025-02-12T10:15:12.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ShipEngine Shipping Quotes plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 1.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento ShipEngine Shipping Quotes para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'edit_id' en todas las versiones hasta la 1.0.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json index e12569e134d..80e4f6eb871 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:29.023", "lastModified": "2025-02-12T12:15:29.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Small Package Quotes \u2013 Purolator Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Small Package Quotes \u2013 Purolator Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.6.4 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13539.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13539.json index 3acce768070..37442bcd22a 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13539.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13539.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.197", "lastModified": "2025-02-12T04:15:09.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AForms Eats plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.3.1. This is due the /vendor/aura/payload-interface/phpunit.php file being publicly accessible and displaying error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento AForms Eats para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.3.1 y incluida. Esto se debe a que el archivo /vendor/aura/payload-interface/phpunit.php es de acceso p\u00fablico y muestra mensajes de error. Esto permite que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar a otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que exista otra vulnerabilidad para que se produzcan da\u00f1os en un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13541.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13541.json index 8044e968f44..4da0469cccb 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13541.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13541.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.347", "lastModified": "2025-02-12T04:15:09.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The aDirectory \u2013 WordPress Directory Listing Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the adqs_delete_listing() function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts." + }, + { + "lang": "es", + "value": "El complemento aDirectory \u2013 WordPress Directory Listing Plugin para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n adqs_delete_listing() en todas las versiones hasta la 2.3 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json index d758351c208..50bb7755c61 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.373", "lastModified": "2025-02-11T15:15:16.633", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zarinpal Paid Download WordPress plugin through 2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Zarinpal Paid Download de WordPress hasta la versi\u00f3n 2.3 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json index 89c73f2cf5f..49d3c6711ce 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.650", "lastModified": "2025-02-11T16:15:38.953", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zarinpal Paid Download WordPress plugin through 2.3 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Zarinpal Paid Download WordPress hasta la versi\u00f3n 2.3 no valida correctamente los archivos cargados, lo que permite que usuarios con privilegios elevados, como el administrador, carguen archivos arbitrarios en el servidor incluso cuando no se les deber\u00eda permitir hacerlo (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json index c1dda68f35a..3ae30c84be0 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.857", "lastModified": "2025-02-01T04:15:30.857", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13554.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13554.json index fc6a7e61c60..84143f2f86e 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13554.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13554.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.503", "lastModified": "2025-02-12T04:15:09.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the reorder_route() function in all versions up to, and including, 3.0.13. This makes it possible for unauthenticated attackers to reorder posts." + }, + { + "lang": "es", + "value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n reorder_route() en todas las versiones hasta la 3.0.13 y incluida. Esto permite que atacantes no autenticados reordenen las publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json index 1518d765ba9..739d20620bc 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.757", "lastModified": "2025-02-11T16:15:39.090", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Stray Random Quotes WordPress plugin through 1.9.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Stray Random Quotes WordPress hasta la versi\u00f3n 1.9.9 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json index 9d3397d1afe..50c009d8810 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.643", "lastModified": "2025-02-12T06:15:19.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Majestic Support \u2013 The Leading-Edge Help Desk & Customer Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.5 via the 'majesticsupportdata' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/majesticsupportdata directory which can contain file attachments included in support tickets." + }, + { + "lang": "es", + "value": "El complemento Majestic Support \u2013 The Leading-Edge Help Desk & Customer Support Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta 1.0.5 incluida, a trav\u00e9s del directorio 'majesticsupportdata'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/majesticsupportdata, que puede contener archivos adjuntos incluidos en los tickets de soporte." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13601.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13601.json index a0615238a77..3d6351cf7a5 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13601.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13601.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.830", "lastModified": "2025-02-12T06:15:19.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Majestic Support \u2013 The Leading-Edge Help Desk & Customer Support Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.5 via the 'exportusereraserequest' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export ticket data for any user." + }, + { + "lang": "es", + "value": "El complemento Majestic Support \u2013 The Leading-Edge Help Desk & Customer Support Plugin para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta 1.0.5 incluida, a trav\u00e9s de la funci\u00f3n 'exportusereraserequest' debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, exporten datos de tickets para cualquier usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json index 53dcb99dc19..705ffc92a5e 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T10:15:09.310", "lastModified": "2025-02-13T10:15:09.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JS Help Desk \u2013 The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'jssupportticketdata' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/jssupportticketdata directory which can contain file attachments included in support tickets." + }, + { + "lang": "es", + "value": "El complemento JS Help Desk \u2013 The Ultimate Help Desk & Support Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.8.8 incluida a trav\u00e9s del directorio 'jssupportticketdata'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/jssupportticketdata, que puede contener archivos adjuntos incluidos en los tickets de soporte." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json index 9d2b8f1a025..6e50f48ec5b 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T13:15:21.320", "lastModified": "2025-02-01T13:15:21.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json index d9c5947243b..a8e49eb0165 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerability@kaspersky.com", "published": "2025-02-06T17:15:18.080", "lastModified": "2025-02-06T17:15:18.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json index a0521a7ddcf..2e6c35412aa 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T09:15:07.273", "lastModified": "2025-02-13T09:15:07.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Read More & Accordion plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the expmDeleteData() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary 'read more' posts." + }, + { + "lang": "es", + "value": "El complemento Read More & Accordion para WordPress es vulnerable a modificaciones no autorizadas y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n expmDeleteData() en todas las versiones hasta la 3.4.2 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen publicaciones arbitrarias de \"leer m\u00e1s\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13643.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13643.json index 21829518cae..f48e4cb7216 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13643.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13643.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T08:15:30.450", "lastModified": "2025-02-11T08:15:30.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zox News - Professional WordPress News & Magazine Theme plugin for WordPress is vulnerable to unauthorized data modification. This vulnerability can lead to privilege escalation and denial of service conditions due to missing capability checks on the backup_options() and reset_options() functions in all versions up to and including 3.17.0. This vulnerability allows authenticated attackers with Subscriber-level access and above to update and delete arbitrary option values on the WordPress site. Attackers can exploit this issue to update the default user role for registration to Administrator and enable user registration, thereby gaining administrative access to the vulnerable site. Additionally, they could delete critical options, causing errors that may disrupt the site's functionality and deny service to legitimate users." + }, + { + "lang": "es", + "value": "El complemento Zox News - Professional WordPress News & Magazine Theme para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos. Esta vulnerabilidad puede provocar la escalada de privilegios y la denegaci\u00f3n de condiciones de servicio debido a la falta de comprobaciones de capacidad en las funciones backup_options() y reset_options() en todas las versiones hasta 3.17.0, incluida. Esta vulnerabilidad permite a los atacantes autenticados con acceso de nivel de suscriptor y superior actualizar y eliminar valores de opciones arbitrarios en el sitio de WordPress. Los atacantes pueden aprovechar este problema para actualizar el rol de usuario predeterminado para el registro a Administrador y habilitar el registro de usuarios, obteniendo as\u00ed acceso administrativo al sitio vulnerable. Adem\u00e1s, podr\u00edan eliminar opciones cr\u00edticas, lo que provocar\u00eda errores que podr\u00edan interrumpir la funcionalidad del sitio y denegar el servicio a usuarios leg\u00edtimos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13644.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13644.json index 5c593cf59e4..c0db41cf431 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13644.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13644.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T02:15:29.320", "lastModified": "2025-02-13T02:15:29.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DethemeKit For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's De Gallery widget in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento DethemeKit For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget De Gallery del complemento en todas las versiones hasta 2.1.8 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13651.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13651.json index fce3d53088f..38fd7b5ef29 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13651.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.997", "lastModified": "2025-02-01T04:15:30.997", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13653.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13653.json index 982821a7f97..6dd44830f5f 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13653.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13653.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.820", "lastModified": "2025-02-12T05:15:11.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZoxPress - The All-In-One WordPress News Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'backup_options' function in all versions up to, and including, 2.12.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El tema ZoxPress - The All-In-One WordPress News Theme para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'backup_options' en todas las versiones hasta la 2.12.0 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json index 424291b6e01..a4a60dc0a95 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.987", "lastModified": "2025-02-12T05:15:11.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZoxPress - The All-In-One WordPress News Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'reset_options' function in all versions up to, and including, 2.12.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to legitimate users." + }, + { + "lang": "es", + "value": "El tema ZoxPress - The All-In-One WordPress News Theme para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una denegaci\u00f3n de servicio debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'reset_options' en todas las versiones hasta la 2.12.0 y incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen valores de opciones arbitrarios en el sitio de WordPress. Esto se puede aprovechar para eliminar una opci\u00f3n que crear\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json index eb5c8d160ac..dae331665e2 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.143", "lastModified": "2025-02-12T05:15:12.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Click Mag - Viral WordPress News Magazine/Blog Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the propanel_of_ajax_callback() function in all versions up to, and including, 3.6.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to legitimate users." + }, + { + "lang": "es", + "value": "El tema The Click Mag - Viral WordPress News Magazine/Blog Theme para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una denegaci\u00f3n de servicio debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n propanel_of_ajax_callback() en todas las versiones hasta la 3.6.0 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen valores de opciones arbitrarios en el sitio de WordPress. Esto se puede aprovechar para eliminar una opci\u00f3n que crear\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json index efe8958c154..dad4bffc410 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.320", "lastModified": "2025-02-12T05:15:12.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NGG Smart Image Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'hr_SIS_nextgen_searchbox' shortcode in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento NGG Smart Image Search para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'hr_SIS_nextgen_searchbox' del complemento en todas las versiones hasta 3.2.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json index b91363a2e75..c29b6f203e9 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.483", "lastModified": "2025-02-12T05:15:12.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Admire Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'space' shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Admire Extra para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'espacio' del complemento en todas las versiones hasta 1.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13701.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13701.json index afffac48bac..bebd186f749 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13701.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13701.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.647", "lastModified": "2025-02-12T04:15:09.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Liveticker (by stklcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'liveticker' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Liveticker (de stklcode) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'liveticker' del complemento en todas las versiones hasta 1.2.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13714.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13714.json index c7edb691f88..7452c34b0cf 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13714.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13714.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.987", "lastModified": "2025-02-12T06:15:19.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The All-Images.ai \u2013 IA Image Bank and Custom Image creation plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the '_get_image_by_url' function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento All-Images.ai \u2013 IA Image Bank and Custom Image creation para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n '_get_image_by_url' en todas las versiones hasta la 1.0.4 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json index df4d965042e..455ea3a49df 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json @@ -3,7 +3,7 @@ "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2025-02-04T22:15:40.113", "lastModified": "2025-02-06T15:15:12.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json index 51c931d621c..500a462d1f6 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json @@ -3,7 +3,7 @@ "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2025-02-04T22:15:40.227", "lastModified": "2025-02-06T15:15:13.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13749.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13749.json index 693efafd6ce..971a4b30d9e 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13749.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13749.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.793", "lastModified": "2025-02-12T04:15:09.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The StaffList plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.3. This is due to missing or incorrect nonce validation on the 'stafflist' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento StaffList para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.2.3 y incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la p\u00e1gina 'stafflist'. Esto hace posible que atacantes no autenticados actualicen configuraciones e inyecten contenido web malicioso scripts a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json index d0927b8f869..8bd0ade95b4 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.637", "lastModified": "2025-02-12T05:15:12.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL theme for WordPress is vulnerable to Stored Cross-Site Scripting due to a missing capability check on the 'theme_options_ajax_post_action' AJAX action in all versions up to, and including, 4.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings and inject malicious web scripts. The developer opted to remove the software from the repository, so an update is not available and it is recommended to find a replacement software." + }, + { + "lang": "es", + "value": "El tema The Puzzles | WP Magazine / Review con Store WordPress Theme + RTL theme para WordPress es vulnerable a Cross-Site Scripting Almacenado debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n AJAX 'theme_options_ajax_post_action' en todas las versiones hasta 4.2.4 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento e inyecten contenido web malicioso scripts. El desarrollador opt\u00f3 por eliminar el software del repositorio, por lo que no hay una actualizaci\u00f3n disponible y se recomienda encontrar un software de reemplazo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13770.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13770.json index d8e209b1cdf..9fc89f5693a 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13770.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13770.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:14.177", "lastModified": "2025-02-13T05:15:14.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.2.4 via deserialization of untrusted input 'view_more_posts' AJAX action. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. The developer opted to remove the software from the repository, so an update is not available and it is recommended to find a replacement software." + }, + { + "lang": "es", + "value": "El tema Puzzles | WP Magazine / Review with Store WordPress Theme + RTL para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta 4.2.4 incluida, a trav\u00e9s de la deserializaci\u00f3n de la acci\u00f3n AJAX 'view_more_posts' de entrada no confiable. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el objetivo sistema, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente. El desarrollador opt\u00f3 por eliminar el software del repositorio, por lo que no hay una actualizaci\u00f3n disponible y se recomienda encontrar un software de reemplazo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json index f5b30bbe4cb..da7463f38ae 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T13:15:22.847", "lastModified": "2025-02-01T13:15:22.847", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json index 97ef763876f..6d1303588bc 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.430", "lastModified": "2025-02-12T15:15:14.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Ghost (Hide My WP Ghost) \u2013 Security & Firewall plugin for WordPress is vulnerable to Login Page Dislcosure in all versions up to, and including, 5.3.02. This is due to the plugin not properly restricting the /wp-register.php path. This makes it possible for unauthenticated attackers to discover the hidden login page location." + }, + { + "lang": "es", + "value": "El complemento WP Ghost (Hide My WP Ghost) \u2013 Security & Firewall para WordPress es vulnerable a la divulgaci\u00f3n de la p\u00e1gina de inicio de sesi\u00f3n en todas las versiones hasta la 5.3.02 incluida. Esto se debe a que el complemento no restringe correctamente la ruta /wp-register.php. Esto hace posible que atacantes no autenticados descubran la ubicaci\u00f3n oculta de la p\u00e1gina de inicio de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json index 7ba6dfae70e..18630ce02ac 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.810", "lastModified": "2025-02-12T05:15:12.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ConvertPlus plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cp_dismiss_notice' AJAX endpoint in all versions up to, and including, 3.5.30. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to '1' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration." + }, + { + "lang": "es", + "value": "El complemento ConvertPlus para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una denegaci\u00f3n de servicio debido a una comprobaci\u00f3n de capacidad faltante en el AJAX 'cp_dismiss_notice' endpoint en todas las versiones hasta 3.5.30 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen los valores de las opciones a '1' en el sitio de WordPress. Esto se puede aprovechar para actualizar una opci\u00f3n que crear\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos o se puede utilizar para establecer algunos valores en verdaderos, como el registro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json index d83866911e2..556b5d8fe6c 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.220", "lastModified": "2025-02-11T16:15:39.220", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient permissions in Ivanti Secure Access Client before version 22.8R1 allows a local authenticated attacker to delete arbitrary files." + }, + { + "lang": "es", + "value": "Los permisos insuficientes en Ivanti Secure Access Client anterior a la versi\u00f3n 22.8R1 permiten que un atacante autenticado local elimine archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13814.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13814.json index ca85c2cca9a..0b8d4672717 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13814.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T09:15:08.433", "lastModified": "2025-02-12T09:15:08.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Global Gallery - WordPress Responsive Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 9.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento The Global Gallery - WordPress Responsive Gallery para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta 9.1.5 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json index 0be0f0100f3..083dd231d08 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.660", "lastModified": "2025-02-12T15:15:14.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Booking Calendar plugin for WordPress is vulnerable to Unauthenticated Post-Confirmation Booking Manipulation in all versions up to, and including, 10.10. This is due to the plugin not properly requiring re-verification after a booking has been made and a change is being attempted. This makes it possible for unauthenticated attackers to manipulate their confirmed bookings, even after they have been approved." + }, + { + "lang": "es", + "value": "El complemento WP Booking Calendar para WordPress es vulnerable a la manipulaci\u00f3n de reservas posteriores a la confirmaci\u00f3n no autenticadas en todas las versiones hasta la 10.10 incluida. Esto se debe a que el complemento no requiere una nueva verificaci\u00f3n despu\u00e9s de que se haya realizado una reserva y se intente realizar un cambio. Esto hace posible que los atacantes no autenticados manipulen sus reservas confirmadas, incluso despu\u00e9s de que hayan sido aprobadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13829.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13829.json index 31587b716f8..7d8cd8d2665 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13829.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13829.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-05T06:15:31.257", "lastModified": "2025-02-05T06:15:31.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13841.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13841.json index 28e6dcccc33..34cb76417dc 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13841.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13841.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-07T07:15:14.573", "lastModified": "2025-02-07T07:15:14.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Builder Shortcode Extras \u2013 WordPress Shortcodes Collection to Save You Time plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via the 'bse-elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created with Elementor that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento Builder Shortcode Extras \u2013 WordPress Shortcodes Collection to Save You Time para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.0.0 incluida a trav\u00e9s del shortcode 'bse-elementor-template' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas y borradores creadas con Elementor a las que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json index 99a592b3db8..2241177aedd 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.513", "lastModified": "2025-02-11T16:15:39.513", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data." + }, + { + "lang": "es", + "value": "Una clave codificada en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.3 y en Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.3 permite que un atacante local autenticado con privilegios de administrador lea datos confidenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json index 78f0c5a586e..2ef44424f40 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.667", "lastModified": "2025-02-11T16:15:39.667", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data." + }, + { + "lang": "es", + "value": "El almacenamiento de informaci\u00f3n en texto plano en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.6 e Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.3 permite que un atacante local autenticado con privilegios de administrador lea datos confidenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13850.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13850.json index 64e5fd220f6..8da72af6966 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13850.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13850.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-08T13:15:06.840", "lastModified": "2025-02-08T13:15:06.840", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Simple Add Pages or Posts para WordPress es vulnerable a Cross-Site Scripting Almacenado en todas las versiones hasta la 2.0.0 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json index 4f94e1d9a5b..aa0df6142a0 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T10:15:09.847", "lastModified": "2025-02-13T10:15:09.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Listivo - Classified Ads WordPress Theme theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 2.3.67 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El tema Listivo - Classified Ads WordPress Theme para WordPress es vulnerable a Cross-Site Scripting Reflected a trav\u00e9s del par\u00e1metro 's' en todas las versiones hasta la 2.3.67 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json index bc5348c78dd..1b304d35a2e 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:21.163", "lastModified": "2024-11-21T08:50:27.733", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1539.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1539.json index 784f75f1d71..dfe9b5547f6 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1539.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T10:15:22.327", "lastModified": "2025-02-05T10:15:22.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1557.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1557.json index 21995907566..3a277d46255 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1557.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1557.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-02-20T14:15:09.100", "lastModified": "2024-11-21T08:50:49.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json index 8c2d0634592..c61a58fff3b 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-02-29T08:15:46.437", "lastModified": "2024-11-21T08:51:31.743", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1888.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1888.json index eb566c6ab78..5d3f0df1f40 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1888.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1888.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-02-29T09:15:06.563", "lastModified": "2024-11-21T08:51:31.867", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2025.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2025.json index 1ba9c67fa78..b571c98d533 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2025.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2025.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T02:15:47.127", "lastModified": "2024-11-21T09:08:51.250", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json index cf63859630b..2e92ac19bc2 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-03-19T17:15:09.837", "lastModified": "2024-11-21T08:54:50.897", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json index 77eff3e7735..0569b31ddcb 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-06-18T17:15:51.243", "lastModified": "2024-11-21T08:54:51.630", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json index 871b767de44..78eba99f260 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-07-16T21:15:10.257", "lastModified": "2024-11-21T08:54:51.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json index a44da426cd2..5ae38e86a85 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-08-20T10:15:04.103", "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json index 4510a12dd9c..f061c365ba7 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) VPL software before version 2023.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en algunos programas Intel(R) VPL anteriores a la versi\u00f3n 2023.4.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json index d37908be8eb..35598f8b745 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper buffer restrictions in the UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en el firmware UEFI para algunos procesadores Intel(R) pueden permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21924.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21924.json index eb86f6ecba6..3fe61e7af0f 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21924.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21924.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T21:15:12.437", "lastModified": "2025-02-11T21:15:12.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SMM callout vulnerability within the AmdPlatformRasSspSmm driver could allow a ring 0 attacker to modify boot services handlers, potentially resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de llamada SMM dentro del controlador AmdPlatformRasSspSmm podr\u00eda permitir que un atacante de anillo 0 modifique los controladores de servicios de arranque, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21925.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21925.json index b4b2fc7e593..acb1dd9d209 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21925.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21925.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T21:15:12.577", "lastModified": "2025-02-11T21:15:12.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta dentro del controlador AmdPspP2CmboxV2 puede permitir que un atacante privilegiado sobrescriba SMRAM, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21966.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21966.json index d639d0d069c..272d34fe8c6 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21966.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21966.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-11T20:15:34.210", "lastModified": "2025-02-11T20:15:34.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A DLL hijacking vulnerability in the AMD Ryzen\u2122 Master Utility could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de secuestro de DLL en AMD Ryzen\u2122 Master Utility podr\u00eda permitir a un atacante lograr una escalada de privilegios, lo que potencialmente podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21971.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21971.json index 71dd65ac988..34e339588c3 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21971.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21971.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-02-12T00:15:08.750", "lastModified": "2025-02-12T00:15:08.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in AMD Crash Defender could allow an attacker to provide the Windows\u00ae system process ID to a kernel-mode driver, resulting in an operating system crash, potentially leading to denial of service." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n de entrada incorrecta en AMD Crash Defender podr\u00eda permitir que un atacante proporcione el ID del proceso de Windows\u00ae sistema a un controlador en modo kernel, lo que genera un bloqueo de sistema operativo, lo que puede llevar a una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json index bc88d20b20e..27ace9a4ab8 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T21:15:07.137", "lastModified": "2024-11-21T09:09:10.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23488.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23488.json index b87ee3ae139..0459511328a 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23488.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-02-29T08:15:47.110", "lastModified": "2024-11-21T08:57:48.947", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23563.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23563.json index 967396de987..6c9f4d93fd9 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23563.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23563.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-02-12T14:15:30.317", "lastModified": "2025-02-12T14:15:30.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL Connections Docs is vulnerable to a sensitive information disclosure which could allow a user to obtain sensitive information they are not entitled to, caused by improper handling of request data." + }, + { + "lang": "es", + "value": "HCL Connections Docs es vulnerable a una divulgaci\u00f3n de informaci\u00f3n confidencial que podr\u00eda permitir que un usuario obtenga informaci\u00f3n confidencial a la que no tiene derecho, debido a una gesti\u00f3n inadecuada de los datos solicitados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json index 47fb3f557b3..b7b3aa58882 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:12.430", "lastModified": "2025-02-11T11:15:12.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). The integrated ICMP service of the network stack of affected devices can be forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (Todas las versiones < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (Todas las versiones < V3.0.0), iFeatures de SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (EE. UU.) (6GK5766-1GE00-3DB0) (Todas las versiones < V3.0.0). El servicio ICMP integrado de la pila de red de los dispositivos afectados puede verse obligado a agotar sus recursos de memoria disponibles al recibir mensajes especialmente manipulados que tengan como objetivo el reensamblado de fragmentos de IP. Esto podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio temporal del servicio ICMP; otros servicios de comunicaci\u00f3n no se ven afectados. Los dispositivos afectados reanudar\u00e1n su funcionamiento normal una vez que finalice el ataque." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json index 78c4388dc75..4245aa71c31 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-09T14:15:51.433", "lastModified": "2024-11-21T09:09:31.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json index e6288146e9c..6a3a122feff 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-12T13:15:50.023", "lastModified": "2024-11-21T09:09:39.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json index ce2625eb867..eccbb171b45 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la funci\u00f3n XmlCli para el firmware UEFI de algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json index 823423f6c44..174b253eeed 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) Ethernet Adapter Complete Driver Pack install before versions 29.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada en algunas instalaciones de Intel(R) Ethernet Adapter Complete Driver Pack anteriores a la versi\u00f3n 29.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24911.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24911.json index 34c57d60090..158be645b81 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24911.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24911.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@checkpoint.com", "published": "2025-02-06T14:15:29.577", "lastModified": "2025-02-06T14:15:29.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json index 6eba25524ba..4db16f3361b 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-13T18:15:07.990", "lastModified": "2024-11-21T09:09:42.670", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json index a9a632ff315..bffb2195f4b 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-14T10:15:09.403", "lastModified": "2024-11-21T09:09:49.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json index f30dcbc05aa..060aa2ae514 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in some Intel(R) SPS firmware before SPS_E5_06.01.04.059.0 may allow a privileged user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos firmware Intel(R) SPS anteriores a SPS_E5_06.01.04.059.0 puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json index 4a88ceda6d3..9819b0edb3c 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T04:15:07.073", "lastModified": "2024-11-21T09:09:59.753", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json index 00930186a74..3dcf9dcb05a 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T03:15:06.123", "lastModified": "2024-11-21T09:10:03.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json index 302edb9935e..fd99e008a65 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper initialization in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La inicializaci\u00f3n incorrecta en el firmware de algunos Intel(R) AMT e Intel(R) Standard Manageability puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json index 0d7bbc5d975..211e3d3722d 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T21:15:06.723", "lastModified": "2024-11-21T09:10:06.217", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json index a49df0923d7..3dcf95cb48d 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-20T10:15:11.250", "lastModified": "2024-11-21T09:10:18.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27194.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27194.json index c29bdf94c4c..f521b48550f 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27194.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-16T02:15:08.500", "lastModified": "2024-11-21T09:04:04.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27780.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27780.json index 6538c491dd6..c7b1fc90efc 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27780.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27780.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:21.850", "lastModified": "2025-02-11T17:15:21.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple\u00a0Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabilities [CWE-79] in FortiSIEM 7.1 all versions, 7.0 all versions, 6.7 all versions incident page\u00a0may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Vulnerabilidades de neutralizaci\u00f3n incorrecta m\u00faltiple de entradas durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') [CWE-79] en FortiSIEM 7.1 todas las versiones, 7.0 todas las versiones, 6.7 todas las versiones La p\u00e1gina de incidentes puede permitir que un atacante autenticado realice un ataque de cross-site scripting a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27781.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27781.json index b50a054dc86..970be108faa 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27781.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27781.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:21.980", "lastModified": "2025-02-11T17:15:21.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox at least versions 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\"cross-site scripting\") en Fortinet FortiSandbox al menos en las versiones 4.4.0 a 4.4.4 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.4 y 3.2.0 a 3.2.4 y 3.1.0 a 3.1.5 y 3.0.0 a 3.0.7 permite que un atacante autenticado ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27859.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27859.json index 0c6850255ef..f765a4156e3 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27859.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27859.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-02-10T19:15:37.737", "lastModified": "2025-02-11T15:15:17.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json index 4e7ba777dad..4f9e5ba3ffc 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-21T07:15:47.193", "lastModified": "2024-11-21T09:10:26.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json index 0aeb0d8d8b5..5b493853757 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T20:15:07.933", "lastModified": "2024-11-21T09:05:50.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json index 1535adcbac9..74778439789 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T20:15:08.113", "lastModified": "2024-11-21T09:05:50.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json index 32b820ffd66..6a02a4ef727 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI para algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28989.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28989.json index 56cd4073ff2..e70a4e5724f 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28989.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28989.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2025-02-11T08:15:30.787", "lastModified": "2025-02-11T08:15:30.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SolarWinds Web Help Desk was found to have a hardcoded cryptographic key that could allow the disclosure of sensitive information from the software." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que SolarWinds Web Help Desk ten\u00eda una clave criptogr\u00e1fica codificada que podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n confidencial del software." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json index 498c399f16e..2e49e5306ae 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-23T06:15:08.793", "lastModified": "2024-11-21T09:10:38.020", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json index 26cedee79a9..5801a03c527 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-23T18:15:07.770", "lastModified": "2024-11-21T09:10:40.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json index 2b2e14dfdaf..18cab6b044c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T13:15:22.523", "lastModified": "2025-02-05T20:15:44.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json index d9675e0e862..4d93cba7cf3 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2, contains an Improper certificate verification vulnerability. A remote attacker could potentially exploit this vulnerability, leading to information disclosure." + }, + { + "lang": "es", + "value": "Dell BSAFE SSL-J, versiones anteriores a la 6.6 y versiones 7.0 a 7.2, contiene una vulnerabilidad de verificaci\u00f3n incorrecta de certificados. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad, lo que dar\u00eda lugar a la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json index 5a43de88b6e..6eec3918112 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2, contains a deadlock vulnerability. A remote attacker could potentially exploit this vulnerability, leading to a Denial of Service." + }, + { + "lang": "es", + "value": "Dell BSAFE SSL-J, versiones anteriores a la 6.6 y versiones 7.0 a 7.2, contiene una vulnerabilidad de bloqueo. Un atacante remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json index 9b12b208f62..81b86713043 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI CseVariableStorageSmm para algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json index 60f325cbb60..1a0ab4380e8 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software de la tecnolog\u00eda Intel(R) QuickAssist anterior a la versi\u00f3n 2.2.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json index 747fd235705..ed4401d1fd3 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T00:15:07.870", "lastModified": "2024-11-21T09:10:51.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json index 353ca8507b8..c2b773d688f 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:46.830", "lastModified": "2024-11-21T09:10:52.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json index b955e500d83..949b9997b8c 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.100", "lastModified": "2024-11-21T09:10:52.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json index 1f48c586d94..3738b2d6e73 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.360", "lastModified": "2024-11-21T09:10:52.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2955.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2955.json index b2fa9f3ffbb..4ec8fb35e03 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2955.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2955.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-03-26T20:15:11.710", "lastModified": "2024-11-21T09:10:55.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json index 5a718c7685c..809015e8506 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in some Intel(R) ME driver pack installer engines before version 2422.6.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos motores de instalaci\u00f3n de paquetes de controladores Intel(R) ME anteriores a la versi\u00f3n 2422.6.2.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json index b992b7bc997..c9308b4042a 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T01:15:48.227", "lastModified": "2024-11-21T09:28:40.910", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json index ec6b8965893..d805aa79bfa 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T02:15:10.813", "lastModified": "2024-11-21T09:28:41.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json index 5c3420aaa2c..7abb96bb82a 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T15:15:49.287", "lastModified": "2024-11-21T09:28:44.810", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json index 961c2b6c446..74d3c4bd5a4 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Las m\u00e1quinas de estados finitos (FSM) inadecuadas en la l\u00f3gica de hardware de algunos procesadores Intel\u00ae pueden permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json index 031321f1219..2d37862589f 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta para alg\u00fan software de la tecnolog\u00eda Intel(R) QuickAssist anterior a la versi\u00f3n 2.2.0 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json index 415d1a3a61c..1e4f896a808 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper buffer restrictions in the UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Las restricciones de b\u00fafer inadecuadas en el firmware UEFI para algunos procesadores Intel(R) pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json index bbb36cfbe87..cd54095d12a 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La inicializaci\u00f3n incorrecta en el m\u00f3dulo OutOfBandXML del firmware UEFI en algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json index 51c9da3d167..6ccc4b2720a 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T18:15:10.467", "lastModified": "2024-11-21T09:13:40.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json index bac42916d6d..b09da7cf958 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds write for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites para algunos programas de software de Intel(R) QuickAssist Technology anteriores a la versi\u00f3n 2.2.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3129.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3129.json index fc90967ab7c..1b413a92a36 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3129.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T16:15:59.810", "lastModified": "2024-11-21T09:28:57.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32037.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32037.json index 4b93158bdf4..ee265c7a6a3 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32037.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32037.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T22:15:27.930", "lastModified": "2025-02-11T22:15:27.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GeoNetwork is a catalog application to manage spatially referenced resources. In versions prior to 4.2.10 and 4.4.5, the search end-point response headers contain information about Elasticsearch software in use. This information is valuable from a security point of view because it allows software used by the server to be easily identified. GeoNetwork 4.4.5 and 4.2.10 fix this issue. No known workarounds are available." + }, + { + "lang": "es", + "value": "GeoNetwork es una aplicaci\u00f3n de cat\u00e1logo para administrar recursos referenciados espacialmente. En versiones anteriores a 4.2.10 y 4.4.5, los encabezados de respuesta del endpoint de b\u00fasqueda contienen informaci\u00f3n sobre el software Elasticsearch en uso. Esta informaci\u00f3n es valiosa desde el punto de vista de la seguridad porque permite identificar f\u00e1cilmente el software utilizado por el servidor. GeoNetwork 4.4.5 y 4.2.10 solucionan este problema. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json index a2f845c4861..5fcbb676870 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-12T10:15:13.043", "lastModified": "2025-02-12T18:15:21.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.\u00a0\nUsers are recommended to upgrade to version 1.10.1, which fixes this issue.\n\nA SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en various API endpoints - offices, dashboards, etc. Apache Fineract en las versiones 1.9 y anteriores. Tienen una vulnerabilidad que permite a un atacante autenticado inyectar datos maliciosos en algunos de los par\u00e1metros de consulta de los endpoints de la API REST. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.10.1, que soluciona este problema. Se ha implementado un validador SQL que nos permite configurar una serie de pruebas y comprobaciones contra nuestras consultas SQL que nos permitir\u00e1n validar y protegernos contra casi todos los posibles ataques de inyecci\u00f3n SQL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json index 877f28d5317..54a0abcd537 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) MPI Library for Windows software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software de la librer\u00eda Intel(R) MPI para Windows anterior a la versi\u00f3n 2021.13 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json index 4e4c6c81cd3..1dcd8e6f715 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NULL pointer dereference for some Intel(R) MLC software before version v3.11b may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La desreferenciaci\u00f3n de puntero NULL para alg\u00fan software Intel(R) MLC anterior a la versi\u00f3n v3.11b puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json index dbc57b44ce6..3334e80a4e6 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect default permissions for some Intel(R) DSA installer for Windows before version 24.2.19.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos para algunos instaladores de Intel(R) DSA para Windows anteriores a la versi\u00f3n 24.2.19.5 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json index 7c81418d02a..69d6d810c84 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T00:15:08.980", "lastModified": "2024-11-21T09:29:10.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json index 19114f97810..3e29df532cb 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T00:15:09.237", "lastModified": "2024-11-21T09:29:10.753", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json index ffe0aa54f0d..5f9d1a8f7de 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T01:16:05.023", "lastModified": "2024-11-21T09:29:10.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json index 299d059c6dc..c59a900dde2 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T02:15:08.097", "lastModified": "2024-11-21T09:29:11.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json index 45fc439a6ff..8c0cdebf9cf 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T02:15:08.347", "lastModified": "2024-11-21T09:29:11.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33504.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33504.json index a9c89d16cdc..d8305176199 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33504.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33504.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.110", "lastModified": "2025-02-11T17:15:22.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded cryptographic key to encrypt sensitive data vulnerability [CWE-321] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9, 7.0 all versions, 6.4 all versions may allow an attacker with JSON API access permissions to decrypt some secrets even if the 'private-data-encryption' setting is enabled." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de uso de una clave criptogr\u00e1fica codificada para cifrar datos confidenciales [CWE-321] en FortiManager 7.6.0 a 7.6.1, 7.4.0 a 7.4.5, 7.2.0 a 7.2.9, 7.0 todas las versiones, 6.4 todas las versiones puede permitir que un atacante con permisos de acceso a la API JSON descifre algunos secretos incluso si la configuraci\u00f3n 'private-data-encryption' est\u00e1 habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33659.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33659.json index 136797cd69e..24783b778db 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33659.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33659.json @@ -3,12 +3,16 @@ "sourceIdentifier": "biossecurity@ami.com", "published": "2025-02-11T15:15:17.200", "lastModified": "2025-02-11T15:15:17.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMI APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Input Validation by a local attacker. Successful exploitation of these vulnerabilities may lead to overwriting arbitrary memory and execute arbitrary code at SMM level, also impacting Confidentiality, Integrity, and Availability." + }, + { + "lang": "es", + "value": "AMI APTIOV contiene una vulnerabilidad en BIOS donde un atacante puede provocar una validaci\u00f3n de entrada incorrecta por parte de un atacante local. La explotaci\u00f3n exitosa de estas vulnerabilidades puede provocar la sobrescritura de memoria arbitraria y la ejecuci\u00f3n de c\u00f3digo arbitrario a nivel de SMM, lo que tambi\u00e9n afecta la confidencialidad, la integridad y la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3303.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3303.json index b8a3448071f..5edf9ebd1f5 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3303.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3303.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-13T09:15:09.653", "lastModified": "2025-02-13T09:15:09.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.6.5, starting from 17.7 prior to 17.7.4, and starting from 17.8 prior to 17.8.2, which allows an attacker to exfiltrate contents of a private issue using prompt injection." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde la 16.0 anterior a la 17.6.5, desde la 17.7 anterior a la 17.7.4 y desde la 17.8 anterior a la 17.8.2, que permite a un atacante exfiltrar el contenido de una emisi\u00f3n privada mediante inyecci\u00f3n r\u00e1pida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json index a5e0a161a97..09e387fd45d 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T00:15:08.147", "lastModified": "2024-11-21T09:29:23.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json index 9bad8f4eb6c..cb5fd1ef517 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T01:15:51.747", "lastModified": "2024-11-21T09:29:23.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json index 8b94179ac94..21bae6c0e1e 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T16:15:08.203", "lastModified": "2024-11-21T09:29:25.703", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json index 47778b14a9c..3fae43513bd 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-06T09:15:08.093", "lastModified": "2024-11-21T09:29:27.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34066.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34066.json index bd6364a1f09..4b01f4f8402 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34066.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-03T18:15:09.363", "lastModified": "2024-11-21T09:18:01.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34068.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34068.json index 6521dc8931a..0515fa0d1bb 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34068.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-03T18:15:09.773", "lastModified": "2024-11-21T09:18:01.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34521.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34521.json index 9e365ae6b3b..127aad78da0 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34521.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34521.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A directory traversal vulnerability exists in the Mavenir SCE Application Provisioning Portal, version PORTAL-LBS-R_1_0_24_0, which allows an administrative user to access system files with the file permissions of the privileged system user running the application." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de directory traversal en el portal de aprovisionamiento de aplicaciones Mavenir SCE, versi\u00f3n PORTAL-LBS-R_1_0_24_0, que permite a un usuario administrativo acceder a archivos del sistema con los permisos de archivo del usuario privilegiado del sistema que ejecuta la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35138.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35138.json index 8eb1ccfeb6e..adeb6e8c06b 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35138.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35138.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T21:15:26.213", "lastModified": "2025-02-04T21:15:26.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35279.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35279.json index 657bd599cf7..091e4ca54ea 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35279.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35279.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.253", "lastModified": "2025-02-11T17:15:22.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en pila [CWE-121] en Fortinet FortiOS versi\u00f3n 7.2.4 a 7.2.8 y versi\u00f3n 7.4.0 a 7.4.4 permite a un atacante remoto no autenticado ejecutar c\u00f3digo o comandos arbitrarios a trav\u00e9s de paquetes UDP manipulados mediante el control CAPWAP, siempre que el atacante haya podido evadir las protecciones de la pila de FortiOS y siempre que el servicio de estructura se est\u00e9 ejecutando en la interfaz expuesta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json index 3cde14e6adc..c8397ead264 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:08.743", "lastModified": "2024-11-21T09:29:53.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json index 5186c54db00..41b6d63e05e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:09.000", "lastModified": "2024-11-21T09:29:53.280", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json index 8f122d50b91..62ccadf9453 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n en algunos firmware de Intel(R) System Security Report y System Resources Defense puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json index bcaba7670c6..6dad6b75e31 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Intel(R) Ethernet Adapter Complete Driver Pack before versions 29.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el controlador Ethernet de la serie Intel(R) 800 para el paquete completo de controladores del adaptador Ethernet Intel(R) anterior a la versi\u00f3n 29.1 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json index a441ef4d241..8ad44523121 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) High Level Synthesis Compiler software before version 24.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software del compilador de s\u00edntesis de alto nivel Intel(R) anterior a la versi\u00f3n 24.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json index 4c134f97ec4..2ea567c2060 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for the Intel(R) Thread Director Visualizer software before version 1.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para el software Intel(R) Thread Director Visualizer anterior a la versi\u00f3n 1.0.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json index b0d17a4d708..a159871f789 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La condici\u00f3n ejecuci\u00f3n en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json index 9ed8e220039..245bf76a70d 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Chipset Software Installation Utility before version 10.1.19867.8574 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para algunas Utilidades de instalaci\u00f3n de software de chipset Intel(R) anteriores a la versi\u00f3n 10.1.19867.8574 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36508.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36508.json index 4ea04cc1387..187fd72071c 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36508.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36508.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.393", "lastModified": "2025-02-11T17:15:22.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 CLI allows an authenticated admin user with diagnose privileges to delete files on the system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') [CWE-22] en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2 y anteriores a 7.2.5 y Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2 y anteriores a 7.2.5 CLI permite que un usuario administrador autenticado con privilegios de diagn\u00f3stico elimine archivos en el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json index f84cce93078..deea36349fc 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T18:15:31.903", "lastModified": "2025-02-07T16:15:36.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json index f01542a1e2a..ce647421b12 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T00:15:07.393", "lastModified": "2024-11-21T09:29:59.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json index e7289202862..46b0bb5c01a 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T00:15:07.700", "lastModified": "2024-11-21T09:29:59.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json index 0bddb248d61..433b2e594e2 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T02:15:46.990", "lastModified": "2024-11-21T09:29:59.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json index ff63467ec1b..25bdea7541d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en alg\u00fan software de gr\u00e1ficos Intel(R) puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37358.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37358.json index 5f352baa0c6..c09175b0c35 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37358.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37358.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-06T12:15:26.343", "lastModified": "2025-02-06T12:15:26.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json index 9549159ebc3..40284d5cab8 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow an authenticated user to potentially enable denial of service via network access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware de algunos Intel(R) AMT e Intel(R) Standard Manageability puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json index c89fa38c60a..20726d56d91 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos instaladores de software del controlador de gr\u00e1ficos Intel(R) puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38316.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38316.json index 0f1cc2a909c..a2a1b543c76 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38316.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:08.480", "lastModified": "2025-02-05T23:15:08.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json index c2ea9769a98..25226c56a68 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:09.407", "lastModified": "2025-02-05T23:15:09.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json index 6e68c503f86..f560335fbb0 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:09.557", "lastModified": "2025-02-05T23:15:09.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json index 12df4399446..f358e9b0444 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:18.553", "lastModified": "2025-02-06T22:15:37.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json index 2744ccb430a..07694e6472b 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper restriction of communication channel to intended endpoints in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software before version 23.80 may allow an unauthenticated user to potentially enable information disclosure via adjacent access." + }, + { + "lang": "es", + "value": "La restricci\u00f3n incorrecta del canal de comunicaci\u00f3n a los endpoints previstos en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json index 864458e0850..4d6508d8cc4 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-02-06T17:15:18.647", "lastModified": "2025-02-06T19:15:19.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json index dfc3181c700..3902dd96537 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La granularidad insuficiente del control de acceso en el firmware UEFI en algunos procesadores Intel(R) puede permitir que un usuario autenticado potencialmente habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json index 7d2eb68a6b8..6aa9d9fe037 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Advisor software before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software Intel(R) Advisor anterior a la versi\u00f3n 2024.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json index 6b65d7a37c9..1e243a63022 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de las condiciones f\u00edsicas o ambientales en algunos procesadores Intel(R) puede permitir que un usuario autenticado habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json index 776a09fbc7a..aa3ea32ab86 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for the Intel(R) XTU software for Windows before version 7.14.2.14 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para el software Intel(R) XTU para Windows anterior a la versi\u00f3n 7.14.2.14 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39564.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39564.json index e9e51f29723..b2e3c11e01f 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39564.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39564.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2025-02-05T16:15:40.270", "lastModified": "2025-02-05T16:15:40.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json index eebc1ee5989..1d572cbf03a 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json index d9864b47485..878706d24f0 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Stack-based buffer overflow in some drivers for Intel(R) Ethernet Connection I219 Series before version 12.19.1.39 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer basado en pila en algunos controladores para Intel(R) Ethernet Connection I219 Series anteriores a la versi\u00f3n 12.19.1.39 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json index 007180762c7..02a143e5787 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in some drivers for Intel(R) Ethernet Connection I219 Series before version 12.19.1.39 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos controladores para Intel(R) Ethernet Connection I219 Series anteriores a la versi\u00f3n 12.19.1.39 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json index 336d1746d43..508b841282e 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficient verification of data authenticity in some Intel(R) DSA software before version 23.4.39 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n insuficiente de la autenticidad de los datos en algunos programas Intel(R) DSA anteriores a la versi\u00f3n 23.4.39 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json index 85dd6771843..a7464966dea 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T12:15:27.627", "lastModified": "2025-02-05T20:15:44.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40584.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40584.json index 16929cca63e..36f0c5f4c11 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40584.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40584.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.540", "lastModified": "2025-02-11T17:15:22.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiAnalyzer version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15 and 6.2.2 through 6.2.13, Fortinet FortiManager version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15 and 6.2.2 through 6.2.13, Fortinet FortiAnalyzer BigData version 7.4.0, 7.2.0 through 7.2.7, 7.0.1 through 7.0.6, 6.4.5 through 6.4.7 and 6.2.5, Fortinet FortiAnalyzer Cloud version 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.13 and 6.4.1 through 6.4.7 and Fortinet FortiManager Cloud version 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.13 and 6.4.1 through 6.4.7 GUI allows an authenticated privileged attacker to execute unauthorized code or commands via crafted HTTPS or HTTP requests." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n indebida de elementos especiales utilizados en un comando del SO ('Inyecci\u00f3n de comando del SO') [CWE-78] en Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.13, 6.4.0 a 6.4.15 y 6.2.2 a 6.2.13, Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.13, 6.4.0 a 6.4.15 y 6.2.2 a 6.2.13, Fortinet FortiAnalyzer BigData versi\u00f3n 7.4.0, 7.2.0 a 7.2.7, 7.0.1 a 7.0.6, La GUI permite que un atacante privilegiado autenticado ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTPS o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40586.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40586.json index a864d9a02db..5d5e9b643f1 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40586.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40586.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.683", "lastModified": "2025-02-11T17:15:22.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via\u00a0FortiSSLVPNd service pipe." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado [CWE-284] en FortiClient versi\u00f3n 7.4.0, versi\u00f3n 7.2.6 y anteriores, versi\u00f3n 7.0.13 y anteriores para Windows puede permitir que un usuario local aumente sus privilegios a trav\u00e9s de la tuber\u00eda de servicio FortiSSLVPNd." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40591.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40591.json index b5fac5ae10f..10e0b52ef33 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40591.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40591.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.810", "lastModified": "2025-02-11T17:15:22.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de asignaci\u00f3n incorrecta de privilegios [CWE-266] en Fortinet FortiOS versi\u00f3n 7.6.0, 7.4.0 a 7.4.4, 7.2.0 a 7.2.9 y anteriores a 7.0.15 permite que un administrador autenticado cuyo perfil de acceso tiene el permiso Security Fabric escale sus privilegios a superadministrador conectando el FortiGate objetivo a un FortiGate ascendente malicioso que controlan." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json index 0ea1da7d48f..34dbd934e58 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T21:15:26.380", "lastModified": "2025-02-04T21:15:26.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json index ddd5bc45466..78888b6ca9a 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La condici\u00f3n ejecuci\u00f3n en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json index beae1b06333..8c7d9a51ac0 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json @@ -3,7 +3,7 @@ "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-04-19T21:15:08.800", "lastModified": "2024-11-21T09:42:02.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4018.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4018.json index aa7ddda0a12..baaaddf8b60 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4018.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4018.json @@ -3,7 +3,7 @@ "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-04-19T21:15:08.997", "lastModified": "2024-11-21T09:42:02.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json index 8ef8a0f0c03..e0669836f85 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer basado en pila en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json index e932149d2fa..b54bf4c25e0 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use after free in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "Use after free en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado potencialmente habilite la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json index ebd0e3307cf..57b0feaad2b 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in some Intel(R) GPA software before version 2024.3 may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en algunos programas Intel(R) GPA anteriores a la versi\u00f3n 2024.3 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42207.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42207.json index 22dcba7f18d..b6bb66913b4 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42207.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-02-05T16:15:40.447", "lastModified": "2025-02-05T16:15:40.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json index a21a6d2e8a8..59430e7440c 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper input validation in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en algunos controladores de gr\u00e1ficos Intel(R) puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json index a50b9a29d7a..d2255a721c6 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect default permissions for some Intel(R) GPA and Intel(R) GPA Framework software installers may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos para algunos instaladores de software Intel(R) GPA e Intel(R) GPA framework pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json index e230c293d35..643a43d3942 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path element in some BIOS and System Firmware Update Package for Intel(R) Server M50FCP family before version R01.02.0002 may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Un elemento de ruta de b\u00fasqueda no controlada en algunos paquetes de actualizaci\u00f3n de firmware del sistema y BIOS para la familia Intel(R) Server M50FCP anteriores a la versi\u00f3n R01.02.0002 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42512.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42512.json index 098a065dc71..be7e92bfa20 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42512.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42512.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:37.910", "lastModified": "2025-02-10T22:15:33.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when the deprecated Basic128Rsa15 security policy is enabled." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en PC UA .NET Standard Stack anterior a 1.5.374.158 permite que un atacante no autorizado eluda la autenticaci\u00f3n de la aplicaci\u00f3n cuando la pol\u00edtica de seguridad obsoleta Basic128Rsa15 est\u00e1 habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42513.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42513.json index d59425775f1..6d49dfdb778 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42513.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42513.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.023", "lastModified": "2025-02-10T22:15:33.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when using HTTPS endpoints." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en OPC UA .NET Standard Stack anterior a 1.5.374.158 permite que un atacante no autorizado eluda la autenticaci\u00f3n de la aplicaci\u00f3n cuando utiliza endpoints HTTPS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json index 9c391de1c61..5b6d0cf5c00 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-13T11:15:18.450", "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json index e0669ca6357..59cbc607047 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T21:15:26.537", "lastModified": "2025-02-04T21:15:26.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json index 9e08aa56e75..e5973d2e43d 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-02-06T17:15:19.160", "lastModified": "2025-02-06T19:15:19.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json index d6a155e8de7..b47fb62ca98 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in AnkiDroid Android Application v2.17.6 allows attackers to retrieve internal files from the /data/data/com.ichi2.anki/ directory and save it into publicly available storage." + }, + { + "lang": "es", + "value": "Un problema en la aplicaci\u00f3n Android AnkiDroid v2.17.6 permite a los atacantes recuperar archivos internos del directorio /data/data/com.ichi2.anki/ y guardarlos en un almacenamiento disponible p\u00fablicamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json index 29ed005776e..540e37eb601 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-09-04T09:15:04.397", "lastModified": "2025-02-05T02:00:01.767", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45386.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45386.json index 435aaca8da2..100ba0157e4 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45386.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45386.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:13.627", "lastModified": "2025-02-11T11:15:13.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions < V4.1 Update 2), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1), SIMOCODE ES V19 (All versions < V19 Update 1), SIRIUS Safety ES V19 (TIA Portal) (All versions < V19 Update 1), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions < V19 Update 1), TIA Administrator (All versions < V3.0.4). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIMATIC PCS neo V4.0 (todas las versiones), SIMATIC PCS neo V4.1 (todas las versiones < V4.1 Update 2), SIMATIC PCS neo V5.0 (todas las versiones < V5.0 Update 1), SIMOCODE ES V19 (todas las versiones < V19 Update 1), SIRIUS Safety ES V19 (TIA Portal) (todas las versiones < V19 Update 1), SIRIUS Soft Starter ES V19 (TIA Portal) (todas las versiones < V19 Update 1), TIA Administrator (todas las versiones < V3.0.4). Los productos afectados no invalidan correctamente las sesiones de usuario al cerrar la sesi\u00f3n. Esto podr\u00eda permitir que un atacante remoto no autenticado, que haya obtenido el token de sesi\u00f3n por otros medios, reutilice la sesi\u00f3n de un usuario leg\u00edtimo incluso despu\u00e9s de cerrar la sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json index 3736b7655fb..e4cb7ed8736 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T21:15:26.687", "lastModified": "2025-02-04T21:15:26.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json index 0b1e0e6a15a..471f5c41b7d 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T21:15:26.833", "lastModified": "2025-02-04T21:15:26.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45659.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45659.json index e1a435edb62..39a59ef2f3a 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45659.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-04T18:15:34.723", "lastModified": "2025-02-04T18:15:34.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45718.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45718.json index d0d5b05a58f..bef01bb0e7d 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45718.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45718.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2025-02-11T08:15:30.953", "lastModified": "2025-02-11T08:15:30.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data could be exposed to non- privileged users in a configuration file. Local access to the computer with a low- privileged account is required to access the configuration file containing the sensitive data." + }, + { + "lang": "es", + "value": "Los datos confidenciales podr\u00edan quedar expuestos a usuarios sin privilegios en un archivo de configuraci\u00f3n. Se requiere acceso local a ordenador con una cuenta con pocos privilegios para acceder al archivo de configuraci\u00f3n que contiene los datos confidenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46429.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46429.json index 2085e5f1dda..69d2cff0550 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46429.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46429.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.153", "lastModified": "2025-02-10T22:15:33.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A hardcoded credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to access the web management portal using a default guest account with administrative privileges." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de credenciales codificadas en Tenda W18E V16.01.0.8(1625) permite a atacantes remotos no autenticados acceder al portal de administraci\u00f3n web utilizando una cuenta de invitado predeterminada con privilegios administrativos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46430.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46430.json index a78bc41dad9..231b44fc309 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46430.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46430.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.273", "lastModified": "2025-02-10T22:15:33.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda W18E V16.01.0.8(1625) is vulnerable to Incorrect Access Control. Unauthorized password change via the web management portal allows an unauthenticated remote attacker to change the administrator password by sending a specially crafted HTTP POST request to the setLoginPassword function, bypassing the authentication mechanism." + }, + { + "lang": "es", + "value": "Tenda W18E V16.01.0.8(1625) es vulnerable a un control de acceso incorrecto. El cambio de contrase\u00f1a no autorizado a trav\u00e9s del portal de administraci\u00f3n web permite que un atacante remoto no autenticado cambie la contrase\u00f1a del administrador mediante el env\u00edo de una solicitud HTTP POST especialmente manipulada a la funci\u00f3n setLoginPassword, omitiendo as\u00ed el mecanismo de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46431.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46431.json index f75bbc06314..a93b4fcafb9 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46431.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46431.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.390", "lastModified": "2025-02-10T22:15:34.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda W18E V16.01.0.8(1625) is vulnerable to Buffer Overflow. An attacker with access to the web management portal can exploit this vulnerability by sending specially crafted data to the delWewifiPic function." + }, + { + "lang": "es", + "value": "Tenda W18E V16.01.0.8(1625) es vulnerable a desbordamiento de b\u00fafer. Un atacante con acceso al portal de administraci\u00f3n web puede aprovechar esta vulnerabilidad enviando datos especialmente manipulados a la funci\u00f3n delWewifiPic." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46432.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46432.json index 798368a0dd8..d99cd5bfa72 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46432.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46432.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.540", "lastModified": "2025-02-10T22:15:34.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda W18E V16.01.0.8(1625) is vulnerable to Incorrect Access Control. An attacker can send a specially crafted HTTP POST request to the setQuickCfgWifiAndLogin function, which allows unauthorized changes to WiFi configuration settings and administrative credentials." + }, + { + "lang": "es", + "value": "Tenda W18E V16.01.0.8(1625) es vulnerable a un control de acceso incorrecto. Un atacante puede enviar una solicitud HTTP POST especialmente manipulada a la funci\u00f3n setQuickCfgWifiAndLogin, que permite realizar cambios no autorizados en la configuraci\u00f3n de WiFi y las credenciales administrativas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46433.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46433.json index 861a9efb779..951146d6eac 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46433.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46433.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.683", "lastModified": "2025-02-10T22:15:34.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A default credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to access the web management portal using the default rzadmin account with administrative privileges." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de credenciales predeterminadas en Tenda W18E V16.01.0.8(1625) permite a atacantes remotos no autenticados acceder al portal de administraci\u00f3n web utilizando la cuenta rzadmin predeterminada con privilegios administrativos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46434.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46434.json index db3f16358c8..38a959d3958 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46434.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.803", "lastModified": "2025-02-10T22:15:34.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda W18E V16.01.0.8(1625) suffers from authentication bypass in the web management portal allowing an unauthorized remote attacker to gain administrative access by sending a specially crafted HTTP request." + }, + { + "lang": "es", + "value": "Tenda W18E V16.01.0.8(1625) sufre una evasi\u00f3n de autenticaci\u00f3n en el portal de administraci\u00f3n web, lo que permite que un atacante remoto no autorizado obtenga acceso administrativo mediante el env\u00edo de una solicitud HTTP especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46435.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46435.json index 6d65d02cb69..15e8134697b 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46435.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:38.930", "lastModified": "2025-02-10T22:15:34.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack overflow vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an authenticated remote attacker to cause a denial of service or potentially execute arbitrary code. This vulnerability occurs due to improper input validation when handling user-supplied data in the delFacebookPic function." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de pila en el portal de administraci\u00f3n web Tenda W18E V16.01.0.8(1625) permite que un atacante remoto autenticado provoque una denegaci\u00f3n de servicio o potencialmente ejecute c\u00f3digo arbitrario. Esta vulnerabilidad se produce debido a una validaci\u00f3n de entrada incorrecta al gestionar datos proporcionados por el usuario en la funci\u00f3n delFacebookPic." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46436.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46436.json index b282847e9b3..803e7151455 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46436.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46436.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:39.063", "lastModified": "2025-02-10T22:15:35.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hardcoded credentials in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to gain root access to the device over the telnet service." + }, + { + "lang": "es", + "value": "Las credenciales codificadas en Tenda W18E V16.01.0.8(1625) permiten a atacantes remotos no autenticados obtener acceso de superusuario al dispositivo a trav\u00e9s del servicio telnet." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46437.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46437.json index 2e7bdca90c9..bbd8978d0c0 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46437.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T19:15:39.200", "lastModified": "2025-02-10T22:15:35.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an unauthenticated remote attacker to retrieve sensitive configuration information, including WiFi SSID, WiFi password, and base64-encoded administrator credentials, by sending a specially crafted HTTP POST request to the getQuickCfgWifiAndLogin function, bypassing authentication checks." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n confidencial en el portal de administraci\u00f3n web Tenda W18E V16.01.0.8(1625) permite a un atacante remoto no autenticado recuperar informaci\u00f3n de configuraci\u00f3n confidencial, incluido el SSID de WiFi, la contrase\u00f1a de WiFi y las credenciales de administrador codificadas en base64, enviando una solicitud HTTP POST especialmente manipulada a la funci\u00f3n getQuickCfgWifiAndLogin, eludiendo los controles de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46910.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46910.json index 655680b2670..d5368909576 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46910.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authenticated user can perform XSS and potentially impersonate another user.\n\nThis issue affects Apache Atlas versions\u00a02.3.0 and earlier.\n\nUsers are recommended to upgrade to version 2.4.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Un usuario autenticado puede realizar ataques XSS y potencialmente hacerse pasar por otro usuario. Este problema afecta a las versiones 2.3.0 y anteriores de Apache Atlas. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.4.0, que soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json index 61249ce8b91..4d2cb90e9d0 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncontrolled search path for the Intel(R) RealSense D400 Series Universal Windows Platform (UWP) Driver for Windows(R) 10 all versions may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para el controlador de la plataforma universal de Windows (UWP) Intel(R) RealSense D400 Series para Windows(R) 10 todas las versiones puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json index 3db2fcb9d2a..4e055197311 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T22:15:04.650", "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json index 37461ece19f..2b0a1e8ef49 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-07T18:15:17.417", "lastModified": "2024-11-21T17:15:16.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json index 0b78b4c4f18..cfee9b02800 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-02-06T20:15:39.533", "lastModified": "2025-02-06T20:15:39.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json index 186d6089196..9daa82618bf 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-02-06T20:15:39.643", "lastModified": "2025-02-06T20:15:39.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json index af5fa367091..83a4445c920 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:09.990", "lastModified": "2025-02-13T15:15:19.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in agent-related functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with administrator privileges to delete arbitrary files via unspecified vectors." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en la funcionalidad relacionada con el agente en Synology Active Backup for Business anteriores a 2.7.1-13234, 2.7.1-23234 y 2.7.1-3234 permite a usuarios remotos autenticados con privilegios de administrador eliminar archivos arbitrarios a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json index 55a3b27a393..5810615062d 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:10.207", "lastModified": "2025-02-13T15:15:19.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in encrypted share umount functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users to write specific files via unspecified vectors." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en la funcionalidad de desmontaje de recursos compartidos cifrados en Synology Active Backup for Business anteriores a 2.7.1-13234, 2.7.1-23234 y 2.7.1-3234 permite que usuarios remotos autenticados escriban archivos espec\u00edficos a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47266.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47266.json index 576982f182f..fcdf01d6aa9 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47266.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47266.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:10.383", "lastModified": "2025-02-13T07:15:10.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in share file list functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with administrator privileges to read specific files containing non-sensitive information via unspecified vectors." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en la funcionalidad de lista de archivos compartidos en Synology Active Backup for Business anteriores a 2.7.1-13234, 2.7.1-23234 y 2.7.1-3234 permite que usuarios remotos autenticados con privilegios de administrador lean archivos espec\u00edficos que contienen informaci\u00f3n no confidencial a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json index 23853b17a44..795b7b143c3 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:40.247", "lastModified": "2025-02-11T16:15:40.247", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection in the admin web console of Ivanti CSA before version 5.0.5 allows a remote authenticated attacker with admin privileges to achieve remote code execution." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de comandos del sistema operativo en la consola web de administraci\u00f3n de Ivanti CSA anterior a la versi\u00f3n 5.0.5 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json index 926b5c5ec9e..9ed8aea5293 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-04T19:15:31.733", "lastModified": "2025-02-07T22:15:12.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48091.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48091.json index ab20835d085..53cb20436d1 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48091.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tally Prime Edit Log v2.1 was discovered to contain a DLL hijacking vulnerability via the component TextShaping.dll. This vulnerability allows attackers to execute arbitrary code via a crafted DLL." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tally Prime Edit Log v2.1 conten\u00eda una vulnerabilidad de secuestro de DLL a trav\u00e9s del componente TextShaping.dll. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una DLL manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json index 7b2bea0e3d4..0a05c0f8164 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:26.243", "lastModified": "2025-02-10T18:15:26.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPGurukul Small CRM 3.0 is vulnerable to Cross Site Scripting (XSS) via a crafted payload injected into the name in the profile.php." + }, + { + "lang": "es", + "value": "PHPGurukul Small CRM 3.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de un payload manipulado inyectado en el nombre en profile.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48394.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48394.json index e8c2405bdc2..71951db6d8c 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48394.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48394.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:30.240", "lastModified": "2025-02-06T16:15:37.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48445.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48445.json index 4d61c31e318..e263a654e91 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48445.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-04T23:15:08.850", "lastModified": "2025-02-06T15:15:13.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json index f8bc459074f..ddda1b268b5 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T12:15:28.570", "lastModified": "2025-02-05T12:15:28.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json index 720cb35ec87..90799fdac96 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T11:15:14.540", "lastModified": "2025-02-05T11:15:14.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json index 695d8096a8f..094eaca078f 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T01:15:08.230", "lastModified": "2025-02-06T01:15:08.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json index db16e8ba0ea..f0f01a37ed3 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T09:15:18.277", "lastModified": "2024-11-21T09:43:58.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json index 9634f575629..1cf40863012 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:10.973", "lastModified": "2024-11-21T09:43:59.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json index 821edc7bd68..e64fb70cbb9 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:11.973", "lastModified": "2024-11-21T09:43:59.157", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json index 0a34ddbae37..6e2c20f8c61 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:12.703", "lastModified": "2024-11-21T09:43:59.293", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50567.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50567.json index db007ad10eb..ca1f1b41f14 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50567.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50567.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:22.980", "lastModified": "2025-02-11T17:15:22.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiWeb 7.4.0 a 7.6.0 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de una entrada manipulada espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50569.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50569.json index 665a017b252..960914c70c6 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50569.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50569.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:23.123", "lastModified": "2025-02-11T17:15:23.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.0.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiWeb 7.0.0 a 7.6.0 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de una entrada manipulada espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json index 40447997e2f..5fa5447ec91 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T01:15:09.420", "lastModified": "2025-02-06T01:15:09.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json index 016eae01a1f..2be2e10460a 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-02-06T05:15:12.850", "lastModified": "2025-02-06T05:15:12.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json index 9338973a7f4..29a20cfef81 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T16:15:19.550", "lastModified": "2024-11-21T15:15:32.900", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json index 449ca7ca2da..e3b28c6dcdd 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T12:15:28.743", "lastModified": "2025-02-05T12:15:28.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json index 2cf13c75c51..61baa1ecba2 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T12:15:28.917", "lastModified": "2025-02-05T12:15:28.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52606.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52606.json index 009c58dae73..e352ecff6ca 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52606.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52606.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2025-02-11T08:15:31.133", "lastModified": "2025-02-11T08:15:31.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request." + }, + { + "lang": "es", + "value": "La plataforma SolarWinds se ve afectada por la vulnerabilidad server-side request forgery. No se aplic\u00f3 la depuraci\u00f3n de entrada adecuada, lo que permiti\u00f3 la posibilidad de una solicitud web maliciosa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52611.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52611.json index 8907faa6df6..d42cf90293f 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52611.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52611.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2025-02-11T08:15:31.280", "lastModified": "2025-02-11T08:15:31.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SolarWinds Platform is vulnerable to an information disclosure vulnerability through an error message. While the data does not provide anything sensitive, the information could assist an attacker in other malicious actions." + }, + { + "lang": "es", + "value": "La plataforma SolarWinds es vulnerable a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de un mensaje de error. Si bien los datos no brindan informaci\u00f3n confidencial, podr\u00edan ayudar a un atacante a realizar otras acciones maliciosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52612.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52612.json index 102344d2970..efad0eb1d32 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52612.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52612.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable." + }, + { + "lang": "es", + "value": "SolarWinds Platform es vulnerable a una vulnerabilidad de cross-site scripting reflejado. Esto se debi\u00f3 a una depuraci\u00f3n insuficiente de los par\u00e1metros de entrada. Para poder explotar esta vulnerabilidad, es necesario que una cuenta con privilegios elevados est\u00e9 autenticada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52881.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52881.json index 50a8144f4db..ca860271c73 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52881.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52881.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in AudioCodes One Voice Operations Center (OVOC) before 8.4.582. Due to the use of a hard-coded key, an attacker is able to decrypt sensitive data such as passwords extracted from the topology file." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en AudioCodes One Voice Operations Center (OVOC) anterior a la versi\u00f3n 8.4.582. Gracias al uso de una clave codificada, un atacante puede descifrar datos confidenciales, como contrase\u00f1as extra\u00eddas del archivo de topolog\u00eda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52882.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52882.json index 9a548e7df6c..62dea093f40 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52882.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in AudioCodes One Voice Operations Center (OVOC) before 8.4.582. Due to improper neutralization of input via the devices API, an attacker can inject malicious JavaScript code (XSS) to attack logged-in administrator sessions." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en AudioCodes One Voice Operations Center (OVOC) anterior a la versi\u00f3n 8.4.582. Debido a la neutralizaci\u00f3n incorrecta de la entrada a trav\u00e9s de la API de dispositivos, un atacante puede inyectar c\u00f3digo JavaScript malicioso (XSS) para atacar las sesiones de administrador iniciadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52883.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52883.json index a3a1476d91c..8d5d84f0e7d 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52883.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52883.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in AudioCodes One Voice Operations Center (OVOC) before 8.4.582. Due to a path traversal vulnerability, sensitive data can be read without any authentication." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en AudioCodes One Voice Operations Center (OVOC) anterior a la versi\u00f3n 8.4.582. Debido a una vulnerabilidad de path traversal, se pueden leer datos confidenciales sin ninguna autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52884.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52884.json index bb6900110cf..680f9123f9a 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52884.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52884.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in AudioCodes Mediant Session Border Controller (SBC) before 7.40A.501.841. Due to the use of weak password obfuscation/encryption, an attacker with access to configuration exports (INI) is able to decrypt the passwords." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en AudioCodes Mediant Session Border Controller (SBC) antes de la versi\u00f3n 7.40A.501.841. Debido al uso de una codificaci\u00f3n/ofuscaci\u00f3n de contrase\u00f1as d\u00e9biles, un atacante con acceso a las exportaciones de configuraci\u00f3n (INI) puede descifrar las contrase\u00f1as." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json index b743678881e..97fab16d486 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T20:15:39.763", "lastModified": "2025-02-06T20:15:39.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52966.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52966.json index 9796be77b39..30d756e8f73 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52966.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52966.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:23.260", "lastModified": "2025-02-11T17:15:23.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiAnalyzer 6.4.0 through 7.6.0 allows attacker to cause information disclosure via filter manipulation." + }, + { + "lang": "es", + "value": "Una exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Fortinet FortiAnalyzer 6.4.0 a 7.6.0 permite a un atacante provocar la divulgaci\u00f3n de informaci\u00f3n mediante la manipulaci\u00f3n de filtros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52968.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52968.json index f52aa0f031b..cefdc4f15d2 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52968.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52968.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:23.400", "lastModified": "2025-02-11T17:15:23.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper authentication in Fortinet FortiClientMac 7.0.11 through 7.2.4 allows attacker to gain improper access to MacOS via empty password." + }, + { + "lang": "es", + "value": "Una autenticaci\u00f3n incorrecta en Fortinet FortiClientMac 7.0.11 a 7.2.4 permite a un atacante obtener acceso indebido a MacOS a trav\u00e9s de una contrase\u00f1a vac\u00eda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53266.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53266.json index a9cf0e25193..9206ef84125 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53266.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T22:15:40.347", "lastModified": "2025-02-04T22:15:40.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53648.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53648.json index ce574e42a73..997fe83c58e 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53648.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53648.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:14.460", "lastModified": "2025-02-11T11:15:14.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.90), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions < V9.90), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.90), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.90), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.90), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.90), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.90), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.90), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.90), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.90), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.90), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions < V9.90), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.90). Affected devices do not properly limit access to a development shell accessible over a physical interface. This could allow an unauthenticated attacker with physical access to the device to execute arbitrary commands on the device." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 6MD85 (CP200) (Todas las versiones), SIPROTEC 5 6MD85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 6MD86 (CP200) (Todas las versiones), SIPROTEC 5 6MD86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 6MD89 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 6MU85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7KE85 (CP200) (Todas las versiones), SIPROTEC 5 7KE85 (CP300) (Todas las versiones), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SA86 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SA87 (CP200) (Todas las versiones), SIPROTEC 5 7SA87 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SD86 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SD87 (CP200) (Todas las versiones), SIPROTEC 5 7SD87 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SJ85 (CP200) (Todas las versiones), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SJ86 (CP200) (Todas las versiones), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SK85 (CP200) (Todas las versiones), SIPROTEC 5 7SK85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SL86 (CP200) (Todas las versiones), SIPROTEC 5 7SL86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SL87 (CP200) (Todas las versiones), SIPROTEC 5 7SL87 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SS85 (CP200) (Todas las versiones), SIPROTEC 5 7SS85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7ST85 (CP200) (Todas las versiones), SIPROTEC 5 7ST85 (CP300) (Todas las versiones), SIPROTEC 5 7ST86 (CP300) (Todas las versiones), SIPROTEC 5 7SX82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SX85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7SY82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7UM85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7UT85 (CP200) (Todas las versiones), SIPROTEC 5 7UT85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7UT86 (CP200) (Todas las versiones), SIPROTEC 5 7UT86 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7UT87 (CP200) (Todas las versiones), SIPROTEC 5 7UT87 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7VE85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7VK87 (CP200) (Todas las versiones), SIPROTEC 5 7VK87 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 7VU85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (Todas las versiones < V9.90). Los dispositivos afectados no limitan correctamente el acceso a un shell de desarrollo accesible a trav\u00e9s de una interfaz f\u00edsica. Esto podr\u00eda permitir que un atacante no autenticado con acceso f\u00edsico al dispositivo ejecute comandos arbitrarios en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53651.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53651.json index 875aac1e2bf..b9c52e58aa5 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53651.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53651.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:14.880", "lastModified": "2025-02-11T11:15:14.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) (All versions), SIPROTEC 5 6MU85 (CP300) (All versions), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions), SIPROTEC 5 7SX85 (CP300) (All versions), SIPROTEC 5 7SY82 (CP150) (All versions), SIPROTEC 5 7UM85 (CP300) (All versions), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions), SIPROTEC 5 7VE85 (CP300) (All versions), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions), SIPROTEC 5 7VU85 (CP300) (All versions), SIPROTEC 5 Compact 7SX800 (CP050) (All versions). Affected devices do not encrypt certain data within the on-board flash storage on their PCB. This could allow an attacker with physical access to read the entire filesystem of the device." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (Todas las versiones), SIPROTEC 5 6MD85 (CP200) (Todas las versiones), SIPROTEC 5 6MD85 (CP300) (Todas las versiones), SIPROTEC 5 6MD86 (CP200) (Todas las versiones), SIPROTEC 5 6MD86 (CP300) (Todas las versiones), SIPROTEC 5 6MD89 (CP300) (Todas las versiones), SIPROTEC 5 6MU85 (CP300) (Todas las versiones), SIPROTEC 5 7KE85 (CP200) (Todas las versiones), SIPROTEC 5 7KE85 (CP300) (Todas las versiones), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (Todas las versiones), SIPROTEC 5 7SA86 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP300) (Todas las versiones), SIPROTEC 5 7SA87 (CP200) (Todas las versiones), SIPROTEC 5 7SA87 (CP300) (Todas las versiones), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (Todas las versiones), SIPROTEC 5 7SD86 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP300) (Todas las versiones), SIPROTEC 5 7SD87 (CP200) (Todas las versiones), SIPROTEC 5 7SD87 (CP300) (Todas las versiones), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), versiones), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones), SIPROTEC 5 7SJ85 (CP200) (Todas las versiones), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones), SIPROTEC 5 7SJ86 (CP200) (Todas las versiones), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (Todas las versiones), SIPROTEC 5 7SK85 (CP200) (Todas las versiones), SIPROTEC 5 7SK85 (CP300) (Todas las versiones), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (Todas las versiones), SIPROTEC 5 7SL86 (CP200) (Todas las versiones versiones), SIPROTEC 5 7SL86 (CP300) (Todas las versiones), SIPROTEC 5 7SL87 (CP200) (Todas las versiones), SIPROTEC 5 7SL87 (CP300) (Todas las versiones), SIPROTEC 5 7SS85 (CP200) (Todas las versiones), SIPROTEC 5 7SS85 (CP300) (Todas las versiones), SIPROTEC 5 7ST85 (CP200) (Todas las versiones), SIPROTEC 5 7ST85 (CP300) (Todas las versiones), SIPROTEC 5 7ST86 (CP300) (Todas las versiones), SIPROTEC 5 7SX82 (CP150) (Todas las versiones), SIPROTEC 5 7SX85 (CP300) (Todas las versiones), SIPROTEC 5 7SY82 (CP150) (Todas las versiones), SIPROTEC 5 7UM85 (CP300) (Todas las versiones), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (Todas las versiones), SIPROTEC 5 7UT85 (CP200) (Todas las versiones), SIPROTEC 5 7UT85 (CP300) (Todas las versiones), SIPROTEC 5 7UT86 (CP200) (Todas las versiones), SIPROTEC 5 7UT86 (CP300) (Todas las versiones), SIPROTEC 5 7UT87 (CP200) (Todas las versiones), SIPROTEC 5 7UT87 (CP300) (Todas las versiones), SIPROTEC 5 7VE85 (CP300) (Todas las versiones), SIPROTEC 5 7VK87 (CP200) (Todas las versiones), SIPROTEC 5 7VK87 (CP300) (Todas las versiones), SIPROTEC 5 7VU85 (CP300) (Todas las versiones), SIPROTEC 5 Compact 7SX800 (CP050) (todas las versiones). Los dispositivos afectados no cifran determinados datos dentro del almacenamiento flash integrado en su PCB. Esto podr\u00eda permitir que un atacante con acceso f\u00edsico lea todo el sistema de archivos del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53851.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53851.json index 05ff1a92960..f4490c0b8d8 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53851.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53851.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T22:15:40.490", "lastModified": "2025-02-04T22:15:40.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json index 72bdb833ccb..4a2a83045e7 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.940", "lastModified": "2025-02-12T01:15:08.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service." + }, + { + "lang": "es", + "value": "NVIDIA Triton Inference Server contiene una vulnerabilidad en la API de carga de modelos, donde un usuario podr\u00eda provocar un desbordamiento de n\u00fameros enteros o un error de envoltura al cargar un modelo con un tama\u00f1o de archivo extragrande que desborda una variable interna. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53977.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53977.json index f949461ed2b..baca568c402 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53977.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53977.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:15.063", "lastModified": "2025-02-11T11:15:15.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en ModelSim (todas las versiones anteriores a la V2025.1) y Questa (todas las versiones anteriores a la V2025.1). Un ejemplo de secuencia de comandos de configuraci\u00f3n incluido en las aplicaciones afectadas permite cargar un archivo ejecutable espec\u00edfico desde el directorio de trabajo actual. Esto podr\u00eda permitir que un atacante local autenticado inyecte c\u00f3digo arbitrario y aumente los privilegios en instalaciones en las que los administradores o procesos con privilegios elevados inicien la secuencia de comandos desde un directorio en el que el usuario pueda escribir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53994.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53994.json index d4a5665fc8b..a319e35f51e 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53994.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T22:15:40.640", "lastModified": "2025-02-04T22:15:40.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json index 8b56956ee9b..0b1247d0a2d 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54015.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:15.227", "lastModified": "2025-02-11T11:15:15.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 6MD85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (Todas las versiones >= V8.80), SIPROTEC 5 7SA82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SA86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SD86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SK85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SL86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (Todas las versiones >= V8.80), SIPROTEC 5 7ST86 (CP300) (Todas las versiones), SIPROTEC 5 7SX82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7SX85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7UM85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (Todas las versiones < V9.90), SIPROTEC 5 7UT85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (Todas las versiones < V9.90), SIPROTEC 5 M\u00f3dulo de comunicaci\u00f3n ETH-BA-2EL (Rev.2) (Todas las versiones < V9.90), SIPROTEC 5 M\u00f3dulo de comunicaci\u00f3n ETH-BB-2FO (Rev. 2) (Todas las versiones < V9.90), SIPROTEC 5 M\u00f3dulo de comunicaci\u00f3n ETH-BD-2FO (Todas las versiones >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (Todas las versiones >= V9.50 < V9.90). Los dispositivos afectados no validan correctamente las solicitudes SNMP GET. Esto podr\u00eda permitir que un atacante remoto no autenticado recupere informaci\u00f3n confidencial de los dispositivos afectados con solicitudes SNMPv2 GET utilizando credenciales predeterminadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54089.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54089.json index 8f1ccb2959a..6b4845a35b4 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54089.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54089.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:15.423", "lastModified": "2025-02-11T11:15:15.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain a weak encryption mechanism based on a hard-coded key.\r\nThis could allow an attacker to guess or decrypt the password from the cyphertext." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en APOGEE PXC Series (BACnet) (todas las versiones), APOGEE PXC Series (P2 Ethernet) (todas las versiones) y TALON TC Series (BACnet) (todas las versiones). Los dispositivos afectados contienen un mecanismo de cifrado d\u00e9bil basado en una clave codificada. Esto podr\u00eda permitir a un atacante adivinar o descifrar la contrase\u00f1a a partir del texto cifrado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54090.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54090.json index d858e255037..46c64a71dbd 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54090.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54090.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:15.647", "lastModified": "2025-02-11T11:15:15.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain an out-of-bounds read in the memory dump function.\r\nThis could allow an attacker with Medium (MED) or higher privileges to cause the device to enter an insecure cold start state." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en APOGEE PXC Series (BACnet) (todas las versiones), APOGEE PXC Series (P2 Ethernet) (todas las versiones) y TALON TC Series (BACnet) (todas las versiones). Los dispositivos afectados contienen una lectura fuera de los l\u00edmites en la funci\u00f3n de volcado de memoria. Esto podr\u00eda permitir que un atacante con privilegios medios (MED) o superiores haga que el dispositivo entre en un estado de arranque en fr\u00edo inseguro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json index 69bcbce5ead..7c8eea90c36 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T15:15:15.050", "lastModified": "2025-02-12T15:15:15.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "dashboards-reporting (aka Dashboards Reports) before 2.19.0.0, as shipped in OpenSearch before 2.19, allows XSS because Markdown is not sanitized when previewing a header or footer." + }, + { + "lang": "es", + "value": "dashboards-reporting (tambi\u00e9n conocido como Dashboards Reports) anterior a 2.19.0.0, tal como se incluye en OpenSearch antes de 2.19, permite XSS porque Markdown no se depura al obtener una vista previa de un encabezado o pie de p\u00e1gina." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json index f1f671dd00c..cca0cdf13e1 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T21:15:21.453", "lastModified": "2025-02-06T21:15:21.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json index b5dc36a6ed5..fbb849faf5a 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-08T17:15:21.643", "lastModified": "2025-02-08T17:15:21.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 and IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14 and 7.3 through 7.3.2 could allow an authenticated user to obtain sensitive information about other users on the system due to missing authorization for a function." + }, + { + "lang": "es", + "value": "IBM DevOps Deploy 8.0 a 8.0.1.4, 8.1 a 8.1.0.0 e IBM UrbanCode Deploy (UCD) 7.0 a 7.0.5.25, 7.1 a 7.1.2.21, 7.2 a 7.2.3.14 y 7.3 a 7.3.2 podr\u00edan permitir que un usuario autenticado obtenga informaci\u00f3n confidencial sobre otros usuarios en el sistema debido a la falta de autorizaci\u00f3n para una funci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54658.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54658.json index 359f369e216..448d3974d6f 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54658.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54658.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-02-10T19:15:39.320", "lastModified": "2025-02-11T15:15:18.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1 y macOS Sonoma 14.4. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json index 064eeac3ecd..ccfe1eafed3 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in the Winbox service of MikroTik RouterOS v6.43 through v7.16.1. A discrepancy in response times between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el servicio Winbox de MikroTik RouterOS v6.43 a v7.16.1. Una discrepancia en los tiempos de respuesta entre los intentos de conexi\u00f3n realizados con un nombre de usuario v\u00e1lido y aquellos con un nombre de usuario no v\u00e1lido permite a los atacantes realizar una enumeraci\u00f3n de cuentas v\u00e1lidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54853.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54853.json index 29b4711f753..0dd74e11c73 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54853.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54853.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:30.557", "lastModified": "2025-02-06T16:15:38.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json index 2fc6cc0209f..6301a4117d6 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.227", "lastModified": "2025-02-12T16:15:42.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the SharedConfig class of Telegram Android APK v.11.7.0 allows a physically proximate attacker to bypass authentication and escalate privileges by manipulating the return value of the checkPasscode method." + }, + { + "lang": "es", + "value": "Un problema en la clase SharedConfig de Telegram Android APK v.11.7.0 permite que un atacante f\u00edsicamente pr\u00f3ximo evite la autenticaci\u00f3n y escale privilegios manipulando el valor de retorno del m\u00e9todo checkPasscode." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json index 7fb09a24806..5fa4b74e14c 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:29.663", "lastModified": "2025-02-10T18:15:29.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OneBlog v2.3.6 was discovered to contain a template injection vulnerability via the template management department." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que OneBlog v2.3.6 conten\u00eda una vulnerabilidad de inyecci\u00f3n de plantillas a trav\u00e9s del departamento de gesti\u00f3n de plantillas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json index 1169af3bf7d..71807bfff78 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.247", "lastModified": "2025-02-08T03:15:11.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in trojan v.2.0.0 through v.2.15.3 allows a remote attacker to escalate privileges via the initialization interface /auth/register." + }, + { + "lang": "es", + "value": "Un problema en trojan v.2.0.0 a v.2.15.3 permite a un atacante remoto escalar privilegios a trav\u00e9s de la interfaz de inicializaci\u00f3n /auth/register." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55272.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55272.json index ad3e12841d1..c7edb5007d5 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55272.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55272.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.337", "lastModified": "2025-02-08T03:15:11.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Brainasoft Braina v2.8 allows a remote attacker to obtain sensitive information via the chat window function." + }, + { + "lang": "es", + "value": "Un problema en Brainasoft Braina v2.8 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de ventana de chat." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json index 652b96a7e11..f5436e0a98a 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Joplin's HTML sanitizer allows the `name` attribute to be specified. If `name` is set to the same value as an existing `document` property (e.g. `querySelector`), that property is replaced with the element. This vulnerability's only known impact is denial of service. The note viewer fails to refresh until closed and re-opened with a different note. This issue has been addressed in version 3.2.8 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Joplin es una aplicaci\u00f3n de c\u00f3digo abierto y gratuita para tomar notas y realizar tareas pendientes, que puede gestionar una gran cantidad de notas organizadas en cuadernos. El depurador HTML de Joplin permite especificar el atributo `name`. Si `name` se establece con el mismo valor que una propiedad `document` existente (por ejemplo, `querySelector`), esa propiedad se reemplaza con el elemento. El \u00fanico impacto conocido de esta vulnerabilidad es la denegaci\u00f3n de servicio. El visor de notas no se actualiza hasta que se cierra y se vuelve a abrir con una nota diferente. Este problema se ha solucionado en la versi\u00f3n 3.2.8 y se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55948.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55948.json index 123f3585059..9e816cdc312 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55948.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55948.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:27.123", "lastModified": "2025-02-04T21:15:27.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json index 445758916fe..cc8c2d12c54 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-18T19:15:11.933", "lastModified": "2024-12-18T19:15:11.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json index 8d80d1f2c6c..3fff82a387d 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-18T19:15:12.067", "lastModified": "2024-12-18T19:15:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json index b323e4fced1..321932b9ab3 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T11:15:17.160", "lastModified": "2025-02-05T20:15:45.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json index b8701d6ef1b..2b340e1b026 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-05T18:15:28.507", "lastModified": "2025-02-05T18:15:28.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json index 4bd7c8df8c3..9ff74d1a230 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-05T18:15:28.700", "lastModified": "2025-02-05T18:15:28.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json index 0dccaedd30e..d026432d223 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-05T18:15:28.880", "lastModified": "2025-02-05T18:15:28.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json index e92bc58f527..c91f9895983 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-05T18:15:29.050", "lastModified": "2025-02-05T18:15:29.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json index b5b1e9fb772..6f50863d409 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-05T18:15:29.210", "lastModified": "2025-02-05T18:15:29.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56197.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56197.json index 194ffde9379..1665e490264 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56197.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:27.260", "lastModified": "2025-02-04T21:15:27.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56328.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56328.json index 0dfa90897a4..c751dbb6a23 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56328.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:27.400", "lastModified": "2025-02-04T21:15:27.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json index 70189d30a34..d9ffab77489 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json index 7a4e00eebc5..6a74632fcba 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T21:15:21.600", "lastModified": "2025-02-06T21:15:21.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json index 2b0e734f427..71a077c8b11 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:09.707", "lastModified": "2025-02-05T23:15:09.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json index 55cf1b15fab..3021dd5458a 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:09.860", "lastModified": "2025-02-05T23:15:09.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json index 9a79f6abd2c..4e267d8c853 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:10.007", "lastModified": "2025-02-05T23:15:10.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json index 60a04aa87bc..3d5e80a9014 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-05T23:15:10.153", "lastModified": "2025-02-05T23:15:10.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json index 35fe67d0efe..97598d7bb03 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:29.510", "lastModified": "2025-01-10T16:15:29.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json index 17e1ba28c6a..1fd10b1e2b6 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T22:15:38.903", "lastModified": "2025-02-07T16:15:37.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57063.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57063.json index c342efc6a6f..4c77dd4ef48 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57063.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57063.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:30.670", "lastModified": "2025-02-06T16:15:39.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57064.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57064.json index 5698fa01f25..d6c0420e56e 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57064.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:30.790", "lastModified": "2025-02-06T16:15:39.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57065.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57065.json index bb9b0d8aa0f..f90b8b1624c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57065.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:30.903", "lastModified": "2025-02-06T16:15:39.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57066.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57066.json index 55bf1715a7a..7b83d16d206 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57066.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.020", "lastModified": "2025-02-06T16:15:39.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57067.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57067.json index 690d9efd904..b44d26ee07a 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57067.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.143", "lastModified": "2025-02-06T16:15:39.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57068.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57068.json index 72509c4ed61..5f76aff60b3 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57068.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.250", "lastModified": "2025-02-06T16:15:40.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json index 85187f735bd..d2f604e5b05 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.353", "lastModified": "2025-02-06T17:15:19.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json index 6504d86838f..2802bef18cd 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.477", "lastModified": "2025-02-06T17:15:19.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57072.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57072.json index 7553af52af7..da5e5966032 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57072.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57072.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.603", "lastModified": "2025-02-06T16:15:40.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57074.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57074.json index 2accb3e005d..7a2c0f9c676 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57074.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.710", "lastModified": "2025-02-06T15:15:15.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57075.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57075.json index 428488b8919..b5036dd256e 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57075.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.803", "lastModified": "2025-02-06T15:15:15.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57076.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57076.json index 7322992f021..667c556b090 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57076.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57076.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.910", "lastModified": "2025-02-06T15:15:15.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57077.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57077.json index 960f78ad93a..5721aadd2a3 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57077.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57077.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.997", "lastModified": "2025-02-06T15:15:15.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57078.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57078.json index b0db1e8c96e..dde013c3b72 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57078.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57078.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.107", "lastModified": "2025-02-06T16:15:40.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57079.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57079.json index edeff47b21f..a10c347fab4 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57079.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.193", "lastModified": "2025-02-06T15:15:15.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json index 80fcd64689c..cb7a3d2b710 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.300", "lastModified": "2025-02-06T17:15:19.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json index 40cd540637b..d48a06ddfc3 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.397", "lastModified": "2025-02-06T15:15:16.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57082.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57082.json index a186f0f6864..aa6ca8163ea 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57082.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.500", "lastModified": "2025-02-06T15:15:16.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57084.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57084.json index 543bad31848..3b4337e93e0 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57084.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.613", "lastModified": "2025-02-07T16:15:37.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57085.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57085.json index a3895c6941b..bc398e32a81 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57085.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57085.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.700", "lastModified": "2025-02-06T15:15:16.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json index 4b73db6ad8a..f9df7e56588 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.810", "lastModified": "2025-02-06T17:15:20.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json index 873b7379739..87c8c105c4d 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.700", "lastModified": "2025-02-03T19:15:12.880", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57177.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57177.json index 39782319d02..e50884deb1c 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57177.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57177.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T20:15:41.903", "lastModified": "2025-02-10T22:15:36.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A host header injection vulnerability exists in the NPM package of perfood/couch-auth <= 0.21.2. By sending a specially crafted host header in the email change confirmation request, it is possible to trigger a SSTI which can be leveraged to run limited commands or leak server-side information" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de encabezado de host en el paquete NPM de perfood/couch-auth <= 0.21.2. Al enviar un encabezado de host especialmente manipulado en la solicitud de confirmaci\u00f3n de cambio de correo electr\u00f3nico, es posible activar una SSTI que se puede aprovechar para ejecutar comandos limitados o filtrar informaci\u00f3n del lado del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57178.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57178.json index 812a20532cf..a54098d1b1f 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57178.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57178.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T20:15:42.013", "lastModified": "2025-02-10T20:15:42.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An SQL injection vulnerability exists in Stock-Forecaster <=01-04-2020. By sending a specially crafted 'stock-symbol' parameter to the portofolio() endpoint, it is possible to trigger an SQL injection in the application. As a result, the attacker will be able the user data or manipulate the software behavior." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en Stock-Forecaster <=01-04-2020. Al enviar un par\u00e1metro 'stock-symbol' especialmente manipulado al endpoint portofolio(), es posible activar una inyecci\u00f3n SQL en la aplicaci\u00f3n. Como resultado, el atacante podr\u00e1 acceder a los datos del usuario o manipular el comportamiento del software." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57248.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57248.json index e8b1b3e3445..c8a03790a40 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57248.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57248.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files." + }, + { + "lang": "es", + "value": "Directory Traversal durante la carga de archivos en Gleamtech FileVista 9.2.0.0 permite a atacantes remotos lograr la ejecuci\u00f3n de c\u00f3digo, la divulgaci\u00f3n de informaci\u00f3n y la escalada de privilegios mediante la inyecci\u00f3n de payloads en solicitudes HTTP para manipular rutas de archivos, eludir controles de acceso y cargar archivos maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57278.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57278.json index 5973fbeb6d1..d1ea01ef197 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57278.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57278.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.433", "lastModified": "2025-02-07T23:15:14.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected Cross-Site Scripting (XSS) vulnerability exists in /webscan/sqlmap/index.html in QingScan <=v1.8.0. The vulnerability is caused by improper input sanitization of the query parameter, allowing an attacker to inject malicious JavaScript payloads. When a victim accesses a crafted URL containing the malicious input, the script executes in the victim's browser context." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en /webscan/sqlmap/index.html en QingScan <=v1.8.0. La vulnerabilidad se debe a una depuraci\u00f3n incorrecta de la entrada del par\u00e1metro de consulta, lo que permite a un atacante inyectar payloads de JavaScript maliciosos. Cuando una v\u00edctima accede a una URL manipulada que contiene la entrada maliciosa, el script se ejecuta en el contexto del navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57279.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57279.json index 89d682e3c4a..65effeb09b2 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57279.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57279.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.527", "lastModified": "2025-02-07T23:15:14.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected Cross-Site Scripting (XSS) vulnerability has been identified in the LDAP User Manager <= ce92321, specifically in the /setup/index.php endpoint via the returnto parameter. This vulnerability arises due to improper sanitization of user-supplied input, allowing an attacker to inject malicious JavaScript." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de tipo Cross-Site Scripting (XSS) reflejado en LDAP User Manager <= ce92321, espec\u00edficamente en el punto de conexi\u00f3n /setup/index.php a trav\u00e9s del par\u00e1metro returnto. Esta vulnerabilidad surge debido a una depuraci\u00f3n inadecuada de la entrada proporcionada por el usuario, lo que permite a un atacante inyectar c\u00f3digo JavaScript malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57357.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57357.json index 218a7cbf65c..6f1491e00b1 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57357.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57357.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.630", "lastModified": "2025-02-07T23:15:14.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in TPLINK TL-WPA 8630 TL-WPA8630(US)_V2_2.0.4 Build 20230427 allows a remote attacker to execute arbitrary code via function sub_4256CC, which allows command injection by injecting 'devpwd'." + }, + { + "lang": "es", + "value": "Un problema en TPLINK TL-WPA 8630 TL-WPA8630(US)_V2_2.0.4 Build 20230427 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n sub_4256CC, lo que permite la inyecci\u00f3n de comandos inyectando 'devpwd'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57378.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57378.json index 58830e0dcd9..3244a647e8d 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57378.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Wazuh SIEM version 4.8.2 is affected by a broken access control vulnerability. This issue allows the unauthorized creation of internal users without assigning any existing user role, potentially leading to privilege escalation or unauthorized access to sensitive resources." + }, + { + "lang": "es", + "value": "La versi\u00f3n 4.8.2 de Wazuh SIEM se ve afectada por una vulnerabilidad de control de acceso no autorizado. Este problema permite la creaci\u00f3n no autorizada de usuarios internos sin asignar ning\u00fan rol de usuario existente, lo que puede provocar una escalada de privilegios o un acceso no autorizado a recursos confidenciales." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57407.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57407.json index af50734122d..4dbf07858b5 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57407.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57407.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:33.160", "lastModified": "2025-02-10T18:15:33.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the component /userPicture of Timo v2.0.3 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /userPicture de Timo v2.0.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57408.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57408.json index 268e02b3a52..b85e2e89487 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57408.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57408.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:33.370", "lastModified": "2025-02-11T00:15:28.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the component /comm/upload of cool-admin-java v1.0 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /comm/upload de cool-admin-java v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57409.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57409.json index 9c824015f1d..998b71e950d 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57409.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57409.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:33.593", "lastModified": "2025-02-11T00:15:28.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Parameter List module of cool-admin-java v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the internet pictures field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en el m\u00f3dulo Lista de par\u00e1metros de cool-admin-java v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload especialmente manipulado en el campo de im\u00e1genes de Internet." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json index 813d2031cdf..33fe04e8f6d 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:20.357", "lastModified": "2025-02-06T17:15:20.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json index e185a5b628b..6ddfdb9eb08 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:20.527", "lastModified": "2025-02-06T22:15:39.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json index 6878b4026d6..5d1d9b7218a 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:20.627", "lastModified": "2025-02-06T22:15:39.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json index ff16eaeeb2c..5b4a676adee 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:20.717", "lastModified": "2025-02-06T22:15:39.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57520.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57520.json index 5be12165de6..f928425e205 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57520.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.923", "lastModified": "2025-02-06T16:15:40.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json index 180cd0fbf24..67b774ce617 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T19:15:19.547", "lastModified": "2025-02-06T20:15:40.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57598.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57598.json index 0ed680342c4..f12dc02ddf0 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57598.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57598.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:33.043", "lastModified": "2025-02-06T16:15:41.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json index 47762b74db1..ee9c9362b1f 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T17:15:20.820", "lastModified": "2025-02-06T21:15:21.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json index a8b2dba0b60..7080f0c7719 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to escalate privileges via the index.php file." + }, + { + "lang": "es", + "value": "Un problema en Alex Tselegidis EasyAppointments v.1.5.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del archivo index.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json index 81d7313f259..3ee8bede664 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.707", "lastModified": "2025-02-08T03:15:12.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 allows a remote attacker to obtain sensitive information via the getTotalData component." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json index c79135cdfbc..6ac2432bd7a 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T18:15:32.133", "lastModified": "2025-02-07T16:15:38.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json index aa6f1db75e3..95c46f225fa 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T19:15:19.643", "lastModified": "2025-02-07T16:15:38.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json index 160f405f67a..07aeecd74cc 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T20:15:40.227", "lastModified": "2025-02-07T16:15:38.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json index 462d0087404..314093eab3d 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T20:15:40.347", "lastModified": "2025-02-07T16:15:38.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57699.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57699.json index 4c0ba01da2b..3499b2291d7 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57699.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57699.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:33.183", "lastModified": "2025-02-06T16:15:41.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57707.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57707.json index 8f8eb385190..6e4933fd58e 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57707.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57707.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in DataEase v1 allows an attacker to execute arbitrary code via the user account and password components." + }, + { + "lang": "es", + "value": "Un problema en DataEase v1 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de los componentes de cuenta de usuario y contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json index 029835e5518..53176c20774 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:24.710", "lastModified": "2025-01-19T12:15:24.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57906.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57906.json index ac35ccce32e..6ce85d46063 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57906.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:24.800", "lastModified": "2025-02-02T11:15:12.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57907.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57907.json index b85dc92e120..0ad98a6e1bd 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57907.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:24.897", "lastModified": "2025-02-02T11:15:12.887", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57908.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57908.json index 1d688afc83b..a0c1625da28 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57908.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57908.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:24.990", "lastModified": "2025-02-02T11:15:13.003", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json index 8379af50902..773aa327720 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.083", "lastModified": "2025-01-19T12:15:25.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57912.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57912.json index 38d600cd8cf..6a0551aa2e8 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57912.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.380", "lastModified": "2025-02-02T11:15:13.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json index c2161f1e516..a649dd12992 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.763", "lastModified": "2025-01-19T12:15:25.763", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json index e476cfe1cf5..8e2808499c1 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:26.053", "lastModified": "2025-01-19T12:15:26.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57950.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57950.json index f15966d914f..8f06c299550 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57950.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57950.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:37.913", "lastModified": "2025-02-10T16:15:37.913", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Initialize denominator defaults to 1\n\n[WHAT & HOW]\nVariables, used as denominators and maybe not assigned to other values,\nshould be initialized to non-zero to avoid DIVIDE_BY_ZERO, as reported\nby Coverity.\n\n(cherry picked from commit e2c4c6c10542ccfe4a0830bb6c9fd5b177b7bbb7)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: inicializar el denominador por defecto es 1 [QU\u00c9 Y C\u00d3MO] Las variables, utilizadas como denominadores y que tal vez no se asignen a otros valores, deben inicializarse con valores distintos de cero para evitar DIVIDE_BY_ZERO, como lo inform\u00f3 Coverity. (seleccionado de el commit e2c4c6c10542ccfe4a0830bb6c9fd5b177b7bbb7)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57954.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57954.json index cc5da65477e..fb98a716ef2 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57954.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:39.467", "lastModified": "2025-02-06T13:15:39.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57955.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57955.json index 395089ac438..06732c340f2 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57955.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57955.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:39.590", "lastModified": "2025-02-06T13:15:39.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57956.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57956.json index 9f82d00871c..e1246c55fb3 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57956.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57956.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:39.723", "lastModified": "2025-02-06T13:15:39.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57957.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57957.json index 783892772a0..7e4708d2f47 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57957.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57957.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:39.867", "lastModified": "2025-02-06T13:15:39.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57958.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57958.json index 738487c0be2..50263cb4cc3 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57958.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57958.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:40.000", "lastModified": "2025-02-06T13:15:40.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57959.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57959.json index af8a26e4be2..c75ffdb776e 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57959.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57959.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:40.133", "lastModified": "2025-02-06T13:15:40.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57960.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57960.json index 275e92045ec..e9f1dde603f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57960.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:40.270", "lastModified": "2025-02-06T13:15:40.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57961.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57961.json index 3e0582ab8c3..b5241acc922 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57961.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57961.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:40.417", "lastModified": "2025-02-06T13:15:40.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57962.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57962.json index 5fc6611a030..6193ba97dc1 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57962.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57962.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-02-06T13:15:40.600", "lastModified": "2025-02-06T13:15:40.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json index b4bac644b2d..6afda979a44 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T18:15:21.977", "lastModified": "2025-02-12T18:15:21.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Reporting versions prior to 2025 Q1 (19.0.25.211), information disclosure is possible by a local threat actor through an absolute path vulnerability." + }, + { + "lang": "es", + "value": "En las versiones de Progress\u00ae Telerik\u00ae Reporting anteriores al primer trimestre de 2025 (19.0.25.211), la divulgaci\u00f3n de informaci\u00f3n es posible por parte de un actor de amenazas local a trav\u00e9s de una vulnerabilidad de ruta absoluta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6356.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6356.json index 5edfd80b9b0..77f05111c52 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6356.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T10:15:22.523", "lastModified": "2025-02-05T10:15:22.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json index 27e700e0d43..1ea04a24c07 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-07-27T09:15:02.123", "lastModified": "2024-11-21T09:49:41.607", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7102.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7102.json index af6a2160631..2d187d15707 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7102.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7102.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-13T01:15:24.980", "lastModified": "2025-02-13T01:15:24.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.0 which allows an attacker to trigger a pipeline as another user under certain circumstances." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.4 hasta la 17.5.0, que permite a un atacante activar una canalizaci\u00f3n como otro usuario en determinadas circunstancias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8125.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8125.json index 630b4507f5c..f998ed0cf05 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8125.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2025-02-04T22:15:41.573", "lastModified": "2025-02-04T22:15:41.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8266.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8266.json index 8470d2276cc..dba71b1faf3 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8266.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8266.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-13T01:15:25.137", "lastModified": "2025-02-13T01:15:25.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.1 prior to 17.6.0, which allows an attacker with maintainer role to trigger a pipeline as project owner under certain circumstances." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.1 anterior a la 17.6.0, que permite a un atacante con el rol fabricante activar una canalizaci\u00f3n como propietario del proyecto en determinadas circunstancias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8550.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8550.json index 350d95e7bc6..77504027f35 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8550.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@huntr.dev", "published": "2025-02-10T19:15:39.440", "lastModified": "2025-02-11T00:15:29.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Local File Inclusion (LFI) vulnerability exists in the /load-workflow endpoint of modelscope/agentscope version v0.0.4. This vulnerability allows an attacker to read arbitrary files from the server, including sensitive files such as API keys, by manipulating the filename parameter. The issue arises due to improper sanitization of user input passed to the os.path.join function, which can be exploited to access files outside the intended directory." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en el endpoint /load-workflow de modelscope/agentscope versi\u00f3n v0.0.4. Esta vulnerabilidad permite a un atacante leer archivos arbitrarios del servidor, incluidos archivos confidenciales como claves de API, mediante la manipulaci\u00f3n del par\u00e1metro filename. El problema surge debido a una depuraci\u00f3n inadecuada de la entrada del usuario que se pasa a la funci\u00f3n os.path.join, que se puede explotar para acceder a archivos fuera del directorio previsto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8684.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8684.json index c4a9759d98c..efe9d279993 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8684.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8684.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-10T13:15:26.103", "lastModified": "2025-02-10T13:15:26.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the \u2018php/dal.php\u2019 endpoint, in the \u2018arrSaveConfig\u2019 parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en Revolution Pi versi\u00f3n 2022-07-28-revpi-buster de KUNBUS GmbH. Esta vulnerabilidad podr\u00eda permitir que un atacante autenticado ejecute comandos del sistema operativo en el dispositivo a trav\u00e9s del endpoint 'php/dal.php', en el par\u00e1metro 'arrSaveConfig'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8685.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8685.json index a24e8214328..9e69b4228ea 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8685.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8685.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-10T13:15:26.270", "lastModified": "2025-02-10T13:15:26.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path-Traversal vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to list device directories via the \u2018/pictory/php/getFileList.php\u2019 endpoint in the \u2018dir\u2019 parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path-Traversal en Revolution Pi versi\u00f3n 2022-07-28-revpi-buster de KUNBUS GmbH. Esta vulnerabilidad podr\u00eda permitir que un atacante autenticado enumere los directorios de dispositivos a trav\u00e9s del punto de conexi\u00f3n '/pictory/php/getFileList.php' en el par\u00e1metro 'dir'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json index d0176f2c5cd..f4ce064e0d4 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.077", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json index 22295b5ee8f..71e559ba024 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.343", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9097.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9097.json index c3c3f2a52fb..3247ed349b9 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9097.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-02-05T13:15:23.237", "lastModified": "2025-02-05T13:15:23.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json index 6b538aa544c..b28aa8f601d 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T11:15:17.567", "lastModified": "2025-02-05T20:15:45.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9661.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9661.json index 0829a892d13..8f7c6957c4d 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9661.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9661.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-07T16:15:39.263", "lastModified": "2025-02-07T16:15:39.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP All Import Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.7. This is due to missing nonce validation on the delete_and_edit function. This makes it possible for unauthenticated attackers to delete imported content (posts, comments, users, etc.) via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP All Import Pro para WordPress es vulnerable a cross-site request forgery en todas las versiones hasta la 4.9.7 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n delete_and_edit. Esto hace posible que atacantes no autenticados eliminen contenido importado (publicaciones, comentarios, usuarios, etc.) a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json index 3172f30ccf9..58ba8eec6fa 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T16:15:42.563", "lastModified": "2025-02-12T16:15:42.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An external service interaction vulnerability in GitLab EE affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send requests from the GitLab server to unintended services." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de interacci\u00f3n de servicio externo en GitLab EE que afecta a todas las versiones desde 15.11 anterior a 17.6.5, 17.7 anterior a 17.7.4 y 17.8 anterior a 17.8.2 permite a un atacante enviar solicitudes desde el servidor de GitLab a servicios no deseados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json index b81bef0a645..5c92e0fa024 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:09.650", "lastModified": "2025-02-11T06:15:19.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Application Server Java does not sufficiently handle user input, resulting in a stored cross-site scripting vulnerability. The application allows attackers with basic user privileges to store a Javascript payload on the server, which could be later executed in the victim's web browser. With this the attacker might be able to read or modify information associated with the vulnerable web page." + }, + { + "lang": "es", + "value": "El servidor de aplicaciones Java de SAP NetWeaver no gestiona adecuadamente la entrada del usuario, lo que da lugar a una vulnerabilidad Cross-Site Scripting Almacenado. La aplicaci\u00f3n permite a los atacantes con privilegios de usuario b\u00e1sicos almacenar un payload Javascript en el servidor, que podr\u00eda ejecutarse posteriormente en el navegador web de la v\u00edctima. Con esto, el atacante podr\u00eda leer o modificar informaci\u00f3n asociada a la p\u00e1gina web vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json index a266aceec84..28f5d06cbcb 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:09.803", "lastModified": "2025-02-11T15:15:19.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability." + }, + { + "lang": "es", + "value": "En determinadas condiciones, la consola de administraci\u00f3n central de la plataforma SAP BusinessObjects Business Intelligence permite a un atacante con derechos de administrador generar o recuperar una contrase\u00f1a secreta, lo que le permite hacerse pasar por cualquier usuario del sistema. Esto tiene un gran impacto en la confidencialidad y la integridad, pero no en la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json index 3763eed46cd..5d0843ff700 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + }, + { + "lang": "es", + "value": "Una omisi\u00f3n de autenticaci\u00f3n en el software PAN-OS de Palo Alto Networks permite que un atacante no autenticado con acceso a la red a la interfaz web de administraci\u00f3n omita la autenticaci\u00f3n que de otro modo requerir\u00eda la interfaz web de administraci\u00f3n de PAN-OS e invoque ciertos scripts PHP. Si bien la invocaci\u00f3n de estos scripts PHP no permite la ejecuci\u00f3n remota de c\u00f3digo, puede afectar negativamente la integridad y la confidencialidad de PAN-OS. Puede reducir en gran medida el riesgo de este problema al restringir el acceso a la interfaz web de administraci\u00f3n solo a direcciones IP internas confiables de acuerdo con nuestras pautas de implementaci\u00f3n de mejores pr\u00e1cticas recomendadas https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . Este problema no afecta al software Cloud NGFW ni a Prisma Access." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json index a284a0c504c..f6f47169fd7 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the \u201cnobody\u201d user; this includes limited logs and configuration files but does not include system files.\n\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de eliminaci\u00f3n de archivos no autenticados en la interfaz web de administraci\u00f3n PAN-OS de Palo Alto Networks permite que un atacante no autenticado con acceso de red a la interfaz web de administraci\u00f3n elimine determinados archivos como usuario \u201cnobody\u201d; esto incluye registros y archivos de configuraci\u00f3n limitados, pero no incluye archivos del sistema. Puede reducir en gran medida el riesgo de este problema al restringir el acceso a la interfaz web de administraci\u00f3n solo a direcciones IP internas de confianza de acuerdo con nuestras pautas de implementaci\u00f3n de mejores pr\u00e1cticas recomendadas https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431. Este problema no afecta al software Cloud NGFW ni a Prisma Access." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json index f71d7857d8c..b9aaae53429 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the \u201c__openconfig\u201d user (which has the Device Administrator role) on the firewall.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 ." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en el complemento OpenConfig de PAN-OS de Palo Alto Networks permite que un administrador autenticado pueda realizar solicitudes gNMI a la interfaz web de administraci\u00f3n de PAN-OS para eludir las restricciones del sistema y ejecutar comandos arbitrarios. Los comandos se ejecutan como el usuario \u201c__openconfig\u201d (que tiene el rol de administrador del dispositivo) en el firewall. Puede reducir en gran medida el riesgo de este problema al restringir el acceso a la interfaz web de administraci\u00f3n solo a direcciones IP internas de confianza de acuerdo con nuestras pautas de implementaci\u00f3n de mejores pr\u00e1cticas recomendadas https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json index 77c1ce55b7f..38f7ca56d92 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the \u201cnobody\u201d user.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\n\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura de archivos autenticados en el software PAN-OS de Palo Alto Networks permite que un atacante autenticado con acceso de red a la interfaz web de administraci\u00f3n lea archivos en el sistema de archivos PAN-OS que son legibles por el usuario \u201cnobody\u201d. Puede reducir en gran medida el riesgo de este problema al restringir el acceso a la interfaz web de administraci\u00f3n solo a direcciones IP internas de confianza de acuerdo con nuestras pautas de implementaci\u00f3n de mejores pr\u00e1cticas recomendadas https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431. Este problema no afecta al software Cloud NGFW ni a Prisma Access." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json index 93befe1680f..013641f4983 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server." + }, + { + "lang": "es", + "value": "Un problema con el mecanismo de aislamiento de red de la m\u00e1quina virtual Broker Cortex XDR de Palo Alto Networks permite a los atacantes acceder sin autorizaci\u00f3n a los contenedores Docker desde la red host utilizada por la m\u00e1quina virtual Broker. Esto puede permitir el acceso para leer archivos enviados para an\u00e1lisis y registros transmitidos por el agente Cortex XDR al servidor Cortex XDR." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json index ff5a06d39aa..2764e9718fe 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T21:15:21.923", "lastModified": "2025-02-06T21:15:21.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0167.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0167.json index 76b8d079643..3ab06e69420 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0167.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-02-05T10:15:22.710", "lastModified": "2025-02-06T15:15:16.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0180.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0180.json index 7f329b7ffa2..ad373a66da2 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0180.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0180.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T07:15:29.277", "lastModified": "2025-02-11T07:15:29.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator." + }, + { + "lang": "es", + "value": "El complemento WP Foodbakery para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 3.3 y incluida. Esto se debe a que el complemento no restringe adecuadamente qu\u00e9 metadatos de usuario se pueden actualizar durante el registro del perfil. Esto hace posible que atacantes no autenticados se registren en el sitio como administradores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0181.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0181.json index b0a77cd82ec..8b45a702ada 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0181.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0181.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T07:15:29.827", "lastModified": "2025-02-11T07:15:29.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.7. This is due to the plugin not properly validating a user's identity prior to setting the current user and their authentication cookie. This makes it possible for unauthenticated attackers to gain access to a target user's (e.g. administrators) account." + }, + { + "lang": "es", + "value": "El complemento WP Foodbakery para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 4.7 y incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de configurar el usuario actual y su cookie de autenticaci\u00f3n. Esto hace posible que atacantes no autenticados obtengan acceso a la cuenta de un usuario objetivo (por ejemplo, administradores)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json index ce6693918e1..04c67a06938 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-08T22:15:28.477", "lastModified": "2025-02-08T22:15:28.477", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username." + }, + { + "lang": "es", + "value": "El complemento WP Directorybox Manager para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 2.5 incluida. Esto se debe a una autenticaci\u00f3n incorrecta en la funci\u00f3n 'wp_dp_enquiry_agent_contact_form_submit_callback'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al nombre de usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0327.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0327.json index e34aa3ac7c4..491b60b9212 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0327.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0327.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T07:15:10.570", "lastModified": "2025-02-13T07:15:10.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit\ntrail data and the other acting as server managing client request) that could cause a loss of Confidentiality,\nIntegrity and Availability of engineering workstation when an attacker with standard privilege modifies the\nexecutable path of the windows services. To be exploited, services need to be restarted." + }, + { + "lang": "es", + "value": "CWE-269: Existe una vulnerabilidad de administraci\u00f3n inadecuada de privilegios para dos servicios (uno de los cuales administra los datos de registro de auditor\u00eda y el otro act\u00faa como servidor que administra las solicitudes de los clientes) que podr\u00eda provocar una p\u00e9rdida de confidencialidad, integridad y disponibilidad de la estaci\u00f3n de trabajo de ingenier\u00eda cuando un atacante con privilegios est\u00e1ndar modifica la ruta ejecutable de los servicios de Windows. Para explotarla, es necesario reiniciar los servicios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json index 147b0ffc018..19b6ad06f5d 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T16:15:42.703", "lastModified": "2025-02-12T16:15:42.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae UI for WinForms, versions prior to 2025 Q1 (2025.1.211), using the improper limitation of a target path can lead to decompressing an archive's content into a restricted directory." + }, + { + "lang": "es", + "value": "En Progress\u00ae Telerik\u00ae UI for WinForms, versiones anteriores a 2025 Q1 (2025.1.211), el uso de una limitaci\u00f3n incorrecta de una ruta de destino puede provocar la descompresi\u00f3n del contenido de un archivo en un directorio restringido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json index 0c947e3a4b4..e35ea4a54a2 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-02-04T18:15:35.067", "lastModified": "2025-02-04T18:15:35.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json index 82ed2ea67b3..046a45045f3 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:31.213", "lastModified": "2025-02-01T06:15:31.213", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json index e889c1cfa67..6b5471a6e9c 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:31.367", "lastModified": "2025-02-01T06:15:31.367", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json index 0328d6d53cb..2f3619ef6ad 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T15:15:15.477", "lastModified": "2025-02-12T15:15:15.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad XSS en GitLab CE/EE que afecta a todas las versiones desde la 13.3 anterior a la 17.6.5, la 17.7 anterior a la 17.7.4 y la 17.8 anterior a la 17.8.2 que permite a un atacante ejecutar acciones no autorizadas a trav\u00e9s de una p\u00e1gina de cambios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0413.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0413.json index 5ae096d152b..18b859a4fd1 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0413.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-05T00:15:28.173", "lastModified": "2025-02-05T00:15:28.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json index 553531137ca..f36b6db2b22 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema de seguridad en Kubernetes donde una gran cantidad de solicitudes de puntos de control de contenedor realizadas al endpoint HTTP de solo lectura de kubelet no autenticado pueden provocar una denegaci\u00f3n de servicio de nodo al llenar el disco del nodo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0444.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0444.json index 299372b6218..abc8a8a0584 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0444.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-04T19:15:32.237", "lastModified": "2025-02-07T22:15:13.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0445.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0445.json index 9e33bf0b5a8..87823aeb7de 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0445.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-04T19:15:32.353", "lastModified": "2025-02-07T22:15:13.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0451.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0451.json index 3cf917fcc28..3e0e70e0efa 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0451.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0451.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-04T19:15:32.477", "lastModified": "2025-02-07T22:15:14.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json index ac3c684358e..3bef6234139 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:14.360", "lastModified": "2025-02-12T15:15:15.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Rise Blocks \u2013 A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rise Blocks \u2013 A Complete Gutenberg Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro titleTag en todas las versiones hasta la 3.6 incluida, debido a un escape de entrada desinfecci\u00f3n y de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json index 581d5412de3..851fd7f750a 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json @@ -3,7 +3,7 @@ "sourceIdentifier": "patrick@puiterwijk.org", "published": "2025-02-04T20:15:49.763", "lastModified": "2025-02-04T20:15:49.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0511.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0511.json index 272f8f58c4f..3cefcbe90d1 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0511.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0511.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:29.210", "lastModified": "2025-02-12T12:15:29.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Welcart e-Commerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018name\u2019 parameter in all versions up to, and including, 2.11.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Welcart e-Commerce para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'nombre' en todas las versiones hasta 2.11.9 incluida, debido a un escape de entrada desinfecci\u00f3n y de salida insuficiente. Esto hace posible que atacantes no autenticados inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0513.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0513.json index 2d31d928d97..4aa9af31e97 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0513.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0513.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T11:15:15.817", "lastModified": "2025-02-11T15:15:19.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Server, los mensajes de error se gestionaban de forma insegura en la p\u00e1gina de error. Si un adversario pudiera controlar cualquier parte del mensaje de error, podr\u00eda insertar c\u00f3digo que podr\u00eda afectar al usuario que visualiza el mensaje de error." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json index 091b5c321f9..1740e30fef9 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T16:15:42.883", "lastModified": "2025-02-12T16:15:42.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Authorization in GitLab CE/EE affecting all versions from 17.7 prior to 17.7.4, 17.8 prior to 17.8.2 allow users with limited permissions to perform unauthorized actions on critical project data." + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n incorrecta en GitLab CE/EE que afecta a todas las versiones desde la 17.7 anterior a la 17.7.4 y desde la 17.8 anterior a la 17.8.2 permite que los usuarios con permisos limitados realicen acciones no autorizadas en datos cr\u00edticos del proyecto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0522.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0522.json index 0ed06e5f0e4..a14da1b1897 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0522.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-06T06:15:30.357", "lastModified": "2025-02-06T15:15:17.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json index aafedbfc7bf..db6bcd68e70 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T10:15:09.490", "lastModified": "2025-02-11T15:15:19.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Server, la funci\u00f3n de importaci\u00f3n de vista previa podr\u00eda utilizarse para identificar la existencia de un archivo de destino. Esto podr\u00eda proporcionar a un adversario informaci\u00f3n que podr\u00eda ayudar a realizar futuros ataques contra el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json index f15c0b49db9..d23996430a7 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T11:15:15.923", "lastModified": "2025-02-11T15:15:19.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Deploy, era posible cargar archivos en ubicaciones inesperadas en el host mediante un endpoint de API. El campo carec\u00eda de validaci\u00f3n, lo que podr\u00eda dar lugar a formas de eludir los flujos de trabajo esperados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json index 060aee9dd8f..28d5117c509 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@progress.com", "published": "2025-02-12T16:15:43.030", "lastModified": "2025-02-12T16:15:43.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing." + }, + { + "lang": "es", + "value": "En Progress\u00ae Telerik\u00ae Report Server, versiones anteriores a 2025 Q1 (11.0.25.211) cuando se utiliza la implementaci\u00f3n .NET framework m\u00e1s antigua, la comunicaci\u00f3n de informaci\u00f3n no confidencial entre el proceso del agente de servicio y el proceso del host de la aplicaci\u00f3n se produce a trav\u00e9s de un t\u00fanel no cifrado, que puede estar sujeto al rastreo del tr\u00e1fico de la red local." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json index 6541db56e4b..0097290a19e 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:13.587", "lastModified": "2025-01-30T21:15:13.587", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json index 89d6a46ee96..6b75daee851 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:13.710", "lastModified": "2025-01-30T21:15:13.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json index 4c2170fc1fc..3005c12bbb2 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:13.830", "lastModified": "2025-01-30T21:15:13.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json index 8f034fc15fc..5b1b384b8d6 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:13.960", "lastModified": "2025-01-30T21:15:13.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json index 81ca19671ce..62ab273ce19 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:14.093", "lastModified": "2025-01-30T21:15:14.093", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json index 83721abb31d..21bdfbe9a2a 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:14.227", "lastModified": "2025-01-30T21:15:14.227", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json index 663746ac989..32bdcc837c1 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-30T21:15:14.357", "lastModified": "2025-01-30T21:15:14.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0588.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0588.json index 643e9224527..9a28834b9e1 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0588.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0588.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T12:15:34.200", "lastModified": "2025-02-11T15:15:19.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Server, un usuario con acceso suficiente pod\u00eda configurar encabezados personalizados en todas las respuestas del servidor. Al enviar un encabezado de referencia especialmente dise\u00f1ado, el usuario pod\u00eda asegurarse de que todas las respuestas posteriores del servidor devolvieran errores 500, lo que dejar\u00eda el sitio pr\u00e1cticamente inutilizable. El usuario pod\u00eda configurar y desconfigurar posteriormente el encabezado de referencia para controlar el estado de denegaci\u00f3n de servicio con un token CSRF v\u00e1lido, mientras que no se pod\u00edan generar nuevos tokens CSRF." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0589.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0589.json index 2b72d8f723f..6003b3d49df 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0589.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0589.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T09:15:09.387", "lastModified": "2025-02-11T16:15:49.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Deploy en las que los clientes utilizan Active Directory para la autenticaci\u00f3n, era posible que un usuario no autenticado realizara una solicitud de API contra dos endpoints que recuperar\u00edan algunos datos del Active Directory asociado. Las solicitudes, cuando se elaboraban correctamente, devolver\u00edan informaci\u00f3n espec\u00edfica de los perfiles de usuario (direcci\u00f3n de correo electr\u00f3nico/UPN y nombre para mostrar) de un endpoint e informaci\u00f3n de grupo (ID de grupo y nombre para mostrar) del otro. Esta vulnerabilidad no expone los datos dentro del producto Octopus Server en s\u00ed." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0630.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0630.json index 3ec0c695665..8414e74589c 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0630.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-04T20:15:49.940", "lastModified": "2025-02-04T20:15:49.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0661.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0661.json index 5d1bd324c2b..1cd62a3f61c 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0661.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0661.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T07:15:10.777", "lastModified": "2025-02-13T07:15:10.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post." + }, + { + "lang": "es", + "value": "El complemento DethemeKit For Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 2.36 incluida, a trav\u00e9s de la funci\u00f3n duplicate_post() debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden duplicar. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones protegidas con contrase\u00f1a, privadas, en borrador o programadas a las que no deber\u00edan tener acceso duplicando la publicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json index 3255d8c5c5c..fe3997fcb77 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json @@ -3,7 +3,7 @@ "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-02-05T10:15:22.857", "lastModified": "2025-02-05T20:15:45.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0674.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0674.json index 798fba26863..4dc75376000 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0674.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0674.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-07T00:15:27.017", "lastModified": "2025-02-07T00:15:27.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Elber products are affected by an authentication bypass \nvulnerability which allows unauthorized access to the password \nmanagement functionality. Attackers can exploit this issue by \nmanipulating the endpoint to overwrite any user's password within the \nsystem. This grants them unauthorized administrative access to protected\n areas of the application, compromising the device's system security." + }, + { + "lang": "es", + "value": "Varios productos de Elber se ven afectados por una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que permite el acceso no autorizado a la funci\u00f3n de gesti\u00f3n de contrase\u00f1as. Los atacantes pueden aprovechar este problema manipulando el endpoint para sobrescribir la contrase\u00f1a de cualquier usuario dentro del sistema. Esto les otorga acceso administrativo no autorizado a \u00e1reas protegidas de la aplicaci\u00f3n, lo que compromete la seguridad del sistema del dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0675.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0675.json index fcbc42d34a8..57fc5be06b8 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0675.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0675.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-07T00:15:28.030", "lastModified": "2025-02-07T00:15:28.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Elber products suffer from an unauthenticated device configuration and client-side hidden functionality disclosure." + }, + { + "lang": "es", + "value": "Varios productos Elber sufren una configuraci\u00f3n de dispositivo no autenticada y una divulgaci\u00f3n de funcionalidad oculta del lado del cliente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0692.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0692.json index 916d4926fbf..972b9dcbfc2 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0692.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0692.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:21.353", "lastModified": "2025-02-13T06:15:21.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Video Management System WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Simple Video Management System de WordPress hasta la versi\u00f3n 1.0.4 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con altos privilegios como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json index d2a0e6dccf1..ea1eecd955a 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json @@ -3,7 +3,7 @@ "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-02-05T10:15:22.980", "lastModified": "2025-02-06T19:15:19.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json index dacaf7aa961..d380b44dbdf 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T01:15:09.580", "lastModified": "2025-02-06T01:15:09.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0808.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0808.json index 477e8e999fd..0c29b49b79c 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0808.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0808.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T04:15:09.950", "lastModified": "2025-02-12T04:15:09.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Houzez Property Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.21. This is due to missing or incorrect nonce validation on the \"deleteexport\" action. This makes it possible for unauthenticated attackers to delete property feed exports via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Houzez Property Feed para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.4.21 y incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la acci\u00f3n \"deleteexport\". Esto hace posible que atacantes no autenticados eliminen las exportaciones del feed de propiedades a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0814.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0814.json index a8c7f6edc81..f70b352fb6d 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0814.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T07:15:10.973", "lastModified": "2025-02-13T07:15:10.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the network\nservices running on the product when malicious IEC61850-MMS packets are sent to the device. The core\nfunctionality of the breaker remains intact during the attack." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar una denegaci\u00f3n de servicio de los servicios de red que se ejecutan en el producto cuando se env\u00edan paquetes IEC61850-MMS maliciosos al dispositivo. La funcionalidad principal del disyuntor permanece intacta durante el ataque." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0815.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0815.json index 036b5edc7b0..848098e95bc 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0815.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0815.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T07:15:11.160", "lastModified": "2025-02-13T07:15:11.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the\nproduct when malicious ICMPV6 packets are sent to the device." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la denegaci\u00f3n de servicio del producto cuando se env\u00edan paquetes ICMPV6 maliciosos al dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0816.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0816.json index 0995efe9fdc..515babf068a 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0816.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0816.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T07:15:11.353", "lastModified": "2025-02-13T07:15:11.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the\nproduct when malicious IPV6 packets are sent to the device." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar una denegaci\u00f3n de servicio del producto cuando se env\u00edan paquetes IPV6 maliciosos al dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0837.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0837.json index 2a147dbe918..ec6b212df2c 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0837.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0837.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:14.623", "lastModified": "2025-02-13T05:15:14.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Puzzles theme for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 4.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El tema Puzzles para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de c\u00f3digos cortos en versiones hasta 4.2.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0858.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0858.json index 84b7321974b..68a4c13f7ea 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0858.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0858.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hp-security-alert@hp.com", "published": "2025-02-05T15:15:21.580", "lastModified": "2025-02-05T15:15:21.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json index 0fc4fe54a49..9ce76ca0128 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-06T10:15:08.340", "lastModified": "2025-02-06T10:15:08.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0862.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0862.json index 28014beaacf..b3e54ce8cdc 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0862.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0862.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T11:15:16.043", "lastModified": "2025-02-11T11:15:16.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SuperSaaS \u2013 online appointment scheduling plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018after\u2019 parameter in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is limited to Chromium-based browsers (e.g. Chrome, Edge, Brave)." + }, + { + "lang": "es", + "value": "El complemento SuperSaaS \u2013 online appointment scheduling para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \"after\" en todas las versiones hasta la 2.1.12 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto se limita a los navegadores basados en Chromium (por ejemplo, Chrome, Edge, Brave)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0896.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0896.json index 654d7d3c483..52de3e0579d 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0896.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T02:15:29.470", "lastModified": "2025-02-13T02:15:29.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker." + }, + { + "lang": "es", + "value": "Los servidores Orthanc anteriores a la versi\u00f3n 1.5.8 no habilitan la autenticaci\u00f3n b\u00e1sica de forma predeterminada cuando est\u00e1 habilitado el acceso remoto. Esto podr\u00eda provocar un acceso no autorizado por parte de un atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json index a7b4a401ac7..38bd5d8b038 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-31T20:15:32.893", "lastModified": "2025-01-31T20:15:32.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0937.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0937.json index 41dc5902376..ac5e01e3e04 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0937.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0937.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@hashicorp.com", "published": "2025-02-12T19:15:09.687", "lastModified": "2025-02-12T19:15:09.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nomad Community and Nomad Enterprise (\"Nomad\") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces." + }, + { + "lang": "es", + "value": "El flujo de eventos de Nomad Community y Nomad Enterprise (\"Nomad\") configurado con un espacio de nombres comod\u00edn puede omitir la pol\u00edtica de ACL y permitir lecturas en otros espacios de nombres." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0939.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0939.json index 154cb6e63a3..ab16648b16e 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0939.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0939.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T07:15:08.097", "lastModified": "2025-02-01T07:15:08.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0960.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0960.json index 43d600640af..381c1d758f8 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0960.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-04T20:15:50.103", "lastModified": "2025-02-04T20:15:50.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0982.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0982.json index 2de815192d0..cd52b30042e 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0982.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0982.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@google.com", "published": "2025-02-06T12:15:27.267", "lastModified": "2025-02-06T12:15:27.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve-coordination@google.com", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1002.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1002.json index f61f0e0b0b3..3b0dc6a4e48 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1002.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1002.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-10T21:15:21.830", "lastModified": "2025-02-10T21:15:21.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MicroDicom DICOM Viewer\u00a0version 2024.03\n\nfails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user." + }, + { + "lang": "es", + "value": "La versi\u00f3n 2024.03 de MicroDicom DICOM Viewer no verifica adecuadamente el certificado del servidor de actualizaci\u00f3n, lo que podr\u00eda permitir a los atacantes en una posici\u00f3n privilegiada de la red alterar el tr\u00e1fico de la red y llevar a cabo un ataque de tipo m\u00e1quina intermedia (MITM). Esto permite a los atacantes modificar la respuesta del servidor y entregar una actualizaci\u00f3n maliciosa al usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1004.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1004.json index 648c6d785df..0f113e8b127 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1004.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1004.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hp-security-alert@hp.com", "published": "2025-02-06T21:15:22.247", "lastModified": "2025-02-06T21:15:22.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json index fa43cfd479a..5855a657e00 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2025-02-05T05:15:10.337", "lastModified": "2025-02-05T20:15:45.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json index 2a1126af248..d8739e10208 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2025-02-05T05:15:10.517", "lastModified": "2025-02-05T20:15:45.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1026.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1026.json index c0ec84ab698..dcc943952ea 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1026.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1026.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2025-02-05T05:15:10.687", "lastModified": "2025-02-05T05:15:10.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1028.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1028.json index 11eff6a3493..a535c8fddc7 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1028.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-05T04:15:06.543", "lastModified": "2025-02-05T04:15:06.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json index 43a9d47aa16..f7035f9ca3d 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T15:15:16.230", "lastModified": "2025-02-12T15:15:16.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insecure direct object reference vulnerability in GitLab EE affecting all versions from 15.7 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to view repositories in an unauthorized way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de referencia directa a objetos insegura en GitLab EE que afecta a todas las versiones desde la 15.7 anterior a la 17.6.5, la 17.7 anterior a la 17.7.4 y la 17.8 anterior a la 17.8.2 permite a un atacante ver repositorios de forma no autorizada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1044.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1044.json index 2107008a4ff..8e7771bf6bb 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1044.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1044.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.913", "lastModified": "2025-02-11T20:15:35.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the web service, which listens on TCP port 443 by default. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25336." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Logsign Unified SecOps Platform. Esta vulnerabilidad permite a atacantes remotos omitir la autenticaci\u00f3n en las instalaciones afectadas de Logsign Unified SecOps Platform. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio web, que escucha en el puerto TCP 443 de manera predeterminada. El problema es el resultado de la falta de una implementaci\u00f3n adecuada del algoritmo de autenticaci\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n en el sistema. Era ZDI-CAN-25336." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1052.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1052.json index c6cdf412097..2028624ef49 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1052.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1052.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:36.070", "lastModified": "2025-02-11T20:15:36.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mintty. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of sixel images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23382." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en mont\u00f3n en el an\u00e1lisis de im\u00e1genes de Mintty Sixel. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Mintty. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de im\u00e1genes de Sixel. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en mont\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Era ZDI-CAN-23382." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1058.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1058.json index 856ee491709..4a552045efb 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1058.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1058.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T06:15:21.480", "lastModified": "2025-02-13T06:15:21.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device\ninoperable when malicious firmware is downloaded." + }, + { + "lang": "es", + "value": "CWE-494: Existe una vulnerabilidad de descarga de c\u00f3digo sin verificaci\u00f3n de integridad que podr\u00eda dejar el dispositivo inoperativo cuando se descarga firmware malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1059.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1059.json index 0c542c1766e..058c0bc2ecd 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1059.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1059.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T06:15:21.680", "lastModified": "2025-02-13T06:15:21.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could\ncause communications to stop when malicious packets are sent to the webserver of the device." + }, + { + "lang": "es", + "value": "CWE-770: Existe una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n que podr\u00eda provocar que las comunicaciones se detengan cuando se env\u00edan paquetes maliciosos al servidor web del dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1060.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1060.json index f421aec4bf4..8653cdbb1fd 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1060.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1060.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T06:15:22.213", "lastModified": "2025-02-13T06:15:22.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure\nof data when network traffic is being sniffed by an attacker." + }, + { + "lang": "es", + "value": "CWE-319: Existe una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n confidencial en texto plano que podr\u00eda provocar la exposici\u00f3n de datos cuando un atacante esp\u00eda el tr\u00e1fico de la red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1061.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1061.json index 94d77f1e0ba..ee0f69948ff 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1061.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1061.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-07T02:15:29.587", "lastModified": "2025-02-07T02:15:29.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.16. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email." + }, + { + "lang": "es", + "value": "El complemento Nextend Social Login Pro para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en versiones hasta la 3.1.16 incluida. Esto se debe a que no se proporciona suficiente verificaci\u00f3n del usuario durante la solicitud de autenticaci\u00f3n de Apple OAuth a trav\u00e9s del complemento. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json index 0af63e7baaf..10cbc3e71e7 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cret@cert.org", "published": "2025-02-06T00:15:27.760", "lastModified": "2025-02-06T15:15:17.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1070.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1070.json index 35c6794b220..f90119efd53 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1070.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1070.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-02-13T06:15:22.463", "lastModified": "2025-02-13T06:15:22.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could render the device\ninoperable when a malicious file is downloaded." + }, + { + "lang": "es", + "value": "CWE-434: Existe una vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos que podr\u00eda dejar el dispositivo inoperativo cuando se descarga un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1072.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1072.json index 23fca093017..97971ddc72f 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1072.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1072.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-07T04:15:07.737", "lastModified": "2025-02-07T04:15:07.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14.1 prior to 17.3.7, 17.4 prior to 17.4.4, and 17.5 prior to 17.5.2. A denial of service could occur upon importing maliciously crafted content using the Fogbugz importer." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones a partir de la 7.14.1 anterior a la 17.3.7, la 17.4 anterior a la 17.4.4 y la 17.5 anterior a la 17.5.2. Una denegaci\u00f3n de servicio podr\u00eda ocurrir al importar contenido manipulado con fines malintencionados mediante el importador Fogbugz." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1074.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1074.json index c57dc154d5b..4270cea794e 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1074.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-06T14:15:30.050", "lastModified": "2025-02-06T14:15:30.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1076.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1076.json index ff3b88b377e..6967e3fc446 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1076.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1076.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-06T14:15:30.287", "lastModified": "2025-02-06T14:15:30.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1077.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1077.json index 1a2d049ce75..0989aac956c 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1077.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1077.json @@ -3,12 +3,16 @@ "sourceIdentifier": "incident@nbu.gov.sk", "published": "2025-02-07T09:15:08.380", "lastModified": "2025-02-07T09:15:08.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote\u00a0unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de seguridad en Visual Weather de IBL Software Engineering y productos derivados (NAMIS, Aero Weather, Satellite Weather). La vulnerabilidad est\u00e1 presente en el componente Product Delivery Service (PDS) en configuraciones de servidor espec\u00edficas donde la canalizaci\u00f3n PDS utiliza la canalizaci\u00f3n IPDS con filtros de salida del editor de mensajes habilitados. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para enviar solicitudes no autenticadas para ejecutar la canalizaci\u00f3n IPDS con propiedades de formulario especialmente manipuladas, lo que permite la ejecuci\u00f3n remota de c\u00f3digo Python arbitrario. Esta vulnerabilidad podr\u00eda provocar un compromiso total del sistema del servidor afectado, en particular si los servicios de Visual Weather se ejecutan bajo una cuenta de usuario privilegiada, lo que contradice las pr\u00e1cticas recomendadas de instalaci\u00f3n documentadas. Actualice a las versiones parcheadas 7.3.10 (o superior), 8.6.0 (o superior)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json index 749da3086b8..93ab6d24293 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-06T17:15:21.040", "lastModified": "2025-02-06T17:15:21.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1081.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1081.json index c22010dad8e..c624ac545fb 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1081.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-06T21:15:23.120", "lastModified": "2025-02-06T21:15:23.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1082.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1082.json index 6801325da6d..63a40d48ba1 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1082.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1082.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-06T23:15:08.140", "lastModified": "2025-02-06T23:15:08.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Mindskip xzs-mysql \u5b66\u4e4b\u601d\u5f00\u6e90\u8003\u8bd5\u7cfb\u7edf 3.9.0. Affected is an unknown function of the file /api/admin/question/edit of the component Exam Edit Handler. The manipulation of the argument title/content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Mindskip xzs-mysql ????????? 3.9.0. Se ve afectada una funci\u00f3n desconocida del archivo /api/admin/question/edit del componente Exam Edit Handler. La manipulaci\u00f3n del argumento title/content provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1083.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1083.json index 445559519de..42a9e20cdff 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1083.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1083.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-06T23:15:08.350", "lastModified": "2025-02-06T23:15:08.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Mindskip xzs-mysql \u5b66\u4e4b\u601d\u5f00\u6e90\u8003\u8bd5\u7cfb\u7edf 3.9.0. Affected by this vulnerability is an unknown functionality of the component CORS Handler. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Mindskip xzs-mysql ????????? 3.9.0. Esta vulnerabilidad afecta una funcionalidad desconocida del componente CORS Handler. La manipulaci\u00f3n conduce a una pol\u00edtica permisiva entre dominios con dominios no confiables. El ataque se puede lanzar de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. La explotaci\u00f3n se ha divulgado al p\u00fablico y puede usarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1084.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1084.json index 5a02600a078..5184f11be46 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1084.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1084.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T00:15:28.180", "lastModified": "2025-02-07T00:15:28.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Mindskip xzs-mysql \u5b66\u4e4b\u601d\u5f00\u6e90\u8003\u8bd5\u7cfb\u7edf 3.9.0. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en Mindskip xzs-mysql ????????? 3.9.0. Este problema afecta a algunas funciones desconocidas. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se ven afectados varios endpoints. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1085.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1085.json index 64ef54e3444..720a829cccd 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1085.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1085.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T01:15:07.930", "lastModified": "2025-02-07T01:15:07.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Animati PACS up to 1.24.12.09.03. This affects an unknown part of the file /login. The manipulation of the argument p leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Animati PACS hasta la versi\u00f3n 1.24.12.09.03. Afecta a una parte desconocida del archivo /login. La manipulaci\u00f3n del argumento p provoca un ataque de cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1086.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1086.json index 62535179020..9e44fac6dfa 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1086.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1086.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T02:15:30.523", "lastModified": "2025-02-07T02:15:30.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Safetytest Cloud-Master Server up to 1.1.1 and classified as critical. This vulnerability affects unknown code of the file /static/. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Safetytest Cloud-Master Server hasta la versi\u00f3n 1.1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /static/. La manipulaci\u00f3n conduce a path traversal: '../filedir'. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1094.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1094.json index 768b087b64e..ad7884f583c 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1094.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n incorrecta de la sintaxis de comillas en las funciones libpq de PostgreSQL PQescapeLiteral(), PQescapeIdentifier(), PQescapeString() y PQescapeStringConn() permite que un proveedor de entrada de base de datos logre una inyecci\u00f3n SQL en ciertos patrones de uso. Espec\u00edficamente, la inyecci\u00f3n SQL requiere que la aplicaci\u00f3n use el resultado de la funci\u00f3n para construir la entrada a psql, la terminal interactiva de PostgreSQL. De manera similar, la neutralizaci\u00f3n incorrecta de la sintaxis de comillas en los programas de utilidad de l\u00ednea de comandos de PostgreSQL permite que una fuente de argumentos de l\u00ednea de comandos logre una inyecci\u00f3n SQL cuando client_encoding es BIG5 y server_encoding es uno de EUC_TW o MULE_INTERNAL. Las versiones anteriores a PostgreSQL 17.3, 16.7, 15.11, 14.16 y 13.19 se ven afectadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1100.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1100.json index 7d07f78d286..03dfb71eb11 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1100.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1100.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:31.647", "lastModified": "2025-02-12T14:15:31.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-259 \"Use of Hard-coded Password\" for the root account in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to execute arbitrary code with root privileges via SSH." + }, + { + "lang": "es", + "value": "Un CWE-259 \"Uso de contrase\u00f1a codificada\" para la cuenta ra\u00edz en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario con privilegios de superusuario a trav\u00e9s de SSH." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1101.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1101.json index f3f6db94941..fd0b847f332 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1101.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1101.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:31.800", "lastModified": "2025-02-12T14:15:31.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-204 \"Observable Response Discrepancy\" in the login page in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enumerate valid usernames via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una \"Discrepancia de respuesta observable\" CWE-204 en la p\u00e1gina de inicio de sesi\u00f3n en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado enumerar nombres de usuario v\u00e1lidos a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1102.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1102.json index ac823942b1a..bfe3b1ebbd7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1102.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1102.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:31.943", "lastModified": "2025-02-12T14:15:31.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-346 \"Origin Validation Error\" in the CORS configuration in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to affect the device confidentiality, integrity, or availability via crafted URLs or HTTP requests." + }, + { + "lang": "es", + "value": "Un error de validaci\u00f3n de origen CWE-346 \"Origin Validation Error\" en la configuraci\u00f3n CORS en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado afecte la confidencialidad, integridad o disponibilidad del dispositivo a trav\u00e9s de URL manipulado o solicitudes HTTP." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1103.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1103.json index dbf378d91cc..98d41626b32 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1103.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1103.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T15:15:17.583", "lastModified": "2025-02-07T16:15:39.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En D-Link DIR-823X 240126/240802 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica que afecta a la funci\u00f3n set_wifi_blacklists del archivo /goform/set_wifi_blacklists del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento macList provoca la desreferenciaci\u00f3n de un puntero nulo. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1104.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1104.json index f372b36f27e..0dd69224271 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1104.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1104.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T17:15:31.477", "lastModified": "2025-02-07T17:15:31.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en D-Link DHP-W310AV 1.04 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n permite eludir la autenticaci\u00f3n mediante suplantaci\u00f3n de identidad. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1105.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1105.json index 392ffc29ed4..2456ac875f9 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1105.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1105.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T18:15:28.433", "lastModified": "2025-02-07T18:15:28.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SiberianCMS 4.20.6. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /app/sae/design/desktop/flat of the component HTTP GET Request Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SiberianCMS 4.20.6. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /app/sae/design/desktop/flat del componente HTTP GET Request Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json index 1a6ba37e89b..a4bf78273ee 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T19:15:24.613", "lastModified": "2025-02-07T19:15:24.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in CmsEasy 7.7.7.9. This affects the function deletedir_action/restore_action in the library lib/admin/database_admin.php. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en CmsEasy 7.7.7.9. Afecta a la funci\u00f3n deleteir_action/restore_action en la librer\u00eda lib/admin/database_admin.php. La manipulaci\u00f3n provoca un path traversal. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1107.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1107.json index 90265d87158..557dac84116 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1107.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1107.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-07T14:15:48.343", "lastModified": "2025-02-07T14:15:48.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unverified password change vulnerability in Janto, versions prior to r12. This could allow an unauthenticated attacker to change another user's password without knowing their current password. To exploit the vulnerability, the attacker must create a specific POST request and send it to the endpoint \u2018/public/cgi/Gateway.php\u2019." + }, + { + "lang": "es", + "value": "Vulnerabilidad de cambio de contrase\u00f1a no verificada en Janto, versiones anteriores a r12. Esto podr\u00eda permitir que un atacante no autenticado cambie la contrase\u00f1a de otro usuario sin conocer su contrase\u00f1a actual. Para explotar la vulnerabilidad, el atacante debe crear una solicitud POST espec\u00edfica y enviarla al endpoint '/public/cgi/Gateway.php'." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1108.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1108.json index 40db66e7774..a1866a57e9d 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1108.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1108.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-07T14:15:48.530", "lastModified": "2025-02-07T14:15:48.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the \u2018Xml\u2019 parameter on the \u2018/public/cgi/Gateway.php\u2019 endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de verificaci\u00f3n insuficiente de la autenticidad de los datos en Janto, versiones anteriores a r12. Esto permite que un atacante no autenticado modifique el contenido de los correos electr\u00f3nicos enviados para restablecer la contrase\u00f1a. Para explotar la vulnerabilidad, el atacante debe crear una solicitud POST inyectando contenido malicioso en el par\u00e1metro 'Xml' en el endpoint '/public/cgi/Gateway.php'." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1113.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1113.json index f873c849d73..e850e2aaaf0 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1113.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1113.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T22:15:14.283", "lastModified": "2025-02-07T23:15:14.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in taisan tarzan-cms up to 1.0.0. It has been rated as critical. This issue affects the function upload of the file /admin#themes of the component Add Theme Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en taisan tarzan-cms hasta la versi\u00f3n 1.0.0. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n de carga del archivo /admin#themes del componente Add Theme Handler. La manipulaci\u00f3n provoca la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json index fd566e3ab5c..da97c17f5e4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in newbee-mall 1.0. Affected is the function save of the file /admin/categories/save of the component Add Category Page. The manipulation of the argument categoryName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en newbee-mall 1.0. La funci\u00f3n de guardado del archivo /admin/categories/save del componente Add Category Page se ve afectada. La manipulaci\u00f3n del argumento categoryName provoca ataques de cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Este producto utiliza una versi\u00f3n continua para proporcionar una distribuci\u00f3n continua. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json index c1bf87260db..c41e2cbb38e 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-08T10:15:20.997", "lastModified": "2025-02-08T10:15:20.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_thread_create of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en RT-Thread hasta la versi\u00f3n 5.1.0. Esta vulnerabilidad afecta a la funci\u00f3n sys_thread_create del archivo rt-thread/components/lwp/lwp_syscall.c. La manipulaci\u00f3n del argumento arg[0] provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque debe abordarse localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1116.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1116.json index 7ee37e5d85b..971265eedbc 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1116.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1116.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-08T12:15:39.660", "lastModified": "2025-02-08T12:15:39.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Dreamvention Live AJAX Search Free up to 1.0.6 on OpenCart. Affected by this issue is the function searchresults/search of the file /?route=extension/live_search/module/live_search.searchresults. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Dreamvention Live AJAX Search Free hasta la versi\u00f3n 1.0.6 en OpenCart. La funci\u00f3n searchresults/search del archivo /?route=extension/live_search/module/live_search.searchresults se ve afectada por este problema. La manipulaci\u00f3n de la palabra clave argument provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1117.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1117.json index de236e1d03a..d6ee9fb4bc6 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1117.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1117.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-08T13:15:07.843", "lastModified": "2025-02-08T13:15:07.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in CoinRemitter 0.0.1/0.0.2 on OpenCart. This affects an unknown part. The manipulation of the argument coin leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.3 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en CoinRemitter 0.0.1/0.0.2 en OpenCart. Afecta a una parte desconocida. La manipulaci\u00f3n del argumento coin provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 0.0.3 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1126.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1126.json index 53b1f624852..ed08cdfd0d4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1126.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853", "published": "2025-02-11T17:15:23.537", "lastModified": "2025-02-11T17:15:23.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reliance on Untrusted Inputs in a Security Decision vulnerability has been identified in the Lexmark Print Management Client." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de dependencia de entradas no confiables en una decisi\u00f3n de seguridad en Lexmark Print Management Client." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1127.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1127.json index fc95c792bf0..84f25cb7ad4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1127.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1127.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem." + }, + { + "lang": "es", + "value": "Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario como un usuario sin privilegios y/o modificar el contenido de cualquier dato en el sistema de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json index 978271056a6..d90b21cc924 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-02-11T04:15:08.163", "lastModified": "2025-02-11T06:15:20.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain models of routers from Billion Electric has hard-coded embedded linux credentials, allowing attackers to log in through the SSH service using these credentials and obtain root privilege of the system." + }, + { + "lang": "es", + "value": "Ciertos modelos de enrutadores de Billion Electric tienen credenciales de Linux integradas codificadas, lo que permite a los atacantes iniciar sesi\u00f3n a trav\u00e9s del servicio SSH usando estas credenciales y obtener privilegios de superusuario en el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1144.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1144.json index 4fea3679115..3c08606b6d2 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1144.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-02-11T04:15:08.330", "lastModified": "2025-02-11T06:15:20.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Affairs System from Quanxun has an Exposure of Sensitive Information, allowing unauthenticated attackers to view specific pages and obtain database information as well as plaintext administrator credentials." + }, + { + "lang": "es", + "value": "School Affairs System de Quanxun tiene una exposici\u00f3n de informaci\u00f3n confidencial, lo que permite a atacantes no autenticados ver p\u00e1ginas espec\u00edficas y obtener informaci\u00f3n de la base de datos, as\u00ed como credenciales de administrador de texto plano." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json index 328b0648d26..6dc91e512f5 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json @@ -3,12 +3,16 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-02-11T04:15:08.480", "lastModified": "2025-02-11T06:15:20.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetVision Information ISOinsight has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript code in the user's browser through phishing techniques." + }, + { + "lang": "es", + "value": "NetVision Information ISOinsight tiene una vulnerabilidad Cross-Site Scripting Reflejado, que permite a atacantes remotos no autenticados ejecutar c\u00f3digo JavaScript arbitrario en el navegador del usuario a trav\u00e9s de t\u00e9cnicas de phishing." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1146.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1146.json index b92016a85c2..c597e37e9a1 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1146.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1146.json @@ -3,12 +3,16 @@ "sourceIdentifier": "13ddcd98-6f4a-40a8-8e24-29ca0aee4661", "published": "2025-02-12T19:15:09.840", "lastModified": "2025-02-12T19:15:09.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This could allow an attacker with the ability to control network traffic to potentially conduct a man-in-the-middle (MiTM) attack. CrowdStrike identified this issue internally and released a security fix in all Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor versions 7.06 and above.\n\n \nCrowdStrike identified this issue through our longstanding, rigorous security review process, which has been continually strengthened with deeper source code analysis and ongoing program enhancements as part of our commitment to security resilience. CrowdStrike has no indication of any exploitation of this issue in the wild. CrowdStrike has leveraged its world class threat hunting and intelligence capabilities to actively monitor for signs of abuse or usage of this flaw and will continue to do so. \n\n\nWindows and Mac sensors are not affected by this." + }, + { + "lang": "es", + "value": "CrowdStrike utiliza el est\u00e1ndar industrial TLS (seguridad de la capa de transporte) para proteger las comunicaciones desde el sensor Falcon a la nube de CrowdStrike. CrowdStrike ha identificado un error en la l\u00f3gica de validaci\u00f3n en el sensor Falcon para Linux, Falcon Kubernetes Admission Controller y Falcon Container Sensor, donde nuestra rutina de conexi\u00f3n TLS a la nube de CrowdStrike puede procesar incorrectamente la validaci\u00f3n del certificado del servidor. Esto podr\u00eda permitir que un atacante con la capacidad de controlar el tr\u00e1fico de la red realice potencialmente un ataque de intermediario (MiTM). CrowdStrike identific\u00f3 este problema internamente y lanz\u00f3 una correcci\u00f3n de seguridad en todas las versiones 7.06 y posteriores del sensor Falcon para Linux, Falcon Kubernetes Admission Controller y Falcon Container Sensor. CrowdStrike identific\u00f3 este problema a trav\u00e9s de nuestro riguroso y prolongado proceso de revisi\u00f3n de seguridad, que se ha fortalecido continuamente con un an\u00e1lisis m\u00e1s profundo del c\u00f3digo fuente y mejoras continuas del programa como parte de nuestro compromiso con la resiliencia de la seguridad. CrowdStrike no tiene indicios de ninguna explotaci\u00f3n de este problema en la naturaleza. CrowdStrike ha aprovechado sus capacidades de inteligencia y b\u00fasqueda de amenazas de primer nivel para monitorear activamente los indicios de abuso o uso de esta falla y continuar\u00e1 haci\u00e9ndolo. Los sensores de Windows y Mac no se ven afectados por esto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json index 542c7f06fa6..e37baff8fea 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T14:15:29.643", "lastModified": "2025-02-10T14:15:29.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n __sanitizer::internal_strlen del archivo binutils/nm.c del componente nm. La manipulaci\u00f3n del argumento const provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json index f9904176e0e..42d46de429f 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T14:15:29.927", "lastModified": "2025-02-10T14:15:29.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\"" + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en GNU Binutils 2.43 y se clasific\u00f3 como problem\u00e1tica. La funci\u00f3n link_order_scan del archivo ld/ldelfgen.c del componente ld se ve afectada por este problema. La manipulaci\u00f3n provoca una fuga de memoria. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El responsable del c\u00f3digo explica: \"No voy a enviar algunas de las correcciones de fugas en las que he estado trabajando a la rama 2.44 debido a la preocupaci\u00f3n de que desestabilizar\u00edan ld. Todas las fugas informadas en este bugzilla se han solucionado en binutils master\". " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json index bed4876fe32..c7eee314fa0 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T15:15:13.093", "lastModified": "2025-02-10T15:15:13.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43. It has been classified as problematic. This affects the function xstrdup of the file libiberty/xmalloc.c of the component ld. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\"" + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha clasificado como problem\u00e1tica. Afecta a la funci\u00f3n xstrdup del archivo libiberty/xmalloc.c del componente ld. La manipulaci\u00f3n provoca una fuga de memoria. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El responsable del c\u00f3digo explica: \"No voy a enviar algunas de las correcciones de fugas en las que he estado trabajando a la rama 2.44 debido a la preocupaci\u00f3n de que desestabilizar\u00edan ld. Todas las fugas informadas en este bugzilla se han solucionado en binutils master\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json index 27bf0f3d8ce..510ef913b83 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T17:15:18.517", "lastModified": "2025-02-10T17:15:18.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\"" + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n bfd_malloc del archivo libbfd.c del componente ld. La manipulaci\u00f3n provoca una fuga de memoria. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El responsable del c\u00f3digo explica: \"No voy a enviar algunas de las correcciones de fugas en las que he estado trabajando a la rama 2.44 debido a la preocupaci\u00f3n de que desestabilizar\u00edan ld. Todas las fugas informadas en este bugzilla se han solucionado en binutils master\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json index e09cff8d784..6eb88925121 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T17:15:18.713", "lastModified": "2025-02-10T17:15:18.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\"" + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha calificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n xmemdup del archivo xmemdup.c del componente ld. La manipulaci\u00f3n provoca una fuga de memoria. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El responsable del c\u00f3digo explica: \"No voy a enviar algunas de las correcciones de fugas en las que he estado trabajando a la rama 2.44 debido a la preocupaci\u00f3n de que desestabilizar\u00edan ld. Todas las fugas informadas en este bugzilla se han solucionado en binutils master\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1152.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1152.json index 71fa42deeaf..32fdadfd659 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1152.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1152.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T18:15:34.043", "lastModified": "2025-02-10T18:15:34.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\"" + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en GNU Binutils 2.43. La funci\u00f3n xstrdup del archivo xstrdup.c del componente ld est\u00e1 afectada. La manipulaci\u00f3n provoca una fuga de memoria. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El responsable del c\u00f3digo explica: \"No voy a enviar algunas de las correcciones de fugas en las que he estado trabajando a la rama 2.44 debido a la preocupaci\u00f3n de que desestabilizar\u00edan ld. Todas las fugas informadas en este bugzilla se han solucionado en binutils master\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1153.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1153.json index 9b019a16816..940e8878e6a 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1153.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1153.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T19:15:39.900", "lastModified": "2025-02-10T19:15:39.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en GNU Binutils 2.43/2.44. Esta vulnerabilidad afecta a la funci\u00f3n bfd_set_format del archivo format.c. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque puede ejecutarse de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 2.45 puede solucionar este problema. El identificador del parche es 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1154.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1154.json index 8829b08734f..6ebb08b2b05 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1154.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1154.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T20:15:42.173", "lastModified": "2025-02-10T20:15:42.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in xxyopen Novel up to 3.4.1. Affected by this issue is some unknown functionality of the file /api/front/search/books. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en xxyopen Novel hasta la versi\u00f3n 3.4.1. Este problema afecta a algunas funciones desconocidas del archivo /api/front/search/books. La manipulaci\u00f3n del argumento sort provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1155.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1155.json index 333bcbd9e0f..6b2c32066d4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1155.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1155.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T20:15:42.360", "lastModified": "2025-02-10T21:15:22.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Webkul QloApps 1.6.1. This affects an unknown part of the file /stores of the component Your Location Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. It is planned to remove this page in the long term." + }, + { + "lang": "es", + "value": "En Webkul QloApps 1.6.1 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica que afecta a una parte desconocida del archivo /stores del componente Your Location Search. La manipulaci\u00f3n provoca cross site scripting. Es posible iniciar el ataque de forma remota. Est\u00e1 previsto eliminar esta p\u00e1gina a largo plazo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1156.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1156.json index f6978e07a52..4a5ead00650 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1156.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1156.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T21:15:22.133", "lastModified": "2025-02-10T21:15:22.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Pix Software Vivaz 6.0.10 and classified as critical. This vulnerability affects unknown code of the file /servlet?act=login. The manipulation of the argument usuario leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Pix Software Vivaz 6.0.10 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /servlet?act=login. La manipulaci\u00f3n del argumento usuario provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1157.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1157.json index 08d3b8e30c9..6f0434567dd 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1157.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1157.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T21:15:22.300", "lastModified": "2025-02-10T21:15:22.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Allims lab.online up to 20250201 and classified as critical. This issue affects some unknown processing of the file /model/model_recuperar_senha.php. The manipulation of the argument recuperacao leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Allims lab.online hasta 20250201 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /model/model_recuperar_senha.php. La manipulaci\u00f3n del argumento recuperacao conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1158.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1158.json index d0049d1e391..3c39d56aeb0 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1158.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1158.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T22:15:37.080", "lastModified": "2025-02-10T22:15:37.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5.6.3.154.205_20250114. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo addPolicyToSafetyGroup.jsp. La manipulaci\u00f3n del argumento safetyGroupId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1159.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1159.json index 4125c55ff1f..1c5a13d38fa 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1159.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T22:15:37.257", "lastModified": "2025-02-11T16:15:49.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json index a4139018f07..9c1da983b0e 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T23:15:15.387", "lastModified": "2025-02-11T15:15:19.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument username/password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Employee Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo index.php. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a conduce al uso de credenciales predeterminadas. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json index bc75f2183d7..13cba7392f7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T23:15:15.553", "lastModified": "2025-02-11T15:15:20.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1163.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1163.json index b1eb32969cc..87939e810d4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1163.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1163.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T00:15:29.230", "lastModified": "2025-02-11T16:15:49.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Vehicle Parking Management System 1.0. This vulnerability affects the function login of the component Authentication. The manipulation of the argument username leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Vehicle Parking Management System 1.0. Esta vulnerabilidad afecta a la funci\u00f3n login del componente Authentication. La manipulaci\u00f3n del argumento username provoca un desbordamiento del b\u00fafer basado en la pila. El ataque debe realizarse de forma local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1164.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1164.json index 5e1f3c5f055..9d41954501c 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1164.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1164.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T00:15:29.403", "lastModified": "2025-02-11T16:15:50.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Police FIR Record Management System 1.0. This issue affects some unknown processing of the component Add Record Handler. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en code-projects Police FIR Record Management System 1.0. Este problema afecta a algunos procesos desconocidos del componente Add Record Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en la pila. Se requiere acceso local para abordar este ataque. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json index 370ff6736af..cb84fad98ae 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T01:15:09.947", "lastModified": "2025-02-11T06:15:20.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Lumsoft ERP 8. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En Lumsoft ERP 8 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n DoUpload/DoWebUpload del archivo /Api/FileUploadApi.ashx est\u00e1 afectada. La manipulaci\u00f3n del archivo de argumentos permite cargar archivos sin restricciones. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json index 395260752f6..f4fb6ae885b 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.100", "lastModified": "2025-02-11T06:15:20.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Food Menu Manager 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file endpoint/update.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Food Menu Manager 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo endpoint/update.php. La manipulaci\u00f3n permite la carga sin restricciones. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json index e9bb761f780..9db6d332ff5 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.570", "lastModified": "2025-02-11T06:15:21.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Mayuri K Employee Management System up to 192.168.70.3 and classified as critical. Affected by this issue is some unknown functionality of the file /hr_soft/admin/Update_User.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Mayuri K Employee Management System hasta 192.168.70.3 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /hr_soft/admin/Update_User.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json index e854f3a3ad9..1c99faf4115 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.733", "lastModified": "2025-02-11T06:15:21.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Contact Manager with Export to VCF 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-contact.php. The manipulation of the argument contact leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Contact Manager con Export to VCF 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /endpoint/delete-contact.php. La manipulaci\u00f3n del argumento contact conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json index ed8654fdfc4..a8f21164e55 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.640", "lastModified": "2025-02-11T06:15:21.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Image Compressor Tool 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /image-compressor/compressor.php. The manipulation of the argument image leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Image Compressor Tool 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /image-compressor/compressor.php. La manipulaci\u00f3n del argumento image conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json index 3d6fea0b823..54818fd2cd9 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.810", "lastModified": "2025-02-11T06:15:21.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /Admin/Category.php. The manipulation of the argument Desc leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Real Estate Property Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /Admin/Category.php. La manipulaci\u00f3n del argumento Desc conduce a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json index 2d65dd2da2c..ef18f331fd2 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.630", "lastModified": "2025-02-11T06:15:22.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in code-projects Real Estate Property Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Real Estate Property Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Admin/CustomerReport.php. La manipulaci\u00f3n del argumento Address conduce a Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json index 5db762f947b..68086a01890 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.800", "lastModified": "2025-02-11T06:15:22.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file addtocart.php. The manipulation of the argument bcid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo addtocart.php. La manipulaci\u00f3n del argumento bcid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json index 6cf3ea69ad0..4c36aae6ea7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T05:15:13.530", "lastModified": "2025-02-11T05:15:13.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file process_users_del.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Afecta a una parte desconocida del archivo process_users_del.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json index c77b6b72e51..26b9bea4983 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T05:15:13.810", "lastModified": "2025-02-11T05:15:13.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file process_book_add.php of the component Add Book Page. The manipulation of the argument Book Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en 1000 Projects Bookstore Management System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo process_book_add.php del componente Add Book Page. La manipulaci\u00f3n del argumento Book Name provoca Cross-Site Scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1175.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1175.json index e45441a657c..b9ce0283823 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1175.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1175.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-10T13:15:26.593", "lastModified": "2025-02-10T13:15:26.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in Kelio Visio 1, Kelio Visio X7 and Kelio Visio X4, in versions between 3.2C and 5.1K. This vulnerability could allow an attacker to execute a JavaScript payload by making a POST request and injecting malicious code into the editable \u2018username\u2019 parameter of the \u2018/PageLoginVisio.do\u2019 endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en Kelio Visio 1, Kelio Visio X7 y Kelio Visio X4, en versiones entre 3.2C y 5.1K. Esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar un payload de JavaScript al realizar una solicitud POST e inyectar c\u00f3digo malicioso en el par\u00e1metro editable 'username' del endpoint '/PageLoginVisio.do'." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json index 52d2de180b9..acb110d58b7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T06:15:22.433", "lastModified": "2025-02-11T06:15:22.433", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n _bfd_elf_gc_mark_rsec del archivo elflink.c del componente ld. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se llama f9978defb6fab0bd8583942d97c112b0932ac814. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json index 212a7ca78d5..940ff5ab27e 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T06:15:22.623", "lastModified": "2025-02-11T06:15:22.623", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in dayrui XunRuiCMS 4.6.3. It has been classified as critical. Affected is the function import_add of the file dayrui/Fcms/Control/Admin/Linkage.php. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en dayrui XunRuiCMS 4.6.3. Se ha clasificado como cr\u00edtica. La funci\u00f3n import_add del archivo dayrui/Fcms/Control/Admin/Linkage.php est\u00e1 afectada. La manipulaci\u00f3n provoca la deserializaci\u00f3n. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1178.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1178.json index 81f8f12e703..839fb3db6f8 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1178.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1178.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T07:15:29.997", "lastModified": "2025-02-11T16:15:50.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha declarado como problem\u00e1tica. La vulnerabilidad afecta a la funci\u00f3n bfd_putl64 del archivo libbfd.c del componente ld. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque se puede lanzar de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. El identificador del parche es 75086e9de1707281172cc77f178e7949a4414ed0. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1179.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1179.json index 85f0f4ac89a..e55769438cf 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1179.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1179.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T07:15:30.230", "lastModified": "2025-02-11T07:15:30.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that \"[t]his bug has been fixed at some point between the 2.43 and 2.44 releases\"." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n bfd_putl64 del archivo bfd/libbfd.c del componente ld. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque puede ejecutarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2.44 puede solucionar este problema. Se recomienda actualizar el componente afectado. El c\u00f3digo fabricante explica que \"[e]ste error se ha corregido en alg\u00fan momento entre las versiones 2.43 y 2.44\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1180.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1180.json index a9625adb71e..43ff6422662 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1180.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1180.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T08:15:31.590", "lastModified": "2025-02-11T15:15:20.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en GNU Binutils 2.43. Afecta a la funci\u00f3n _bfd_elf_write_section_eh_frame del archivo bfd/elf-eh-frame.c del componente ld. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1181.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1181.json index b99f618ff1b..9a67d2ddf80 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1181.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1181.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T08:15:31.797", "lastModified": "2025-02-11T15:15:20.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en GNU Binutils 2.43. Esta vulnerabilidad afecta a la funci\u00f3n _bfd_elf_gc_mark_rsec del archivo bfd/elflink.c del componente ld. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es 931494c9a89558acb36a03a340c01726545eef24. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1182.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1182.json index 13d6d177703..c8e92743dc6 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1182.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1182.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T09:15:09.530", "lastModified": "2025-02-11T15:15:20.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en GNU Binutils 2.43. La funci\u00f3n bfd_elf_reloc_symbol_deleted_p del archivo bfd/elflink.c del componente ld est\u00e1 afectada. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se identifica como b425859021d17adf62f06fb904797cf8642986ad. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json index 7749dd3cb0f..ef001c79e20 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:07.863", "lastModified": "2025-02-12T15:15:16.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in CodeZips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/more-userprofile.php. The manipulation of the argument login_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en CodeZips Gym Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /dashboard/admin/more-userprofile.php. La manipulaci\u00f3n del argumento login_id conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json index 32bc69530b1..0254abf057b 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:08.410", "lastModified": "2025-02-12T15:15:16.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in pihome-shc PiHome 1.77 and classified as critical. Affected by this issue is some unknown functionality of the file /ajax.php?Ajax=GetModal_MQTTEdit. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en pihome-shc PiHome 1.77 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /ajax.php?Ajax=GetModal_MQTTEdit. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json index 4692b3c351f..22c7f7239ff 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:08.870", "lastModified": "2025-02-12T15:15:16.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in pihome-shc PiHome 2.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?Ajax=GetModal_Sensor_Graph. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en pihome-shc PiHome 2.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /ajax.php?Ajax=GetModal_Sensor_Graph. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json index aece19af6e7..016d910a396 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:09.153", "lastModified": "2025-02-12T15:15:17.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in dayrui XunRuiCMS up to 4.6.4. It has been declared as critical. This vulnerability affects unknown code of the file /Control/Api/Api.php. The manipulation of the argument thumb leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en dayrui XunRuiCMS hasta la versi\u00f3n 4.6.4. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /Control/Api/Api.php. La manipulaci\u00f3n del argumento thumb provoca la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1187.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1187.json index c38cc0a1db0..2c8d5755e76 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1187.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1187.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T09:15:08.613", "lastModified": "2025-02-12T09:15:08.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Police FIR Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Delete Record Handler. The manipulation leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Police FIR Record Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Delete Record Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en la pila. Es necesario atacar de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json index 24f920829cd..2e2909378d4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T09:15:08.803", "lastModified": "2025-02-12T15:15:17.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Gym Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /dashboard/admin/updateroutine.php. La manipulaci\u00f3n del argumento tid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json index 35d551027d9..92f24bdf9ba 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T10:15:14.540", "lastModified": "2025-02-12T10:15:14.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in 1000 Projects Attendance Tracking Management System 1.0. This affects an unknown part of the file /admin/chart1.php. The manipulation of the argument course_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Attendance Tracking Management System 1.0. Afecta a una parte desconocida del archivo /admin/chart1.php. La manipulaci\u00f3n del argumento course_id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json index 22a4dc13059..02a40cc88d4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T10:15:14.740", "lastModified": "2025-02-12T10:15:14.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/load_user-profile.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Multiple parameters might be affected." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Job Recruitment 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /_parse/load_user-profile.php. La manipulaci\u00f3n conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. Pueden verse afectados varios par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json index c5fa8f69bd7..777bb088768 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T11:15:08.480", "lastModified": "2025-02-12T11:15:08.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Multi Restaurant Table Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/approve-reject.php. The manipulation of the argument breject_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Multi Restaurant Table Reservation System 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /dashboard/approve-reject.php. La manipulaci\u00f3n del argumento breject_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json index 388809a0904..fd7ffa61f5a 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T11:15:10.727", "lastModified": "2025-02-12T11:15:10.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Multi Restaurant Table Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file select-menu.php. The manipulation of the argument table leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Multi Restaurant Table Reservation System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo select-menu.php. La manipulaci\u00f3n de la tabla de argumentos provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json index 06bb31bec9d..8abf53605a1 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@devolutions.net", "published": "2025-02-10T14:15:30.107", "lastModified": "2025-02-10T18:15:34.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper host validation in the certificate validation component in Devolutions Remote Desktop Manager on 2024.3.19 and earlier on Windows allows an attacker to intercept and modify encrypted communications via a man-in-the-middle attack \nby presenting a certificate for a different host." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de host incorrecta en el componente de validaci\u00f3n de certificados en Devolutions Remote Desktop Manager en 2024.3.19 y versiones anteriores en Windows permite que un atacante intercepte y modifique las comunicaciones cifradas a trav\u00e9s de un ataque de intermediario presentando un certificado para un host diferente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1195.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1195.json index 1358f3f781b..20f075bef1c 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1195.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1195.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T12:15:29.397", "lastModified": "2025-02-12T12:15:29.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Real Estate Property Management System 1.0. This issue affects some unknown processing of the file /Admin/EditCategory. The manipulation of the argument CategoryId leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Real Estate Property Management System 1.0. Este problema afecta a algunos procesamientos desconocidos del archivo /Admin/EditCategory. La manipulaci\u00f3n del argumento CategoryId conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json index f7337ec37f3..983756a2670 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T12:15:29.640", "lastModified": "2025-02-12T12:15:29.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Real Estate Property Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /search.php. La manipulaci\u00f3n del argumento PropertyName da lugar a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json index aba0a79b7d8..80e8db11cc8 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:08.983", "lastModified": "2025-02-12T15:15:17.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /_parse/load_user-profile.php. The manipulation of the argument userhash leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Real Estate Property Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /_parse/load_user-profile.php. La manipulaci\u00f3n del argumento userhash conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1198.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1198.json index a54a589b5a9..c4851576223 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1198.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-13T02:15:29.627", "lastModified": "2025-02-13T02:15:29.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue discovered in GitLab CE/EE affecting all versions from 16.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 meant that long-lived connections in ActionCable potentially allowed revoked Personal Access Tokens access to streaming results." + }, + { + "lang": "es", + "value": "Un problema descubierto en GitLab CE/EE que afectaba a todas las versiones desde 16.11 hasta 17.6.5, 17.7 hasta 17.7.4 y 17.8 hasta 17.8.2 significaba que las conexiones de larga duraci\u00f3n en ActionCable potencialmente permit\u00edan el acceso de tokens de acceso personal revocados a los resultados de transmisi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json index 63920e77457..80fce8530bd 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:09.537", "lastModified": "2025-02-12T13:15:09.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been classified as critical. This affects an unknown part of the file /admin/app/role_crud.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.1. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/app/role_crud.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1200.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1200.json index 60a8d9ed9b5..f9fd916f49a 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1200.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T14:15:32.090", "lastModified": "2025-02-12T14:15:32.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/app/slider_crud.php. The manipulation of the argument del_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.1. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/app/slider_crud.php. La manipulaci\u00f3n del argumento del_id provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json index fc1f3c6a2f4..9295c00c407 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T14:15:32.297", "lastModified": "2025-02-12T14:15:32.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been rated as critical. This issue affects some unknown processing of the file /admin/app/profile_crud.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best Church Management Software 1.1. Se la ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/app/profile_crud.php. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Es posible que se vean afectados varios par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json index 66ad2093a12..cfd856a6cb0 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T15:15:17.920", "lastModified": "2025-02-12T15:15:17.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Best Church Management Software 1.1. Affected is an unknown function of the file /admin/edit_slider.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Best Church Management Software 1.1. Se ve afectada una funci\u00f3n desconocida del archivo /admin/edit_slider.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json index 8f4ab4e5f6d..1b8beefbb96 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T15:15:18.093", "lastModified": "2025-02-12T15:15:18.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file /dashboard/admin/viewdetailroutine.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Gym Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /dashboard/admin/viewdetailroutine.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json index 68cbb0be7b3..55eaf91a7d5 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T16:15:44.393", "lastModified": "2025-02-12T16:15:44.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in phjounin TFTPD64 4.64. It has been declared as problematic. This vulnerability affects unknown code of the component DNS Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en phjounin TFTPD64 4.64. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del componente DNS Handler. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. El ataque debe realizarse dentro de la red local. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json index 8d0adcdb535..a33b7659fe1 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T16:15:44.613", "lastModified": "2025-02-12T16:15:44.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /Profile.php. The manipulation of the argument postcontent leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Wazifa System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesamientos desconocidos del archivo /Profile.php. La manipulaci\u00f3n del argumento postcontent conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json index f159621d9c7..cfbaaaf2d31 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T17:15:23.497", "lastModified": "2025-02-12T17:15:23.497", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. There is a typo in the affected file name." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Wazifa System 1.0. La funci\u00f3n searchuser del archivo /search_resualts.php est\u00e1 afectada. La manipulaci\u00f3n del argumento firstname/lastname da lugar a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Hay un error tipogr\u00e1fico en el nombre del archivo afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json index 0f332bf1a7e..e5afaee2415 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T17:15:23.673", "lastModified": "2025-02-12T17:15:23.673", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Wazifa System 1.0. Affected by this vulnerability is an unknown functionality of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Wazifa System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /controllers/control.php. La manipulaci\u00f3n del argumento conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1211.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1211.json index 30f009f9422..af440421a92 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1211.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1211.json @@ -3,12 +3,16 @@ "sourceIdentifier": "report@snyk.io", "published": "2025-02-11T05:15:14.013", "lastModified": "2025-02-11T16:15:50.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package hackney from 0.0.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://127.0.0.1?@127.2.2.2/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. \rThis vulnerability can be exploited when users rely on the URL function for host checking." + }, + { + "lang": "es", + "value": "Las versiones del paquete hackney a partir de la versi\u00f3n 0.0.0 son vulnerables a Server-side Request Forgery (SSRF) debido al an\u00e1lisis incorrecto de las URL por parte del m\u00f3dulo integrado URI y hackey. Dada la URL http://127.0.0.1?@127.2.2.2/, la funci\u00f3n URI analizar\u00e1 y ver\u00e1 el host como 127.0.0.1 (lo cual es correcto), y hackney se referir\u00e1 al host como 127.2.2.2/. Esta vulnerabilidad puede explotarse cuando los usuarios dependen de la funci\u00f3n URL para la verificaci\u00f3n del host." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json index f5d940c4bbe..8d97b08ce37 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-12T15:15:18.290", "lastModified": "2025-02-12T15:15:18.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in GitLab CE/EE affecting all versions from 8.3 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send a crafted request to a backend server to reveal sensitive information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en GitLab CE/EE que afecta a todas las versiones desde la 8.3 anterior a la 17.6.5, la 17.7 anterior a la 17.7.4 y la 17.8 anterior a la 17.8.2 permite a un atacante enviar una solicitud manipulada a un servidor backend para revelar informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json index fb00cefcdaa..286beb8c435 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T18:15:22.180", "lastModified": "2025-02-12T18:15:22.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in pihome-shc PiHome 1.77. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en pihome-shc PiHome 1.77. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /index.php. La manipulaci\u00f3n del argumento $_SERVER['PHP_SELF'] conduce a Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json index 8ecc4972a5e..e4914303379 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en pihome-shc PiHome 2.0. Afecta a una parte desconocida del archivo /user_accounts.php?uid del componente Role-Based Access Control. La manipulaci\u00f3n provoca la falta de autorizaci\u00f3n. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1215.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1215.json index e7c5de24a16..2bfd46b4f68 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1215.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1215.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en vim hasta la versi\u00f3n 9.1.1096. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo src/main.c. La manipulaci\u00f3n del argumento --log provoca la corrupci\u00f3n de la memoria. Es posible lanzar el ataque en el host local. La actualizaci\u00f3n a la versi\u00f3n 9.1.1097 puede solucionar este problema. El parche se identifica como c5654b84480822817bb7b69ebc97c174c91185e9. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json index 2326b607d20..1a25bd21c06 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ywoa up to 2024.07.03. This issue affects the function selectNoticeList of the file com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se clasific\u00f3 como cr\u00edtica, en ywoa hasta 2024.07.03. Este problema afecta a la funci\u00f3n selectNoticeList del archivo com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. La manipulaci\u00f3n del argumento sort conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2024.07.04 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json index 8faa29c0255..2a05ef609cb 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in ywoa up to 2024.07.03. This issue affects the function extract of the file c-main/src/main/java/com/redmoon/weixin/aes/XMLParse.java of the component WXCallBack Interface. The manipulation leads to xml external entity reference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en ywoa hasta la versi\u00f3n 2024.07.03. Este problema afecta a la funci\u00f3n extract del archivo c-main/src/main/java/com/redmoon/weixin/aes/XMLParse.java del componente WXCallBack Interface. La manipulaci\u00f3n conduce a una referencia a una entidad externa xml. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2024.07.04 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json index ac8887267fa..84a21b31ed1 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in ywoa up to 2024.07.03. It has been declared as critical. This vulnerability affects unknown code of the file /oa/setup/setup.jsp. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en ywoa hasta la versi\u00f3n 2024.07.03. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /oa/setup/setup.jsp. La manipulaci\u00f3n conduce a una autorizaci\u00f3n incorrecta. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2024.07.04 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json index 0b37638c0e5..e74e8efb818 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in ywoa up to 2024.07.03. It has been rated as critical. This issue affects the function selectList of the file com/cloudweb/oa/mapper/xml/AddressDao.xml. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en ywoa hasta la versi\u00f3n 2024.07.03. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n selectList del archivo com/cloudweb/oa/mapper/xml/AddressDao.xml. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2024.07.04 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json index 22374a60d98..758adc0c217 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected is an unknown function of the file /read/?page=1&logfile=LOG_Monitor of the component Logfile Update Handler. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en olajowon Loggrove hasta e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Se ve afectada una funci\u00f3n desconocida del archivo /read/?page=1&logfile=LOG_Monitor del componente Logfile Update Handler. La manipulaci\u00f3n de la ruta de argumentos conduce a Path Traversal. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Este producto utiliza la entrega continua con versiones sucesivas. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json index b1038849462..1917e971d02 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected by this vulnerability is an unknown functionality of the file /read/?page=1&logfile=eee&match=. The manipulation of the argument path leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en olajowon Loggrove hasta e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /read/?page=1&logfile=eee&match=. La manipulaci\u00f3n de la ruta de argumentos conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Este producto no utiliza control de versiones. Por este motivo, no est\u00e1 disponible la informaci\u00f3n sobre las versiones afectadas y no afectadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1230.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1230.json index b0412a980db..50cd12f9c96 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1230.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1230.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-12T11:15:11.230", "lastModified": "2025-02-12T11:15:11.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored Cross-Site Scripting (XSS) vulnerability in Prestashop 8.1.7, due to the lack of proper validation of user input through \u2018//index.php\u2019, affecting the \u2018link\u2019 parameter. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details." + }, + { + "lang": "es", + "value": "Vulnerabilidad Cross-Site Scripting (XSS) Almacenado en Prestashop 8.1.7, debido a la falta de validaci\u00f3n adecuada de la entrada del usuario a trav\u00e9s de \u2018//index.php\u2019, que afecta al par\u00e1metro \u2018link\u2019. Esta vulnerabilidad podr\u00eda permitir que un usuario remoto env\u00ede una consulta manipulado especial a un usuario autenticado y robe los detalles de su sesi\u00f3n de cookies." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json index ebd9a9b1c93..2cc00305221 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@devolutions.net", "published": "2025-02-11T14:15:31.130", "lastModified": "2025-02-11T15:15:20.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality." + }, + { + "lang": "es", + "value": "El restablecimiento de contrase\u00f1a incorrecto en el m\u00f3dulo PAM en Devolutions Server 2024.3.10.0 y versiones anteriores permite que un usuario autenticado reutilice la contrase\u00f1a de usuario de Oracle despu\u00e9s del check-in debido a una falla en la funcionalidad de restablecimiento de contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1240.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1240.json index b1c8e9d0b1f..404b5b8172e 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1240.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1240.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T22:15:29.800", "lastModified": "2025-02-11T22:15:29.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WinZip 7Z File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of 7Z files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24986." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en el an\u00e1lisis de archivos de WinZip 7Z que permite escribir fuera de los l\u00edmites. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de WinZip. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos 7Z. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-24986." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json index 0776c6185f4..3dbe5a896cf 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@temporal.io", "published": "2025-02-12T01:15:09.073", "lastModified": "2025-02-12T01:15:09.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted." + }, + { + "lang": "es", + "value": "La librer\u00eda Temporal api-go anterior a la versi\u00f3n 1.44.1 no enviaba informaci\u00f3n de \"respuesta de actualizaci\u00f3n\" a Data Converter cuando el paquete proxy dentro del m\u00f3dulo api-go se usaba en un proxy gRPC antes de la transmisi\u00f3n. Esto hac\u00eda que la informaci\u00f3n contenida dentro del campo \"respuesta de actualizaci\u00f3n\" no tuviera transformaciones de Data Converter (por ejemplo, cifrado). Este es un problema solo cuando se usan las API UpdateWorkflowExecution (lanzadas el 13 de enero de 2025) con un proxy que aprovecha la librer\u00eda api-go anterior a la versi\u00f3n 1.44.1. Otros campos de datos se enviaban correctamente a Data Converter. Este problema no afecta al servidor de Data Converter. Los datos se cifraban en tr\u00e1nsito. Los servicios de Temporal Cloud no se ven afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json index e14dcd8e80a..d1531c018df 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-12T15:15:18.430", "lastModified": "2025-02-12T15:15:18.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Emacs text editor. Improper handling of custom \"man\" URI schemes allows attackers to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el editor de texto de Emacs. La gesti\u00f3n inadecuada de esquemas de URL \"man\" personalizados permite a los atacantes ejecutar comandos de shell arbitrarios enga\u00f1ando a los usuarios para que visiten un sitio web especialmente manipulado o una URL HTTP con una redirecci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1247.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1247.json index 13c681463cf..28ed11e38c8 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1247.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1247.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-13T14:16:18.400", "lastModified": "2025-02-13T14:16:18.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Quarkus REST que permite que los par\u00e1metros de solicitud se filtren entre solicitudes concurrentes si los endpoints usan la inyecci\u00f3n de campos sin un alcance CDI. Esta vulnerabilidad permite a los atacantes manipular los datos de la solicitud, hacerse pasar por usuarios o acceder a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1270.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1270.json index a1b33598720..5d091a8291f 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1270.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1270.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-13T13:15:09.273", "lastModified": "2025-02-13T13:15:09.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure direct object reference (IDOR) vulnerability in Anapi Group's h6web, allows an authenticated attacker to access other users' information by making a POST request and modifying the \u201cpkrelated\u201d parameter in the \u201c/h6web/ha_datos_hermano.php\u201d endpoint to refer to another user. In addition, the first request could also allow the attacker to impersonate other users. As a result, all requests made after exploitation of the IDOR vulnerability will be executed with the privileges of the impersonated user." + }, + { + "lang": "es", + "value": "La vulnerabilidad de referencia directa a objetos insegura (IDOR) en h6web de Anapi Group permite a un atacante autenticado acceder a la informaci\u00f3n de otros usuarios mediante una solicitud POST y modificando el par\u00e1metro \u201cpkrelated\u201d en el endpoint \u201c/h6web/ha_datos_hermano.php\u201d para hacer referencia a otro usuario. Adem\u00e1s, la primera solicitud tambi\u00e9n podr\u00eda permitir al atacante hacerse pasar por otros usuarios. Como resultado, todas las solicitudes realizadas despu\u00e9s de la explotaci\u00f3n de la vulnerabilidad IDOR se ejecutar\u00e1n con los privilegios del usuario suplantado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1271.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1271.json index ed5fe8b1060..b714d019d58 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1271.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-13T13:15:09.433", "lastModified": "2025-02-13T13:15:09.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user." + }, + { + "lang": "es", + "value": "Cross-Site Scripting (XSS) Reflejado en h6web de Anapi Group. Esta falla de seguridad podr\u00eda permitir a un atacante inyectar c\u00f3digo JavaScript malicioso en una URL. Cuando un usuario accede a esa URL, el c\u00f3digo inyectado se ejecuta en su navegador, lo que puede provocar el robo de informaci\u00f3n confidencial, robo de identidad o la ejecuci\u00f3n de acciones no autorizadas por parte del usuario afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1283.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1283.json index 118e3468853..97fc0e9ef62 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1283.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1283.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Dingtian DT-R0 Series is vulnerable to an exploit that allows \nattackers to bypass login requirements by directly navigating to the \nmain page." + }, + { + "lang": "es", + "value": "Dingtian DT-R0 Series es vulnerable a un exploit que permite a los atacantes eludir los requisitos de inicio de sesi\u00f3n navegando directamente a la p\u00e1gina principal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json new file mode 100644 index 00000000000..a57dbd9dc9d --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1332", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-16T01:15:20.440", + "lastModified": "2025-02-16T01:15:20.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in FastCMS up to 0.1.5 and classified as problematic. This vulnerability affects unknown code of the file /fastcms.html#/template/menu of the component Template Menu. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/xjd2020/fastcms/issues/IBKJ1W", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295942", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295942", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json index dadd99189d3..bd64a0cc4c8 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:29.573", "lastModified": "2025-02-05T18:15:29.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json index f3962d5bfcd..f92aadafed2 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:29.760", "lastModified": "2025-02-05T18:15:29.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json index a40c667eefd..fe98f0e33fe 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:29.943", "lastModified": "2025-02-05T18:15:29.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20094.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20094.json index 27739913ecd..85ce3cef21b 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20094.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T08:15:29.837", "lastModified": "2025-02-06T08:15:29.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json index ad8e0d19b9c..338d57f6441 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access." + }, + { + "lang": "es", + "value": "Una excepci\u00f3n no detectada en el firmware OpenBMC para la familia Intel(R) Server M50FCP y la familia Intel(R) Server D50DNP anterior a la versi\u00f3n R01.02.0002 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json index 798ffcd86f0..29baedc117d 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:22.457", "lastModified": "2025-02-05T17:15:22.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json index 56f9aac1802..f36b54725bb 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:22.610", "lastModified": "2025-02-05T17:15:22.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json index adcb71477b0..35d2f7f16ce 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:22.777", "lastModified": "2025-02-05T17:15:22.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json index 070502fd9f4..e2983a2262a 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:23.283", "lastModified": "2025-02-05T17:15:23.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json index 08adda43f90..07fd2dd5b1d 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:23.753", "lastModified": "2025-02-05T17:15:23.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json index 697f294607c..317056c168b 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.020", "lastModified": "2025-02-05T17:15:24.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json index 354bbb28ef0..beebad4fd37 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.263", "lastModified": "2025-02-05T17:15:24.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json index be2c1209cf5..3e3a3552183 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.513", "lastModified": "2025-02-05T17:15:24.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json index 515d74d5188..715e398e946 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.720", "lastModified": "2025-02-05T17:15:24.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json index 6c3f399fa3e..96a8a141572 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.997", "lastModified": "2025-02-05T17:15:24.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json index 3b69eef6023..7db8a864f08 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:25.210", "lastModified": "2025-02-05T17:15:25.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json index 2c9f3c901bd..8f76ce81eb7 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:25.370", "lastModified": "2025-02-05T17:15:25.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json index b5a6d8d8ff7..8552d8922ff 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:25.527", "lastModified": "2025-02-05T17:15:25.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json index 709dbe2ab87..706b2434e5b 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:25.697", "lastModified": "2025-02-05T17:15:25.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json index b621400dc3f..f8f7b31d87b 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:25.883", "lastModified": "2025-02-05T17:15:25.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json index 306d2166e31..3f7f6f23cda 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:26.077", "lastModified": "2025-02-05T17:15:26.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json index 81592091f43..49ab366fb5c 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:26.243", "lastModified": "2025-02-05T17:15:26.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json index 2166a377b39..4683301f9f4 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:26.410", "lastModified": "2025-02-05T17:15:26.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json index 08930d49aa9..a53aaa81c88 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Qardio Arm iOS application exposes sensitive data such as usernames \nand passwords in a plist file. This allows an attacker to log in to \nproduction-level development accounts and access an engineering backdoor\n in the application. The engineering backdoor allows the attacker to \nsend hex-based commands over a UI-based terminal." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n Qardio Arm para iOS expone datos confidenciales, como nombres de usuario y contrase\u00f1as, en un archivo plist. Esto permite que un atacante inicie sesi\u00f3n en cuentas de desarrollo de nivel de producci\u00f3n y acceda a una puerta trasera de ingenier\u00eda en la aplicaci\u00f3n. La puerta trasera de ingenier\u00eda permite al atacante enviar comandos basados en hexadecimales a trav\u00e9s de una terminal basada en UI." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json index 8240c61b4cc..d462f6798ad 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:30.430", "lastModified": "2025-02-05T18:15:30.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json index deb59ae887b..e64c03829f6 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:30.613", "lastModified": "2025-02-05T18:15:30.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json index 12195c3b0d0..e95360cb632 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-05T14:15:27.417", "lastModified": "2025-02-05T14:15:27.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21121.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21121.json index f7e66c7abce..a3d9b9f11c5 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21121.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21121.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:23.673", "lastModified": "2025-02-11T17:15:23.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21123.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21123.json index 0c75c6aea9f..575b48987d6 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21123.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21123.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:23.817", "lastModified": "2025-02-11T17:15:23.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21124.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21124.json index 714b6ea3ee5..a26a6815b60 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21124.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21124.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:23.950", "lastModified": "2025-02-11T17:15:23.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21125.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21125.json index 666ecc2c330..2850b0ab8c0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21125.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21125.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:24.083", "lastModified": "2025-02-11T17:15:24.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una denegaci\u00f3n de servicio de la aplicaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad para bloquear la aplicaci\u00f3n, lo que provocar\u00eda una condici\u00f3n de denegaci\u00f3n de servicio. Para aprovechar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21126.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21126.json index 57ffb885637..25d446e6133 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21126.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:24.220", "lastModified": "2025-02-11T17:15:24.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Improper Input Validation vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda generar una condici\u00f3n de denegaci\u00f3n de servicio de la aplicaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad para provocar el bloqueo de la aplicaci\u00f3n, lo que generar\u00eda una denegaci\u00f3n de servicio. Para aprovechar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json index 406e65d0d21..07a765f876b 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.583", "lastModified": "2025-02-11T18:15:27.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.1.0 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una denegaci\u00f3n de servicio de la aplicaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad para bloquear la aplicaci\u00f3n, lo que provocar\u00eda una condici\u00f3n de denegaci\u00f3n de servicio. Para aprovechar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json index 52fb8f5db53..68c4d66cf09 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.787", "lastModified": "2025-02-11T18:15:27.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.0, 19.5.1 y anteriores de InCopy se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21157.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21157.json index d771c97645e..8590c2b0f53 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21157.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21157.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:24.353", "lastModified": "2025-02-11T17:15:24.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21158.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21158.json index e243656229c..6fdaf7e11b4 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21158.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21158.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T17:15:24.487", "lastModified": "2025-02-11T17:15:24.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID20.0, ID19.5.1 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json index 4751db5ddbd..0998511e22b 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.977", "lastModified": "2025-02-11T18:15:27.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Illustrator versions 29.1, 28.7.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 29.1, 28.7.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json index 94705457935..f73f06093a0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.163", "lastModified": "2025-02-11T18:15:28.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Illustrator versions 29.1, 28.7.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 29.1, 28.7.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json index 44813a047c1..64d8ca5295d 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.347", "lastModified": "2025-02-11T18:15:28.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Designer versions 14.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.0.2 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21162.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21162.json index 904a9f81bc6..039bbf828ce 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21162.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21162.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.567", "lastModified": "2025-02-11T18:15:28.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Photoshop Elements versions 2025.0 and earlier are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2025.0 y anteriores de Photoshop Elements se ven afectadas por una vulnerabilidad de creaci\u00f3n de archivo temporal en un directorio con permisos incorrectos que podr\u00eda provocar una escalada de privilegios en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json index f99ba66824b..243fde630f1 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.747", "lastModified": "2025-02-11T18:15:28.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Illustrator versions 29.1, 28.7.3 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 29.1, 28.7.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basada en pila que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json index ffcbded4bb1..daa7b52652b 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json index 00c78abfc5b..a4991716f2b 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json index 90d8f469a9d..27cbd397972 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21179.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21179.json index 3add159b4c2..6664b651d2e 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21179.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21179.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:29.343", "lastModified": "2025-02-11T18:15:29.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DHCP Client Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio cliente DHCP" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json index ab949a6b14e..129175aa4e6 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:29.553", "lastModified": "2025-02-11T18:15:29.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queue (MSMQ)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21182.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21182.json index 80a1b1ea54c..78707684927 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21182.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21182.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:29.797", "lastModified": "2025-02-11T18:15:29.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servicio de deduplicaci\u00f3n del sistema de archivos resiliente (ReFS) de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21183.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21183.json index d2e500165b3..ccbb7e66126 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21183.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21183.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:29.993", "lastModified": "2025-02-11T18:15:29.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servicio de deduplicaci\u00f3n del sistema de archivos resiliente (ReFS) de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json index 6d91a5acdc7..c2682279589 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.180", "lastModified": "2025-02-11T18:15:30.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Core Messaging Elevation of Privileges Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Core Messaging" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json index 42d0d7eb86c..fa3f69f19b0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.403", "lastModified": "2025-02-11T18:15:30.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Azure Network Watcher VM Extension Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la extensi\u00f3n de m\u00e1quina virtual de Azure Network Watcher" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json index 03912f77a1a..07793b8cb31 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.610", "lastModified": "2025-02-11T18:15:30.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21194.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21194.json index d41b9e66793..9a65409c875 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21194.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21194.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.820", "lastModified": "2025-02-11T18:15:30.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Surface Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad de Microsoft Surface" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json index 8831cb1172c..4f915ef7efc 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.020", "lastModified": "2025-02-11T18:15:31.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el paquete de computaci\u00f3n de alto rendimiento (HPC) de Microsoft" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json index ac17a8a090b..2bbd5052f83 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.203", "lastModified": "2025-02-11T18:15:31.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json index fd8995aa641..77f2060260a 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.407", "lastModified": "2025-02-11T18:15:31.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servidor de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json index 896b4aaed11..b736b5649da 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.610", "lastModified": "2025-02-11T18:15:31.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el instalador de Visual Studio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json index 47d297220bc..8d3436da165 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.793", "lastModified": "2025-02-11T18:15:31.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json index 500f3ac54b3..6386b1117f0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.980", "lastModified": "2025-02-11T18:15:31.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en el uso compartido de la conexi\u00f3n a Internet (ICS)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json index 8483112157f..e8458c9d349 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.177", "lastModified": "2025-02-11T18:15:32.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en el uso compartido de la conexi\u00f3n a Internet (ICS)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json index 97ec7680106..eef3cae17ee 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.450", "lastModified": "2025-02-11T18:15:32.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en el uso compartido de la conexi\u00f3n a Internet (ICS)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json index f766307b8e5..8ffd6b4b6e4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.643", "lastModified": "2025-02-11T18:15:32.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Outlook Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Outlook" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json index 805cbf4e370..47f92de51b7 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.027", "lastModified": "2025-02-11T18:15:33.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft PC Manager Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft PC Manager" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json index ab566679195..8daf6b263c0 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.217", "lastModified": "2025-02-11T18:15:33.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows NTFS Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows NTFS" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json index 462430b1106..154cd729e8f 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.497", "lastModified": "2025-02-11T18:15:33.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Deployment Services Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de los servicios de implementaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json index 69fce47ddbe..9288f5f057d 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.697", "lastModified": "2025-02-11T18:15:33.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Configuration Service Tampering Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de manipulaci\u00f3n del servicio de configuraci\u00f3n de escritorio remoto de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json index 1ed86f3c367..3c23b0e1643 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.903", "lastModified": "2025-02-11T18:15:33.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Kerberos en Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21351.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21351.json index 356eb9613cd..6d987d86581 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21351.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21351.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:34.113", "lastModified": "2025-02-11T18:15:34.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Active Directory Domain Services API Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de la API de servicios de dominio de Active Directory de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21352.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21352.json index dfece9e4b0a..2c6025cb55d 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21352.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21352.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:34.310", "lastModified": "2025-02-11T18:15:34.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en el uso compartido de la conexi\u00f3n a Internet (ICS)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21358.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21358.json index 0f1e0d26b4e..9207fd57ecd 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21358.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21358.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:34.550", "lastModified": "2025-02-11T18:15:34.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Core Messaging Elevation of Privileges Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Core Messaging" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21359.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21359.json index 5b5a902ef46..e51838cba93 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21359.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:34.743", "lastModified": "2025-02-11T18:15:34.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad del kernel de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21367.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21367.json index d01755ed293..f873226b440 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21367.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21367.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:34.943", "lastModified": "2025-02-11T18:15:34.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el subsistema del n\u00facleo Win32 de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21368.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21368.json index 27097756057..1e66a8696ea 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21368.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21368.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:35.123", "lastModified": "2025-02-11T18:15:35.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Digest Authentication Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la autenticaci\u00f3n de Microsoft Digest" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21369.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21369.json index 7bbcc7277ab..f6e079da6d3 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21369.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21369.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:35.340", "lastModified": "2025-02-11T18:15:35.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Digest Authentication Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la autenticaci\u00f3n de Microsoft Digest" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21371.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21371.json index ca317dfd98e..5981ae3ad5f 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21371.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21371.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:35.540", "lastModified": "2025-02-11T18:15:35.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21373.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21373.json index 74a87f8736f..74d33938968 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21373.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21373.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:35.740", "lastModified": "2025-02-11T18:15:35.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Installer" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21375.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21375.json index 4244df450ec..5dc7172a7bc 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21375.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21375.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:35.947", "lastModified": "2025-02-11T18:15:35.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador de servicio de transmisi\u00f3n de kernel WOW Thunk" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21376.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21376.json index 8c8c301247b..69f5df87552 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21376.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:36.167", "lastModified": "2025-02-11T18:15:36.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Protocolo ligero de acceso a directorios (LDAP) de Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21381.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21381.json index 6b56012478c..8a20a2e7e64 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21381.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21381.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:36.773", "lastModified": "2025-02-11T18:15:36.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21383.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21383.json index 89755fd2fad..0266b8a46f8 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21383.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21383.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:36.963", "lastModified": "2025-02-11T18:15:36.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21386.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21386.json index f310a5e4c7b..6c45d96d3fa 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21386.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21386.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.157", "lastModified": "2025-02-11T18:15:37.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json index 4898d70c647..dde92c4811a 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.337", "lastModified": "2025-02-11T18:15:37.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21390.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21390.json index 145cc3142c8..6c60a909bcf 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21390.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21390.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.523", "lastModified": "2025-02-11T18:15:37.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21392.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21392.json index b4f15edd3df..8d4a379f32e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21392.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21392.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.907", "lastModified": "2025-02-11T18:15:37.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21394.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21394.json index 3774eabe417..73cc445b021 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21394.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21394.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:38.100", "lastModified": "2025-02-11T18:15:38.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json index ea34391bb03..1cd9d93656e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21681.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21681.json index ee299af647b..9e27e846b61 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21681.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-31T12:15:29.260", "lastModified": "2025-01-31T12:15:29.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21684.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21684.json index 0179347798d..aab3744b904 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21684.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21684.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: xilinx: Convert gpio_lock to raw spinlock\n\nirq_chip functions may be called in raw spinlock context. Therefore, we\nmust also use a raw spinlock for our own internal locking.\n\nThis fixes the following lockdep splat:\n\n[ 5.349336] =============================\n[ 5.353349] [ BUG: Invalid wait context ]\n[ 5.357361] 6.13.0-rc5+ #69 Tainted: G W\n[ 5.363031] -----------------------------\n[ 5.367045] kworker/u17:1/44 is trying to lock:\n[ 5.371587] ffffff88018b02c0 (&chip->gpio_lock){....}-{3:3}, at: xgpio_irq_unmask (drivers/gpio/gpio-xilinx.c:433 (discriminator 8))\n[ 5.380079] other info that might help us debug this:\n[ 5.385138] context-{5:5}\n[ 5.387762] 5 locks held by kworker/u17:1/44:\n[ 5.392123] #0: ffffff8800014958 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work (kernel/workqueue.c:3204)\n[ 5.402260] #1: ffffffc082fcbdd8 (deferred_probe_work){+.+.}-{0:0}, at: process_one_work (kernel/workqueue.c:3205)\n[ 5.411528] #2: ffffff880172c900 (&dev->mutex){....}-{4:4}, at: __device_attach (drivers/base/dd.c:1006)\n[ 5.419929] #3: ffffff88039c8268 (request_class#2){+.+.}-{4:4}, at: __setup_irq (kernel/irq/internals.h:156 kernel/irq/manage.c:1596)\n[ 5.428331] #4: ffffff88039c80c8 (lock_class#2){....}-{2:2}, at: __setup_irq (kernel/irq/manage.c:1614)\n[ 5.436472] stack backtrace:\n[ 5.439359] CPU: 2 UID: 0 PID: 44 Comm: kworker/u17:1 Tainted: G W 6.13.0-rc5+ #69\n[ 5.448690] Tainted: [W]=WARN\n[ 5.451656] Hardware name: xlnx,zynqmp (DT)\n[ 5.455845] Workqueue: events_unbound deferred_probe_work_func\n[ 5.461699] Call trace:\n[ 5.464147] show_stack+0x18/0x24 C\n[ 5.467821] dump_stack_lvl (lib/dump_stack.c:123)\n[ 5.471501] dump_stack (lib/dump_stack.c:130)\n[ 5.474824] __lock_acquire (kernel/locking/lockdep.c:4828 kernel/locking/lockdep.c:4898 kernel/locking/lockdep.c:5176)\n[ 5.478758] lock_acquire (arch/arm64/include/asm/percpu.h:40 kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851 kernel/locking/lockdep.c:5814)\n[ 5.482429] _raw_spin_lock_irqsave (include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)\n[ 5.486797] xgpio_irq_unmask (drivers/gpio/gpio-xilinx.c:433 (discriminator 8))\n[ 5.490737] irq_enable (kernel/irq/internals.h:236 kernel/irq/chip.c:170 kernel/irq/chip.c:439 kernel/irq/chip.c:432 kernel/irq/chip.c:345)\n[ 5.494060] __irq_startup (kernel/irq/internals.h:241 kernel/irq/chip.c:180 kernel/irq/chip.c:250)\n[ 5.497645] irq_startup (kernel/irq/chip.c:270)\n[ 5.501143] __setup_irq (kernel/irq/manage.c:1807)\n[ 5.504728] request_threaded_irq (kernel/irq/manage.c:2208)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: xilinx: Convertir gpio_lock en un bloqueo de giro sin formato Las funciones irq_chip pueden llamarse en un contexto de bloqueo de giro sin formato. Por lo tanto, tambi\u00e9n debemos utilizar un bloqueo de giro sin formato para nuestro propio bloqueo interno. Esto corrige el siguiente error de bloqueo: [ 5.349336] ============================= [ 5.353349] [ BUG: Invalid wait context ] [ 5.357361] 6.13.0-rc5+ #69 Tainted: G W [ 5.363031] ----------------------------- [ 5.367045] kworker/u17:1/44 is trying to lock: [ 5.371587] ffffff88018b02c0 (&chip->gpio_lock){....}-{3:3}, at: xgpio_irq_unmask (drivers/gpio/gpio-xilinx.c:433 (discriminator 8)) [ 5.380079] other info that might help us debug this: [ 5.385138] context-{5:5} [ 5.387762] 5 locks held by kworker/u17:1/44: [ 5.392123] #0: ffffff8800014958 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work (kernel/workqueue.c:3204) [ 5.402260] #1: ffffffc082fcbdd8 (deferred_probe_work){+.+.}-{0:0}, at: process_one_work (kernel/workqueue.c:3205) [ 5.411528] #2: ffffff880172c900 (&dev->mutex){....}-{4:4}, at: __device_attach (drivers/base/dd.c:1006) [ 5.419929] #3: ffffff88039c8268 (request_class#2){+.+.}-{4:4}, at: __setup_irq (kernel/irq/internals.h:156 kernel/irq/manage.c:1596) [ 5.428331] #4: ffffff88039c80c8 (lock_class#2){....}-{2:2}, at: __setup_irq (kernel/irq/manage.c:1614) [ 5.436472] stack backtrace: [ 5.439359] CPU: 2 UID: 0 PID: 44 Comm: kworker/u17:1 Tainted: G W 6.13.0-rc5+ #69 [ 5.448690] Tainted: [W]=WARN [ 5.451656] Hardware name: xlnx,zynqmp (DT) [ 5.455845] Workqueue: events_unbound deferred_probe_work_func [ 5.461699] Call trace: [ 5.464147] show_stack+0x18/0x24 C [ 5.467821] dump_stack_lvl (lib/dump_stack.c:123) [ 5.471501] dump_stack (lib/dump_stack.c:130) [ 5.474824] __lock_acquire (kernel/locking/lockdep.c:4828 kernel/locking/lockdep.c:4898 kernel/locking/lockdep.c:5176) [ 5.478758] lock_acquire (arch/arm64/include/asm/percpu.h:40 kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851 kernel/locking/lockdep.c:5814) [ 5.482429] _raw_spin_lock_irqsave (include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162) [ 5.486797] xgpio_irq_unmask (drivers/gpio/gpio-xilinx.c:433 (discriminator 8)) [ 5.490737] irq_enable (kernel/irq/internals.h:236 kernel/irq/chip.c:170 kernel/irq/chip.c:439 kernel/irq/chip.c:432 kernel/irq/chip.c:345) [ 5.494060] __irq_startup (kernel/irq/internals.h:241 kernel/irq/chip.c:180 kernel/irq/chip.c:250) [ 5.497645] irq_startup (kernel/irq/chip.c:270) [ 5.501143] __setup_irq (kernel/irq/manage.c:1807) [ 5.504728] request_threaded_irq (kernel/irq/manage.c:2208)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21685.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21685.json index 1ecda619481..fc1caa03082 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21685.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21685.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: lenovo-yoga-tab2-pro-1380-fastcharger: fix serdev race\n\nThe yt2_1380_fc_serdev_probe() function calls devm_serdev_device_open()\nbefore setting the client ops via serdev_device_set_client_ops(). This\nordering can trigger a NULL pointer dereference in the serdev controller's\nreceive_buf handler, as it assumes serdev->ops is valid when\nSERPORT_ACTIVE is set.\n\nThis is similar to the issue fixed in commit 5e700b384ec1\n(\"platform/chrome: cros_ec_uart: properly fix race condition\") where\ndevm_serdev_device_open() was called before fully initializing the\ndevice.\n\nFix the race by ensuring client ops are set before enabling the port via\ndevm_serdev_device_open().\n\nNote, serdev_device_set_baudrate() and serdev_device_set_flow_control()\ncalls should be after the devm_serdev_device_open() call." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86: lenovo-yoga-tab2-pro-1380-fastcharger: corregir la condici\u00f3n de ejecuci\u00f3n de serdev La funci\u00f3n yt2_1380_fc_serdev_probe() llama a devm_serdev_device_open() antes de configurar las operaciones del cliente a trav\u00e9s de serdev_device_set_client_ops(). Este orden puede desencadenar una desreferencia de puntero NULL en el controlador de recepci\u00f3n de serdev, ya que asume que serdev->ops es v\u00e1lido cuando SERPORT_ACTIVE est\u00e1 configurado. Esto es similar al problema corregido en el commit 5e700b384ec1 (\"platform/chrome: cros_ec_uart: corregir correctamente la condici\u00f3n de ejecuci\u00f3n\") donde se llam\u00f3 a devm_serdev_device_open() antes de inicializar completamente el dispositivo. Corrija la ejecuci\u00f3n asegur\u00e1ndose de que las operaciones del cliente est\u00e9n configuradas antes de habilitar el puerto a trav\u00e9s de devm_serdev_device_open(). Tenga en cuenta que las llamadas a serdev_device_set_baudrate() y serdev_device_set_flow_control() deben realizarse despu\u00e9s de la llamada a devm_serdev_device_open(). " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21686.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21686.json index db34770d785..fa5cf258fc6 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21686.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21686.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.100", "lastModified": "2025-02-10T16:15:38.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/rsrc: require cloned buffers to share accounting contexts\n\nWhen IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring\ninstance A to uring instance B, where A and B use different MMs for\naccounting, the accounting can go wrong:\nIf uring instance A is closed before uring instance B, the pinned memory\ncounters for uring instance B will be decremented, even though the pinned\nmemory was originally accounted through uring instance A; so the MM of\nuring instance B can end up with negative locked memory." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/rsrc: requiere que los b\u00faferes clonados compartan contextos de contabilidad Cuando se utiliza IORING_REGISTER_CLONE_BUFFERS para clonar b\u00faferes de la instancia A de uring a la instancia B de uring, donde A y B utilizan diferentes MM para la contabilidad, la contabilidad puede fallar: si la instancia A de uring se cierra antes que la instancia B de uring, los contadores de memoria fijada para la instancia B de uring se reducir\u00e1n, aunque la memoria fijada se contabiliz\u00f3 originalmente a trav\u00e9s de la instancia A de uring; por lo que la MM de la instancia B de uring puede terminar con memoria bloqueada negativa." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json index d163322754e..87a4a47f098 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.207", "lastModified": "2025-02-10T16:15:38.207", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: check the bounds of read/write syscalls\n\ncount and offset are passed from user space and not checked, only\noffset is capped to 40 bits, which can be used to read/write out of\nbounds of the device." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/platform: comprueba que los l\u00edmites de las llamadas al sistema de lectura/escritura count y offset se pasan desde el espacio del usuario y no se comprueban, solo offset est\u00e1 limitado a 40 bits, que se pueden usar para leer/escribir fuera de los l\u00edmites del dispositivo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21688.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21688.json index 67aa3178dbe..548b23122f2 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21688.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21688.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.323", "lastModified": "2025-02-10T16:15:38.323", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Assign job pointer to NULL before signaling the fence\n\nIn commit e4b5ccd392b9 (\"drm/v3d: Ensure job pointer is set to NULL\nafter job completion\"), we introduced a change to assign the job pointer\nto NULL after completing a job, indicating job completion.\n\nHowever, this approach created a race condition between the DRM\nscheduler workqueue and the IRQ execution thread. As soon as the fence is\nsignaled in the IRQ execution thread, a new job starts to be executed.\nThis results in a race condition where the IRQ execution thread sets the\njob pointer to NULL simultaneously as the `run_job()` function assigns\na new job to the pointer.\n\nThis race condition can lead to a NULL pointer dereference if the IRQ\nexecution thread sets the job pointer to NULL after `run_job()` assigns\nit to the new job. When the new job completes and the GPU emits an\ninterrupt, `v3d_irq()` is triggered, potentially causing a crash.\n\n[ 466.310099] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000c0\n[ 466.318928] Mem abort info:\n[ 466.321723] ESR = 0x0000000096000005\n[ 466.325479] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 466.330807] SET = 0, FnV = 0\n[ 466.333864] EA = 0, S1PTW = 0\n[ 466.337010] FSC = 0x05: level 1 translation fault\n[ 466.341900] Data abort info:\n[ 466.344783] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[ 466.350285] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 466.355350] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 466.360677] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000089772000\n[ 466.367140] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[ 466.375875] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n[ 466.382163] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device algif_hash algif_skcipher af_alg bnep binfmt_misc vc4 snd_soc_hdmi_codec drm_display_helper cec brcmfmac_wcc spidev rpivid_hevc(C) drm_client_lib brcmfmac hci_uart drm_dma_helper pisp_be btbcm brcmutil snd_soc_core aes_ce_blk v4l2_mem2mem bluetooth aes_ce_cipher snd_compress videobuf2_dma_contig ghash_ce cfg80211 gf128mul snd_pcm_dmaengine videobuf2_memops ecdh_generic sha2_ce ecc videobuf2_v4l2 snd_pcm v3d sha256_arm64 rfkill videodev snd_timer sha1_ce libaes gpu_sched snd videobuf2_common sha1_generic drm_shmem_helper mc rp1_pio drm_kms_helper raspberrypi_hwmon spi_bcm2835 gpio_keys i2c_brcmstb rp1 raspberrypi_gpiomem rp1_mailbox rp1_adc nvmem_rmem uio_pdrv_genirq uio i2c_dev drm ledtrig_pattern drm_panel_orientation_quirks backlight fuse dm_mod ip_tables x_tables ipv6\n[ 466.458429] CPU: 0 UID: 1000 PID: 2008 Comm: chromium Tainted: G C 6.13.0-v8+ #18\n[ 466.467336] Tainted: [C]=CRAP\n[ 466.470306] Hardware name: Raspberry Pi 5 Model B Rev 1.0 (DT)\n[ 466.476157] pstate: 404000c9 (nZcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 466.483143] pc : v3d_irq+0x118/0x2e0 [v3d]\n[ 466.487258] lr : __handle_irq_event_percpu+0x60/0x228\n[ 466.492327] sp : ffffffc080003ea0\n[ 466.495646] x29: ffffffc080003ea0 x28: ffffff80c0c94200 x27: 0000000000000000\n[ 466.502807] x26: ffffffd08dd81d7b x25: ffffff80c0c94200 x24: ffffff8003bdc200\n[ 466.509969] x23: 0000000000000001 x22: 00000000000000a7 x21: 0000000000000000\n[ 466.517130] x20: ffffff8041bb0000 x19: 0000000000000001 x18: 0000000000000000\n[ 466.524291] x17: ffffffafadfb0000 x16: ffffffc080000000 x15: 0000000000000000\n[ 466.531452] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 466.538613] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffffd08c527eb0\n[ 466.545777] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n[ 466.552941] x5 : ffffffd08c4100d0 x4 : ffffffafadfb0000 x3 : ffffffc080003f70\n[ 466.560102] x2 : ffffffc0829e8058 x1 : 0000000000000001 x0 : 0000000000000000\n[ 466.567263] Call trace:\n[ 466.569711] v3d_irq+0x118/0x2e0 [v3d] (P)\n[ 466.\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/v3d: Asignar puntero de trabajo a NULL antes de se\u00f1alar la valla En el commit e4b5ccd392b9 (\"drm/v3d: Asegurarse de que el puntero de trabajo est\u00e9 establecido en NULL despu\u00e9s de la finalizaci\u00f3n del trabajo\"), introdujimos un cambio para asignar el puntero de trabajo a NULL despu\u00e9s de completar un trabajo, lo que indica la finalizaci\u00f3n del trabajo. Sin embargo, este enfoque cre\u00f3 una condici\u00f3n de ejecuci\u00f3n entre la cola de trabajo del programador DRM y el hilo de ejecuci\u00f3n de IRQ. Tan pronto como se se\u00f1ala la valla en el hilo de ejecuci\u00f3n de IRQ, comienza a ejecutarse un nuevo trabajo. Esto da como resultado una condici\u00f3n de ejecuci\u00f3n donde el hilo de ejecuci\u00f3n de IRQ establece el puntero de trabajo en NULL simult\u00e1neamente mientras la funci\u00f3n `run_job()` asigna un nuevo trabajo al puntero. Esta condici\u00f3n de ejecuci\u00f3n puede conducir a una desreferencia de puntero NULL si el hilo de ejecuci\u00f3n de IRQ establece el puntero de trabajo en NULL despu\u00e9s de que `run_job()` lo asigne al nuevo trabajo. Cuando se completa el nuevo trabajo y la GPU emite una interrupci\u00f3n, se activa `v3d_irq()`, lo que puede provocar un bloqueo. [ 466.310099] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 00000000000000c0 [ 466.318928] Mem abort info: [ 466.321723] ESR = 0x0000000096000005 [ 466.325479] EC = 0x25: DABT (current EL), IL = 32 bits [ 466.330807] SET = 0, FnV = 0 [ 466.333864] EA = 0, S1PTW = 0 [ 466.337010] FSC = 0x05: level 1 translation fault [ 466.341900] Data abort info: [ 466.344783] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 466.350285] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 466.355350] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 466.360677] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000089772000 [ 466.367140] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 [ 466.375875] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 466.382163] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device algif_hash algif_skcipher af_alg bnep binfmt_misc vc4 snd_soc_hdmi_codec drm_display_helper cec brcmfmac_wcc spidev rpivid_hevc(C) drm_client_lib brcmfmac hci_uart drm_dma_helper pisp_be btbcm brcmutil snd_soc_core aes_ce_blk v4l2_mem2mem bluetooth aes_ce_cipher snd_compress videobuf2_dma_contig ghash_ce cfg80211 gf128mul snd_pcm_dmaengine videobuf2_memops ecdh_generic sha2_ce ecc videobuf2_v4l2 snd_pcm v3d sha256_arm64 rfkill videodev snd_timer sha1_ce libaes gpu_sched snd videobuf2_common sha1_generic drm_shmem_helper mc rp1_pio drm_kms_helper raspberrypi_hwmon spi_bcm2835 gpio_keys i2c_brcmstb rp1 raspberrypi_gpiomem rp1_mailbox rp1_adc nvmem_rmem uio_pdrv_genirq uio i2c_dev drm ledtrig_pattern drm_panel_orientation_quirks backlight fuse dm_mod ip_tables x_tables ipv6 [ 466.458429] CPU: 0 UID: 1000 PID: 2008 Comm: chromium Tainted: G C 6.13.0-v8+ #18 [ 466.467336] Tainted: [C]=CRAP [ 466.470306] Hardware name: Raspberry Pi 5 Model B Rev 1.0 (DT) [ 466.476157] pstate: 404000c9 (nZcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 466.483143] pc : v3d_irq+0x118/0x2e0 [v3d] [ 466.487258] lr : __handle_irq_event_percpu+0x60/0x228 [ 466.492327] sp : ffffffc080003ea0 [ 466.495646] x29: ffffffc080003ea0 x28: ffffff80c0c94200 x27: 0000000000000000 [ 466.502807] x26: ffffffd08dd81d7b x25: ffffff80c0c94200 x24: ffffff8003bdc200 [ 466.509969] x23: 0000000000000001 x22: 00000000000000a7 x21: 0000000000000000 [ 466.517130] x20: ffffff8041bb0000 x19: 0000000000000001 x18: 0000000000000000 [ 466.524291] x17: ffffffafadfb0000 x16: ffffffc080000000 x15: 0000000000000000 [ 466.531452] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 466.538613] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffffd08c527eb0 [ 466.545777] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 [ 466.552941] x5 : ffffffd08c4100d0 x4 : ffffffafadfb0000 x3 : ffffffc080003f70 ---truncated--- " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21689.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21689.json index 4496a6ca2d8..be31f7eeaa5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21689.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21689.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.447", "lastModified": "2025-02-10T16:15:38.447", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()\n\nThis patch addresses a null-ptr-deref in qt2_process_read_urb() due to\nan incorrect bounds check in the following:\n\n if (newport > serial->num_ports) {\n dev_err(&port->dev,\n \"%s - port change to invalid port: %i\\n\",\n __func__, newport);\n break;\n }\n\nThe condition doesn't account for the valid range of the serial->port\nbuffer, which is from 0 to serial->num_ports - 1. When newport is equal\nto serial->num_ports, the assignment of \"port\" in the\nfollowing code is out-of-bounds and NULL:\n\n serial_priv->current_port = newport;\n port = serial->port[serial_priv->current_port];\n\nThe fix checks if newport is greater than or equal to serial->num_ports\nindicating it is out-of-bounds." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: serial: quatech2: arreglo de null-ptr-deref en qt2_process_read_urb() Este parche soluciona un null-ptr-deref en qt2_process_read_urb() debido a una comprobaci\u00f3n de los l\u00edmites incorrecta en lo siguiente: if (newport > serial->num_ports) { dev_err(&port->dev, \"%s - port change to invalid port: %i\\n\", __func__, newport); break; } La condici\u00f3n no tiene en cuenta el rango v\u00e1lido del b\u00fafer serial->port, que es de 0 a serial->num_ports - 1. Cuando newport es igual a serial->num_ports, la asignaci\u00f3n de \"port\" en el siguiente c\u00f3digo est\u00e1 fuera de los l\u00edmites y es NULL: serial_priv->current_port = newport; port = serial->port[serial_priv->current_port]; La soluci\u00f3n verifica si newport es mayor o igual que serial->num_ports, lo que indica que est\u00e1 fuera de los l\u00edmites." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21690.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21690.json index 4959ef53ad7..3c29e2f31b9 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21690.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21690.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.553", "lastModified": "2025-02-10T16:15:38.553", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Ratelimit warning logs to prevent VM denial of service\n\nIf there's a persistent error in the hypervisor, the SCSI warning for\nfailed I/O can flood the kernel log and max out CPU utilization,\npreventing troubleshooting from the VM side. Ratelimit the warning so\nit doesn't DoS the VM." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: storvsc: Limite la velocidad de los registros de advertencia para evitar la denegaci\u00f3n de servicio de la m\u00e1quina virtual. Si hay un error persistente en el hipervisor, la advertencia de SCSI por E/S fallida puede inundar el registro del kernel y maximizar la utilizaci\u00f3n de la CPU, lo que impide la resoluci\u00f3n de problemas desde el lado de la m\u00e1quina virtual. Limite la velocidad de la advertencia para que no realice un ataque de denegaci\u00f3n de servicio (DoS) a la m\u00e1quina virtual." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21691.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21691.json index 0bd3b217333..830f8e6d49c 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21691.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21691.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.660", "lastModified": "2025-02-10T16:15:38.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachestat: fix page cache statistics permission checking\n\nWhen the 'cachestat()' system call was added in commit cf264e1329fb\n(\"cachestat: implement cachestat syscall\"), it was meant to be a much\nmore convenient (and performant) version of mincore() that didn't need\nmapping things into the user virtual address space in order to work.\n\nBut it ended up missing the \"check for writability or ownership\" fix for\nmincore(), done in commit 134fca9063ad (\"mm/mincore.c: make mincore()\nmore conservative\").\n\nThis just adds equivalent logic to 'cachestat()', modified for the file\ncontext (rather than vma)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cachestat: corregir la comprobaci\u00f3n de permisos de las estad\u00edsticas de cach\u00e9 de p\u00e1gina Cuando se a\u00f1adi\u00f3 la llamada al sistema 'cachestat()' en el commit cf264e1329fb (\"cachestat: implementar la llamada al sistema cachestat\"), se supon\u00eda que era una versi\u00f3n mucho m\u00e1s conveniente (y de mayor rendimiento) de mincore() que no necesitaba asignar cosas al espacio de direcciones virtuales del usuario para funcionar. Pero termin\u00f3 faltando la correcci\u00f3n de \"comprobar la capacidad de escritura o la propiedad\" para mincore(), realizada en el commit 134fca9063ad (\"mm/mincore.c: hacer que mincore() sea m\u00e1s conservador\"). Esto solo a\u00f1ade una l\u00f3gica equivalente a 'cachestat()', modificada para el contexto del archivo (en lugar de vma)." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21692.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21692.json index 91fd954cb28..ab108fe3029 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21692.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21692.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.763", "lastModified": "2025-02-10T16:15:38.763", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix ets qdisc OOB Indexing\n\nHaowei Yan found that ets_class_from_arg() can\nindex an Out-Of-Bound class in ets_class_from_arg() when passed clid of\n0. The overflow may cause local privilege escalation.\n\n [ 18.852298] ------------[ cut here ]------------\n [ 18.853271] UBSAN: array-index-out-of-bounds in net/sched/sch_ets.c:93:20\n [ 18.853743] index 18446744073709551615 is out of range for type 'ets_class [16]'\n [ 18.854254] CPU: 0 UID: 0 PID: 1275 Comm: poc Not tainted 6.12.6-dirty #17\n [ 18.854821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n [ 18.856532] Call Trace:\n [ 18.857441] \n [ 18.858227] dump_stack_lvl+0xc2/0xf0\n [ 18.859607] dump_stack+0x10/0x20\n [ 18.860908] __ubsan_handle_out_of_bounds+0xa7/0xf0\n [ 18.864022] ets_class_change+0x3d6/0x3f0\n [ 18.864322] tc_ctl_tclass+0x251/0x910\n [ 18.864587] ? lock_acquire+0x5e/0x140\n [ 18.865113] ? __mutex_lock+0x9c/0xe70\n [ 18.866009] ? __mutex_lock+0xa34/0xe70\n [ 18.866401] rtnetlink_rcv_msg+0x170/0x6f0\n [ 18.866806] ? __lock_acquire+0x578/0xc10\n [ 18.867184] ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n [ 18.867503] netlink_rcv_skb+0x59/0x110\n [ 18.867776] rtnetlink_rcv+0x15/0x30\n [ 18.868159] netlink_unicast+0x1c3/0x2b0\n [ 18.868440] netlink_sendmsg+0x239/0x4b0\n [ 18.868721] ____sys_sendmsg+0x3e2/0x410\n [ 18.869012] ___sys_sendmsg+0x88/0xe0\n [ 18.869276] ? rseq_ip_fixup+0x198/0x260\n [ 18.869563] ? rseq_update_cpu_node_id+0x10a/0x190\n [ 18.869900] ? trace_hardirqs_off+0x5a/0xd0\n [ 18.870196] ? syscall_exit_to_user_mode+0xcc/0x220\n [ 18.870547] ? do_syscall_64+0x93/0x150\n [ 18.870821] ? __memcg_slab_free_hook+0x69/0x290\n [ 18.871157] __sys_sendmsg+0x69/0xd0\n [ 18.871416] __x64_sys_sendmsg+0x1d/0x30\n [ 18.871699] x64_sys_call+0x9e2/0x2670\n [ 18.871979] do_syscall_64+0x87/0x150\n [ 18.873280] ? do_syscall_64+0x93/0x150\n [ 18.874742] ? lock_release+0x7b/0x160\n [ 18.876157] ? do_user_addr_fault+0x5ce/0x8f0\n [ 18.877833] ? irqentry_exit_to_user_mode+0xc2/0x210\n [ 18.879608] ? irqentry_exit+0x77/0xb0\n [ 18.879808] ? clear_bhb_loop+0x15/0x70\n [ 18.880023] ? clear_bhb_loop+0x15/0x70\n [ 18.880223] ? clear_bhb_loop+0x15/0x70\n [ 18.880426] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [ 18.880683] RIP: 0033:0x44a957\n [ 18.880851] Code: ff ff e8 fc 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 8974 24 10\n [ 18.881766] RSP: 002b:00007ffcdd00fad8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n [ 18.882149] RAX: ffffffffffffffda RBX: 00007ffcdd010db8 RCX: 000000000044a957\n [ 18.882507] RDX: 0000000000000000 RSI: 00007ffcdd00fb70 RDI: 0000000000000003\n [ 18.885037] RBP: 00007ffcdd010bc0 R08: 000000000703c770 R09: 000000000703c7c0\n [ 18.887203] R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000001\n [ 18.888026] R13: 00007ffcdd010da8 R14: 00000000004ca7d0 R15: 0000000000000001\n [ 18.888395] \n [ 18.888610] ---[ end trace ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: fix ets qdisc OOB Indexing Haowei Yan descubri\u00f3 que ets_class_from_arg() puede indexar una clase fuera de los l\u00edmites en ets_class_from_arg() cuando se le pasa un clid de 0. El desbordamiento puede provocar una escalada de privilegios locales. [ 18.852298] ------------[ cut here ]------------ [ 18.853271] UBSAN: array-index-out-of-bounds in net/sched/sch_ets.c:93:20 [ 18.853743] index 18446744073709551615 is out of range for type 'ets_class [16]' [ 18.854254] CPU: 0 UID: 0 PID: 1275 Comm: poc Not tainted 6.12.6-dirty #17 [ 18.854821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 [ 18.856532] Call Trace: [ 18.857441] [ 18.858227] dump_stack_lvl+0xc2/0xf0 [ 18.859607] dump_stack+0x10/0x20 [ 18.860908] __ubsan_handle_out_of_bounds+0xa7/0xf0 [ 18.864022] ets_class_change+0x3d6/0x3f0 [ 18.864322] tc_ctl_tclass+0x251/0x910 [ 18.864587] ? lock_acquire+0x5e/0x140 [ 18.865113] ? __mutex_lock+0x9c/0xe70 [ 18.866009] ? __mutex_lock+0xa34/0xe70 [ 18.866401] rtnetlink_rcv_msg+0x170/0x6f0 [ 18.866806] ? __lock_acquire+0x578/0xc10 [ 18.867184] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 18.867503] netlink_rcv_skb+0x59/0x110 [ 18.867776] rtnetlink_rcv+0x15/0x30 [ 18.868159] netlink_unicast+0x1c3/0x2b0 [ 18.868440] netlink_sendmsg+0x239/0x4b0 [ 18.868721] ____sys_sendmsg+0x3e2/0x410 [ 18.869012] ___sys_sendmsg+0x88/0xe0 [ 18.869276] ? rseq_ip_fixup+0x198/0x260 [ 18.869563] ? rseq_update_cpu_node_id+0x10a/0x190 [ 18.869900] ? trace_hardirqs_off+0x5a/0xd0 [ 18.870196] ? syscall_exit_to_user_mode+0xcc/0x220 [ 18.870547] ? do_syscall_64+0x93/0x150 [ 18.870821] ? __memcg_slab_free_hook+0x69/0x290 [ 18.871157] __sys_sendmsg+0x69/0xd0 [ 18.871416] __x64_sys_sendmsg+0x1d/0x30 [ 18.871699] x64_sys_call+0x9e2/0x2670 [ 18.871979] do_syscall_64+0x87/0x150 [ 18.873280] ? do_syscall_64+0x93/0x150 [ 18.874742] ? lock_release+0x7b/0x160 [ 18.876157] ? do_user_addr_fault+0x5ce/0x8f0 [ 18.877833] ? irqentry_exit_to_user_mode+0xc2/0x210 [ 18.879608] ? irqentry_exit+0x77/0xb0 [ 18.879808] ? clear_bhb_loop+0x15/0x70 [ 18.880023] ? clear_bhb_loop+0x15/0x70 [ 18.880223] ? clear_bhb_loop+0x15/0x70 [ 18.880426] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 18.880683] RIP: 0033:0x44a957 [ 18.880851] Code: ff ff e8 fc 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 8974 24 10 [ 18.881766] RSP: 002b:00007ffcdd00fad8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 18.882149] RAX: ffffffffffffffda RBX: 00007ffcdd010db8 RCX: 000000000044a957 [ 18.882507] RDX: 0000000000000000 RSI: 00007ffcdd00fb70 RDI: 0000000000000003 [ 18.885037] RBP: 00007ffcdd010bc0 R08: 000000000703c770 R09: 000000000703c7c0 [ 18.887203] R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000001 [ 18.888026] R13: 00007ffcdd010da8 R14: 00000000004ca7d0 R15: 0000000000000001 [ 18.888395] [ 18.888610] ---[ end trace ]---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21693.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21693.json index dc09425cd29..aeb6b987ab9 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21693.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21693.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.883", "lastModified": "2025-02-10T18:15:35.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: zswap: properly synchronize freeing resources during CPU hotunplug\n\nIn zswap_compress() and zswap_decompress(), the per-CPU acomp_ctx of the\ncurrent CPU at the beginning of the operation is retrieved and used\nthroughout. However, since neither preemption nor migration are disabled,\nit is possible that the operation continues on a different CPU.\n\nIf the original CPU is hotunplugged while the acomp_ctx is still in use,\nwe run into a UAF bug as some of the resources attached to the acomp_ctx\nare freed during hotunplug in zswap_cpu_comp_dead() (i.e. \nacomp_ctx.buffer, acomp_ctx.req, or acomp_ctx.acomp).\n\nThe problem was introduced in commit 1ec3b5fe6eec (\"mm/zswap: move to use\ncrypto_acomp API for hardware acceleration\") when the switch to the\ncrypto_acomp API was made. Prior to that, the per-CPU crypto_comp was\nretrieved using get_cpu_ptr() which disables preemption and makes sure the\nCPU cannot go away from under us. Preemption cannot be disabled with the\ncrypto_acomp API as a sleepable context is needed.\n\nUse the acomp_ctx.mutex to synchronize CPU hotplug callbacks allocating\nand freeing resources with compression/decompression paths. Make sure\nthat acomp_ctx.req is NULL when the resources are freed. In the\ncompression/decompression paths, check if acomp_ctx.req is NULL after\nacquiring the mutex (meaning the CPU was offlined) and retry on the new\nCPU.\n\nThe initialization of acomp_ctx.mutex is moved from the CPU hotplug\ncallback to the pool initialization where it belongs (where the mutex is\nallocated). In addition to adding clarity, this makes sure that CPU\nhotplug cannot reinitialize a mutex that is already locked by\ncompression/decompression.\n\nPreviously a fix was attempted by holding cpus_read_lock() [1]. This\nwould have caused a potential deadlock as it is possible for code already\nholding the lock to fall into reclaim and enter zswap (causing a\ndeadlock). A fix was also attempted using SRCU for synchronization, but\nJohannes pointed out that synchronize_srcu() cannot be used in CPU hotplug\nnotifiers [2].\n\nAlternative fixes that were considered/attempted and could have worked:\n- Refcounting the per-CPU acomp_ctx. This involves complexity in\n handling the race between the refcount dropping to zero in\n zswap_[de]compress() and the refcount being re-initialized when the\n CPU is onlined.\n- Disabling migration before getting the per-CPU acomp_ctx [3], but\n that's discouraged and is a much bigger hammer than needed, and could\n result in subtle performance issues.\n\n[1]https://lkml.kernel.org/20241219212437.2714151-1-yosryahmed@google.com/\n[2]https://lkml.kernel.org/20250107074724.1756696-2-yosryahmed@google.com/\n[3]https://lkml.kernel.org/20250107222236.2715883-2-yosryahmed@google.com/\n\n[yosryahmed@google.com: remove comment]\n Link: https://lkml.kernel.org/r/CAJD7tkaxS1wjn+swugt8QCvQ-rVF5RZnjxwPGX17k8x9zSManA@mail.gmail.com" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: zswap: sincronizar correctamente la liberaci\u00f3n de recursos durante la desconexi\u00f3n en caliente de la CPU En zswap_compress() y zswap_decompress(), se recupera y se utiliza en todo momento el acomp_ctx por CPU de la CPU actual al comienzo de la operaci\u00f3n. Sin embargo, dado que ni la preempci\u00f3n ni la migraci\u00f3n est\u00e1n deshabilitadas, es posible que la operaci\u00f3n contin\u00fae en una CPU diferente. Si se desconecta en caliente la CPU original mientras el acomp_ctx todav\u00eda est\u00e1 en uso, nos encontramos con un error de UAF ya que algunos de los recursos adjuntos al acomp_ctx se liberan durante la desconexi\u00f3n en caliente en zswap_cpu_comp_dead() (es decir, acomp_ctx.buffer, acomp_ctx.req o acomp_ctx.acomp). El problema se introdujo en el commit 1ec3b5fe6eec (\"mm/zswap: pasar a usar la API crypto_acomp para la aceleraci\u00f3n de hardware\") cuando se realiz\u00f3 el cambio a la API crypto_acomp. Antes de eso, el crypto_comp por CPU se recuperaba usando get_cpu_ptr() que deshabilita la preempci\u00f3n y se asegura de que la CPU no pueda irse de debajo de nosotros. La preempci\u00f3n no se puede deshabilitar con la API crypto_acomp ya que se necesita un contexto inactivo. Use acomp_ctx.mutex para sincronizar las devoluciones de llamadas hotplug de la CPU que asignan y liberan recursos con rutas de compresi\u00f3n/descompresi\u00f3n. Aseg\u00farese de que acomp_ctx.req sea NULL cuando se liberan los recursos. En las rutas de compresi\u00f3n/descompresi\u00f3n, verifique si acomp_ctx.req es NULL despu\u00e9s de adquirir el mutex (lo que significa que la CPU estaba fuera de l\u00ednea) y vuelva a intentarlo en la nueva CPU. La inicializaci\u00f3n de acomp_ctx.mutex se mueve de la devoluci\u00f3n de llamada hotplug de la CPU a la inicializaci\u00f3n del grupo donde pertenece (donde se asigna el mutex). Adem\u00e1s de agregar claridad, esto asegura que la conexi\u00f3n en caliente de la CPU no pueda reinicializar un mutex que ya est\u00e1 bloqueado por compresi\u00f3n/descompresi\u00f3n. Anteriormente se intent\u00f3 una soluci\u00f3n manteniendo pulsada la tecla cpus_read_lock() [1]. Esto habr\u00eda provocado un posible bloqueo, ya que es posible que el c\u00f3digo que ya mantiene el bloqueo caiga en recuperaci\u00f3n y entre en zswap (provocando un bloqueo). Tambi\u00e9n se intent\u00f3 una soluci\u00f3n utilizando SRCU para la sincronizaci\u00f3n, pero Johannes se\u00f1al\u00f3 que no se puede utilizarsynchronous_srcu() en los notificadores de conexi\u00f3n en caliente de la CPU [2]. Workarounds que se consideraron/intentaron y que podr\u00edan haber funcionado: - Refcounting el acomp_ctx por CPU. Esto implica complejidad en la gesti\u00f3n de la ejecuci\u00f3n entre el refcount que cae a cero en zswap_[de]compress() y el refcount que se reinicializa cuando la CPU est\u00e1 en l\u00ednea. - Deshabilitar la migraci\u00f3n antes de obtener el acomp_ctx por CPU [3], pero eso no se recomienda y es un martillo mucho m\u00e1s grande de lo necesario, y podr\u00eda dar lugar a problemas de rendimiento sutiles. [1]https://lkml.kernel.org/20241219212437.2714151-1-yosryahmed@google.com/ [2]https://lkml.kernel.org/20250107074724.1756696-2-yosryahmed@google.com/ [3]https://lkml.kernel.org/20250107222236.2715883-2-yosryahmed@google.com/ [yosryahmed@google.com: eliminar comentario] Enlace: https://lkml.kernel.org/r/CAJD7tkaxS1wjn+swugt8QCvQ-rVF5RZnjxwPGX17k8x9zSManA@mail.gmail.com" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21700.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21700.json index 93cd860cffd..7a2e0396c6e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21700.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21700.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-13T12:15:27.837", "lastModified": "2025-02-13T14:16:18.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug <=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent. b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12. send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13. send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: No permitir el reemplazo de una qdisc secundaria de una primaria a otra Lion Ackermann pudo crear una UAF que se puede usar de forma abusiva para la escalada de privilegios con el siguiente script Step 1. create root qdisc tc qdisc add dev lo root handle 1:0 drr step2. a class for packet aggregation do demonstrate uaf tc class add dev lo classid 1:1 drr step3. a class for nesting tc class add dev lo classid 1:2 drr step4. a class to graft qdisc to tc class add dev lo classid 1:3 drr step5. tc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024 step6. tc qdisc add dev lo parent 1:2 handle 3:0 drr step7. tc class add dev lo classid 3:1 drr step 8. tc qdisc add dev lo parent 3:1 handle 4:0 pfifo step 9. Display the class/qdisc layout tc class ls dev lo class drr 1:1 root leaf 2: quantum 64Kb class drr 1:2 root leaf 3: quantum 64Kb class drr 3:1 root leaf 4: quantum 64Kb tc qdisc ls qdisc drr 1: dev lo root refcnt 2 qdisc plug 2: dev lo parent 1:1 qdisc pfifo 4: dev lo parent 3:1 limit 1000p qdisc drr 3: dev lo parent 1:2 step10. trigger the bug <=== prevented by this patch tc qdisc replace dev lo parent 1:3 handle 4:0 step 11. Redisplay again the qdiscs/classes tc class ls dev lo class drr 1:1 root leaf 2: quantum 64Kb class drr 1:2 root leaf 3: quantum 64Kb class drr 1:3 root leaf 4: quantum 64Kb class drr 3:1 root leaf 4: quantum 64Kb tc qdisc ls qdisc drr 1: dev lo root refcnt 2 qdisc plug 2: dev lo parent 1:1 qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p qdisc drr 3: dev lo parent 1:2 Observe that a) parent for 4:0 does not change despite the replace request. There can only be one parent. b) refcount has gone up by two for 4:0 and c) both class 1:3 and 3:1 are pointing to it. Step 12. send one packet to plug echo \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001)) step13. send one packet to the grafted fifo echo \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003)) step14. La sem\u00e1ntica de \"reemplazar\" es para una eliminaci\u00f3n/adici\u00f3n _en el mismo nodo_ y no para una eliminaci\u00f3n de un nodo (3:1) y una adici\u00f3n a otro nodo (1:3) como en el paso 10. Si bien podr\u00edamos \"arreglarlo\" con un enfoque m\u00e1s complejo, podr\u00eda haber consecuencias para las expectativas, por lo que el parche adopta el enfoque preventivo de \"no permitir dicha configuraci\u00f3n\". Trabajo conjunto con Lion Ackermann " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json index 3939595f13b..99ac9bd6ebb 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-13T15:15:20.867", "lastModified": "2025-02-13T15:15:20.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: avoid race between device unregistration and ethnl ops\n\nThe following trace can be seen if a device is being unregistered while\nits number of channels are being modified.\n\n DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120\n CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771\n RIP: 0010:__mutex_lock+0xc8a/0x1120\n Call Trace:\n \n ethtool_check_max_channel+0x1ea/0x880\n ethnl_set_channels+0x3c3/0xb10\n ethnl_default_set_doit+0x306/0x650\n genl_family_rcv_msg_doit+0x1e3/0x2c0\n genl_rcv_msg+0x432/0x6f0\n netlink_rcv_skb+0x13d/0x3b0\n genl_rcv+0x28/0x40\n netlink_unicast+0x42e/0x720\n netlink_sendmsg+0x765/0xc20\n __sys_sendto+0x3ac/0x420\n __x64_sys_sendto+0xe0/0x1c0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThis is because unregister_netdevice_many_notify might run before the\nrtnl lock section of ethnl operations, eg. set_channels in the above\nexample. In this example the rss lock would be destroyed by the device\nunregistration path before being used again, but in general running\nethnl operations while dismantle has started is not a good idea.\n\nFix this by denying any operation on devices being unregistered. A check\nwas already there in ethnl_ops_begin, but not wide enough.\n\nNote that the same issue cannot be seen on the ioctl version\n(__dev_ethtool) because the device reference is retrieved from within\nthe rtnl lock section there. Once dismantle started, the net device is\nunlisted and no reference will be found." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: evitar la ejecuci\u00f3n entre la anulaci\u00f3n del registro del dispositivo y las operaciones ethnl. El siguiente rastro se puede ver si se anula el registro de un dispositivo mientras se modifica su n\u00famero de canales. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e. Esto se debe a que unregister_netdevice_many_notify podr\u00eda ejecutarse antes de la secci\u00f3n de bloqueo rtnl de las operaciones ethnl, por ejemplo, set_channels en el ejemplo anterior. En este ejemplo, el bloqueo de rss se destruir\u00eda por la ruta de anulaci\u00f3n del registro del dispositivo antes de volver a usarse, pero en general, ejecutar operaciones ethnl mientras se ha iniciado el desmantelamiento no es una buena idea. Solucione esto denegando cualquier operaci\u00f3n en los dispositivos que se van a anular el registro. Ya hab\u00eda una comprobaci\u00f3n en ethnl_ops_begin, pero no lo suficientemente amplia. Tenga en cuenta que no se puede ver el mismo problema en la versi\u00f3n ioctl (__dev_ethtool) porque la referencia del dispositivo se recupera desde dentro de la secci\u00f3n de bloqueo rtnl all\u00ed. Una vez que se inicia el desmantelamiento, el dispositivo de red no aparece en la lista y no se encontrar\u00e1 ninguna referencia." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22399.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22399.json index c2c970cae80..025f30621cd 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22399.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22399.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-11T17:15:34.453", "lastModified": "2025-02-11T17:15:34.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell UCC Edge, version 2.3.0, contains a Blind SSRF on Add Customer SFTP Server vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Server-side request forgery" + }, + { + "lang": "es", + "value": "Dell UCC Edge, versi\u00f3n 2.3.0, contiene una vulnerabilidad de SSRF ciega en el servidor SFTP de adici\u00f3n de clientes. Un atacante no autenticado con acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda Server-Side Request Forgery." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json index 83d2eca56ff..e452e06ca03 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-07T03:15:12.287", "lastModified": "2025-02-07T03:15:12.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Update Manager Plugin, version(s) 1.5.0 through 1.6.0, contain(s) an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure." + }, + { + "lang": "es", + "value": "El complemento Dell Update Manager, versi\u00f3n(es) 1.5.0 a 1.6.0, contiene una vulnerabilidad de neutralizaci\u00f3n inadecuada de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico). Un atacante con pocos privilegios y acceso remoto podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json index 1965407bfa8..f34277d0903 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:50.840", "lastModified": "2025-02-11T16:15:50.840", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en pila en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.6 permite que un atacante autenticado remoto logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json index 58a42b7d823..89911e8dfff 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-13T16:16:48.777", "lastModified": "2025-02-13T16:16:48.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell SupportAssist OS Recovery versions prior to 5.5.13.1 contain a symbolic link attack vulnerability. A low-privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary file deletion and Elevation of Privileges." + }, + { + "lang": "es", + "value": "Las versiones de Dell SupportAssist OS Recovery anteriores a la 5.5.13.1 contienen una vulnerabilidad de ataque de enlace simb\u00f3lico. Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la eliminaci\u00f3n arbitraria de archivos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22601.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22601.json index af7055d4b67..97b5de0d2fa 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22601.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22601.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:27.800", "lastModified": "2025-02-04T21:15:27.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22602.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22602.json index 6d822fd549b..5b48f7e9903 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22602.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:27.950", "lastModified": "2025-02-04T21:15:27.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json index a5130932e36..9e5a37f7427 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:31.000", "lastModified": "2025-02-05T18:15:31.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json index b3c0bb3ca6a..8dc7db382d1 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@golang.org", "published": "2025-02-06T18:15:32.543", "lastModified": "2025-02-06T22:15:40.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22880.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22880.json index 7b175d483a7..35b1e0d26d1 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22880.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22880.json @@ -3,12 +3,16 @@ "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-02-07T08:15:28.737", "lastModified": "2025-02-07T08:15:28.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Si un objetivo visita una p\u00e1gina maliciosa o abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22890.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22890.json index e8ec19c7951..d83a14e286d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22890.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22890.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T07:15:17.113", "lastModified": "2025-02-06T07:15:17.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json index e11d82f42de..1eb5658bdb5 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:31.190", "lastModified": "2025-02-05T18:15:31.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22894.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22894.json index bbd72bbbac5..c85bb34005a 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22894.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22894.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T08:15:30.027", "lastModified": "2025-02-06T08:15:30.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22896.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22896.json index dff52618588..9b8eee655ae 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22896.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22896.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "mySCADA myPRO Manager\n\n\nstores credentials in cleartext, which could allow an attacker to obtain sensitive information." + }, + { + "lang": "es", + "value": "mySCADA myPRO Manager almacena las credenciales en texto plano, lo que podr\u00eda permitir a un atacante obtener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json index f9cbd13b4f1..66557bb43ee 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T19:15:19.970", "lastModified": "2025-02-06T21:15:23.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23023.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23023.json index 6a4e6dfc414..4714a66e427 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23023.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23023.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T21:15:28.083", "lastModified": "2025-02-04T21:15:28.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23058.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23058.json index e58760fb3c3..79c9ba21a1c 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23058.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23058.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-02-04T18:15:35.423", "lastModified": "2025-02-04T18:15:35.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23059.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23059.json index cde5e409303..b59e529c1d8 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23059.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-02-04T18:15:35.570", "lastModified": "2025-02-04T18:15:35.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23060.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23060.json index b23c4ab50fa..cac72130d17 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23060.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23060.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-02-04T18:15:35.717", "lastModified": "2025-02-04T18:15:35.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23085.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23085.json index b520bd19f4d..0b98ef876d0 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23085.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23085.json @@ -3,12 +3,16 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-02-07T07:15:15.810", "lastModified": "2025-02-07T16:15:40.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\r\n\r\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x." + }, + { + "lang": "es", + "value": "Se podr\u00eda producir una p\u00e9rdida de memoria cuando un par remoto cierra abruptamente el socket sin enviar una notificaci\u00f3n GOAWAY. Adem\u00e1s, si nghttp2 detectaba un encabezado no v\u00e1lido, lo que hac\u00eda que el par terminara la conexi\u00f3n, se activaba la misma p\u00e9rdida. Esta falla podr\u00eda provocar un mayor consumo de memoria y una posible denegaci\u00f3n de servicio en determinadas condiciones. Esta vulnerabilidad afecta a los usuarios del servidor HTTP/2 en Node.js v18.x, v20.x, v22.x y v23.x." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json index 3266f566452..8104defd374 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-02-05T02:15:28.610", "lastModified": "2025-02-05T02:15:28.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json index b12b84abb96..396dff43726 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.117", "lastModified": "2025-02-11T15:15:21.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an unauthenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability." + }, + { + "lang": "es", + "value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n en un m\u00f3dulo de funci\u00f3n habilitado para RFC en la transacci\u00f3n SDCCN, un atacante no autenticado podr\u00eda generar metadatos t\u00e9cnicos. Esto genera un impacto bajo en la integridad. No hay impacto en la confidencialidad o disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23189.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23189.json index a9b36b9e5cd..89eab61f3fe 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23189.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23189.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.263", "lastModified": "2025-02-11T01:15:10.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability" + }, + { + "lang": "es", + "value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n en un m\u00f3dulo de funci\u00f3n habilitado para RFC en la transacci\u00f3n SDCCN, un atacante autenticado podr\u00eda generar metadatos t\u00e9cnicos. Esto genera un impacto bajo en la integridad. No hay impacto en la confidencialidad o disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23190.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23190.json index 9979dbdedbb..b6915d3cf12 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23190.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23190.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.413", "lastModified": "2025-02-11T01:15:10.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing authorization check, an authenticated attacker could call a remote-enabled function module which allows them to access data that they would otherwise not have access to. The attacker cannot modify data or impact the availability of the system." + }, + { + "lang": "es", + "value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n, un atacante autenticado podr\u00eda llamar a un m\u00f3dulo de funci\u00f3n habilitado de forma remota que le permita acceder a datos a los que de otra manera no tendr\u00eda acceso. El atacante no puede modificar los datos ni afectar la disponibilidad del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23191.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23191.json index 3418d06e187..c5fa854e76e 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23191.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23191.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.557", "lastModified": "2025-02-11T01:15:10.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application." + }, + { + "lang": "es", + "value": "Los valores almacenados en cach\u00e9 que pertenecen al endpoint SAP OData en SAP Fiori para SAP ERP podr\u00edan verse afectados si se modifica el valor del encabezado Host en una solicitud HTTP GET. Un atacante podr\u00eda alterar los valores `atom:link` en los metadatos devueltos y redirigirlos desde el servidor SAP a un enlace malicioso establecido por el atacante. Una explotaci\u00f3n exitosa podr\u00eda causar un impacto bajo en la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23193.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23193.json index 7865989e454..b4dc4a6a125 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23193.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.700", "lastModified": "2025-02-11T01:15:10.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Server ABAP allows an unauthenticated attacker to exploit a vulnerability that causes the server to respond differently based on the existence of a specified user, potentially revealing sensitive information. This issue does not enable data modification and has no impact on server availability." + }, + { + "lang": "es", + "value": "SAP NetWeaver Server ABAP permite que un atacante no autenticado aproveche una vulnerabilidad que hace que el servidor responda de forma diferente en funci\u00f3n de la existencia de un usuario espec\u00edfico, lo que podr\u00eda revelar informaci\u00f3n confidencial. Este problema no permite la modificaci\u00f3n de datos y no afecta a la disponibilidad del servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json index 1e0b9309f02..ad2f76b38bb 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-06T18:15:32.667", "lastModified": "2025-02-06T18:15:32.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23236.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23236.json index 673e5fb0745..f1670ce7e24 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23236.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T08:15:30.170", "lastModified": "2025-02-06T08:15:30.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json index 02e45a76bc6..664e9b49b75 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:31.373", "lastModified": "2025-02-05T18:15:31.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json index edcddd587a5..8da22cbc86b 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:09.230", "lastModified": "2025-02-12T01:15:09.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + }, + { + "lang": "es", + "value": "NVIDIA Container Toolkit para Linux contiene una vulnerabilidad de tipo Time-of-Check Time-of-Use (TOCTOU) cuando se utiliza con la configuraci\u00f3n predeterminada, donde una imagen de contenedor manipulado podr\u00eda obtener acceso al archivo host sistema. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, la denegaci\u00f3n de servicio, la escalada de privilegios, la divulgaci\u00f3n de informaci\u00f3n y la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json index e28124ac3ef..5511b2f7cf6 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.250", "lastModified": "2025-02-11T11:15:16.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Teamcenter (All versions < V14.3.0.0). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Teamcenter (todas las versiones anteriores a V14.3.0.0). El servicio de inicio de sesi\u00f3n SSO de las aplicaciones afectadas acepta entradas controladas por el usuario que podr\u00edan especificar un enlace a un sitio externo. Esto podr\u00eda permitir que un atacante redirija al usuario leg\u00edtimo a una URL elegida por el atacante para robar datos v\u00e1lidos de la sesi\u00f3n. Para que la vulnerabilidad se aproveche con \u00e9xito, el usuario leg\u00edtimo debe hacer clic activamente en un enlace creado por el atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23403.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23403.json index 036aceed5a3..4bb3679ac68 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23403.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23403.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.420", "lastModified": "2025-02-11T11:15:16.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC IPC DiagBase (All versions), SIMATIC IPC DiagMonitor (All versions). The affected device do not properly restrict the user permission for the registry key. This could allow an authenticated attacker to load vulnerable drivers into the system leading to privilege escalation or bypassing endpoint protection and other security measures." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIMATIC IPC DiagBase (todas las versiones) y SIMATIC IPC DiagMonitor (todas las versiones). El dispositivo afectado no restringe correctamente el permiso del usuario para la clave de registro. Esto podr\u00eda permitir que un atacante autenticado cargue controladores vulnerables en el sistema, lo que provocar\u00eda una escalada de privilegios o eludir\u00eda la protecci\u00f3n de endpoints y otras medidas de seguridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23411.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23411.json index 8c9758ac7b9..e453b1e710a 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23411.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23411.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "mySCADA myPRO Manager\n is vulnerable to cross-site request forgery (CSRF), which could allow \nan attacker to obtain sensitive information. An attacker would need to \ntrick the victim in to visiting an attacker-controlled website." + }, + { + "lang": "es", + "value": "mySCADA myPRO Manager es vulnerable a cross-site request forgery (CSRF), lo que podr\u00eda permitir a un atacante obtener informaci\u00f3n confidencial. Un atacante tendr\u00eda que enga\u00f1ar a la v\u00edctima para que visite un sitio web controlado por el atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json index 7e10c3adcd5..d86f7b14892 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:31.580", "lastModified": "2025-02-05T18:15:31.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "f5sirt@f5.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json index 6c158fcd5dc..f9d436cddb9 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:31.930", "lastModified": "2025-02-05T18:15:31.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json index 686ba8dc16a..bd9d61f91e4 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:32.573", "lastModified": "2025-02-05T18:15:32.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json index 9290f4c7144..63482998ccf 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:33.347", "lastModified": "2025-02-05T20:15:45.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json index 12cd7f46c19..fd88f770c52 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker could obtain firmware files and reverse engineer their \nintended use leading to loss of confidentiality and integrity of the \nhardware devices enabled by the Qardio iOS and Android applications." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda obtener archivos de firmware y realizar ingenier\u00eda inversa para su uso previsto, lo que provocar\u00eda la p\u00e9rdida de confidencialidad e integridad de los dispositivos de hardware habilitados por las aplicaciones Qardio para iOS y Android." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json index 6e788f7266a..5d556283370 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-21T16:15:14.760", "lastModified": "2025-01-21T16:15:14.760", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json index ad7625e7156..cb23e93a33b 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-21T16:15:14.923", "lastModified": "2025-01-21T16:15:14.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24016.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24016.json index 3f7aa1af03e..a9ebbff9616 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24016.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24016.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T20:15:42.540", "lastModified": "2025-02-10T20:15:42.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix." + }, + { + "lang": "es", + "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta ante amenazas. A partir de la versi\u00f3n 4.4.0 y antes de la versi\u00f3n 4.9.1, una vulnerabilidad de deserializaci\u00f3n insegura permite la ejecuci\u00f3n remota de c\u00f3digo en servidores Wazuh. Los par\u00e1metros de DistributedAPI se serializan como JSON y se deserializan utilizando `as_wazuh_object` (en `framework/wazuh/core/cluster/common.py`). Si un atacante logra inyectar un diccionario no depurado en una solicitud/respuesta DAPI, puede falsificar una excepci\u00f3n no controlada (`__unhandled_exc__`) para evaluar c\u00f3digo Python arbitrario. La vulnerabilidad puede ser activada por cualquier persona con acceso a la API (panel de control comprometido o servidores Wazuh en el cl\u00faster) o, en ciertas configuraciones, incluso por un agente comprometido. La versi\u00f3n 4.9.1 contiene una correcci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json index a22273d935e..5b317f049d2 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by differences between how Joplin's HTML sanitizer handles comments and how the browser handles comments. This affects both the Rich Text Editor and the Markdown viewer. However, unlike the Rich Text Editor, the Markdown viewer is `cross-origin isolated`, which prevents JavaScript from directly accessing functions/variables in the toplevel Joplin `window`. This issue is not present in Joplin 3.1.24 and may have been introduced in `9b50539`. This is an XSS vulnerability that impacts users that open untrusted notes in the Rich Text Editor. This vulnerability has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Joplin es una aplicaci\u00f3n de c\u00f3digo abierto y gratuita para tomar notas y realizar tareas pendientes, que puede gestionar una gran cantidad de notas organizadas en cuadernos. Esta vulnerabilidad se debe a diferencias entre la forma en que el depurador HTML de Joplin gestiona los comentarios y la forma en que el navegador los gestiona. Esto afecta tanto al editor de texto enriquecido como al visor de Markdown. Sin embargo, a diferencia del editor de texto enriquecido, el visor de Markdown est\u00e1 \"aislado en todos los or\u00edgenes\", lo que impide que JavaScript acceda directamente a funciones o variables en la \"ventana\" de nivel superior de Joplin. Este problema no est\u00e1 presente en Joplin 3.1.24 y puede haberse introducido en \"9b50539\". Se trata de una vulnerabilidad XSS que afecta a los usuarios que abren notas que no son de confianza en el editor de texto enriquecido. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 3.2.12 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24031.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24031.json index 24cf5ada899..01e6d150046 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24031.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24031.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T16:15:38.990", "lastModified": "2025-02-10T16:15:38.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. In versions 0.6.12 and prior, the pam_pkcs11 module segfaults when a user presses ctrl-c/ctrl-d when they are asked for a PIN. When a user enters no PIN at all, `pam_get_pwd` will never initialize the password buffer pointer and as such `cleanse` will try to dereference an uninitialized pointer. On my system this pointer happens to have the value 3 most of the time when running sudo and as such it will segfault. The most likely impact to a system affected by this issue is an availability impact due to a daemon that uses PAM crashing. As of time of publication, a patch for the issue is unavailable." + }, + { + "lang": "es", + "value": "PAM-PKCS#11 es un m\u00f3dulo de inicio de sesi\u00f3n de Linux-PAM que permite un inicio de sesi\u00f3n de usuario basado en certificado X.509. En las versiones 0.6.12 y anteriores, el m\u00f3dulo pam_pkcs11 genera un error de segmentaci\u00f3n cuando un usuario presiona Ctrl-C/Ctrl-D cuando se le solicita un PIN. Cuando un usuario no ingresa ning\u00fan PIN, `pam_get_pwd` nunca inicializar\u00e1 el puntero del b\u00fafer de contrase\u00f1a y, como tal, `cleanse` intentar\u00e1 desreferenciar un puntero no inicializado. En mi sistema, este puntero tiene el valor 3 la mayor parte del tiempo cuando se ejecuta sudo y, como tal, generar\u00e1 un error de segmentaci\u00f3n. El impacto m\u00e1s probable en un sistema afectado por este problema es un impacto en la disponibilidad debido a un bloqueo de un daemon que usa PAM. Al momento de la publicaci\u00f3n, no hay disponible un parche para el problema. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24032.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24032.json index 28f8b01e133..f2c42d27f1a 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24032.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24032.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T16:15:39.153", "lastModified": "2025-02-10T16:15:39.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`." + }, + { + "lang": "es", + "value": "PAM-PKCS#11 es un m\u00f3dulo de inicio de sesi\u00f3n de Linux-PAM que permite un inicio de sesi\u00f3n de usuario basado en certificado X.509. Antes de la versi\u00f3n 0.6.13, si cert_policy se configuraba en none (el valor predeterminado), entonces pam_pkcs11 solo verificaba si el usuario puede iniciar sesi\u00f3n en el token. Un atacante puede crear un token diferente con los datos p\u00fablicos del usuario (por ejemplo, el certificado del usuario) y un PIN conocido por el atacante. Si no se requiere una firma con la clave privada, entonces el atacante puede iniciar sesi\u00f3n como usuario con ese token creado. El valor predeterminado de *no* verificar la firma de la clave privada se ha cambiado con el commit commi6638576892b59a99389043c90a1e7dd4d783b921, por lo que todas las versiones que comiencen con pam_pkcs11-0.6.0 deber\u00edan verse afectadas. Como workaround, en `pam_pkcs11.conf`, establezca al menos `cert_policy = signature;`." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24039.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24039.json index aad7029d818..9b4c7392ec0 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24039.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24039.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.927", "lastModified": "2025-02-11T18:15:40.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Code Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Visual Studio Code" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24042.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24042.json index e2589364a17..7198555762e 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24042.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24042.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:41.117", "lastModified": "2025-02-11T18:15:41.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Code JS Debug Extension Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la extensi\u00f3n de depuraci\u00f3n de JavaScript de Visual Studio Code" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json index 4b726cc931a..59eb3df3862 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:34.060", "lastModified": "2025-02-05T18:15:34.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json index a07ef2799fd..49e992d36fd 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:34.557", "lastModified": "2025-02-05T18:15:34.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json index 68093310cde..340cf4fe67b 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:34.960", "lastModified": "2025-02-05T18:15:34.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json index 1b07f302bdd..e8bdcd2be45 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:35.420", "lastModified": "2025-02-05T18:15:35.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24366.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24366.json index b76007ae30d..d802c4e7860 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24366.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-07T22:15:14.463", "lastModified": "2025-02-07T22:15:14.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SFTPGo is an open source, event-driven file transfer solution. SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being `rsync`. It is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends. Due to missing sanitization of the client provided `rsync` command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. This issue was fixed in version v2.6.5 by checking the client provided arguments. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "SFTPGo es una soluci\u00f3n de transferencia de archivos basada en eventos y de c\u00f3digo abierto. SFTPGo admite la ejecuci\u00f3n de un conjunto definido de comandos a trav\u00e9s de SSH. Adem\u00e1s de un conjunto de comandos predeterminados, se pueden activar algunos comandos opcionales, uno de ellos es `rsync`. Est\u00e1 deshabilitado en la configuraci\u00f3n predeterminada y est\u00e1 limitado al sistema de archivos local; no funciona con backends de almacenamiento remoto o en la nube. Debido a la falta de depuraci\u00f3n del comando `rsync` proporcionado por el cliente, un usuario remoto autenticado puede usar algunas opciones del comando rsync para leer o escribir archivos con los permisos del proceso del servidor SFTPGo. Este problema se solucion\u00f3 en la versi\u00f3n v2.6.5 al verificar los argumentos proporcionados por el cliente. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json index e86c099bea5..7109173faf3 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-05T19:15:46.010", "lastModified": "2025-02-05T19:15:46.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json index 956471aba2f..dd021bd95de 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T19:15:33.680", "lastModified": "2025-02-04T19:15:33.680", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json index 9c1873a3471..cbe85e5da33 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.300", "lastModified": "2025-02-11T18:15:41.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to modify files that are stored outside the restricted directory. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\"Path Traversal\") que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para modificar archivos que se almacenan fuera del directorio restringido. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json index a130046f978..830b76aa6bc 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.497", "lastModified": "2025-02-11T18:15:41.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para realizar acciones con permisos que no se le han concedido. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json index c0f10d91514..c1aabb19eb8 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.677", "lastModified": "2025-02-11T18:15:41.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Information Exposure vulnerability that could result in privilege escalation. A low-privileged attacker could gain unauthorized access to sensitive information. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de exposici\u00f3n de informaci\u00f3n que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda obtener acceso no autorizado a informaci\u00f3n confidencial. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json index ffdc3db30c6..91b3aca46c5 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.860", "lastModified": "2025-02-11T18:15:41.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access, leading to both confidentiality and integrity impact. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado, lo que afectar\u00eda tanto a la confidencialidad como a la integridad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json index e2d2ae1b6df..1ecc0707b4a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.057", "lastModified": "2025-02-11T18:15:42.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json index 083511a0575..3b636f10eec 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.243", "lastModified": "2025-02-11T18:15:42.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json index 3593f19ffc1..8de7b528b05 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.433", "lastModified": "2025-02-11T18:15:42.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json index e8168c8f072..3fb15e9d0a6 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.623", "lastModified": "2025-02-11T18:15:42.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json index 27b94b15fa8..e9637dacffa 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.803", "lastModified": "2025-02-11T18:15:42.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json index f559bcf06fb..9de0fc8c420 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.983", "lastModified": "2025-02-11T18:15:42.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json index 334b2e56188..348fc34ad55 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.160", "lastModified": "2025-02-11T18:15:43.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json index 67470d8a5da..3e949aa0037 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.347", "lastModified": "2025-02-11T18:15:43.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json index 6ae5a1574c6..6eeb88fa07c 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.527", "lastModified": "2025-02-11T18:15:43.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json index 463118ea897..359706288b8 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.713", "lastModified": "2025-02-11T18:15:43.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para realizar acciones con permisos que no se le han concedido. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json index a10fb7e62d3..2da3d38f42a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.893", "lastModified": "2025-02-11T18:15:43.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para realizar acciones con permisos que no se le han concedido. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json index e2b4ab8b1de..5f5c26cd186 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.077", "lastModified": "2025-02-11T18:15:44.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para realizar acciones con permisos que no se le han concedido. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json index 23627f8c50a..096c5a2f25f 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.270", "lastModified": "2025-02-11T18:15:44.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json index 8f929c8d25a..3d783117851 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.457", "lastModified": "2025-02-11T18:15:44.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json index f8c7f753508..28c67aa7410 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.660", "lastModified": "2025-02-11T18:15:44.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json index c2af1c3a438..26ec6651e8f 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.857", "lastModified": "2025-02-11T18:15:44.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Business Logic Error vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to circumvent intended security mechanisms by manipulating the logic of the application's operations causing limited data modification. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de error de l\u00f3gica empresarial que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir los mecanismos de seguridad previstos manipulando la l\u00f3gica de las operaciones de la aplicaci\u00f3n y provocando una modificaci\u00f3n limitada de los datos. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json index ffdc9dcb922..8ddec2ae3e3 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.030", "lastModified": "2025-02-11T18:15:45.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json index a239d9361b5..b101ca685f9 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.223", "lastModified": "2025-02-11T18:15:45.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24428.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24428.json index c2ac6ab5e02..5df4673e84a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24428.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24428.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.423", "lastModified": "2025-02-11T18:15:45.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en los campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24429.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24429.json index d445c130a13..bbf686845b1 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24429.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24429.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.610", "lastModified": "2025-02-11T18:15:45.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24430.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24430.json index fcbb7f9fdd6..6a41bedbd79 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24430.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24430.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.787", "lastModified": "2025-02-11T18:15:45.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this race condition to alter a condition after it has been checked but before it is used, potentially bypassing security mechanisms. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n y tiempo de uso (TOCTOU) que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta condici\u00f3n de ejecuci\u00f3n para modificar una condici\u00f3n despu\u00e9s de que se haya verificado pero antes de que se utilice, lo que podr\u00eda eludir los mecanismos de seguridad. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24432.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24432.json index bb704c9ddaf..c6f0f4955a1 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24432.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24432.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.960", "lastModified": "2025-02-11T18:15:45.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this race condition to alter a condition after it has been checked but before it is used, potentially bypassing security mechanisms. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n y tiempo de uso (TOCTOU) que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta condici\u00f3n de ejecuci\u00f3n para modificar una condici\u00f3n despu\u00e9s de que se haya verificado pero antes de que se utilice, lo que podr\u00eda eludir los mecanismos de seguridad. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json index bec178c5cd8..16d1dad8911 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:46.157", "lastModified": "2025-02-11T18:15:46.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json index de66e8a247d..f5def3b3318 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:46.347", "lastModified": "2025-02-11T18:15:46.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to modify limited fields. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado para modificar campos limitados. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24436.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24436.json index 0613426e803..6932e8f2b45 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24436.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24436.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:46.537", "lastModified": "2025-02-11T18:15:46.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24437.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24437.json index 9339658642f..3bd56cb90a5 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24437.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:46.717", "lastModified": "2025-02-11T18:15:46.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain elevated privileges. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener privilegios elevados. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json index 13733ca2875..ada2310f157 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:46.893", "lastModified": "2025-02-11T18:15:46.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar c\u00f3digo JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable. Un atacante con \u00e9xito puede aprovechar esto para lograr la toma de control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24470.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24470.json index aa750ceb48a..38098321b24 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24470.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24470.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:34.730", "lastModified": "2025-02-11T17:15:34.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Improper Resolution of Path Equivalence vulnerability [CWE-41] in FortiPortal 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to retrieve source code via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de resoluci\u00f3n incorrecta de equivalencia de ruta [CWE-41] en FortiPortal 7.4.0 a 7.4.2, 7.2.0 a 7.2.6, 7.0.0 a 7.0.11 puede permitir que un atacante remoto no autenticado recupere el c\u00f3digo fuente a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json index 779e60b2fe8..1817034bd99 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:34.867", "lastModified": "2025-02-11T17:15:34.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo [CWE-288] que afecta a FortiOS 7.0.0 a 7.0.16 y FortiProxy 7.2.0 a 7.2.12, 7.0.0 a 7.0.19 puede permitir que un atacante remoto obtenga privilegios de superadministrador a trav\u00e9s de solicitudes de proxy CSF manipuladas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24483.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24483.json index 185ed3c3a81..eeef855e764 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24483.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T08:15:30.327", "lastModified": "2025-02-06T08:15:30.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json index cadf6015164..e23077c2da9 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2025-02-05T18:15:35.613", "lastModified": "2025-02-05T18:15:35.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24499.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24499.json index 41856c41935..a1d375e984d 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24499.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24499.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.583", "lastModified": "2025-02-11T11:15:16.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices do not properly validate input while loading the configuration files. This could allow an authenticated remote attacker to execute arbitrary shell commands on the device." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (Todas las versiones < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (Todas las versiones < V3.0.0), iFeatures de SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (EE. UU.) (6GK5766-1GE00-3DB0) (Todas las versiones < V3.0.0). Los dispositivos afectados no validan correctamente la entrada al cargar los archivos de configuraci\u00f3n. Esto podr\u00eda permitir que un atacante remoto autenticado ejecute comandos de shell arbitrarios en el dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24532.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24532.json index 26ca49aade0..c909cf89c0e 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24532.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24532.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.740", "lastModified": "2025-02-11T11:15:16.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices with role `user` is affected by incorrect authorization in SNMPv3 View configuration. This could allow an attacker to change the View Type of SNMPv3 Views." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (Todas las versiones < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (Todas las versiones < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (Todas las versiones < V3.0.0), iFeatures de SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (Todas las versiones < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (Todas las versiones < V3.0.0), SCALANCE WUM766-1 (EE. UU.) (6GK5766-1GE00-3DB0) (Todas las versiones < V3.0.0). Los dispositivos afectados con el rol `usuario` se ven afectados por una autorizaci\u00f3n incorrecta en la configuraci\u00f3n de la vista SNMPv3. Esto podr\u00eda permitir que un atacante cambie el tipo de vista de las vistas SNMPv3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json index 001caced4d2..d58d301696c 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-06T19:15:20.067", "lastModified": "2025-02-06T20:15:40.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json index ff986b4bc58..a89489a573d 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-06T19:15:20.213", "lastModified": "2025-02-06T20:15:40.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json index 75cfdafb3ce..734686ab1e9 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-05T19:15:46.207", "lastModified": "2025-02-05T19:15:46.207", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json index 1dce336cb80..9aa399df144 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-05T19:15:46.350", "lastModified": "2025-02-05T19:15:46.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json index f01b851f771..1fd684e2bd8 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-05T19:15:46.487", "lastModified": "2025-02-05T19:15:46.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24807.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24807.json index 640d5c1117b..e9c24042666 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24807.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24807.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:51.190", "lastModified": "2025-02-11T16:15:51.190", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0, per design, PermissionsCA is not full chain validated, nor is the expiration date validated. Access control plugin validates only the S/MIME signature which causes an expired PermissionsCA to be taken as valid. Even though this issue is responsible for allowing `governance/permissions` from an expired PermissionsCA and having the system crash when PermissionsCA is not self-signed and contains the full-chain, the impact is low. Versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0 contain a fix for the issue." + }, + { + "lang": "es", + "value": "eprosima Fast DDS es una implementaci\u00f3n en C++ del est\u00e1ndar DDS (Data Distribution Service) de OMG (Object Management Group). Antes de las versiones 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2 y 3.2.0, por dise\u00f1o, PermissionsCA no se valida en cadena completa ni se valida la fecha de vencimiento. El complemento de control de acceso valida solo la firma S/MIME, lo que hace que un PermissionsCA vencido se considere v\u00e1lido. Aunque este problema es responsable de permitir la `gobernanza/permisos` desde un PermissionsCA vencido y de que el sistema se bloquee cuando PermissionsCA no est\u00e1 autofirmado y contiene la cadena completa, el impacto es bajo. Las versiones 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2 y 3.2.0 contienen una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24811.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24811.json index 15698665c5f..6d16f26fc52 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24811.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24811.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.907", "lastModified": "2025-02-11T11:15:16.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0), SIPLUS S7-1200 CPU 1215C DC/DC/DC (6AG1215-1AG40-5XB0), SIPLUS S7-1200 CPU 1215FC DC/DC/DC (6AG1215-1AF40-5XB0). Affected devices do not process correctly certain special crafted packets sent to port 80/tcp, which could allow an unauthenticated attacker to cause a denial of service in the device." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0), CPU SIMATIC S7-1200 1212FC CC/CC/CC (6ES7212-1AF40-0XB0), CPU SIMATIC S7-1200 1212FC CC/CC/Reproducci\u00f3n (6ES7212-1HF40-0XB0), CPU SIMATIC S7-1200 1214C CA/CC/Reproducci\u00f3n (6ES7214-1BG40-0XB0), CPU SIMATIC S7-1200 1214C CC/CC/CC (6ES7214-1AG40-0XB0), CPU SIMATIC S7-1200 1214C CC/CC/Reproducci\u00f3n (6ES7214-1HG40-0XB0), CPU SIMATIC S7-1200 1214FC CC/CC/CC (6ES7214-1AF40-0XB0), CPU SIMATIC S7-1200 1214FC CC/CC/Reproducci\u00f3n (6ES7214-1HF40-0XB0), CPU SIMATIC S7-1200 1215C CA/CC/Reproducci\u00f3n (6ES7215-1BG40-0XB0), CPU SIMATIC S7-1200 1215C CC/CC/CC (6ES7215-1AG40-0XB0), CPU SIMATIC S7-1200 1215C CC/CC/Reproducci\u00f3n (6ES7215-1HG40-0XB0), CPU SIMATIC S7-1200 1215FC CC/CC/CC (6ES7215-1AF40-0XB0), CPU SIMATIC S7-1200 1215FC CC/CC/Reproducci\u00f3n (6ES7215-1HF40-0XB0), SIMATIC S7-1200 CPU 1217C CC/CC/CC (6ES7217-1AG40-0XB0), SIPLUS S7-1200 CPU 1212 CA/CC/RLY (6AG1212-1BE40-2XB0), SIPLUS S7-1200 CPU 1212 CA/CC/RLY (6AG1212-1BE40-4XB0), SIPLUS S7-1200 CPU 1212 CC/CC/RLY (6AG1212-1HE40-2XB0), SIPLUS S7-1200 CPU 1212 CC/CC/RLY (6AG1212-1HE40-4XB0), SIPLUS S7-1200 CPU 1212C CC/CC/CC (6AG1212-1AE40-2XB0), SIPLUS S7-1200 CPU 1212C CC/CC/CC (6AG1212-1AE40-4XB0), SIPLUS S7-1200 CPU 1212C CC/CC/CC RAIL (6AG2212-1AE40-1XB0), SIPLUS S7-1200 CPU 1214 CA/CC/RLY (6AG1214-1BG40-2XB0), SIPLUS S7-1200 CPU 1214 CA/CC/RLY (6AG1214-1BG40-4XB0), SIPLUS S7-1200 CPU 1214 CA/CC/RLY (6AG1214-1BG40-5XB0), SIPLUS S7-1200 CPU 1214 CC/CC/CC (6AG1214-1AG40-2XB0), SIPLUS S7-1200 CPU 1214 CC/CC/CC (6AG1214-1AG40-4XB0), SIPLUS S7-1200 CPU 1214 CC/CC/CC (6AG1214-1AG40-5XB0), SIPLUS S7-1200 CPU 1214 CC/CC/RLY (6AG1214-1HG40-2XB0), SIPLUS S7-1200 CPU 1214 CC/CC/RLY (6AG1214-1HG40-4XB0), SIPLUS S7-1200 CPU 1214 CC/CC/RLY (6AG1214-1HG40-5XB0), SIPLUS S7-1200 CPU 1214C CC/CC/CC RAIL (6AG2214-1AG40-1XB0), SIPLUS S7-1200 CPU 1214FC CC/CC/CC (6AG1214-1AF40-5XB0), SIPLUS S7-1200 CPU 1214FC CC/CC/RLY (6AG1214-1HF40-5XB0), SIPLUS S7-1200 CPU 1215 CA/CC/RLY (6AG1215-1BG40-2XB0), SIPLUS S7-1200 CPU 1215 CA/CC/RLY (6AG1215-1BG40-4XB0), SIPLUS S7-1200 CPU 1215 CA/CC/RLY (6AG1215-1BG40-5XB0), SIPLUS S7-1200 CPU 1215 CC/CC/CC (6AG1215-1AG40-2XB0), SIPLUS S7-1200 CPU 1215 CC/CC/CC (6AG1215-1AG40-4XB0), SIPLUS S7-1200 CPU 1215 CC/CC/RLY (6AG1215-1HG40-2XB0), SIPLUS S7-1200 CPU 1215 CC/CC/RLY (6AG1215-1HG40-4XB0), SIPLUS S7-1200 CPU 1215 CC/CC/RLY (6AG1215-1HG40-5XB0), SIPLUS S7-1200 CPU 1215C CC/CC/CC (6AG1215-1AG40-5XB0), SIPLUS S7-1200 CPU 1215FC CC/CC/CC (6AG1215-1AF40-5XB0). Los dispositivos afectados no procesan correctamente ciertos paquetes especiales enviados al puerto 80/tcp, lo que podr\u00eda permitir que un atacante no autenticado provoque una denegaci\u00f3n de servicio en el dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24812.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24812.json index 3f0833090ce..e30f4af8366 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24812.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24812.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:17.080", "lastModified": "2025-02-11T11:15:17.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0) (All versions < V4.7), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215C DC/DC/DC (6AG1215-1AG40-5XB0) (All versions < V4.7), SIPLUS S7-1200 CPU 1215FC DC/DC/DC (6AG1215-1AF40-5XB0) (All versions < V4.7). Affected devices do not process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0) (Todas las versiones < V4.7), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0) (Todas las versiones < V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0) (Todas las versiones < --- truncado ----" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json index 7f8046eaf1a..92a3003b2dc 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "With a specially crafted Python script, an attacker could send \ncontinuous startMeasurement commands over an unencrypted Bluetooth \nconnection to the affected device. This would prevent the device from \nconnecting to a clinician's app to take patient readings and ostensibly \nflood it with requests, resulting in a denial-of-service condition." + }, + { + "lang": "es", + "value": "Con un script de Python especialmente manipulado, un atacante podr\u00eda enviar comandos startMeasurement continuos a trav\u00e9s de una conexi\u00f3n Bluetooth no cifrada al dispositivo afectado. Esto evitar\u00eda que el dispositivo se conecte a la aplicaci\u00f3n de un m\u00e9dico para tomar lecturas del paciente y, aparentemente, lo inundar\u00eda con solicitudes, lo que dar\u00eda como resultado una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24845.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24845.json index b93bfd60813..77c8b3972ce 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24845.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24845.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-06T08:15:30.673", "lastModified": "2025-02-06T08:15:30.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24861.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24861.json index 8a17a72b68b..b563930c0f4 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24861.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24861.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker may inject commands via specially-crafted post requests." + }, + { + "lang": "es", + "value": "Un atacante puede inyectar comandos a trav\u00e9s de solicitudes de publicaci\u00f3n especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24865.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24865.json index 550d5c4888a..079de6c279d 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24865.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24865.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The administrative web interface of \nmySCADA myPRO Manager\n\ncan be accessed without authentication \nwhich could allow an unauthorized attacker to retrieve sensitive \ninformation and upload files without the associated password." + }, + { + "lang": "es", + "value": "Se puede acceder a la interfaz web administrativa de mySCADA myPRO Manager sin autenticaci\u00f3n, lo que podr\u00eda permitir que un atacante no autorizado recupere informaci\u00f3n confidencial y cargue archivos sin la contrase\u00f1a asociada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24867.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24867.json index 3bac57a81bb..e75f47352c4 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24867.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24867.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.847", "lastModified": "2025-02-11T01:15:10.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP BusinessObjects Platform (BI Launchpad) does not sufficiently handle user input, resulting in Cross-Site Scripting (XSS) vulnerability. The application allows an unauthenticated attacker to craft a URL that embeds a malicious script within an unprotected parameter. When a victim clicks the link, the script will be executed in the browser, giving the attacker the ability to access and/or modify information related to the web client with no effect on availability." + }, + { + "lang": "es", + "value": "SAP BusinessObjects Platform (BI Launchpad) no gestiona adecuadamente la entrada del usuario, lo que da lugar a una vulnerabilidad de tipo Cross-Site Scripting (XSS). La aplicaci\u00f3n permite a un atacante no autenticado manipular una URL que incorpora un script malicioso dentro de un par\u00e1metro desprotegido. Cuando una v\u00edctima hace clic en el enlace, el script se ejecuta en el navegador, lo que le da al atacante la capacidad de acceder y/o modificar informaci\u00f3n relacionada con el cliente web sin afectar la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24868.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24868.json index b29d09b77d7..02b7f3b596b 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24868.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24868.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.990", "lastModified": "2025-02-11T01:15:10.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Account and Authentication service (UAA) for SAP HANA extended application services, advanced model (SAP HANA XS advanced model) allows an unauthenticated attacker to craft a malicious link, that, when clicked by a victim, redirects the browser to a malicious site due to insufficient redirect URL validation. On successful exploitation attacker can cause limited impact on confidentiality, integrity, and availability of the system." + }, + { + "lang": "es", + "value": "El servicio de autenticaci\u00f3n y cuenta de usuario (UAA) para los servicios de aplicaciones extendidas de SAP HANA, modelo avanzado (modelo avanzado de SAP HANA XS) permite a un atacante no autenticado crear un enlace malicioso que, cuando la v\u00edctima hace clic en \u00e9l, redirige el navegador a un sitio malicioso debido a una validaci\u00f3n insuficiente de la URL de redireccionamiento. Si el atacante lo explota con \u00e9xito, puede causar un impacto limitado en la confidencialidad, la integridad y la disponibilidad del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json index 2fa9b84e4e2..16582b41638 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.140", "lastModified": "2025-02-11T06:15:22.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability." + }, + { + "lang": "es", + "value": "SAP NetWeaver Application Server Java permite a un atacante acceder a un endpoint que puede revelar informaci\u00f3n sobre los componentes del servidor implementados, incluida sus definiciones XML. Lo ideal ser\u00eda que esta informaci\u00f3n estuviera restringida a los administradores de clientes, aunque es posible que no la necesiten. Estos archivos XML no son completamente internos de SAP, ya que se implementan con el servidor. En tal escenario, la informaci\u00f3n confidencial podr\u00eda quedar expuesta sin comprometer su integridad o disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json index 5a0d56bcbe5..99589f6ed1a 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.280", "lastModified": "2025-02-11T06:15:23.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP GUI for Windows & RFC service credentials are incorrectly stored in the memory of the program allowing an unauthenticated attacker to access information within systems, resulting in privilege escalation. On successful exploitation, this could result in disclosure of highly sensitive information. This has no impact on integrity, and availability." + }, + { + "lang": "es", + "value": "Las credenciales de servicio de SAP GUI para Windows y RFC se almacenan incorrectamente en la memoria del programa, lo que permite que un atacante no autenticado acceda a la informaci\u00f3n dentro de los sistemas, lo que da como resultado una escalada de privilegios. Si se explota con \u00e9xito, esto podr\u00eda dar como resultado la divulgaci\u00f3n de informaci\u00f3n altamente confidencial. Esto no tiene impacto en la integridad ni en la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json index fde4f218871..8ca67653d02 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.437", "lastModified": "2025-02-11T06:15:23.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ABAP Build Framework in SAP ABAP Platform allows an authenticated attacker to gain unauthorized access to a specific transaction. By executing the add-on build functionality within the ABAP Build Framework, an attacker could call the transaction and view its details. This has a limited impact on the confidentiality of the application with no effect on the integrity and availability of the application." + }, + { + "lang": "es", + "value": "La compilaci\u00f3n ABAP framework en SAP ABAP Platform permite que un atacante autenticado obtenga acceso no autorizado a una transacci\u00f3n espec\u00edfica. Al ejecutar la funcionalidad de compilaci\u00f3n adicional dentro de la compilaci\u00f3n ABAP Framework, un atacante podr\u00eda llamar a la transacci\u00f3n y ver sus detalles. Esto tiene un impacto limitado en la confidencialidad de la aplicaci\u00f3n sin efecto en la integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json index b67e2251d43..e2c427c0185 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.580", "lastModified": "2025-02-11T06:15:23.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information." + }, + { + "lang": "es", + "value": "SAP Commerce (Backoffice) utiliza el encabezado X-framework-OPTIONS obsoleto para protegerse contra el secuestro de clics. Si bien esta protecci\u00f3n sigue siendo efectiva ahora, es posible que no sea as\u00ed en el futuro, ya que los navegadores podr\u00edan dejar de admitir este encabezado en favor de la directiva CSP frame-ancestors. Por lo tanto, el secuestro de clics podr\u00eda volverse posible en ese momento y dar lugar a la exposici\u00f3n y modificaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json index d96e1aa730a..96e7ad1083c 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.733", "lastModified": "2025-02-11T06:15:23.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Commerce, by default, sets certain cookies with the SameSite attribute configured to None (SameSite=None). This includes authentication cookies utilized in SAP Commerce Backoffice. Applying this setting reduces defense in depth against CSRF and may lead to future compatibility issues." + }, + { + "lang": "es", + "value": "SAP Commerce, de forma predeterminada, establece ciertas cookies con el atributo SameSite configurado en Ninguno (SameSite=None). Esto incluye las cookies de autenticaci\u00f3n utilizadas en SAP Commerce Backoffice. La aplicaci\u00f3n de esta configuraci\u00f3n reduce la defensa en profundidad contra CSRF y puede generar problemas de compatibilidad en el futuro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json index b1965fb55b2..fc50705dbec 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.887", "lastModified": "2025-02-11T06:15:23.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SAP Approuter Node.js package version v16.7.1 and before is vulnerable to Authentication bypass. When trading an authorization code an attacker can steal the session of the victim by injecting malicious payload causing High impact on confidentiality and integrity of the application" + }, + { + "lang": "es", + "value": "El paquete SAP Approuter Node.js versi\u00f3n v16.7.1 y anteriores es vulnerable a la omisi\u00f3n de autenticaci\u00f3n. Al intercambiar un c\u00f3digo de autorizaci\u00f3n, un atacante puede robar la sesi\u00f3n de la v\u00edctima inyectando payload malicioso, lo que provoca un gran impacto en la confidencialidad y la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24888.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24888.json index a655a37ebb6..b719ce2d06d 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24888.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SecureDrop Client is a desktop application for journalists to communicate with sources and work with submissions on the SecureDrop Workstation. Prior to version 0.14.1, a malicious SecureDrop Server could obtain code execution on the SecureDrop Client virtual machine (`sd-app`). SecureDrop Server itself has multiple layers of built-in hardening, and is a dedicated physical machine exposed on the internet only via Tor hidden services for the Source and Journalist interfaces, and optionally via remote SSH access over another Tor hidden service. A newsroom's SecureDrop Workstation communicates only with its own dedicated SecureDrop Server.\n\nThe SecureDrop Client runs in a dedicated Qubes virtual machine, named `sd-app`, as part of the SecureDrop Workstation. The private OpenPGP key used to decrypt submissions and replies is stored in a separate virtual machine and never accessed directly. The vulnerability lies in the code responsible for downloading replies. The filename of the reply is obtained from the `Content-Disposition` HTTP header and used to write the encrypted reply on disk. Note that filenames are generated and sanitized server-side, and files are downloaded in an encrypted format, so a remote attacker who has not achieved server compromise, such as one posing as a source, could not craft the HTTP response necessary for this attack.\n\nWhile the filename is later checked to guard against path traversal before being moved into the Client\u2019s data storage directory, the file has already been written to a potentially arbitrary location. In this case, `safe_move()` would detect the path traversal and fail, leaving the original downloaded file in the attacker-chosen directory. Code execution can be gained by writing an autostart file in `/home/user/.config/autostart/`.\n\nVersion 0.14.1 fixes the issue. As of time of publication, there is no known evidence of exploitation in the wild. This attack requires a previously compromised SecureDrop Server." + }, + { + "lang": "es", + "value": "SecureDrop Client es una aplicaci\u00f3n de escritorio para que los periodistas se comuniquen con las fuentes y trabajen con los env\u00edos en la Estaci\u00f3n de trabajo SecureDrop. Antes de la versi\u00f3n 0.14.1, un Servidor SecureDrop malicioso pod\u00eda obtener la ejecuci\u00f3n de c\u00f3digo en la m\u00e1quina virtual del Cliente SecureDrop (`sd-app`). El Servidor SecureDrop en s\u00ed tiene m\u00faltiples capas de protecci\u00f3n integradas y es una m\u00e1quina f\u00edsica dedicada expuesta en Internet solo a trav\u00e9s de servicios ocultos de Tor para las interfaces de Fuente y Periodista, y opcionalmente a trav\u00e9s de acceso SSH remoto a trav\u00e9s de otro servicio oculto de Tor. La Estaci\u00f3n de trabajo SecureDrop de una sala de redacci\u00f3n se comunica solo con su propio Servidor SecureDrop dedicado. El Cliente SecureDrop se ejecuta en una m\u00e1quina virtual Qubes dedicada, llamada `sd-app`, como parte de la Estaci\u00f3n de trabajo SecureDrop. La clave privada OpenPGP utilizada para descifrar los env\u00edos y las respuestas se almacena en una m\u00e1quina virtual separada y nunca se accede a ella directamente. La vulnerabilidad reside en el c\u00f3digo responsable de descargar las respuestas. El nombre de archivo de la respuesta se obtiene del encabezado HTTP `Content-Disposition` y se utiliza para escribir la respuesta cifrada en el disco. Tenga en cuenta que los nombres de archivo se generan y se depuran en el servidor, y los archivos se descargan en un formato cifrado, por lo que un atacante remoto que no haya logrado comprometer el servidor, como uno que se haga pasar por una fuente, no podr\u00eda manipular la respuesta HTTP necesaria para este ataque. Si bien el nombre de archivo se verifica m\u00e1s tarde para protegerse contra el path traversal antes de moverlo al directorio de almacenamiento de datos del cliente, el archivo ya se ha escrito en una ubicaci\u00f3n potencialmente arbitraria. En este caso, `safe_move()` detectar\u00eda el path traversal y fallar\u00eda, dejando el archivo descargado original en el directorio elegido por el atacante. La ejecuci\u00f3n del c\u00f3digo se puede obtener escribiendo un archivo de inicio autom\u00e1tico en `/home/user/.config/autostart/`. La versi\u00f3n 0.14.1 corrige el problema. Al momento de la publicaci\u00f3n, no hay evidencia conocida de explotaci\u00f3n en la naturaleza. Este ataque requiere un servidor SecureDrop previamente comprometido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24889.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24889.json index 5e79f9d3fdf..fa90bd0fe4a 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24889.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24889.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SecureDrop Client is a desktop application for journalists to communicate with sources and work with submissions on the SecureDrop Workstation. Prior to versions 0.14.1 and 1.0.1, an attacker who has already gained code execution in a virtual machine on the SecureDrop Workstation could gain code execution in the `sd-log` virtual machine by sending a specially crafted log entry. The vulnerability is not exploitable remotely and requires an attacker to already have code execution on one of the other virtual machines (VMs) of the system. Due to the Workstation's underlying usage of Qubes for strong isolation, the vulnerability would have allowed lateral movement between any log-enabled VM and the `sd-log` VM, but no further. The SecureDrop workstation collects logs centrally in an isolated virtual machine named `sd-log` for easy export for support and debugging purposes. The `sd-log` VM is completely isolated from the internet and ingests logs via a narrow Qubes RPC policy that allows for specific inter-VM communication via the Xen vchan protocol used by Qubes's qrexec mechanism. A path traversal bug was found in the logic used to choose where to write the log file for a specific VM: the VM name, used unsanitized in the destination path in `sd-log`, is supplied by the logging VM itself instead of being read from a trusted source, such as the Qubes environment variable `QREXEC_REMOTE_DOMAIN` that is used in the fixed implementation. An attacker could provide an arbitrary source VM name, possibly overwriting logs of other VMs, or writing a file named `syslog.log`, with attacker-controlled content, in arbitrary directories as a low-privileged user. A successful attack could potentially overwrite or add configuration to software that loads configuration files from a directory. This is exploitable to achieve code execution by setting the target directory to `/home/user/.config/autostart/` and letting it write `syslog.log`, because XFCE treats any file in that directory as a `.desktop` file regardless of its extension. Versions 0.14.1 and 1.0.1 contain a patch for this issue." + }, + { + "lang": "es", + "value": "SecureDrop Client es una aplicaci\u00f3n de escritorio para que los periodistas se comuniquen con las fuentes y trabajen con los env\u00edos en la estaci\u00f3n de trabajo SecureDrop. Antes de las versiones 0.14.1 y 1.0.1, un atacante que ya hubiera obtenido la ejecuci\u00f3n de c\u00f3digo en una m\u00e1quina virtual en la estaci\u00f3n de trabajo SecureDrop pod\u00eda obtener la ejecuci\u00f3n de c\u00f3digo en la m\u00e1quina virtual `sd-log` enviando una entrada de registro especialmente manipulada. La vulnerabilidad no se puede explotar de forma remota y requiere que un atacante ya tenga la ejecuci\u00f3n de c\u00f3digo en una de las otras m\u00e1quinas virtuales (VM) del sistema. Debido al uso subyacente de Qubes en la estaci\u00f3n de trabajo para un fuerte aislamiento, la vulnerabilidad habr\u00eda permitido el movimiento lateral entre cualquier VM con registro habilitado y la VM `sd-log`, pero no m\u00e1s all\u00e1. La estaci\u00f3n de trabajo SecureDrop recopila registros de forma centralizada en una m\u00e1quina virtual aislada llamada `sd-log` para facilitar la exportaci\u00f3n con fines de soporte y depuraci\u00f3n. La VM `sd-log` est\u00e1 completamente aislada de Internet e ingiere registros a trav\u00e9s de una pol\u00edtica RPC de Qubes estrecha que permite una comunicaci\u00f3n espec\u00edfica entre VM a trav\u00e9s del protocolo Xen vchan utilizado por el mecanismo qrexec de Qubes. Se encontr\u00f3 un error de path traversal en la l\u00f3gica utilizada para elegir d\u00f3nde escribir el archivo de registro para una VM espec\u00edfica: el nombre de la VM, utilizado sin depurar en la ruta de destino en `sd-log`, es proporcionado por la propia VM de registro en lugar de leerse desde una fuente confiable, como la variable de entorno de Qubes `QREXEC_REMOTE_DOMAIN` que se utiliza en la implementaci\u00f3n corregida. Un atacante podr\u00eda proporcionar un nombre de VM de origen arbitrario, posiblemente sobrescribiendo registros de otras VM, o escribiendo un archivo llamado `syslog.log`, con contenido controlado por el atacante, en directorios arbitrarios como un usuario con pocos privilegios. Un ataque exitoso podr\u00eda sobrescribir o agregar configuraci\u00f3n al software que carga archivos de configuraci\u00f3n desde un directorio. Esto se puede aprovechar para lograr la ejecuci\u00f3n de c\u00f3digo configurando el directorio de destino en `/home/user/.config/autostart/` y permitiendo que escriba `syslog.log`, porque XFCE trata cualquier archivo en ese directorio como un archivo `.desktop` independientemente de su extensi\u00f3n. Las versiones 0.14.1 y 1.0.1 contienen un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24892.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24892.json index cb598522bac..3963d5cb413 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24892.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24892.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T16:15:39.310", "lastModified": "2025-02-10T16:15:39.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenProject is open-source, web-based project management software. In versions prior to 15.2.1, the application fails to properly sanitize user input before displaying it in the Group Management section. Groups created with HTML script tags are not properly escaped before rendering them in a project. The issue has been resolved in OpenProject version 15.2.1. Those who are unable to upgrade may apply the patch manually." + }, + { + "lang": "es", + "value": "OpenProject es un software de gesti\u00f3n de proyectos basado en la web y de c\u00f3digo abierto. En versiones anteriores a la 15.2.1, la aplicaci\u00f3n no puede depurar correctamente la entrada del usuario antes de mostrarla en la secci\u00f3n Gesti\u00f3n de grupos. Los grupos creados con etiquetas de script HTML no se escapan correctamente antes de mostrarlos en un proyecto. El problema se ha resuelto en la versi\u00f3n 15.2.1 de OpenProject. Aquellos que no puedan actualizar pueden aplicar el parche manualmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json index 2ae366d71c5..4544159d6a5 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:51.477", "lastModified": "2025-02-11T16:15:51.477", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, a login token named `token` is stored in a cookie for authentication purposes in Bull Dashboard, but this remains undeleted even after logout is performed. The primary affected users will be users who have logged into Misskey using a public PC or someone else's device, but it's possible that users who have logged out of Misskey before lending their PC to someone else could also be affected. Version 2025.2.0-alpha.0 contains a fix for this issue." + }, + { + "lang": "es", + "value": "Misskey es una plataforma de redes sociales federada de c\u00f3digo abierto. A partir de la versi\u00f3n 12.109.0 y antes de la versi\u00f3n 2025.2.0-alpha.0, se almacena un token de inicio de sesi\u00f3n llamado `token` en una cookie con fines de autenticaci\u00f3n en Bull Dashboard, pero este permanece sin eliminarse incluso despu\u00e9s de cerrar la sesi\u00f3n. Los principales usuarios afectados ser\u00e1n aquellos que hayan iniciado sesi\u00f3n en Misskey utilizando una PC p\u00fablica o el dispositivo de otra persona, pero es posible que los usuarios que hayan cerrado sesi\u00f3n en Misskey antes de prestar su PC a otra persona tambi\u00e9n se vean afectados. La versi\u00f3n 2025.2.0-alpha.0 contiene una soluci\u00f3n para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24897.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24897.json index 70fb2ae8fa9..17593376fa7 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24897.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24897.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:51.610", "lastModified": "2025-02-11T16:15:51.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, due to a lack of CSRF protection and the lack of proper security attributes in the authentication cookies of Bull's dashboard, some of the APIs of bull-board may be subject to CSRF attacks. There is a risk of this vulnerability being used for attacks with relatively large impact on availability and integrity, such as the ability to add arbitrary jobs. This vulnerability was fixed in 2025.2.0-alpha.0. As a workaround, block all access to the `/queue` directory with a web application firewall (WAF)." + }, + { + "lang": "es", + "value": "Misskey es una plataforma de redes sociales federada de c\u00f3digo abierto. A partir de la versi\u00f3n 12.109.0 y antes de la versi\u00f3n 2025.2.0-alpha.0, debido a la falta de protecci\u00f3n CSRF y la falta de atributos de seguridad adecuados en las cookies de autenticaci\u00f3n del panel de control de Bull, algunas de las API de bull-board pueden estar sujetas a ataques CSRF. Existe el riesgo de que esta vulnerabilidad se utilice para ataques con un impacto relativamente grande en la disponibilidad y la integridad, como la capacidad de agregar trabajos arbitrarios. Esta vulnerabilidad se solucion\u00f3 en 2025.2.0-alpha.0. Como workaround, bloquee todo acceso al directorio `/queue` con un firewall de aplicaciones web (WAF)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24900.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24900.json index b95e5980c31..5daf709ac53 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24900.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24900.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:51.763", "lastModified": "2025-02-11T16:15:51.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.\nThe affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating." + }, + { + "lang": "es", + "value": "Concorde, anteriormente conocida como Nexkey, es una bifurcaci\u00f3n de la plataforma de microblogging federada Misskey. Debido a la falta de contramedidas CSRF y a una configuraci\u00f3n incorrecta de las cookies para la autenticaci\u00f3n de MediaProxy, existe una vulnerabilidad que permite eludir la autenticaci\u00f3n de MediaProxy. En versiones anteriores a 12.25Q1.1, la cookie de autenticaci\u00f3n no tiene el atributo SameSite. Esto permite a un atacante eludir la autenticaci\u00f3n de MediaProxy y cargar cualquier imagen sin restricciones en determinadas circunstancias. En versiones anteriores a 12.24Q2.3, esta cookie tambi\u00e9n se utilizaba para autenticar la p\u00e1gina de gesti\u00f3n de la cola de trabajos (bull-board), por lo que tambi\u00e9n se elude la autenticaci\u00f3n bull-board. Esto puede permitir ataques que tengan un impacto significativo en la disponibilidad y la integridad. Las versiones afectadas son demasiado antiguas para estar cubiertas por este aviso, pero los encargados del mantenimiento de Concorde recomiendan encarecidamente no utilizar versiones anteriores. La versi\u00f3n 12.25Q1.1 contiene un parche. No existe un workaround eficaz aparte de actualizar." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json index 9b12110ecd0..9cf5ebf0fd6 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-13T16:16:48.913", "lastModified": "2025-02-13T16:16:48.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libsignal-service-rs is a Rust version of the libsignal-service-java library which implements the core functionality to communicate with Signal servers. Prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, any contact may forge a sync message, impersonating another device of the local user. The origin of sync messages is not checked. Patched libsignal-service can be found after commit 82d70f6720e762898f34ae76b0894b0297d9b2f8. The `Metadata` struct contains an additional `was_encrypted` field, which breaks the API, but should be easily resolvable. No known workarounds are available." + }, + { + "lang": "es", + "value": "libsignal-service-rs es una versi\u00f3n Rust de la librer\u00eda libsignal-service-java que implementa la funcionalidad principal para comunicarse con los servidores Signal. Antes del commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, cualquier contacto puede falsificar un mensaje de sincronizaci\u00f3n, haci\u00e9ndose pasar por otro dispositivo del usuario local. No se verifica el origen de los mensajes de sincronizaci\u00f3n. Se puede encontrar libsignal-service parcheado despu\u00e9s del commit 82d70f6720e762898f34ae76b0894b0297d9b2f8. La estructura `Metadata` contiene un campo `was_encrypted` adicional, que rompe la API, pero deber\u00eda poder resolverse f\u00e1cilmente. No hay workarounds disponibles." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json index 788bf0d24b3..aa08f80acd9 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-13T16:16:49.053", "lastModified": "2025-02-13T16:16:49.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libsignal-service-rs is a Rust version of the libsignal-service-java library which implements the core functionality to communicate with Signal servers. Prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, plaintext content envelopes could be injected by a server or a malicious client, and may have been able to bypass the end-to-end encryption and authentication. The vulnerability is fixed per 82d70f6720e762898f34ae76b0894b0297d9b2f8. The `Metadata` struct contains an additional `was_encrypted` field, which breaks the API, but should be easily resolvable. No known workarounds are available." + }, + { + "lang": "es", + "value": "libsignal-service-rs es una versi\u00f3n Rust de la librer\u00eda libsignal-service-java que implementa la funcionalidad principal para comunicarse con los servidores Signal. Antes del commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, un servidor o un cliente malintencionado pod\u00edan inyectar sobres de contenido de texto plano, que podr\u00edan haber evitado el cifrado y la autenticaci\u00f3n de extremo a extremo. La vulnerabilidad se solucion\u00f3 seg\u00fan 82d70f6720e762898f34ae76b0894b0297d9b2f8. La estructura `Metadata` contiene un campo `was_encrypted` adicional, que rompe la API, pero deber\u00eda poder resolverse f\u00e1cilmente. No hay workarounds disponibles." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24956.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24956.json index 977daff071b..62dec122970 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24956.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24956.json @@ -3,12 +3,16 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:17.273", "lastModified": "2025-02-11T11:15:17.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en OpenV2G (todas las versiones anteriores a la V0.9.6). La funci\u00f3n de an\u00e1lisis de EXI de OpenV2G no tiene una comprobaci\u00f3n de longitud al analizar n\u00fameros de serie X509. Por lo tanto, un atacante podr\u00eda introducir un desbordamiento de b\u00fafer que provoque una corrupci\u00f3n de la memoria." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24963.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24963.json index 49f84fb91b2..87932f970b2 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24963.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24963.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T20:15:50.330", "lastModified": "2025-02-04T20:15:50.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24964.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24964.json index b46dbb1a65b..7807c3d2b9c 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24964.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24964.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T20:15:50.483", "lastModified": "2025-02-04T20:15:50.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24966.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24966.json index e21af829886..18d508b598a 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24966.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24966.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T20:15:50.627", "lastModified": "2025-02-04T20:15:50.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24967.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24967.json index 5a987daeced..e371a78b660 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24967.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T20:15:50.813", "lastModified": "2025-02-04T20:15:50.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24968.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24968.json index cd5e93a0e58..5ad81993d59 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24968.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24968.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T20:15:50.997", "lastModified": "2025-02-04T20:15:50.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24970.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24970.json index 18ff626e1fb..c81cb7b1915 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24970.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24970.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T22:15:38.057", "lastModified": "2025-02-11T16:15:51.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually." + }, + { + "lang": "es", + "value": "Netty, un framework de aplicaci\u00f3n de red asincr\u00f3nico y controlado por eventos, tiene una vulnerabilidad a partir de la versi\u00f3n 4.1.91.Final y anteriores a la versi\u00f3n 4.1.118.Final. Cuando se recibe un paquete especialmente manipulado a trav\u00e9s de SslHandler, no se gestiona correctamente la validaci\u00f3n de dicho paquete en todos los casos, lo que puede provocar un bloqueo nativo. La versi\u00f3n 4.1.118.Final contiene un parche. Como workaround, es posible deshabilitar el uso de SSLEngine nativo o cambiar el c\u00f3digo manualmente. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24971.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24971.json index 86d6a67db95..5bc30a1f47a 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24971.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24971.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T19:15:33.827", "lastModified": "2025-02-04T20:15:51.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24973.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24973.json index d2bafada0b6..b57bdb34f7b 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24973.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24973.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:52.020", "lastModified": "2025-02-11T16:15:52.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Prior to version 12.25Q1.1, due to an improper implementation of the logout process, authentication credentials remain in cookies even after a user has explicitly logged out, which may allow an attacker to steal authentication tokens. This could have devastating consequences if a user with admin privileges is (or was) using a shared device. Users who have logged in on a shared device should go to Settings > Security and regenerate their login tokens. Version 12.25Q1.1 fixes the issue. As a workaround, clear cookies and site data in the browser after logging out." + }, + { + "lang": "es", + "value": "Concorde, anteriormente conocida como Nexkey, es una bifurcaci\u00f3n de la plataforma de microblogging federada Misskey. Antes de la versi\u00f3n 12.25Q1.1, debido a una implementaci\u00f3n incorrecta del proceso de cierre de sesi\u00f3n, las credenciales de autenticaci\u00f3n permanec\u00edan en las cookies incluso despu\u00e9s de que un usuario cerrara sesi\u00f3n expl\u00edcitamente, lo que pod\u00eda permitir a un atacante robar tokens de autenticaci\u00f3n. Esto podr\u00eda tener consecuencias devastadoras si un usuario con privilegios de administrador est\u00e1 (o estaba) usando un dispositivo compartido. Los usuarios que hayan iniciado sesi\u00f3n en un dispositivo compartido deben ir a Configuraci\u00f3n > Seguridad y regenerar sus tokens de inicio de sesi\u00f3n. La versi\u00f3n 12.25Q1.1 soluciona el problema. Como workaround, borre las cookies y los datos del sitio en el navegador despu\u00e9s de cerrar sesi\u00f3n. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24976.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24976.json index 5eed1106fd9..e9e226dda47 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24976.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24976.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:52.163", "lastModified": "2025-02-11T16:15:52.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication." + }, + { + "lang": "es", + "value": "La distribuci\u00f3n es un conjunto de herramientas para empaquetar, enviar, almacenar y entregar contenido de contenedores. Los sistemas que ejecutan las versiones de registro 3.0.0-beta.1 a 3.0.0-rc.2 con la autenticaci\u00f3n de token habilitada pueden ser vulnerables a un problema en el que la autenticaci\u00f3n de token permite a un atacante inyectar una clave de firma no confiable en un token web JSON (JWT). El problema radica en c\u00f3mo se realiza la verificaci\u00f3n de la clave web JSON (JWK). Cuando un JWT contiene un encabezado JWK sin una cadena de certificados, el c\u00f3digo solo verifica si el KeyID (`kid`) coincide con una de las claves confiables, pero no verifica que el material de la clave real coincida. Hay una soluci\u00f3n para el problema disponible en el commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd y se espera que sea parte de la versi\u00f3n 3.0.0-rc.3. No hay forma de solucionar este problema sin aplicar un parche si el sistema requiere autenticaci\u00f3n de token." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24980.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24980.json index 186c158b5cf..1402127f61a 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24980.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24980.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-07T20:15:33.933", "lastModified": "2025-02-07T22:15:14.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "pimcore/admin-ui-classic-bundle provides a Backend UI for Pimcore. In affected versions an error message discloses existing accounts and leads to user enumeration on the target via \"Forgot password\" function. No generic error message has been implemented. This issue has been addressed in version 1.7.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "pimcore/admin-ui-classic-bundle proporciona una interfaz de usuario de backend para Pimcore. En las versiones afectadas, un mensaje de error revela las cuentas existentes y lleva a la enumeraci\u00f3n de usuarios en el destino mediante la funci\u00f3n \"Olvid\u00e9 mi contrase\u00f1a\". No se ha implementado ning\u00fan mensaje de error gen\u00e9rico. Este problema se ha solucionado en la versi\u00f3n 1.7.4 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json index c409557669d..924f18f16f9 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-06T18:15:32.847", "lastModified": "2025-02-06T18:15:32.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25039.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25039.json index 82682d559a1..3c1f584df1d 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25039.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25039.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-02-04T19:15:33.977", "lastModified": "2025-02-04T19:15:33.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json index 8d51cf88056..484771edffe 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "mySCADA myPRO Manager\n \nis vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands." + }, + { + "lang": "es", + "value": "mySCADA myPRO Manager es vulnerable a una inyecci\u00f3n de comandos del sistema operativo que podr\u00eda permitir que un atacante remoto ejecute comandos arbitrarios del sistema operativo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25071.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25071.json index 39ccb74b501..e005a754ebf 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25071.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25071.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:11.840", "lastModified": "2025-02-07T10:15:11.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in topplugins Vignette Ads allows Stored XSS. This issue affects Vignette Ads: from n/a through 0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en topplugins Vignette Ads permite XSS almacenado. Este problema afecta a Vignette Ads: desde n/a hasta la versi\u00f3n 0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25072.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25072.json index f37691aa023..762e994ce8d 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25072.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25072.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.023", "lastModified": "2025-02-07T10:15:12.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in thunderbax WP Admin Custom Page allows Stored XSS. This issue affects WP Admin Custom Page: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en thunderbax WP Admin Custom Page permite XSS almacenado. Este problema afecta a la p\u00e1gina personalizada de administraci\u00f3n de WP: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25073.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25073.json index df2199df648..96926aa212e 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25073.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25073.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.197", "lastModified": "2025-02-07T10:15:12.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vasilis Triantafyllou Easy WP Tiles allows Stored XSS. This issue affects Easy WP Tiles: from n/a through 1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Easy WP Tiles de Vasilis Triantafyllou que permite XSS almacenado. Este problema afecta a Easy WP Tiles: desde n/d hasta 1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25074.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25074.json index 922625b7c08..982300eb7a2 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25074.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25074.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.370", "lastModified": "2025-02-07T10:15:12.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nirmal Kumar Ram WP Social Stream allows Stored XSS. This issue affects WP Social Stream: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Social Stream de Nirmal Kumar Ram permite XSS almacenado. Este problema afecta a WP Social Stream: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25075.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25075.json index a1fc8cf8fdd..320ad32ad3d 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25075.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25075.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.530", "lastModified": "2025-02-07T10:15:12.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Venugopal Show notice or message on admin area allows Stored XSS. This issue affects Show notice or message on admin area: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Venugopal Show notice or message on admin area permite XSS almacenado. Este problema afecta a Show notice or message on admin area: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25076.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25076.json index 5e9709935c0..f0d296735f4 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25076.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25076.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.697", "lastModified": "2025-02-07T10:15:12.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nicholaswilson Graceful Email Obfuscation allows Stored XSS. This issue affects Graceful Email Obfuscation: from n/a through 0.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en nicholaswilson Graceful Email Ofuscation permite XSS almacenado. Este problema afecta a Graceful Email Ofuscation: desde n/a hasta 0.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25077.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25077.json index 3f0df151fa2..de6e7624654 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25077.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25077.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:12.883", "lastModified": "2025-02-07T10:15:12.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dugbug Easy Chart Builder for WordPress allows Stored XSS. This issue affects Easy Chart Builder for WordPress: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en dugbug Easy Chart Builder for WordPress permite XSS almacenado. Este problema afecta a Easy Chart Builder for WordPress: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25078.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25078.json index 17edc5ea630..64d3923947f 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25078.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25078.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.080", "lastModified": "2025-02-07T10:15:13.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andrew Norcross Google Earth Embed allows Stored XSS. This issue affects Google Earth Embed: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Google Earth Embed de Andrew Norcross que permite XSS almacenado. Este problema afecta a Google Earth Embed: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25079.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25079.json index aef1e59775e..879398525de 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25079.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25079.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.250", "lastModified": "2025-02-07T10:15:13.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Garrett Grimm Simple Select All Text Box allows Stored XSS. This issue affects Simple Select All Text Box: from n/a through 3.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Garrett Grimm Simple Select All Text Box que permite XSS almacenado. Este problema afecta al cuadro de texto de selecci\u00f3n simple de todos los casos: desde n/a hasta 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25080.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25080.json index 154a1c619ab..42b25377811 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25080.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25080.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.440", "lastModified": "2025-02-07T10:15:13.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gubbigubbi Kona Gallery Block allows Stored XSS. This issue affects Kona Gallery Block: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en gubbigubbi Kona Gallery Block que permite XSS almacenado. Este problema afecta al bloque Kona Gallery: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25081.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25081.json index 4654bf797c5..1e191d551d5 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25081.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25081.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.613", "lastModified": "2025-02-07T10:15:13.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in DeannaS Embed RSS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Embed RSS: from n/a through 3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en DeannaS Embed RSS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Embed RSS: desde n/a hasta 3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25082.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25082.json index ce6ff34df7c..14419cbdced 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25082.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25082.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.793", "lastModified": "2025-02-07T10:15:13.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Max Chirkov FlexIDX Home Search allows Stored XSS. This issue affects FlexIDX Home Search: from n/a through 2.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FlexIDX Home Search de Max Chirkov que permite XSS almacenado. Este problema afecta a FlexIDX Home Search: desde n/a hasta 2.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25085.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25085.json index b5e5f0127f6..37086447d8d 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25085.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25085.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:13.980", "lastModified": "2025-02-07T10:15:13.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in matt_mcbrien WP SimpleWeather allows Stored XSS. This issue affects WP SimpleWeather: from n/a through 0.2.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en matt_mcbrien WP SimpleWeather permite XSS almacenado. Este problema afecta a WP SimpleWeather: desde n/a hasta 0.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25088.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25088.json index f2eff90a609..40a236a6719 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25088.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25088.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:14.260", "lastModified": "2025-02-07T10:15:14.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor allows Stored XSS. This issue affects WP Keyword Monitor: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en blackus3r WP Keyword Monitor permite XSS almacenado. Este problema afecta a WP Keyword Monitor: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25091.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25091.json index 910e42c1a10..ffb7b8fb1f2 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25091.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25091.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:14.440", "lastModified": "2025-02-07T10:15:14.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in zackdesign NextGen Cooliris Gallery allows Stored XSS. This issue affects NextGen Cooliris Gallery: from n/a through 0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en zackdesign NextGen Cooliris Gallery que permite XSS almacenado. Este problema afecta a la galer\u00eda NextGen Cooliris: desde n/a hasta 0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25093.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25093.json index 40193b56f2d..cae7427c645 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25093.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25093.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:14.623", "lastModified": "2025-02-07T10:15:14.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in paulswarthout Child Themes Helper allows Path Traversal. This issue affects Child Themes Helper: from n/a through 2.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en paulswarthout Child Themes Helper permite Path Traversal. Este problema afecta al asistente de temas secundarios desde la versi\u00f3n n/a hasta la versi\u00f3n 2.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25094.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25094.json index a215c2c9dbd..3e184632dbf 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25094.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25094.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:14.797", "lastModified": "2025-02-07T10:15:14.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Amitythemes.com Breaking News Ticker allows Stored XSS. This issue affects Breaking News Ticker: from n/a through 2.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Amitythemes.com Breaking News Ticker permite XSS almacenado. Este problema afecta a Breaking News Ticker: desde n/a hasta 2.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25095.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25095.json index 9466a5b65b2..5afbfac4b2c 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25095.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25095.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:14.977", "lastModified": "2025-02-07T10:15:14.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reverbnationdev ReverbNation Widgets allows Stored XSS. This issue affects ReverbNation Widgets: from n/a through 2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en reverbnationdev Los widgets de ReverbNation permiten XSS almacenado. Este problema afecta a los widgets de ReverbNation: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25096.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25096.json index ac5d9055351..47fbd917084 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25096.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25096.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:15.143", "lastModified": "2025-02-07T10:15:15.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in titusbicknell RSS in Page allows Stored XSS. This issue affects RSS in Page: from n/a through 2.9.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RSS in Page de titusbicknell que permite XSS almacenado. Este problema afecta a RSS in Page: desde n/a hasta 2.9.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25097.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25097.json index 8e88617d94f..0556b026ec7 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25097.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25097.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:15.327", "lastModified": "2025-02-07T10:15:15.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kwiliarty External Video For Everybody allows Stored XSS. This issue affects External Video For Everybody: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en kwiliarty External Video For Everybody permite XSS almacenado. Este problema afecta a External Video For Everybody: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25098.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25098.json index 389a9f5b5fa..e86b532ef1e 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25098.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25098.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:15.500", "lastModified": "2025-02-07T10:15:15.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zack Katz Links in Captions allows Stored XSS. This issue affects Links in Captions: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Zack Katz Links in Captions permite XSS almacenado. Este problema afecta a los enlaces en los subt\u00edtulos: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25101.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25101.json index ee44d57f9ce..89fc79d41f3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25101.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25101.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:15.670", "lastModified": "2025-02-07T10:15:15.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in MetricThemes Munk Sites allows Cross Site Request Forgery. This issue affects Munk Sites: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MetricThemes Munk Sites permite Cross-Site Request Forgery. Este problema afecta a los sitios Munk desde la versi\u00f3n n/a hasta la 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25103.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25103.json index c5ad392ece5..70325ac3f9c 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25103.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25103.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:15.850", "lastModified": "2025-02-07T10:15:15.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bnielsen Indeed API allows Cross Site Request Forgery. This issue affects Indeed API: from n/a through 0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en la API de Indeed de bnielsen permite Cross-Site Request Forgery. Este problema afecta a la API de Indeed: desde n/a hasta la versi\u00f3n 0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25104.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25104.json index 16b57348fa8..fe16f2da16d 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25104.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25104.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.027", "lastModified": "2025-02-07T10:15:16.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in mraliende URL-Preview-Box allows Cross Site Request Forgery. This issue affects URL-Preview-Box: from n/a through 1.20." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en URL-Preview-Box de mraliende permite Cross-Site Request Forgery. Este problema afecta a URL-Preview-Box: desde n/a hasta 1.20." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25105.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25105.json index f80c67fec3b..20f0c0a2921 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25105.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25105.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.217", "lastModified": "2025-02-07T10:15:16.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in coffeestudios Pop Up allows Stored XSS. This issue affects Pop Up: from n/a through 0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en el pop-up de coffeestudios que permite XSS almacenado. Este problema afecta al pop-up: desde n/a hasta la versi\u00f3n 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25106.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25106.json index 37b0c9eb724..16d068ba60a 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25106.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25106.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.397", "lastModified": "2025-02-07T10:15:16.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in FancyWP Starter Templates by FancyWP allows Cross Site Request Forgery. This issue affects Starter Templates by FancyWP: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en FancyWP Starter Templates by FancyWP permite Cross-Site Request Forgery. Este problema afecta a las plantillas de inicio de FancyWP: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25107.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25107.json index df4eb6ac0fc..2f32f1b156c 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25107.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25107.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.570", "lastModified": "2025-02-07T10:15:16.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in sainwp OneStore Sites allows Cross Site Request Forgery. This issue affects OneStore Sites: from n/a through 0.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en OneStore Sites de sainwp permite Cross-Site Request Forgery. Este problema afecta a OneStore Sites: desde n/a hasta 0.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25110.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25110.json index e1183f081fc..54c86dd5aed 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25110.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25110.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.747", "lastModified": "2025-02-07T10:15:16.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Metagauss Event Kikfyre allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Event Kikfyre: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Metagauss Event Kikfyre permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Event Kikfyre: desde n/a hasta 2.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25111.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25111.json index 869f8010070..2cddddacb85 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25111.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25111.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:16.910", "lastModified": "2025-02-07T10:15:16.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Spell Check WP Spell Check allows Cross Site Request Forgery. This issue affects WP Spell Check: from n/a through 9.21." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Spell Check WP Spell Check permite Cross-Site Request Forgery. Este problema afecta a WP Spell Check: desde n/a hasta la versi\u00f3n 9.21." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25116.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25116.json index 524b7da61f3..85dadc6857c 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25116.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25116.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.083", "lastModified": "2025-02-07T10:15:17.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in sudipto Link to URL / Post allows Blind SQL Injection. This issue affects Link to URL / Post: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en sudipto Link to URL / Post permite la inyecci\u00f3n SQL ciega. Este problema afecta a Link to URL / Post: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25117.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25117.json index 142ee55c971..b4b8c8bde3c 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25117.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25117.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.267", "lastModified": "2025-02-07T10:15:17.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Polonski Smart Countdown FX allows Stored XSS. This issue affects Smart Countdown FX: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Smart Countdown FX de Alex Polonski que permite XSS almacenado. Este problema afecta a Smart Countdown FX: desde n/a hasta 1.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25120.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25120.json index c7c203ad2d9..fdaacda57f3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25120.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25120.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.453", "lastModified": "2025-02-07T10:15:17.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Melodic Media Slide Banners allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Slide Banners: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Slide Banners de Melodic Media permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Slide Banners: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25123.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25123.json index d4a59405951..0b3a69d4115 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25123.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25123.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.640", "lastModified": "2025-02-07T10:15:17.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in xdark Easy Related Posts allows Stored XSS. This issue affects Easy Related Posts: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Easy Related Posts de xdark permite XSS almacenado. Este problema afecta a Easy Related Posts: desde n/a hasta 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25125.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25125.json index 38e0532a2d3..aaf207598a2 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25125.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25125.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.813", "lastModified": "2025-02-07T10:15:17.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CyrilG Fyrebox Quizzes allows Stored XSS. This issue affects Fyrebox Quizzes: from n/a through 2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en CyrilG Fyrebox Quizzes permite XSS almacenado. Este problema afecta a Fyrebox Quizzes: desde n/a hasta 2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25126.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25126.json index 255db17dc05..9806eac02a1 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25126.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25126.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:17.980", "lastModified": "2025-02-07T10:15:17.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in zmseo ZMSEO allows Stored XSS. This issue affects ZMSEO: from n/a through 1.14.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en zmseo ZMSEO permite XSS almacenado. Este problema afecta a ZMSEO: desde n/a hasta 1.14.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25128.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25128.json index 045ed24d631..8dbfac28263 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25128.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25128.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:18.140", "lastModified": "2025-02-07T10:15:18.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in orlandolac Facilita Form Tracker allows Stored XSS. This issue affects Facilita Form Tracker: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Facilita Form Tracker de Orlandolac permite XSS almacenado. Este problema afecta a Facilita Form Tracker: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25135.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25135.json index 7c270133fcc..67a4ac596e4 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25135.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25135.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:18.320", "lastModified": "2025-02-07T10:15:18.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Victor Barkalov Custom Links On Admin Dashboard Toolbar allows Stored XSS. This issue affects Custom Links On Admin Dashboard Toolbar: from n/a through 3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Victor Barkalov Custom Links On Admin Dashboard Toolbar permite XSS almacenado. Este problema afecta a los enlaces personalizados en la barra de herramientas del panel de administraci\u00f3n: desde n/a hasta 3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25136.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25136.json index acaacd6578e..eb61d538ba8 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25136.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25136.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:18.497", "lastModified": "2025-02-07T10:15:18.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in shujahat21 Optimate Ads allows Stored XSS. This issue affects Optimate Ads: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en shujahat21 Optimate Ads permite XSS almacenado. Este problema afecta a Optimate Ads: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25138.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25138.json index 8045d67dca8..22553587f17 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25138.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25138.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:18.663", "lastModified": "2025-02-07T10:15:18.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rishi On Page SEO + Whatsapp Chat Button allows Stored XSS. This issue affects On Page SEO + Whatsapp Chat Button: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Rishi On Page SEO + Whatsapp Chat Button permite XSS almacenado. Este problema afecta al bot\u00f3n de chat de WhatsApp y SEO en la p\u00e1gina desde n/d hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25139.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25139.json index 0a42a89af3b..d81f4c42ce1 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25139.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25139.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:18.837", "lastModified": "2025-02-07T10:15:18.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Cynob IT Consultancy WP Custom Post RSS Feed allows Stored XSS. This issue affects WP Custom Post RSS Feed: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Cynob IT Consultancy WP Custom Post RSS Feed permite XSS almacenado. Este problema afecta al feed RSS de publicaciones personalizadas de WP: desde n/a hasta 1.0.0. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25140.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25140.json index 09f842529e1..a225b7a7296 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25140.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25140.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.020", "lastModified": "2025-02-07T10:15:19.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Scriptonite Simple User Profile allows Stored XSS. This issue affects Simple User Profile: from n/a through 1.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Scriptonite Simple User Profile permite XSS almacenado. Este problema afecta a Simple User Profile: desde n/a hasta 1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25141.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25141.json index 55869efa9e7..6b48bd4d320 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25141.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25141.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.200", "lastModified": "2025-02-07T10:15:19.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zankover Fami Sales Popup allows PHP Local File Inclusion. This issue affects Fami Sales Popup: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Fami Sales Popup de zankover permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Fami Sales Popup: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25143.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25143.json index 1a7b0ceb0fa..1f43dc46ff3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25143.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.383", "lastModified": "2025-02-07T10:15:19.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ibasit GlobalQuran allows Cross Site Request Forgery. This issue affects GlobalQuran: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ibasit GlobalQuran permite Cross-Site Request Forgery. Este problema afecta a GlobalQuran: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25144.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25144.json index ad3e96fc3b4..423eb510ef4 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25144.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.553", "lastModified": "2025-02-07T10:15:19.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in theasys Theasys allows Stored XSS. This issue affects Theasys: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Theasys Theasys permite XSS almacenado. Este problema afecta a Theasys: desde n/a hasta 1.0.1. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25145.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25145.json index cd76c3c7229..45e0d1518ca 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25145.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25145.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.730", "lastModified": "2025-02-07T10:15:19.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in jordan.hatch Infusionsoft Analytics allows Cross Site Request Forgery. This issue affects Infusionsoft Analytics: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en jordan.hatch Infusionsoft Analytics permite Cross-Site Request Forgery. Este problema afecta a Infusionsoft Analytics: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25146.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25146.json index a07b6a62e1d..053a18a4863 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25146.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25146.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:19.887", "lastModified": "2025-02-07T10:15:19.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in saleandro Songkick Concerts and Festivals allows Cross Site Request Forgery. This issue affects Songkick Concerts and Festivals: from n/a through 0.9.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en saleandro Songkick Concerts and Festivals permite Cross-Site Request Forgery. Este problema afecta a los conciertos y festivales de Songkick: desde n/a hasta 0.9.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25147.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25147.json index 3522c258b41..82da55e1b70 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25147.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25147.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.063", "lastModified": "2025-02-07T10:15:20.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Phillip.Gooch Auto SEO allows Stored XSS. This issue affects Auto SEO: from n/a through 2.5.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Phillip.Gooch Auto SEO permite XSS almacenado. Este problema afecta a Auto SEO: desde n/a hasta 2.5.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25148.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25148.json index a5d822c83fc..9ba6b242ba2 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25148.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25148.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.233", "lastModified": "2025-02-07T10:15:20.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ElbowRobo Read More Copy Link allows Stored XSS. This issue affects Read More Copy Link: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ElbowRobo Read More Copy Link permite XSS almacenado. Este problema afecta a: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25149.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25149.json index 205ee382d0c..fc5a2365ebb 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25149.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25149.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.420", "lastModified": "2025-02-07T10:15:20.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Danillo Nunes Login-box allows Stored XSS. This issue affects Login-box: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Login-box de Danillo Nunes permite XSS almacenado. Este problema afecta a Login-box: desde n/a hasta 2.0.4. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25151.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25151.json index 2de41216ce8..a46400bad47 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25151.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25151.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.593", "lastModified": "2025-02-07T10:15:20.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes uListing allows SQL Injection. This issue affects uListing: from n/a through 2.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en StylemixThemes uListing permite la inyecci\u00f3n SQL. Este problema afecta a uListing: desde n/a hasta 2.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25152.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25152.json index 6ff0ba56de9..cd8fdcdbe07 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25152.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25152.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.770", "lastModified": "2025-02-07T10:15:20.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in LukaszWiecek Smart DoFollow allows Stored XSS. This issue affects Smart DoFollow: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en LukaszWiecek Smart DoFollow permite XSS almacenado. Este problema afecta a Smart DoFollow: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25153.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25153.json index 5c20bd0a7c9..c6dba6cb04a 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25153.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25153.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:20.953", "lastModified": "2025-02-07T10:15:20.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in djjmz Simple Auto Tag allows Stored XSS. This issue affects Simple Auto Tag: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en djjmz Simple Auto Tag permite XSS almacenado. Este problema afecta a Simple Auto Tag: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25154.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25154.json index 1991c744375..d755fd02861 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25154.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25154.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:21.120", "lastModified": "2025-02-07T10:15:21.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications allows Stored XSS. This issue affects Custom Comment Notifications: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en scweber Custom Comment Notifications permite XSS almacenado. Este problema afecta a las notificaciones de comentarios personalizados: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25155.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25155.json index 920f0a2895a..4753a1a5c96 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25155.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25155.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:21.287", "lastModified": "2025-02-07T10:15:21.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in efreja Music Sheet Viewer allows Path Traversal. This issue affects Music Sheet Viewer: from n/a through 4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en efreja Music Sheet Viewer permite Path Traversal. Este problema afecta a Music Sheet Viewer: desde n/a hasta 4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25156.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25156.json index a920a8360c4..c92be7ec324 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25156.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25156.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:21.457", "lastModified": "2025-02-07T10:15:21.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stanko Metodiev Quote Comments allows Stored XSS. This issue affects Quote Comments: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Stanko Metodiev Quote Comments permite XSS almacenado. Este problema afecta a los comentarios de citas: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25159.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25159.json index 78fa72dc19d..6ecd7714e02 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25159.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-07T10:15:21.627", "lastModified": "2025-02-07T10:15:21.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in robert_kolatzek WP doodlez allows Stored XSS. This issue affects WP doodlez: from n/a through 1.0.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en robert_kolatzek WP doodlez permite XSS almacenado. Este problema afecta a WP doodlez: desde n/a hasta 1.0.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json index 1436e0c334a..2128f82b7e7 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T17:15:23.857", "lastModified": "2025-02-12T17:15:23.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with ALB and installed in a way that the application is accessible not through the ALB itself. This vulnerability may also allow for server-side request forgery which may lead to code execution or further privileges escalations when using the AWS metadata URL. This scenario assumes that Stroom must be configured to use ALB Authentication integration and the application is network accessible. The vulnerability has been fixed in versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2." + }, + { + "lang": "es", + "value": "Stroom es una plataforma de procesamiento, almacenamiento y an\u00e1lisis de datos. Existe una vulnerabilidad a partir de la versi\u00f3n 7.2-beta.53 y anteriores a las versiones 7.2.24, 7.3-beta.22, 7.4.4 y 7.5-beta.2 que permite omitir la autenticaci\u00f3n a Stroom sistema cuando se configura con ALB y se instala de manera que la aplicaci\u00f3n sea accesible sin el ALB en s\u00ed. Esta vulnerabilidad tambi\u00e9n puede permitir Server-Side Request Forgery que puede provocar la ejecuci\u00f3n de c\u00f3digo o mayores escaladas de privilegios al usar la URL de metadatos de AWS. Este escenario supone que Stroom debe configurarse para usar la integraci\u00f3n de autenticaci\u00f3n ALB y que la aplicaci\u00f3n es accesible a trav\u00e9s de la red. La vulnerabilidad se ha corregido en las versiones 7.2.24, 7.3-beta.22, 7.4.4 y 7.5-beta.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25183.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25183.json index e763c0d8824..e4932f50573 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25183.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25183.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-07T20:15:34.083", "lastModified": "2025-02-07T20:15:34.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Maliciously constructed statements can lead to hash collisions, resulting in cache reuse, which can interfere with subsequent responses and cause unintended behavior. Prefix caching makes use of Python's built-in hash() function. As of Python 3.12, the behavior of hash(None) has changed to be a predictable constant value. This makes it more feasible that someone could try exploit hash collisions. The impact of a collision would be using cache that was generated using different content. Given knowledge of prompts in use and predictable hashing behavior, someone could intentionally populate the cache using a prompt known to collide with another prompt in use. This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "vLLM es un motor de inferencia y servicio de alto rendimiento y uso eficiente de la memoria para LLM. Las declaraciones construidas de forma malintencionada pueden provocar colisiones de hash, lo que da como resultado la reutilizaci\u00f3n de la memoria cach\u00e9, lo que puede interferir con las respuestas posteriores y provocar un comportamiento no deseado. El almacenamiento en cach\u00e9 de prefijos utiliza la funci\u00f3n hash() incorporada de Python. A partir de Python 3.12, el comportamiento de hash(None) ha cambiado para ser un valor constante predecible. Esto hace que sea m\u00e1s factible que alguien pueda intentar explotar las colisiones de hash. El impacto de una colisi\u00f3n ser\u00eda el uso de la memoria cach\u00e9 generada con un contenido diferente. Dado el conocimiento de los mensajes en uso y el comportamiento predecible del hash, alguien podr\u00eda rellenar intencionalmente la memoria cach\u00e9 utilizando un mensaje que se sabe que colisiona con otro mensaje en uso. Este problema se ha solucionado en la versi\u00f3n 0.7.2 y se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25186.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25186.json index 5456a1138cc..d10a8ec03a1 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25186.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T16:15:39.457", "lastModified": "2025-02-10T16:15:39.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory." + }, + { + "lang": "es", + "value": "Net::IMAP implementa la funcionalidad del cliente del Protocolo de acceso a mensajes de Internet (IMAP) en Ruby. A partir de la versi\u00f3n 0.3.2 y antes de las versiones 0.3.8, 0.4.19 y 0.5.6, existe la posibilidad de denegaci\u00f3n de servicio por agotamiento de la memoria en el analizador de respuestas de `net-imap`. En cualquier momento mientras el cliente est\u00e9 conectado, un servidor malintencionado puede enviar datos `uid-set` altamente comprimidos que son le\u00eddos autom\u00e1ticamente por el hilo receptor del cliente. El analizador de respuestas utiliza `Range#to_a` para convertir los datos `uid-set` en matrices de n\u00fameros enteros, sin limitaci\u00f3n en el tama\u00f1o expandido de los rangos. Las versiones 0.3.8, 0.4.19, 0.5.6 y posteriores solucionan este problema. Hay detalles adicionales para la configuraci\u00f3n adecuada de las versiones corregidas y la compatibilidad con versiones anteriores disponibles en el Aviso de seguridad de GitHub." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25187.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25187.json index 14356956bc6..0e6424a1402 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25187.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25187.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by adding note titles to the document using React's `dangerouslySetInnerHTML`, without first escaping HTML entities. Joplin lacks a Content-Security-Policy with a restrictive `script-src`. This allows arbitrary JavaScript execution via inline `onclick`/`onload` event handlers in unsanitized HTML. Additionally, Joplin's main window is created with `nodeIntegration` set to `true`, allowing arbitrary JavaScript execution to result in arbitrary code execution. Anyone who 1) receives notes from unknown sources and 2) uses ctrl-p to search is impacted. This issue has been addressed in version 3.1.24 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Joplin es una aplicaci\u00f3n de c\u00f3digo abierto y gratuita para tomar notas y realizar tareas pendientes, que puede gestionar una gran cantidad de notas organizadas en cuadernos. Esta vulnerabilidad se produce al a\u00f1adir t\u00edtulos de notas al documento mediante `dangerouslySetInnerHTML` de React, sin escapar primero las entidades HTML. Joplin carece de una Content-Security-Policy con un `script-src` restrictivo. Esto permite la ejecuci\u00f3n arbitraria de JavaScript a trav\u00e9s de controladores de eventos `onclick`/`onload` en l\u00ednea en HTML no saneado. Adem\u00e1s, la ventana principal de Joplin se crea con `nodeIntegration` configurado en `true`, lo que permite la ejecuci\u00f3n arbitraria de JavaScript para dar como resultado la ejecuci\u00f3n de c\u00f3digo arbitrario. Cualquiera que 1) reciba notas de fuentes desconocidas y 2) utilice ctrl-p para buscar se ve afectado. Este problema se ha solucionado en la versi\u00f3n 3.1.24 y se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25188.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25188.json index 3601d9ecde7..3ed1e26f6d3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25188.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T18:15:35.827", "lastModified": "2025-02-10T18:15:35.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hickory DNS is a Rust based DNS client, server, and resolver. A vulnerability present starting in version 0.8.0 and prior to versions 0.24.3 and 0.25.0-alpha.5 impacts Hickory DNS users relying on DNSSEC verification in the client library, stub resolver, or recursive resolver. The DNSSEC validation routines treat entire RRsets of DNSKEY records as trusted once they have established trust in only one of the DNSKEYs. As a result, if a zone includes a DNSKEY with a public key that matches a configured trust anchor, all keys in that zone will be trusted to authenticate other records in the zone. There is a second variant of this vulnerability involving DS records, where an authenticated DS record covering one DNSKEY leads to trust in signatures made by an unrelated DNSKEY in the same zone. Versions 0.24.3 and 0.25.0-alpha.5 fix the issue." + }, + { + "lang": "es", + "value": "Hickory DNS es un cliente, servidor y solucionador de DNS basado en Rust. Una vulnerabilidad presente a partir de la versi\u00f3n 0.8.0 y anteriores a las versiones 0.24.3 y 0.25.0-alpha.5 afecta a los usuarios de Hickory DNS que dependen de la verificaci\u00f3n DNSSEC en la librer\u00eda cliente, el solucionador de stub o el solucionador recursivo. Las rutinas de validaci\u00f3n DNSSEC tratan conjuntos RR completos de registros DNSKEY como confiables una vez que han establecido confianza en solo uno de los DNSKEY. Como resultado, si una zona incluye un DNSKEY con una clave p\u00fablica que coincide con un ancla de confianza configurada, se confiar\u00e1 en todas las claves de esa zona para autenticar otros registros en la zona. Existe una segunda variante de esta vulnerabilidad que involucra registros DS, donde un registro DS autenticado que cubre un DNSKEY lleva a confiar en las firmas realizadas por un DNSKEY no relacionado en la misma zona. Las versiones 0.24.3 y 0.25.0-alpha.5 solucionan el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25189.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25189.json index b9e14397c2e..7901ad1b158 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25189.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T22:15:38.190", "lastModified": "2025-02-11T16:15:52.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25190.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25190.json index f6cfffadd5c..928cfd4c6ce 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25190.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25190.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T22:15:38.320", "lastModified": "2025-02-11T16:15:52.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json index ede5184103a..7c9718ff536 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T22:15:38.450", "lastModified": "2025-02-11T16:15:52.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25194.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25194.json index 03770be1a64..8b538422fac 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25194.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25194.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T23:15:16.067", "lastModified": "2025-02-10T23:15:16.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a dependency on activitypub_federation, a framework for ActivityPub federation in Rust. This vulnerability, which is present in versions 0.6.2 and prior of activitypub_federation and versions 0.19.8 and prior of Lemmy, allows a user to bypass any predefined hardcoded URL path or security anti-Localhost mechanism and perform an arbitrary GET request to any Host, Port and URL using a Webfinger Request. As of time of publication, a fix has not been made available." + }, + { + "lang": "es", + "value": "Lemmy, un agregador de enlaces y foro para el fediverso, es vulnerable a server-side request forgery a trav\u00e9s de una dependencia de activitypub_federation, un framework para la federaci\u00f3n de ActivityPub en Rust. Esta vulnerabilidad, que est\u00e1 presente en las versiones 0.6.2 y anteriores de activitypub_federation y en las versiones 0.19.8 y anteriores de Lemmy, permite a un usuario eludir cualquier ruta URL predefinida codificada o mecanismo anti-Localhost de seguridad y realizar una solicitud GET arbitraria a cualquier host, puerto y URL mediante una solicitud Webfinger. Al momento de la publicaci\u00f3n, no se hab\u00eda puesto a disposici\u00f3n una soluci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25195.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25195.json index 8bbbc1acefe..a5f25d69e9a 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25195.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25195.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zulip is an open source team chat application. A weekly cron job (added in 50256f48314250978f521ef439cafa704e056539) demotes channels to being \"inactive\" after they have not received traffic for 180 days. However, upon doing so, an event was sent to all users in the organization, not just users in the channel. This event contained the name of the private channel. Similarly, the same commit (50256f48314250978f521ef439cafa704e056539) added functionality to notify clients when channels stopped being \"inactive.\" The first message sent to a private channel which had not previously had any messages for over 180 days (and were thus already marked \"inactive\") would leak an event to all users in the organization; this event also contained the name of the private channel. Commits 75be449d456d29fef27e9d1828bafa30174284b4 and a2a1a7f8d152296c8966f1380872c0ac69e5c87e fixed the issue. This vulnerability only existed in `main`, and was not part of any published versions." + }, + { + "lang": "es", + "value": "Zulip es una aplicaci\u00f3n de chat en equipo de c\u00f3digo abierto. Un trabajo cron semanal (agregado en 50256f48314250978f521ef439cafa704e056539) degrada los canales a \"inactivos\" despu\u00e9s de que no hayan recibido tr\u00e1fico durante 180 d\u00edas. Sin embargo, al hacerlo, se envi\u00f3 un evento a todos los usuarios de la organizaci\u00f3n, no solo a los usuarios del canal. Este evento conten\u00eda el nombre del canal privado. De manera similar, el mismo commit (50256f48314250978f521ef439cafa704e056539) agreg\u00f3 una funcionalidad para notificar a los clientes cuando los canales dejaron de estar \"inactivos\". El primer mensaje enviado a un canal privado que no hab\u00eda tenido ning\u00fan mensaje previamente durante m\u00e1s de 180 d\u00edas (y, por lo tanto, ya estaba marcado como \"inactivo\") filtrar\u00eda un evento a todos los usuarios de la organizaci\u00f3n; este evento tambi\u00e9n conten\u00eda el nombre del canal privado. Los commits 75be449d456d29fef27e9d1828bafa30174284b4 y a2a1a7f8d152296c8966f1380872c0ac69e5c87e solucionaron el problema. Esta vulnerabilidad solo exist\u00eda en `main` y no formaba parte de ninguna versi\u00f3n publicada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json index 43561604f37..01541ea5323 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T18:15:27.757", "lastModified": "2025-02-12T18:15:27.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -> Configuration -> Options -> Password Settings." + }, + { + "lang": "es", + "value": "mailcow: dockerized es un paquete de correo electr\u00f3nico/groupware de c\u00f3digo abierto basado en docker. Antes de la versi\u00f3n 2025-01a, una vulnerabilidad en la funcionalidad de restablecimiento de contrase\u00f1a de mailcow permit\u00eda a un atacante manipular el encabezado `Host HTTP` para generar un enlace de restablecimiento de contrase\u00f1a que apuntara a un dominio controlado por el atacante. Esto puede provocar la apropiaci\u00f3n de la cuenta si un usuario hace clic en el enlace envenenado. La versi\u00f3n 2025-01a contiene un parche. Como workaround, desactive la funcionalidad de restablecimiento de contrase\u00f1a borrando `Remitente de correo electr\u00f3nico de notificaci\u00f3n` y `Asunto de correo electr\u00f3nico de notificaci\u00f3n` en sistema -> Configuraci\u00f3n -> Opciones -> Configuraci\u00f3n de contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json index 44813dd9019..1de3669f07f 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T18:15:27.933", "lastModified": "2025-02-12T18:15:27.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don't release the key handle, producing a small memory leak every time. Commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contains a fix for the issue. The fix is included in versions 1.23.6-2 and 1.22.12-2 of the Microsoft build of go, as well as in the pseudoversion 0.0.0-20250211154640-f49c8e1379ea of the `github.com/microsoft/go-crypto-winnative` Go package." + }, + { + "lang": "es", + "value": "go-crypto-winnative Backend de criptograf\u00eda Go para Windows que utiliza Cryptography API: Next Generation (CNG). Antes del commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, las llamadas a `cng.TLS1PRF` no liberan el identificador de la clave, lo que produce una peque\u00f1a p\u00e9rdida de memoria. El commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contiene una soluci\u00f3n para el problema. La correcci\u00f3n est\u00e1 incluida en las versiones 1.23.6-2 y 1.22.12-2 de la compilaci\u00f3n de Microsoft de Go, as\u00ed como en la pseudoversi\u00f3n 0.0.0-20250211154640-f49c8e1379ea del paquete Go `github.com/microsoft/go-crypto-winnative`." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json index ad0f12120ca..183a615d9f9 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T18:15:28.110", "lastModified": "2025-02-12T18:15:28.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3, Koa uses an evil regex to parse the `X-Forwarded-Proto` and `X-Forwarded-Host` HTTP headers. This can be exploited to carry out a Denial-of-Service attack. Versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 fix the issue." + }, + { + "lang": "es", + "value": "Koa es un middleware expresivo para Node.js que utiliza funciones asincr\u00f3nicas ES2017. En versiones anteriores a las 0.21.2, 1.7.1, 2.15.4 y 3.0.0-alpha.3, Koa utiliza una expresi\u00f3n regular maliciosa para analizar los encabezados HTTP `X-Forwarded-Proto` y `X-Forwarded-Host`. Esto se puede aprovechar para llevar a cabo un ataque de denegaci\u00f3n de servicio. Las versiones 0.21.2, 1.7.1, 2.15.4 y 3.0.0-alpha.3 solucionan el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25201.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25201.json index d26f3214417..334429b3716 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25201.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T19:15:21.570", "lastModified": "2025-02-12T19:15:21.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nitrokey 3 Firmware is the the firmware of Nitrokey 3 USB keys. For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key. This could lead to compromise of the integrity of the data stored in the application. An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates. Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication. The issue is fixed in piv-authenticator 0.3.9, and in Nitrokey's firmware 1.8.1." + }, + { + "lang": "es", + "value": "El firmware de Nitrokey 3 es el firmware de las llaves USB de Nitrokey 3. En la versi\u00f3n 1.8.0 y en las versiones de prueba con PIV habilitado antes de la 1.8.0, la aplicaci\u00f3n PIV pod\u00eda aceptar claves no v\u00e1lidas para la autenticaci\u00f3n de la clave de administrador. Esto podr\u00eda poner en riesgo la integridad de los datos almacenados en la aplicaci\u00f3n. Un atacante sin acceso a la clave de administraci\u00f3n adecuada podr\u00eda generar nuevas claves y sobrescribir certificados. Dicho atacante no podr\u00eda leer ni extraer datos privados existentes, ni podr\u00eda obtener acceso a operaciones criptogr\u00e1ficas que normalmente requerir\u00edan autenticaci\u00f3n basada en PIN. El problema se solucion\u00f3 en piv-authenticator 0.3.9 y en el firmware 1.8.1 de Nitrokey." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25202.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25202.json index feae7c3d53d..894b4c40afd 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25202.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25202.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T19:15:18.690", "lastModified": "2025-02-11T19:15:18.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ash Authentication is an authentication framework for Elixir applications. Applications which have been bootstrapped by the igniter installer present since AshAuthentication v4.1.0 and who have used the magic link strategy _or_ are manually revoking tokens are affected by revoked tokens being allowed to verify as valid. Unless one hase implemented any kind of custom token revocation feature in your application, then one will not be affected. The impact here for users using builtin functionality is that magic link tokens are reusable until they expire. With that said, magic link tokens are only valid for 10 minutes, so the surface area for abuse is extremely low here. The flaw is patched in version 4.4.9. Additionally a compile time warning is shown to users with remediation instructions if they upgrade. 4.4.9 ships with an upgrader, so those who use `mix igniter.upgrade ash_authentication` will have the necessary patch applied. Otherwise, one may run the upgrader manually as described in the error message. As a workaround, delete the generated `:revoked?` generic action in the token resource. This will cause it to use the one internal to Ash Authentication which has always been correct. Alternatively, manually make the changes that are included in the patch." + }, + { + "lang": "es", + "value": "Ash Authentication es un framework de autenticaci\u00f3n para aplicaciones Elixir. Las aplicaciones que se han iniciado con el instalador de Igniter presente desde AshAuthentication v4.1.0 y que han utilizado la estrategia de enlace m\u00e1gico _o_ est\u00e1n revocando tokens manualmente se ven afectadas por el hecho de que se permite que los tokens revocados se verifiquen como v\u00e1lidos. A menos que uno haya implementado alg\u00fan tipo de funci\u00f3n de revocaci\u00f3n de token personalizada en su aplicaci\u00f3n, no se ver\u00e1 afectado. El impacto aqu\u00ed para los usuarios que utilizan la funcionalidad incorporada es que los tokens de enlace m\u00e1gico se pueden reutilizar hasta que caduquen. Dicho esto, los tokens de enlace m\u00e1gico solo son v\u00e1lidos durante 10 minutos, por lo que la superficie de abuso es extremadamente baja aqu\u00ed. La falla se corrige en la versi\u00f3n 4.4.9. Adem\u00e1s, se muestra una advertencia de tiempo de compilaci\u00f3n a los usuarios con instrucciones de soluci\u00f3n si actualizan. 4.4.9 se env\u00eda con un actualizador, por lo que aquellos que usan `mix igniter.upgrade ash_authentication` tendr\u00e1n el parche necesario aplicado. De lo contrario, uno puede ejecutar el actualizador manualmente como se describe en el mensaje de error. Como workaround, elimine la acci\u00f3n gen\u00e9rica `:revoked?` generada en el recurso de token. Esto har\u00e1 que utilice la acci\u00f3n interna de Ash Authentication que siempre ha sido correcta. Como alternativa, realice manualmente los cambios que se incluyen en el parche. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25203.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25203.json index 36e5694990e..4461a4b5b5e 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25203.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25203.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T23:15:09.450", "lastModified": "2025-02-11T23:15:09.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CtrlPanel is open-source billing software for hosting providers. Prior to version 1.0, a Cross-Site Scripting (XSS) vulnerability exists in the `TicketsController` and `Moderation/TicketsController` due to insufficient input validation on the `priority` field during ticket creation and unsafe rendering of this field in the moderator panel. Version 1.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "CtrlPanel es un software de facturaci\u00f3n de c\u00f3digo abierto para proveedores de alojamiento. Antes de la versi\u00f3n 1.0, exist\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en `TicketsController` y `Moderation/TicketsController` debido a una validaci\u00f3n de entrada insuficiente en el campo `priority` durante la creaci\u00f3n de un ticket y a una representaci\u00f3n insegura de este campo en el panel del moderador. La versi\u00f3n 1.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25205.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25205.json index de5e773fdaf..1b45f3f9631 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25205.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25205.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T19:15:21.717", "lastModified": "2025-02-12T19:15:21.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Audiobookshelf is a self-hosted audiobook and podcast server. Starting in version 2.17.0 and prior to version 2.19.1, a flaw in the authentication bypass logic allows unauthenticated requests to match certain unanchored regex patterns in the URL. Attackers can craft URLs containing substrings like \"/api/items/1/cover\" in a query parameter (?r=/api/items/1/cover) to partially bypass authentication or trigger server crashes under certain routes. This could lead to information disclosure of otherwise protected data and, in some cases, a complete denial of service (server crash) if downstream code expects an authenticated user object. Version 2.19.1 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Audiobookshelf es un servidor de audiolibros y podcasts autoalojado. A partir de la versi\u00f3n 2.17.0 y antes de la versi\u00f3n 2.19.1, una falla en la l\u00f3gica de omisi\u00f3n de autenticaci\u00f3n permite que las solicitudes no autenticadas coincidan con ciertos patrones de expresiones regulares no anclados en la URL. Los atacantes pueden manipuleURL que contengan subcadenas como \"/api/items/1/cover\" en un par\u00e1metro de consulta (?r=/api/items/1/cover) para omitir parcialmente la autenticaci\u00f3n o provocar fallas del servidor en ciertas rutas. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n de datos que de otro modo estar\u00edan protegidos y, en algunos casos, una denegaci\u00f3n completa del servicio (falla del servidor) si el c\u00f3digo descendente espera un objeto de usuario autenticado. La versi\u00f3n 2.19.1 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json index 37aecc39700..d5fe922103b 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:12.027", "lastModified": "2025-02-11T06:15:24.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a missing authorization check, an attacker who is logged in to application can view/ delete \ufffdMy Overtime Requests\ufffd which could allow the attacker to access employee information. This leads to low impact on confidentiality, integrity of the application. There is no impact on availability." + }, + { + "lang": "es", + "value": "Debido a la falta de una verificaci\u00f3n de autorizaci\u00f3n, un atacante que haya iniciado sesi\u00f3n en la aplicaci\u00f3n puede ver o eliminar \"Mis solicitudes de horas extra\", lo que podr\u00eda permitirle acceder a la informaci\u00f3n de los empleados. Esto genera un impacto bajo en la confidencialidad y la integridad de la aplicaci\u00f3n. No hay impacto en la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json index b542028ab0b..fd12b7d8429 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:12.170", "lastModified": "2025-02-11T06:15:24.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Supplier Relationship Management (Master Data Management Catalog) allows an unauthenticated attacker to use a publicly available servlet to download an arbitrary file over the network without any user interaction. This can reveal highly sensitive information with no impact to integrity or availability." + }, + { + "lang": "es", + "value": "SAP Supplier Relationship Management (Master Data Management Catalog) permite que un atacante no autenticado utilice un servlet disponible p\u00fablicamente para descargar un archivo arbitrario a trav\u00e9s de la red sin interacci\u00f3n del usuario. Esto puede revelar informaci\u00f3n altamente confidencial sin afectar la integridad ni la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25246.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25246.json index c20853d0a8a..6ef1d28cfbc 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25246.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T05:15:11.663", "lastModified": "2025-02-05T05:15:11.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25247.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25247.json index 1b456f79fea..f27ff57c714 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25247.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25247.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-10T12:15:29.557", "lastModified": "2025-02-10T15:15:13.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix Webconsole.\n\nThis issue affects Apache Felix Webconsole 4.x up to 4.9.8 and 5.x up to 5.0.8.\n\nUsers are recommended to upgrade to version 4.9.10 or 5.0.10 or higher, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Apache Felix Webconsole. Este problema afecta a Apache Felix Webconsole 4.x hasta 4.9.8 y 5.x hasta 5.0.8. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.9.10 o 5.0.10 o superior, que soluciona el problema. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json index 8e527b72b7d..13a39cb9ba9 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker may modify the URL to discover sensitive information about the target network." + }, + { + "lang": "es", + "value": "Un atacante puede modificar la URL para descubrir informaci\u00f3n confidencial sobre la red objetivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25283.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25283.json index f88a4a3fb4e..7dc61bf4fb5 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25283.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25283.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-12T19:15:21.863", "lastModified": "2025-02-12T19:15:21.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "parse-duraton is software that allows users to convert a human readable duration to milliseconds. Versions prior to 2.1.3 are vulnerable to an event loop delay due to the CPU-bound operation of resolving the provided string, from a 0.5ms and up to ~50ms per one operation, with a varying size from 0.01 MB and up to 4.3 MB respectively, and an out of memory that would crash a running Node.js application due to a string size of roughly 10 MB that utilizes unicode characters. Version 2.1.3 contains a patch." + }, + { + "lang": "es", + "value": "parse-duraton es un software que permite a los usuarios convertir una duraci\u00f3n legible para humanos en milisegundos. Las versiones anteriores a la 2.1.3 son vulnerables a un retraso en el bucle de eventos debido a la operaci\u00f3n limitada por la CPU de resolver la cadena proporcionada, desde 0,5 ms hasta ~50 ms por operaci\u00f3n, con un tama\u00f1o variable desde 0,01 MB hasta 4,3 MB respectivamente, y una falta de memoria que bloquear\u00eda una aplicaci\u00f3n Node.js en ejecuci\u00f3n debido a un tama\u00f1o de cadena de aproximadamente 10 MB que utiliza caracteres Unicode. La versi\u00f3n 2.1.3 contiene un parche." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25286.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25286.json index 306a0f6999f..9f411f22a3b 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25286.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25286.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-13T01:15:25.280", "lastModified": "2025-02-13T01:15:25.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs." + }, + { + "lang": "es", + "value": "Crayfish es una colecci\u00f3n de microservicios de Islandora 8, uno de los cuales, Homarus, proporciona FFmpeg como microservicio. Antes de la versi\u00f3n 4.1.0 de Crayfish, la ejecuci\u00f3n remota de c\u00f3digo pod\u00eda ser posible en instalaciones de Homarus accesibles desde la web en ciertas configuraciones. El problema se ha corregido en `islandora/crayfish:4.1.0`. Hay algunos workarounds disponibles. El exploit requiere realizar una solicitud contra el endpoint `/convert` de Homarus; por lo tanto, la capacidad de explotar se reduce mucho si el microservicio no es directamente accesible desde Internet, por lo tanto: Evite que el acceso general desde Internet llegue a Homarus. Como alternativa o adicionalmente, configure la autenticaci\u00f3n en Crayfish para que sea m\u00e1s obligatoria, de modo que las solicitudes con encabezados `Authorization` que no validen se rechacen antes de que se produzca la interpolaci\u00f3n de CLI problem\u00e1tica." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json index 54258e672e5..8a5968f7c11 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-13T16:16:49.187", "lastModified": "2025-02-13T16:16:49.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lakeus is a simple skin made for MediaWiki. Starting in version 1.8.0 and prior to versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0, Lakeus is vulnerable to store cross-site scripting via malicious system messages, though editing the messages requires high privileges. Those with `(editinterface)` rights can edit system messages that are improperly handled in order to send raw HTML. In the case of `lakeus-footermessage`, this will affect all users if the server is configured to link back to this repository. Otherwise, the system messages in themeDesigner.js are only used when the user enables it in their preferences. Versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0 contain a patch." + }, + { + "lang": "es", + "value": "Lakeus es una m\u00e1scara simple creada para MediaWiki. A partir de la versi\u00f3n 1.8.0 y antes de las versiones 1.3.1+REL1.39, 1.3.1+REL1.42 y 1.4.0, Lakeus es vulnerable a la ejecuci\u00f3n de cross-site scripting almacenado a trav\u00e9s de mensajes de sistema maliciosos, aunque la edici\u00f3n de los mensajes requiere privilegios elevados. Aquellos con derechos `(editinterface)` pueden editar los mensajes de sistema que se gestionan incorrectamente para enviar HTML sin formato. En el caso de `lakeus-footermessage`, esto afectar\u00e1 a todos los usuarios si el servidor est\u00e1 configurado para vincularse a este repositorio. De lo contrario, los mensajes de sistema en themeDesigner.js solo se utilizan cuando el usuario lo habilita en sus preferencias. Las versiones 1.3.1+REL1.39, 1.3.1+REL1.42 y 1.4.0 contienen un parche." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json index b52e2b995c5..05913db545d 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T19:15:22.003", "lastModified": "2025-02-12T19:15:22.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function." + }, + { + "lang": "es", + "value": "El firmware Tenda AC6 V15.03.05.16 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n formexeCommand." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json index 8603723e887..7bb0340703c 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T20:15:39.327", "lastModified": "2025-02-11T20:15:39.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 due to the lack of length verification, which is related to saving parental control configuration information. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Digital China DCBI-Netlog-LAB Gateway 1.0 debido a la falta de verificaci\u00f3n de longitud, que est\u00e1 relacionada con el almacenamiento de informaci\u00f3n de configuraci\u00f3n de control parental. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json index 04059a4c9be..6e80e7512f1 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T18:15:28.293", "lastModified": "2025-02-12T18:15:28.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro IPv6_PppoePassword en el m\u00f3dulo SetIPv6PppoeSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json index 56dc2cbeda7..a2e4fdd7b23 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.150", "lastModified": "2025-02-12T17:15:24.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the AccountPassword parameter in the SetSysEmailSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro AccountPassword en el m\u00f3dulo SetSysEmailSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json index ffbae051bff..1f1d52412eb 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.270", "lastModified": "2025-02-12T17:15:24.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability in the SetVirtualServerSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 contiene una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo SetVirtualServerSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json index e33d609a49f..34155671fe0 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.390", "lastModified": "2025-02-12T17:15:24.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetDynamicDNSSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro Contrase\u00f1a en el m\u00f3dulo SetDynamicDNSSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json index ae8c091c581..23dc23205bb 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.500", "lastModified": "2025-02-12T17:15:24.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro Contrase\u00f1a en el m\u00f3dulo SetWanSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json index cf1e5387332..5b2741dd875 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.790", "lastModified": "2025-02-13T16:16:49.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro 'ip' en /userRpm/WanStaticIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json index 0b301489863..614f567d6ac 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:50.037", "lastModified": "2025-02-13T16:16:50.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the username and password parameters at /userRpm/PPPoEv6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s de los par\u00e1metros de nombre de usuario y contrase\u00f1a en /userRpm/PPPoEv6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json index 4e4a49a06e3..049b65abf5e 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:50.180", "lastModified": "2025-02-13T16:16:50.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de desbordamiento de buffer en TP-Link TL-WR841ND V11, causada por los par\u00e1metros dnsserver1 y dnsserver2 en /userRpm/WanSlaacCfgRpm.htm. Esta vulnerabilidad permite a los atacantes ocasionar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado.\n" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26339.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26339.json index 3d45975e51f..57b2fc28df5 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26339.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26339.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:33.510", "lastModified": "2025-02-12T14:15:33.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxtime/handleRoute.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to affect the device confidentiality, integrity, or availability in multiple unspecified ways via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxtime/handleRoute.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado afecte la confidencialidad, integridad o disponibilidad del dispositivo de m\u00faltiples formas no especificadas a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26340.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26340.json index fc96ecd7dfd..0743e6ead25 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26340.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26340.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:33.650", "lastModified": "2025-02-12T14:15:33.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-321 \"Use of Hard-coded Cryptographic Key\" in the JWT signing in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to bypass the authentication via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-321 \"Uso de clave criptogr\u00e1fica codificada\" en la firma JWT en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado eludir la autenticaci\u00f3n mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26341.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26341.json index 37102d39be3..f8e15aa97a3 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26341.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26341.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:33.857", "lastModified": "2025-02-12T14:15:33.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to reset arbitrary user passwords via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/accounts/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado restablecer contrase\u00f1as de usuarios arbitrarias mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26342.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26342.json index 89a63efaf4b..dd7e503c556 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26342.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26342.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:33.990", "lastModified": "2025-02-12T14:15:33.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to create arbitrary users, including administrators, via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/accounts/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado crear usuarios arbitrarios, administradores incluida, a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26343.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26343.json index ae1e2449dfb..03c8d549a0d 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26343.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26343.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.130", "lastModified": "2025-02-12T14:15:34.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-1390 \"Weak Authentication\" in the PIN authentication mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to brute-force user PINs via multiple crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una \"Autenticaci\u00f3n d\u00e9bil\" CWE-1390 en el mecanismo de autenticaci\u00f3n de PIN en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado forzar la obtenci\u00f3n de PIN de los usuarios a trav\u00e9s de m\u00faltiples solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json index 2cec75f4cb4..9bbfec65465 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.273", "lastModified": "2025-02-12T15:15:18.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/guest-mode/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enable passwordless guest mode via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/guest-mode/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado habilite el modo invitado sin contrase\u00f1a a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json index f45753ec8ef..bc80e6d6309 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.407", "lastModified": "2025-02-12T15:15:18.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user group permissions via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/menu/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado editar permisos de grupo de usuarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26346.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26346.json index 9e7e5fd7ada..56bd35ebec2 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26346.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26346.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.547", "lastModified": "2025-02-12T14:15:34.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-89 \"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\" in maxprofile/menu/model.lua (editUserGroupMenu endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to execute arbitrary SQL commands via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una \"Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL')\" CWE-89 en maxprofile/menu/model.lua (editUserGroupMenu endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado ejecutar comandos SQL arbitrarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26347.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26347.json index d042f52b5f7..5748056636b 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26347.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26347.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.687", "lastModified": "2025-02-12T14:15:34.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user permissions via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/menu/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado editar permisos de usuario a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26348.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26348.json index 200cf1dbfec..2e79c1a55db 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26348.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26348.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.827", "lastModified": "2025-02-12T14:15:34.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-89 \"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\" in maxprofile/menu/model.lua (editUserMenu endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to execute arbitrary SQL commands via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una \"Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL')\" CWE-89 en maxprofile/menu/model.lua (editUserMenu endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado ejecutar comandos SQL arbitrarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26349.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26349.json index 000b4e4f0b2..a5612e433f6 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26349.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26349.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.960", "lastModified": "2025-02-12T14:15:34.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-23 \"Relative Path Traversal\" in the file upload mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite arbitrary files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-23 \"Relative Path Traversal\" en el mecanismo de carga de archivos en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado sobrescribir archivos arbitrarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26350.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26350.json index 7b7b52b58ef..4270c04f5e7 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26350.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.107", "lastModified": "2025-02-12T14:15:35.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-434 \"Unrestricted Upload of File with Dangerous Type\" in the template file uploads in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to upload malicious files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una CWE-434 \"Carga sin restricciones de archivo con tipo peligroso\" en las cargas de archivos de plantilla en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto autenticado cargue archivos maliciosos a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26351.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26351.json index 401a55b3262..0ec0edca23b 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26351.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26351.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.270", "lastModified": "2025-02-12T14:15:35.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in the template download mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en el mecanismo de descarga de plantillas en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado leer archivos confidenciales a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26352.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26352.json index 4494ba70df2..6333ec721bc 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26352.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26352.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.430", "lastModified": "2025-02-12T14:15:35.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in the template deletion mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to delete sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en el mecanismo de eliminaci\u00f3n de plantillas en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado eliminar archivos confidenciales a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26353.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26353.json index 8a4573e3b2c..119ae8f949b 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26353.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26353.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.587", "lastModified": "2025-02-12T14:15:35.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in maxtime/api/sql/sql.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en maxtime/api/sql/sql.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado leer archivos confidenciales a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26354.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26354.json index f5ca77023d4..8d77a9ab7f6 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26354.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26354.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.727", "lastModified": "2025-02-12T14:15:35.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in maxtime/api/database/database.lua (copy endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en maxtime/api/database/database.lua (copia endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado sobrescribir archivos confidenciales mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26355.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26355.json index 82edb07a861..8999e91b17c 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26355.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26355.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:35.870", "lastModified": "2025-02-12T14:15:35.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in maxtime/api/database/database.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to delete sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en maxtime/api/database/database.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado eliminar archivos confidenciales a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26356.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26356.json index 5ecbb35dc1b..2d60485aefd 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26356.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.017", "lastModified": "2025-02-12T14:15:36.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in maxtime/api/database/database.lua (setActive endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en maxtime/api/database/database.lua (setActive endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado sobrescribir archivos confidenciales mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26357.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26357.json index 85158e44422..1da1810e2d4 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26357.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26357.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.160", "lastModified": "2025-02-12T14:15:36.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-35 \"Path Traversal\" in maxtime/api/database/database.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-35 \"Path Traversal\" en maxtime/api/database/database.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado leer archivos confidenciales a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26358.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26358.json index 6148e1ec968..f217f278d2b 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26358.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26358.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.297", "lastModified": "2025-02-12T14:15:36.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-20 \"Improper Input Validation\" in ldbMT.so in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to modify system configuration via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una \"Validaci\u00f3n de entrada incorrecta\" CWE-20 en ldbMT.so en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto autenticado modificar la configuraci\u00f3n sistema a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26359.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26359.json index ce72af17144..1f419f4611a 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26359.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.437", "lastModified": "2025-02-12T14:15:36.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to reset user PINs via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/accounts/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado restablecer los PIN de los usuarios mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26360.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26360.json index 0b50b327a80..d719640cd34 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26360.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26360.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.577", "lastModified": "2025-02-12T14:15:36.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/persistance/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to delete dashboards via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/persistance/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado elimine paneles mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26361.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26361.json index 1a2b50d3f85..6d0587897f6 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26361.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26361.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.717", "lastModified": "2025-02-12T14:15:36.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to factory reset the device via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado restablezca el dispositivo de f\u00e1brica a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26362.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26362.json index ad08be080bc..691bf2b3c63 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26362.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26362.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.847", "lastModified": "2025-02-12T14:15:36.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to set an arbitrary authentication profile server via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado establecer un servidor de perfil de autenticaci\u00f3n arbitrario a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26363.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26363.json index c09a5c9e5b7..fbc7145253f 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26363.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:36.983", "lastModified": "2025-02-12T14:15:36.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enable an authentication profile server via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado habilite un servidor de perfil de autenticaci\u00f3n a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26364.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26364.json index 5340817aa15..8f134b8d243 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26364.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26364.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.123", "lastModified": "2025-02-12T14:15:37.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to disable an authentication profile server via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante remoto no autenticado deshabilitar un servidor de perfil de autenticaci\u00f3n mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26365.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26365.json index c2795b7ea67..bba2b280000 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26365.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26365.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.267", "lastModified": "2025-02-12T14:15:37.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enable front panel authentication via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado habilite la autenticaci\u00f3n del panel frontal a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26366.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26366.json index 4ab8069f6a8..7d8c6272a40 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26366.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.397", "lastModified": "2025-02-12T14:15:37.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-306 \"Missing Authentication for Critical Function\" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to disable front panel authentication via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-306 \"Autenticaci\u00f3n faltante para funci\u00f3n cr\u00edtica\" en maxprofile/setup/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante remoto no autenticado deshabilite la autenticaci\u00f3n del panel frontal mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json index d5bdc516f20..03a401b7434 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.533", "lastModified": "2025-02-12T14:15:37.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to create arbitrary user groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un error CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) cree grupos de usuarios arbitrarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json index 8e35b094e77..feb85e9d62e 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.660", "lastModified": "2025-02-12T14:15:37.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove user groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un error CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) elimine grupos de usuarios mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json index 5f19bfe7127..4ccea456e34 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.800", "lastModified": "2025-02-12T14:15:37.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to add privileges to user groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) agregue privilegios a grupos de usuarios mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json index 26c2fd7c174..eb716e67665 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.940", "lastModified": "2025-02-12T14:15:37.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove privileges from user groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) elimine privilegios de grupos de usuarios mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json index 9327689c127..837b641598d 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.077", "lastModified": "2025-02-12T14:15:38.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to add users to groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) agregue usuarios a grupos mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json index cd7a6fda6dd..7b9a7da1140 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.227", "lastModified": "2025-02-12T14:15:38.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users from groups via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/user-groups/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) elimine usuarios de grupos mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json index 93b16e9a319..977aa32eec4 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.360", "lastModified": "2025-02-12T14:15:38.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua (user endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un error CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua (usuario endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) enumere usuarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json index 91b5491e114..5aa89b66f4d 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.500", "lastModified": "2025-02-12T14:15:38.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua (users endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua (usuarios endpoint) en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante autenticado (con pocos privilegios) enumerar usuarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json index 64db59f3ae4..7eeb59dbf40 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.633", "lastModified": "2025-02-12T14:15:38.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to create users with arbitrary privileges via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) cree usuarios con privilegios arbitrarios a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json index 6912b7d4f8e..6332f4de1b9 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.777", "lastModified": "2025-02-12T14:15:38.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to modify user data via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) modifique datos del usuario a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json index 83747c836ea..eb1f6b4b92e 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.933", "lastModified": "2025-02-12T14:15:38.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite que un atacante autenticado (con pocos privilegios) elimine usuarios mediante solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json index ea324ce8b23..607562e8f56 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json @@ -3,12 +3,16 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:39.163", "lastModified": "2025-02-12T14:15:39.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-862 \"Missing Authorization\" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to reset passwords, including the ones of administrator accounts, via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Un CWE-862 \"Autorizaci\u00f3n faltante\" en maxprofile/users/routes.lua en Q-Free MaxTime menor o igual a la versi\u00f3n 2.11.0 permite a un atacante autenticado (con pocos privilegios) restablecer contrase\u00f1as, incluida las de cuentas de administrador, a trav\u00e9s de solicitudes HTTP manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json index 26b751e1f37..c4bce30c330 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json @@ -3,12 +3,16 @@ "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.617", "lastModified": "2025-02-11T15:15:21.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected." + }, + { + "lang": "es", + "value": "Se puede acceder a la interfaz JTAG de los dispositivos Wattsense Bridge mediante acceso f\u00edsico a la PCB. Despu\u00e9s de conectarse a la interfaz, es posible acceder por completo al dispositivo. Esto permite a un atacante extraer informaci\u00f3n, modificar y depurar el firmware del dispositivo. Todas las versiones conocidas se ven afectadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json index 00e741e5df0..d148b0857a6 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json @@ -3,12 +3,16 @@ "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.743", "lastModified": "2025-02-11T15:15:21.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A serial interface can be accessed with physical access to the PCB of Wattsense Bridge devices. After connecting to the interface, access to the bootloader is possible, as well as a Linux login prompt. The bootloader access can be used to gain a root shell on the device. This issue is fixed in\u00a0recent firmware versions BSP >= 6.4.1." + }, + { + "lang": "es", + "value": "Se puede acceder a una interfaz serial con acceso f\u00edsico a la PCB de los dispositivos Wattsense Bridge. Despu\u00e9s de conectarse a la interfaz, es posible acceder al gestor de arranque, as\u00ed como a un mensaje de inicio de sesi\u00f3n de Linux. El acceso al gestor de arranque se puede utilizar para obtener un shell ra\u00edz en el dispositivo. Este problema se ha solucionado en las versiones de firmware recientes BSP >= 6.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json index 24452059a71..67ef6b8f431 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json @@ -3,12 +3,16 @@ "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.863", "lastModified": "2025-02-11T15:15:21.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1." + }, + { + "lang": "es", + "value": "El firmware de todos los dispositivos Wattsense Bridge contiene las mismas credenciales de usuario y ra\u00edz codificadas. La contrase\u00f1a de usuario se puede recuperar f\u00e1cilmente mediante intentos de descifrado de contrase\u00f1as. Las credenciales recuperadas se pueden utilizar para iniciar sesi\u00f3n en el dispositivo a trav\u00e9s del shell de inicio de sesi\u00f3n que est\u00e1 expuesto por la interfaz serial. El usuario de puerta trasera se ha eliminado en el firmware BSP >= 6.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json index b21a368430e..3a49ed3124f 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json @@ -3,12 +3,16 @@ "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.973", "lastModified": "2025-02-11T15:15:21.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface\u00a0to be able to conduct this attack. This issue is fixed in recent firmware versions BSP >= 6.1.0." + }, + { + "lang": "es", + "value": "Un atacante autenticado puede usar el Administrador de complementos de la interfaz web de los dispositivos Wattsense Bridge para cargar archivos Python maliciosos en el dispositivo. Esto le permite a un atacante obtener acceso remoto a la ra\u00edz del dispositivo. Un atacante necesita una cuenta de usuario v\u00e1lida en la interfaz web de Wattsense para poder llevar a cabo este ataque. Este problema se solucion\u00f3 en las versiones recientes de firmware BSP >= 6.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json index 5de7381bb8e..b814d7e7ff6 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Mojave Inverter uses the GET method for sensitive information." + }, + { + "lang": "es", + "value": "Mojave Inverter utiliza el m\u00e9todo GET para informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26492.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26492.json index feede7fed5d..db654cc822f 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26492.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26492.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@jetbrains.com", "published": "2025-02-11T14:15:31.260", "lastModified": "2025-02-11T14:15:31.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.12.2 improper Kubernetes connection settings could expose sensitive resources" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.12.2, las configuraciones de conexi\u00f3n de Kubernetes incorrectas podr\u00edan exponer recursos confidenciales" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26493.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26493.json index 01564037b71..fb9285dd4dd 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26493.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26493.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@jetbrains.com", "published": "2025-02-11T14:15:31.473", "lastModified": "2025-02-11T14:15:31.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.12.2 several DOM-based XSS were possible on the Code Inspection Report tab" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.12.2, varios XSS basados en DOM eran posibles en la pesta\u00f1a Informe de inspecci\u00f3n de c\u00f3digo" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26494.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26494.json index 03b6ff9f55d..d534a83b9ed 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26494.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26494.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@salesforce.com", "published": "2025-02-11T18:15:47.060", "lastModified": "2025-02-11T18:15:47.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Salesforce Tableau Server permite la omisi\u00f3n de la autenticaci\u00f3n. Este problema afecta a Tableau Server: desde 2023.3 hasta 2023.3.5." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26495.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26495.json index 2942745c1a3..9ac0c225e79 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26495.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26495.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@salesforce.com", "published": "2025-02-11T18:15:47.237", "lastModified": "2025-02-11T18:15:47.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext Storage of Sensitive Information vulnerability in Salesforce Tableau Server can record the Personal Access Token (PAT) into logging repositories.This issue affects Tableau Server: before 2022.1.3, before 2021.4.8, before 2021.3.13, before 2021.2.14, before 2021.1.16, before 2020.4.19." + }, + { + "lang": "es", + "value": "La vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto plano en Salesforce Tableau Server puede registrar el token de acceso personal (PAT) en repositorios de registro. Este problema afecta a Tableau Server: antes de 2022.1.3, antes de 2021.4.8, antes de 2021.3.13, antes de 2021.2.14, antes de 2021.1.16, antes de 2020.4.19." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json index 1a739d5de8e..f0e0bbc854f 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Systems running the Instaclustr \nfork of Stratio's Cassandra-Lucene-Index plugin versions 4.0-rc1-1.0.0 \nthrough 4.0.16-1.0.0 and 4.1.2-1.0.0 through 4.1.8-1.0.0, installed into\n Apache Cassandra version 4.x, are susceptible to a vulnerability which \nwhen successfully exploited could allow authenticated Cassandra users to\n remotely bypass RBAC and escalate their privileges." + }, + { + "lang": "es", + "value": "Los sistemas que ejecutan la bifurcaci\u00f3n Instaclustr del complemento Cassandra-Lucene-Index de Stratio, versiones 4.0-rc1-1.0.0 a 4.0.16-1.0.0 y 4.1.2-1.0.0 a 4.1.8-1.0.0, instaladas en Apache Cassandra versi\u00f3n 4.x, son susceptibles a una vulnerabilidad que, cuando se explota con \u00e9xito, podr\u00eda permitir a los usuarios autenticados de Cassandra eludir de forma remota el RBAC y aumentar sus privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json index 5fe9bb446c7..680d3c1788c 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T07:15:08.617", "lastModified": "2025-02-12T07:15:08.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146." + }, + { + "lang": "es", + "value": "Cacti hasta la versi\u00f3n 1.2.29 permite la inyecci\u00f3n SQL en la funci\u00f3n de plantilla en host_templates.php a trav\u00e9s del par\u00e1metro graph_template. NOTA: este problema existe debido a una correcci\u00f3n incompleta de CVE-2024-54146." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26538.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26538.json index 86b44be9a90..dc1b83f725a 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26538.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26538.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:19.100", "lastModified": "2025-02-13T14:16:19.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan Rossiter Prezi Embedder allows Stored XSS. This issue affects Prezi Embedder: from n/a through 2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Prezi Embedder de Dan Rossiter que permite XSS almacenado. Este problema afecta a Prezi Embedder: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26539.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26539.json index 2278a73d987..eaf6033fccf 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26539.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26539.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:19.383", "lastModified": "2025-02-13T14:16:19.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in petkivim Embed Google Map allows Stored XSS. This issue affects Embed Google Map: from n/a through 3.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en petkivim Embed Google Map permite XSS almacenado. Este problema afecta a Embed Google Map: desde n/a hasta 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json index c53929a4612..447f9fc0846 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:19.707", "lastModified": "2025-02-13T15:15:21.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Pukhraj Suthar Simple Responsive Menu allows Stored XSS. This issue affects Simple Responsive Menu: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Pukhraj Suthar Simple Responsive Menu permite XSS almacenado. Este problema afecta a Simple Responsive Menu: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26545.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26545.json index 3f906120304..6faf0f7c7a2 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26545.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26545.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:20.043", "lastModified": "2025-02-13T14:16:20.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in shisuh Related Posts Line-up-Exactly by Milliard allows Stored XSS. This issue affects Related Posts Line-up-Exactly by Milliard: from n/a through 0.0.22." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en shisuh Related Posts Line-up-Exactly by Milliard permite XSS almacenado. Este problema afecta a Publicaciones relacionadas Line-up-Exactly de Milliard: desde n/a hasta 0.0.22." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26547.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26547.json index 9579aec768c..bcf73b3a1e1 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26547.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26547.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:20.347", "lastModified": "2025-02-13T14:16:20.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in nagarjunsonti My Login Logout Plugin allows Stored XSS. This issue affects My Login Logout Plugin: from n/a through 2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en nagarjunsonti My Login Logout Plugin permite XSS almacenado. Este problema afecta al complemento My Login Logout desde n/a hasta la versi\u00f3n 2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26549.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26549.json index 3cdfdea1702..77aea2a1946 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26549.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26549.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:20.663", "lastModified": "2025-02-13T14:16:20.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap allows Stored XSS. This issue affects WP Html Page Sitemap: from n/a through 2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en pa1 WP Html Page Sitemap permite XSS almacenado. Este problema afecta a WP Html Page Sitemap: desde n/a hasta 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26550.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26550.json index 58bd8d65644..88df1fec92a 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26550.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26550.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:20.993", "lastModified": "2025-02-13T14:16:20.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kunal Shivale Global Meta Keyword & Description allows Stored XSS. This issue affects Global Meta Keyword & Description: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kunal Shivale Global Meta Keyword & Description permite XSS almacenado. Este problema afecta a Global Meta Keyword & Description: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26551.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26551.json index 26f00d5c904..11ce8e3046c 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26551.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26551.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:21.450", "lastModified": "2025-02-13T14:16:21.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sureshdsk Bootstrap collapse allows Stored XSS. This issue affects Bootstrap collapse: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en sureshdsk Bootstrap collapse permite XSS almacenado. Este problema afecta al colapso de Bootstrap: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26552.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26552.json index dc8672628a3..f3205ab6c50 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26552.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26552.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:21.787", "lastModified": "2025-02-13T14:16:21.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in badrHan Naver Syndication V2 allows Stored XSS. This issue affects Naver Syndication V2: from n/a through 0.8.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en badrHan Naver Syndication V2 permite XSS almacenado. Este problema afecta a Naver Syndication V2: desde n/a hasta 0.8.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26558.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26558.json index 9e428efc15b..de3980e628f 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26558.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26558.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:22.130", "lastModified": "2025-02-13T14:16:22.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en mkkmail Aparat Responsive permite XSS basado en DOM. Este problema afecta a Aparat Responsive: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26561.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26561.json index cf0ccac91f3..b14892a4122 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26561.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26561.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:22.450", "lastModified": "2025-02-13T14:16:22.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Yottie Lite allows Stored XSS. This issue affects Elfsight Yottie Lite: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Elfsight Elfsight Yottie Lite permite XSS almacenado. Este problema afecta a Elfsight Yottie Lite: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26562.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26562.json index 9991bc80dea..da1421f4aa2 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26562.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26562.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:22.607", "lastModified": "2025-02-13T14:16:22.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shambhu Patnaik RSS Filter allows Stored XSS. This issue affects RSS Filter: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Shambhu Patnaik RSS Filter permite XSS almacenado. Este problema afecta al filtro RSS: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26567.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26567.json index 405b6a128b4..089669fa500 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26567.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26567.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:22.763", "lastModified": "2025-02-13T14:16:22.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in farjana55 Font Awesome WP allows DOM-Based XSS. This issue affects Font Awesome WP: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en farjana55 Font Awesome WP permite XSS basado en DOM. Este problema afecta a Font Awesome WP: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26568.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26568.json index e2c5f042fea..9f657c22939 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26568.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26568.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:22.910", "lastModified": "2025-02-13T14:16:22.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Easy Amazon Product Information de jensmueller permite XSS almacenado. Este problema afecta a Easy Amazon Product Information: desde n/a hasta 4.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26569.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26569.json index 4f4a8b944aa..0e82fd59c32 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26569.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26569.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.070", "lastModified": "2025-02-13T14:16:23.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in callmeforsox Post Thumbs allows Stored XSS. This issue affects Post Thumbs: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Post Thumbs de callmeforsox permite XSS almacenado. Este problema afecta a Post Thumbs: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26570.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26570.json index 2a566b226ae..ff57b2d1b25 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26570.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26570.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.223", "lastModified": "2025-02-13T14:16:23.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in uamv Glance That allows Cross Site Request Forgery. This issue affects Glance That: from n/a through 4.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Glance That de UAMV que permite Cross-Site Request Forgery. Este problema afecta a Glance That: desde n/a hasta 4.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26571.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26571.json index d2547bd7716..08399c013e1 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26571.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26571.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.360", "lastModified": "2025-02-13T14:16:23.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in wibiya Wibiya Toolbar allows Cross Site Request Forgery. This issue affects Wibiya Toolbar: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en wibiya Wibiya Toolbar permite Cross-Site Request Forgery. Este problema afecta a la barra de herramientas de Wibiya: desde n/a hasta la versi\u00f3n 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26572.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26572.json index d337afe2c7d..73a2273c54d 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26572.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26572.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.507", "lastModified": "2025-02-13T14:16:23.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en jesseheap WP PHPList permite Cross-Site Request Forgery. Este problema afecta a WP PHPList: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26574.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26574.json index 1f77b58d1a5..70acf290da8 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26574.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26574.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.653", "lastModified": "2025-02-13T14:16:23.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moch Amir Google Drive WP Media allows Stored XSS. This issue affects Google Drive WP Media: from n/a through 2.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Moch Amir Google Drive WP Media permite XSS almacenado. Este problema afecta a Google Drive WP Media: desde n/a hasta 2.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26577.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26577.json index f2bdd2dea83..f639a6e727e 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26577.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26577.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.797", "lastModified": "2025-02-13T14:16:23.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in daxiawp DX-auto-publish allows Stored XSS. This issue affects DX-auto-publish: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en daxiawp DX-auto-publish permite XSS almacenado. Este problema afecta a DX-auto-publish: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26578.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26578.json index 55007146fef..e0f560e8569 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26578.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26578.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:23.990", "lastModified": "2025-02-13T14:16:23.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in mathieuhays Simple Documentation allows Stored XSS. This issue affects Simple Documentation: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Simple Documentation de mathieuhays permite XSS almacenado. Este problema afecta a Simple Documentation: desde n/a hasta 1.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26580.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26580.json index cd8e76cb3be..0b2716b90eb 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26580.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26580.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:24.250", "lastModified": "2025-02-13T14:16:24.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CompleteWebResources Page/Post Specific Social Share Buttons allows Stored XSS. This issue affects Page/Post Specific Social Share Buttons: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en CompleteWebResources Page/Post Specific Social Share Buttons permite XSS almacenado. Este problema afecta a los botones para compartir en redes sociales espec\u00edficos de p\u00e1ginas y publicaciones: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26582.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26582.json index 562730a81c3..b8681c246f0 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26582.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26582.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:24.407", "lastModified": "2025-02-13T14:16:24.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Blackbam TinyMCE Advanced qTranslate fix editor problems permite XSS almacenado. Este problema afecta a TinyMCE Advanced qTranslate fix editor problems: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/README.md b/README.md index 877550a31c5..ea6da73c817 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-15T17:00:20.500240+00:00 +2025-02-16T03:00:21.640882+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-15T16:15:30.090000+00:00 +2025-02-16T01:15:20.440000+00:00 ``` ### Last Data Feed Release @@ -27,28 +27,51 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-15T01:00:04.399160+00:00 +2025-02-16T01:00:10.105689+00:00 ``` ### Total Number of included CVEs ```plain -281472 +281473 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-13834](CVE-2024/CVE-2024-138xx/CVE-2024-13834.json) (`2025-02-15T15:15:23.423`) -- [CVE-2025-26793](CVE-2025/CVE-2025-267xx/CVE-2025-26793.json) (`2025-02-15T15:15:23.587`) +- [CVE-2025-1332](CVE-2025/CVE-2025-13xx/CVE-2025-1332.json) (`2025-02-16T01:15:20.440`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `1106` -- [CVE-2025-26788](CVE-2025/CVE-2025-267xx/CVE-2025-26788.json) (`2025-02-15T16:15:30.090`) +- [CVE-2025-26511](CVE-2025/CVE-2025-265xx/CVE-2025-26511.json) (`2025-02-14T00:15:07.667`) +- [CVE-2025-26520](CVE-2025/CVE-2025-265xx/CVE-2025-26520.json) (`2025-02-12T07:15:08.617`) +- [CVE-2025-26538](CVE-2025/CVE-2025-265xx/CVE-2025-26538.json) (`2025-02-13T14:16:19.100`) +- [CVE-2025-26539](CVE-2025/CVE-2025-265xx/CVE-2025-26539.json) (`2025-02-13T14:16:19.383`) +- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T15:15:21.080`) +- [CVE-2025-26545](CVE-2025/CVE-2025-265xx/CVE-2025-26545.json) (`2025-02-13T14:16:20.043`) +- [CVE-2025-26547](CVE-2025/CVE-2025-265xx/CVE-2025-26547.json) (`2025-02-13T14:16:20.347`) +- [CVE-2025-26549](CVE-2025/CVE-2025-265xx/CVE-2025-26549.json) (`2025-02-13T14:16:20.663`) +- [CVE-2025-26550](CVE-2025/CVE-2025-265xx/CVE-2025-26550.json) (`2025-02-13T14:16:20.993`) +- [CVE-2025-26551](CVE-2025/CVE-2025-265xx/CVE-2025-26551.json) (`2025-02-13T14:16:21.450`) +- [CVE-2025-26552](CVE-2025/CVE-2025-265xx/CVE-2025-26552.json) (`2025-02-13T14:16:21.787`) +- [CVE-2025-26558](CVE-2025/CVE-2025-265xx/CVE-2025-26558.json) (`2025-02-13T14:16:22.130`) +- [CVE-2025-26561](CVE-2025/CVE-2025-265xx/CVE-2025-26561.json) (`2025-02-13T14:16:22.450`) +- [CVE-2025-26562](CVE-2025/CVE-2025-265xx/CVE-2025-26562.json) (`2025-02-13T14:16:22.607`) +- [CVE-2025-26567](CVE-2025/CVE-2025-265xx/CVE-2025-26567.json) (`2025-02-13T14:16:22.763`) +- [CVE-2025-26568](CVE-2025/CVE-2025-265xx/CVE-2025-26568.json) (`2025-02-13T14:16:22.910`) +- [CVE-2025-26569](CVE-2025/CVE-2025-265xx/CVE-2025-26569.json) (`2025-02-13T14:16:23.070`) +- [CVE-2025-26570](CVE-2025/CVE-2025-265xx/CVE-2025-26570.json) (`2025-02-13T14:16:23.223`) +- [CVE-2025-26571](CVE-2025/CVE-2025-265xx/CVE-2025-26571.json) (`2025-02-13T14:16:23.360`) +- [CVE-2025-26572](CVE-2025/CVE-2025-265xx/CVE-2025-26572.json) (`2025-02-13T14:16:23.507`) +- [CVE-2025-26574](CVE-2025/CVE-2025-265xx/CVE-2025-26574.json) (`2025-02-13T14:16:23.653`) +- [CVE-2025-26577](CVE-2025/CVE-2025-265xx/CVE-2025-26577.json) (`2025-02-13T14:16:23.797`) +- [CVE-2025-26578](CVE-2025/CVE-2025-265xx/CVE-2025-26578.json) (`2025-02-13T14:16:23.990`) +- [CVE-2025-26580](CVE-2025/CVE-2025-265xx/CVE-2025-26580.json) (`2025-02-13T14:16:24.250`) +- [CVE-2025-26582](CVE-2025/CVE-2025-265xx/CVE-2025-26582.json) (`2025-02-13T14:16:24.407`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1ad50824b6c..bf5f3334a60 100644 --- a/_state.csv +++ b/_state.csv @@ -129278,7 +129278,7 @@ CVE-2019-1092,0,0,0617295426371376589c6fd0173473ab7928b3bf03fc4b5eaeb95d4f827185 CVE-2019-10920,0,0,7dc2cd3856cbdfb59deebdf1fbc8125f58c1bfd4c1cf52bd8f8c342a961148b5,2024-11-21T04:20:09.217000 CVE-2019-10921,0,0,ed46b67905c1d01d5fd0e8ae2a32489d6b3067574568b17c79ae41e70f8f42b7,2024-11-21T04:20:09.347000 CVE-2019-10922,0,0,6368590a88e369cc6f1e9709d1f5303dbae4f2f204f78938f333f9dc3a784e8f,2024-11-21T04:20:09.473000 -CVE-2019-10923,0,0,e03243b6969524afdc84dead5f8254b84a8a80e323d281e8b44ef88a1a022cea,2024-11-21T04:20:09.600000 +CVE-2019-10923,0,1,e0d6aa32c48d6261deb7bfbc88bf180462407577e17fa16b53baf7ba51963c65,2024-11-21T04:20:09.600000 CVE-2019-10924,0,0,6eb9a1bc095fac51dd6169f1c53efcf5351378b434254e7961f27f738e74931c,2024-11-21T04:20:09.860000 CVE-2019-10925,0,0,fb3552efd691db48529b383a6552e35ac95e6c26f64c90c2ceab2a2c7752a366,2024-11-21T04:20:09.977000 CVE-2019-10926,0,0,a8b7fe8227bb8da9a2d219ce21a4942e1acc4117d8e88d53babd57e92c9b941d,2024-11-21T04:20:10.120000 @@ -133022,7 +133022,7 @@ CVE-2019-14999,0,0,ebc276712f69173da63dbf04d9c9a694f38d0394bf57cbc35ae5f07105291 CVE-2019-1500,0,0,03dbbdca3a2ef1c4bef6c8546a1976026b93f9cf67dace89476278620c562e11,2023-11-07T03:08:13.780000 CVE-2019-15000,0,0,48de489f918fc81f8970677272c77c53f45313521fc928f699a5cad1b2247dae,2024-11-21T04:27:50.967000 CVE-2019-15001,0,0,7e0e2b02614d80a3c066b8ca744e3b603427ba18b86ce3b3f4a0fa816bc454d2,2024-11-21T04:27:51.093000 -CVE-2019-15002,0,0,0dd303d2b664b722a68ace03acc21cc99ddc564cf3da456f7db74865128cce95,2025-02-11T18:15:18.557000 +CVE-2019-15002,0,1,1b0c54a9a4a87d02471a3e2a2f69aa58fc5e38eebf1834c9343cf8eee515225c,2025-02-11T18:15:18.557000 CVE-2019-15003,0,0,c26aff5bbbf0ff4ae64adc80d9124bffae326e1360692c86fb00bac1d65f46a5,2024-11-21T04:27:51.237000 CVE-2019-15004,0,0,ddfae35069c4221998bd906e05d722e79034f14e824cc40abe522a9f9ada98fc,2024-11-21T04:27:51.360000 CVE-2019-15005,0,0,09d865eb0f16d95edad21b4e29354bffea608ec50cbc6adb60c4deb8ce75f627,2024-11-21T04:27:51.487000 @@ -148933,7 +148933,7 @@ CVE-2020-13923,0,0,1b73a8425b6ac1ba3bde6cdc9e5a134481dd8bbd3bb17999c977aff674cfb CVE-2020-13924,0,0,b1da729835d8e399c6a4d222e533734eac93bc45245d8f5f0ebe8fca315f86e3,2024-11-21T05:02:09.543000 CVE-2020-13925,0,0,c04b4b4a6dba46bd4db3cfb789c8855e96b3045895c86f4631fe32f478eb3569,2024-11-21T05:02:09.647000 CVE-2020-13926,0,0,a935188cd2b3515e1745f393c587ee64e207363c28b2b403852029cd46400fcd,2024-11-21T05:02:09.750000 -CVE-2020-13927,0,0,1afe6ca3d6a2f8431997a4255dd33ad429bd32b7b1a451ef80b54be87058f01e,2024-11-21T05:02:09.853000 +CVE-2020-13927,0,1,62ce610f901befde1003db9557a8e4abfc43dfeb389b3ae3148f52138e10a113,2024-11-21T05:02:09.853000 CVE-2020-13928,0,0,b336333248d10284d53c667cf9026ca5a0462072b7b3bf02f99e139ea6272a24,2024-11-21T05:02:10.053000 CVE-2020-13929,0,0,2747ba4587d2bdb4749187235f95bf7d5245c81d91b3afd5c7d1e4e19a99fb9a,2024-11-21T05:02:10.197000 CVE-2020-1393,0,0,d7212859ef3e29eb6c3b0e283ce21bb4cb86dd9eac447438fc8e52d5d97eb58f,2024-11-21T05:10:24.340000 @@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486 CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000 CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000 CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000 -CVE-2020-1631,0,0,e81e987544339d84f3a0512ee1cd74ec047298f65848193c23900f1449a9104c,2024-11-21T05:11:02.493000 +CVE-2020-1631,0,1,451a7b2411a128b3b860c824a1399cf8c45f17392884902469b8b74ae9b0a79e,2024-11-21T05:11:02.493000 CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000 CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000 CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000 @@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,0,0,d412eb5285fce19b5be4c24fe9afbd23141c78b30a40e65a3645d0c49b8256ad,2025-02-12T15:15:10.460000 +CVE-2020-3432,0,1,8614608f3d94ea8f07e4e6f06ef7290b646e03e5c4030741ee4e021e6b30b4be,2025-02-12T15:15:10.460000 CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 @@ -158953,7 +158953,7 @@ CVE-2020-36074,0,0,d205b675a3efe7e7fb1b1e1c476ca7d6a3001fa79a7fc0b5a6b197c571eea CVE-2020-36077,0,0,c240000e69b4f06b68caa6416f5238ea39ea02d91ef33b4b6d596448ad0aa246,2025-02-12T15:15:09.483000 CVE-2020-36079,0,0,230b6994faf4d070027f0fa1f6a4a9c852d30612849d7686d59f6cb4641b67dc,2024-11-21T05:28:44.537000 CVE-2020-36082,0,0,6ec0c94eb23b0553d02910ab3688c529fc1c8e8fabff9d4e2868532cbe311ae3,2024-11-21T05:28:44.733000 -CVE-2020-36084,0,0,bbb5fb1b641a03bae0a01b445a9c084ae4812633cffc67513679ede67a5bf67e,2025-02-06T16:15:28.517000 +CVE-2020-36084,0,1,cca4ebc6d2347713ce257e5e8a30cfe1a08da1bf829112bf2e9aead01b633ab0,2025-02-06T16:15:28.517000 CVE-2020-36085,0,0,aba33d469e9e9960896245b690d2e2e2764170b05a6a2518ea7466499cadb3a8,2025-02-11T15:15:13.697000 CVE-2020-3610,0,0,ee5dfdcfcfaf71d88a4bb1c76edaeb2f060b0ee7ff05683376ffd717f387fbf5,2024-11-21T05:31:24.063000 CVE-2020-36109,0,0,fd39d1054cec06e54269dad5b8e29ecd01f66ef99f14f15bfb57cf86fee8e633,2024-11-21T05:28:44.903000 @@ -172510,7 +172510,7 @@ CVE-2021-27013,0,0,795dd7cf56afd1398a5b2224af24df437d1d9e9262a5149bc659b5f9d7e5f CVE-2021-27014,0,0,6d40707d57096814f6ab3cb99f76668d275035ca6e43b92a5350213e7b339d61,2023-11-07T03:31:53.443000 CVE-2021-27015,0,0,f93f20ce124bde3112f47f3ff90875c9778b8593fec9fb40c25aa34922f68c6f,2023-11-07T03:31:53.717000 CVE-2021-27016,0,0,77f6b8e5638f76785fb400255ecbe9f8824cb38b1684f82286bc315e8b419b96,2023-11-07T03:31:53.947000 -CVE-2021-27017,0,0,2f0da6a7f5e67af2884689b9ea57ff84d14b4af6bc86ecf8fd8eceda61ccc0d7,2025-02-07T20:15:31.983000 +CVE-2021-27017,0,1,ec09c813e0368bc0b2caf85deba075be4ba9e8ee0f1fe00e8b61d6bedd1db5c1,2025-02-07T20:15:31.983000 CVE-2021-27018,0,0,442552299636f17fa57908b1de51931703f993e96d07fe7c0dd4fcd9efca773f,2024-11-21T05:57:11.303000 CVE-2021-27019,0,0,2d1382705d83b7936738ff3b4fc8ada4ddf1cc19b1eb0684bfc4881ef1af7ecf,2024-11-21T05:57:11.427000 CVE-2021-27020,0,0,19210c0ded4b1fcff9486fc521b623932a6100ed8161921391865223d49532f2,2024-11-21T05:57:11.543000 @@ -183464,8 +183464,8 @@ CVE-2021-41511,0,0,374ce5b18654830c829bc7060a9f3e0523dbd91eb3afbb165ffc3623ecc10 CVE-2021-41524,0,0,22283c370e38f5c6f709a8373ab94f9f74be9924826c4aee0af19d2d760697fd,2024-11-21T06:26:20.867000 CVE-2021-41525,0,0,9ffc8b2d4dc10fe00494c2e57538cfa6dfc2318703c0ed948c72cd3622f5dcb2,2024-11-21T06:26:21.080000 CVE-2021-41526,0,0,c752a730e149e823a452a8baf3d50e81cfae9ff707bccf2d771317eab589f17b,2024-11-21T06:26:21.203000 -CVE-2021-41527,0,0,e411117f2bb8f1844efdc00d77e5cfe6d8dc2c64c3611fd1385fbb8717c1b092,2025-02-07T20:15:32.140000 -CVE-2021-41528,0,0,294ebcf8dd49c74d43cda6e74c5cfc7b6b991ed2f9ebb2e5a604498900d0db86,2025-02-07T20:15:32.320000 +CVE-2021-41527,0,1,de537526dc1a96102296c833e9494df6518f30d8ee28cf12b441bf8ea30a5aca,2025-02-07T20:15:32.140000 +CVE-2021-41528,0,1,a2d1bb5b21c19eb32a483606ea4ce51636f98492e7e2ca63c618b4de85b2de1a,2025-02-07T20:15:32.320000 CVE-2021-41530,0,0,aa1650b6d3dea96355fb2d68401431402eb996b1d04707a55ce988d6c68dd1c7,2024-11-21T06:26:21.343000 CVE-2021-41531,0,0,0ff0a9063e6a53fc07c35f3c9911fc554d1f8dba515320a0523fc47dbfa8ebef,2024-11-21T06:26:21.453000 CVE-2021-41532,0,0,dbba39ed13ca062ad69b2180516095fe92366227a812cb45274d62ceb0fb61e3,2024-11-21T06:26:21.587000 @@ -193618,7 +193618,7 @@ CVE-2022-24109,0,0,a3de6fcc683c4c7b24080380d7f925454da13c54d2235023ab88990cec132 CVE-2022-2411,0,0,ca9c83615b5a4bd566bcb71d857b9368ab54551d81d57dcdfb30e5919176e56c,2024-11-21T07:00:56.170000 CVE-2022-24110,0,0,65f3dde568ed3390fbba963d442b71ce7e2da467bfd1ead012e4e3a6bacd3f5a,2024-11-21T06:49:49.510000 CVE-2022-24111,0,0,fd2ffe0efb98d197c7531f3defe6abfe786dae537f59e2e8e8e77681cf8e5e19,2024-11-21T06:49:49.657000 -CVE-2022-24112,0,0,ddd4080fffe8f337ac31c15e41f42131f08180f26513fd497c769aa5557444e9,2025-01-29T22:15:27.690000 +CVE-2022-24112,0,1,bcabec02209e3686e855fefa2b004c58c9cedcc290379d8afaf6c25aa8858f26,2025-01-29T22:15:27.690000 CVE-2022-24113,0,0,b08b450631a5c4d09b3e64bbf5b729e9c2971d59d4e3b4ad7a055dd1b70798fe,2024-11-21T06:49:49.933000 CVE-2022-24114,0,0,b921858749eabb462950c87fbeef78e9d9127fb723b4adfc75c40c48de23bb75,2024-11-21T06:49:50.053000 CVE-2022-24115,0,0,07fca88d2c5b2f7d49a037a65f8537e26dbc956c3b5f7ac0fb58138895f281c2,2024-11-21T06:49:50.163000 @@ -194143,7 +194143,7 @@ CVE-2022-24701,0,0,07a386c067c72a923364259b0b8cbb62c5fe40637171f3ff876874c475328 CVE-2022-24702,0,0,a248c5ba6594939f3b78f750dd634faf71af4bcd0ce369655730eeda6292b7c5,2024-11-21T06:50:54.630000 CVE-2022-24704,0,0,06ebe7a984c823654d0bdbf33cbe7f93429877237842a629c81324e1ce89b5b4,2024-11-21T06:50:54.790000 CVE-2022-24705,0,0,29792a396d8f0d926abcc5319a9a695c8800121354f46d540e822cb4690722e9,2024-11-21T06:50:54.903000 -CVE-2022-24706,0,0,377055791a5f5a5d80ef288f6a3e425ed3a042b2b8984fd8ada88bd07e6842ed,2025-01-29T17:15:17.557000 +CVE-2022-24706,0,1,0978f88f543f1e4ab0b60e8e7b1a73cf93d080047efc5bf881987faa6147609c,2025-01-29T17:15:17.557000 CVE-2022-24707,0,0,71511411139c8cfaf9a872f42513435e3c387b87248b74c20b3c1ece4978f312,2024-11-21T06:50:55.173000 CVE-2022-24708,0,0,b34a4d21d71d4595c8f24376caced501db78b6d5c21acb6420263f79dc2a6c28,2024-11-21T06:50:55.313000 CVE-2022-24709,0,0,35affd62b04fbf0a166a199d0547cdb1204eb03a6bf7aa483db7a92271d775a8,2024-11-21T06:50:55.440000 @@ -195070,15 +195070,15 @@ CVE-2022-25763,0,0,cb391d4c483d6954bc71de45db0826e9934c6a6e5dcf2bead8ddc729ed578 CVE-2022-25765,0,0,6a5cb0b2bc9975cd474e10128782a150c0921aac2d2713e32ddd08483ff8435d,2024-11-21T06:52:57.720000 CVE-2022-25766,0,0,7650bcdb856cf60ed50e3b2d316e5b1587fb3571a3403ac15b613de5951e2fa3,2024-11-21T06:52:57.857000 CVE-2022-25767,0,0,dce784a783999f17de4573c017bb2bbeb586039a466cddde0cb825c310fefcc3,2024-11-21T06:52:57.967000 -CVE-2022-25768,0,0,e92c25444f0e5a42439294f8f90b30651538b377a509e4270c007a4ec488d5f7,2024-09-20T12:30:17.483000 -CVE-2022-25769,0,0,47f5e27ad9f322a8d4378b9fe8bab7bcc5e28da3471012d74c0002929efed7e4,2024-09-20T12:30:17.483000 +CVE-2022-25768,0,1,65798d677913ee02cc1bd77465d3831de65725b0f33346038e9521443ce9a629,2024-09-20T12:30:17.483000 +CVE-2022-25769,0,1,0998a8c2839e5b963472953b8a6e7b675aeed2823f1e1b450c7dcfa1d35a8ad4,2024-09-20T12:30:17.483000 CVE-2022-2577,0,0,7dfb4d9179f1eefcc863c8a3e76107909150e1945e894d94650c4a3f70597e2c,2024-11-21T07:01:16.753000 -CVE-2022-25770,0,0,986e3c7c20311ccb52de4c52b6f978467c8033402a63579b7e16565a6d638ae3,2024-09-20T12:30:17.483000 +CVE-2022-25770,0,1,510fc679d9e702469c74e16d4311f3e48d75da55ed647a36d826a76f23b3ba6e,2024-09-20T12:30:17.483000 CVE-2022-25772,0,0,ff796297ad7865332e00bb2b318127a389900f15aa53f8502eeaf569afa498b5,2024-11-21T06:52:58.343000 CVE-2022-25774,0,0,bd380684d32ffa9cd4640164928b773a3662f874edc7e0d020930c6456c349a1,2024-09-23T23:21:35.443000 CVE-2022-25775,0,0,86cd764b6a567381983af3ef2ac724e63b9fbc2964b23fee64b226f75093e044,2024-09-23T23:22:15.763000 CVE-2022-25776,0,0,b92a32835cc3936cfcece435820b9a30ee61228c21cc5409787525b6dbc22604,2024-09-24T15:19:46.117000 -CVE-2022-25777,0,0,518f286235e46fde78e3602e94f3fedf2e55e1f568030242014c7bfaef7560f6,2024-09-20T12:30:17.483000 +CVE-2022-25777,0,1,cebd6e7ee2a9bb3a49e96f8784fc2c69052d22274655c1dd696f05f7a4b5c045,2024-09-20T12:30:17.483000 CVE-2022-25778,0,0,29dba0e52f5c0ac7c80ebc5cb40e92cfcef54ecfb94f30e4c7a652e8c3bd3c69,2024-11-21T06:52:58.800000 CVE-2022-25779,0,0,6c0d96ba8407178a51fcefcaf2b0012a724e485cce8626ebeb568fd03432c05e,2024-11-21T06:52:58.933000 CVE-2022-2578,0,0,4b44e477ec40385f61f718f3e29e0b3ec4afbb832d6a60436222681a370e7a8f,2024-11-21T07:01:16.887000 @@ -195565,8 +195565,8 @@ CVE-2022-26384,0,0,6198d4c01431e2c23c0801b185cb98302c8eb19addebb8592f93ae0a95fc8 CVE-2022-26385,0,0,7d10345eabb9557f09adcfbff170093607f6a92a8a451cd688c49241d041d13e,2024-11-21T06:53:53.500000 CVE-2022-26386,0,0,4db78d42d69a098e259bb74e6f9cbb5bc2a7fe55beb054585ebd54795f54a424,2024-11-21T06:53:53.593000 CVE-2022-26387,0,0,bd47710bced117c65b659de5e36ef5f11c9ecace0ec33ef94bbb64fb132f6aad,2024-11-21T06:53:53.700000 -CVE-2022-26388,0,0,16879be7075803d2b1f660da85072c36d45514076349d9466bcc3b7c266771c4,2025-02-07T17:15:21.960000 -CVE-2022-26389,0,0,b439589c2e649bf84b5e43f6b7701c7f4712cc352b7e9ee8a7463fa62106a007,2025-02-07T17:15:22.130000 +CVE-2022-26388,0,1,a101c7735eee28b0f8c3080bb4c90b786ae15bd9cbaf3452f6a8a999bc639391,2025-02-07T17:15:21.960000 +CVE-2022-26389,0,1,8cc09572bd8f8bbd31ee6d37d2f5f55f8ba844169be3512b465c275676836bf4,2025-02-07T17:15:22.130000 CVE-2022-2639,0,0,46eb68ac748136665fe3ef3676bfe429c7214002c69e54c45d73db3e76507eef,2024-11-21T07:01:25.320000 CVE-2022-26390,0,0,1f374913ded9528c9013a5282a1d2251f35b2d8e68050795b174c011b23d74d8,2024-11-21T06:53:53.800000 CVE-2022-26392,0,0,2957553508b95abbf0a35ad8e1090ce1719ec8838aa7067122bd604a25caca69,2024-11-21T06:53:53.933000 @@ -200008,7 +200008,7 @@ CVE-2022-31760,0,0,5c4a45123a4b9c8de5f1065df7d5ca3224e6479c10f99f0df19090440949e CVE-2022-31761,0,0,95e0181cfe82712600a912100baef04f4706de88030235b976f6fa84ce1100f0,2024-11-21T07:05:15.337000 CVE-2022-31762,0,0,bb6b22df7ef4fc53f49e054a15ce44c4fbc0012358e73c25e15dd603edf6e274,2024-11-21T07:05:15.463000 CVE-2022-31763,0,0,b43c22e16cee7f4d119cb5b8d655d9db9798a7b49f2bef758258ceb1c42c43c2,2024-11-21T07:05:15.613000 -CVE-2022-31764,0,0,8a14b610180c84a5e65c7ca710c4bdb5fff549ad64703fd8a7d22e45c9995354,2025-02-06T17:15:13.030000 +CVE-2022-31764,0,1,cebef64b1cc359157eb5656d561318b558be69c1d189f13d69f85f412de5ad31,2025-02-06T17:15:13.030000 CVE-2022-31765,0,0,586417082fbde887bf1c9b1db7e79c13de1278309904ca5f31a0432f3684915a,2024-11-21T07:05:15.753000 CVE-2022-31766,0,0,49ef4f0ee11858bf0feb62f7c6de554831e3ba977b23532c83f480f664a4d671,2025-02-11T11:15:11.210000 CVE-2022-31767,0,0,b7ea3f47b3ba866b5369e56abd48c9381c68e37bfa533cc503ceda935346da2c,2024-11-21T07:05:16.410000 @@ -200043,7 +200043,7 @@ CVE-2022-31795,0,0,e87150b97c1595f70c15af39b375b9e3a356b56a2e94be20560be511f6e8d CVE-2022-31796,0,0,14e0f1b4cee5370b95f4e2647aeeffe69e5474ef0322e9f54b5182239dbd3879,2024-11-21T07:05:20.900000 CVE-2022-31798,0,0,e549cf30b2c66e83ee0fcd8c913e23d35c726aceb746d6eb9a6de0bb4572e411,2024-11-21T07:05:21.057000 CVE-2022-31799,0,0,b267b7ae01f62f80ffb0216b260fd93dca79abaa52716c5b918a57dad17ae0e3,2024-11-21T07:05:21.203000 -CVE-2022-3180,0,0,7d81fc2d23e606d5a8f406e42f7f0265ed720114cb86bd78ec1b913d812bbc3f,2025-02-12T15:15:10.730000 +CVE-2022-3180,0,1,6b8ddd4c0b91459e469a0bcd25e464fc4449c7a4fb067aa6a4b381fa0de90e44,2025-02-12T15:15:10.730000 CVE-2022-31800,0,0,6db4ef6ef8456fee479b75712875c618f6bf7e29ea191a42b8cb2155d6ab01f6,2024-11-21T07:05:21.370000 CVE-2022-31801,0,0,15a9fabf68274e7f2ba1fa15bae069bfe9e501270dca5df64319063297383989,2024-11-21T07:05:21.537000 CVE-2022-31802,0,0,930da7f9507ef8219beb1bd2fd7f97d299cec36695d5708783a3954bd5782360,2024-11-21T07:05:21.673000 @@ -204653,7 +204653,7 @@ CVE-2022-3763,0,0,c2299b9c134ab1c6cdc29ea9bb0d35812068c7827af0b605982e68cbb64811 CVE-2022-3764,0,0,ec247594a5e83915ba6098faf7bda0926c3802dc302b6ea5fc586fe275d41890,2024-11-21T07:20:12.047000 CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a00617d,2024-11-21T07:20:12.173000 CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000 -CVE-2022-37660,0,0,a8517b39afb8eef34cfd637cfcc57ae2a9b35b1f54581c063073ec13bd645e74,2025-02-12T22:15:29.167000 +CVE-2022-37660,0,1,58491ea394aa7c735141b394ba0276aa3a15bbc95058da85744c30737dcefd81,2025-02-12T22:15:29.167000 CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000 CVE-2022-3767,0,0,4e5d8fb3c9ad7d92e363d8284cf09f4ef86f4da536880a591d9b22149d210ced,2024-11-21T07:20:12.433000 CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000 @@ -206692,7 +206692,7 @@ CVE-2022-40487,0,0,3e3d775e7a40491c3fd4d116c3ae8f05738f2c0d5feb06cb1e31e35f3f01d CVE-2022-40488,0,0,3a8a60e130cf17ecdc391d08fa8819ea901ca1525bde3b2f0bba2c689d09f151,2024-11-21T07:21:27.667000 CVE-2022-40489,0,0,e743d656669d32e037781e2d73364c483b588e68b764611e48cdeec3098fcd14,2024-11-21T07:21:27.823000 CVE-2022-4049,0,0,f0a411220edc73602e7bcd0290ef45b973b7200946950e80279abfcb153b81f2,2024-11-21T07:34:30.693000 -CVE-2022-40490,0,0,a47ae9e60bd41d0c1e1a6acbaf08aa107c175ecd41936d13861f37b53352c162,2025-02-06T21:15:17.307000 +CVE-2022-40490,0,1,027201e4ca2289999a83d7c21c75a857240923a9abc577ba189f3c2b7fe68a7d,2025-02-06T21:15:17.307000 CVE-2022-40494,0,0,bc574e1a4388e8f99a5ee1ca01ffcadbe85a17cbcf626930aed7366ddb80107e,2024-11-21T07:21:27.980000 CVE-2022-40497,0,0,718b25a3e9ff61f82c28c3226d1972f3ae3dd1d71111e6da5c3dcfb3038a8996,2024-11-21T07:21:28.137000 CVE-2022-4050,0,0,8bef661e08e4a418d1cdaf389dc8b12f38ea24cd284f0e02a2d862de17600bc9,2024-11-21T07:34:30.787000 @@ -207057,7 +207057,7 @@ CVE-2022-4090,0,0,6635dd16c911029122ada3aff58c2fdd886219dfb991b1c32f2b95fbe86b07 CVE-2022-40903,0,0,5a716fd283dc9ccc412b02ef5152b5affed451b884f2914c51ac6763bac5d7d4,2024-11-21T07:22:14.360000 CVE-2022-4091,0,0,810b813da55e40407b6a58ab6089f3d2217d2e74b11372cc5db7ba4f20adfd85,2024-11-21T07:34:34.003000 CVE-2022-40912,0,0,a3b9d253bf559fe5033adde53eb07b854e38f5ca4ca171bd0d4dff541694c281,2024-11-21T07:22:14.523000 -CVE-2022-40916,0,0,5352e406a0e057ff84caf65c15b5074c542b8cec41473191ab7d348b3eb1e680,2025-02-07T19:15:22.770000 +CVE-2022-40916,0,1,8c9ac1e4c4f7fddcd037f0ea084d10de23776307765486ccb6a031058320ffce,2025-02-07T19:15:22.770000 CVE-2022-40918,0,0,ada396d447a951b504689c3c6990d1b9529706bbbe7276067fca761169edd11b,2024-11-21T07:22:14.673000 CVE-2022-4092,0,0,1e9eb5c32102b73261130bb8f9fa4983c35ade5e48c301fa2e08178f4fbe1a4a,2024-11-21T07:34:34.127000 CVE-2022-40921,0,0,003a2c3520d6e4ef9557b2d019724c852b0133986327c1cb15e665a48ddf47a9,2024-11-21T07:22:14.830000 @@ -215415,14 +215415,14 @@ CVE-2023-2047,0,0,86734194b86c5881e3432f7299934922de5155eddb2e557c3899b8d8b74cce CVE-2023-2048,0,0,a3fd93a0062ac104ab7685f0c38c5fdd726a12306b1269a975bd7db45101d5a4,2024-11-21T07:57:50.033000 CVE-2023-2049,0,0,a8c5ed7acd162068a2a9410c64cd0f59bf4dff352a99ca706b6abf6f7afe2aab,2024-11-21T07:57:50.160000 CVE-2023-2050,0,0,0f2d06f2759566b1898e0808f1100f70849c771723b910ff4d0d791d8bbccaed,2024-11-21T07:57:50.287000 -CVE-2023-20507,0,0,5fed0288869bdcd6c0eeefc00d71017461fdff4b91e72fc9217d348444cdc77e,2025-02-11T21:15:10.620000 -CVE-2023-20508,0,0,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000 +CVE-2023-20507,0,1,aca1b1ea621c0bddf9ad0eaec14fdd915a42984f86684f6a4794741085d85f26,2025-02-11T21:15:10.620000 +CVE-2023-20508,0,1,467df3ee755f70ea812259ccd5babe567a7862a0aff2f1bd42ed7c8d40509703,2025-02-12T00:15:07.850000 CVE-2023-20509,0,0,134094f09fd2dc07b9b6920005f6ed24e5bf76664c20df20b585bc7031e48136,2024-11-04T18:35:02.490000 CVE-2023-2051,0,0,e835721eb03a78486652d47f32bc2d564aae9456947669d05b669f8ccff34422,2024-11-21T07:57:50.417000 CVE-2023-20510,0,0,a6c482788f115b3798feb6c0849d19428006a08ae6d7047f8994f722afc3ac01,2024-12-12T20:28:55.010000 CVE-2023-20512,0,0,59d42f6271c3359b812b6f8b596e293a713c60f66a1bafff39723266b1bdc81a,2024-10-30T19:35:02.517000 CVE-2023-20513,0,0,7776ff01f91e5878655445e9bf7052bf6adde2a07843f41e59f135f097f32abb,2024-10-29T19:35:02.140000 -CVE-2023-20515,0,0,d98e7fcaa7d956bc4e520c373cd8a89caec4928eaaedc40cf663eadb5397e58a,2025-02-11T22:15:26.087000 +CVE-2023-20515,0,1,04fe70a5a96da8b168e20e112fb051dbe6bd15711cb2a79f919f2c99c9400f98,2025-02-11T22:15:26.087000 CVE-2023-20518,0,0,ec4070e10bb6753c589b73fc8777b131da82d0da8c8e27a0d18ea12dd1178ce6,2024-11-05T17:35:02.627000 CVE-2023-20519,0,0,334e6205bc50dbe0dda46e080b5512b64b8b838d7dcef69d9c0e3875cd92a55e,2024-11-21T07:41:04.023000 CVE-2023-2052,0,0,1e4161388b9b7a198878f66cab1655514d5646eef4374ad14c045ae17d5ec328,2024-11-21T07:57:50.540000 @@ -215466,8 +215466,8 @@ CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182 CVE-2023-20578,0,0,9b8af10cec1c65e7b623d2fea748b48798ccfbff74512f4401b8ab239c3ed071,2024-10-02T17:35:44.117000 CVE-2023-20579,0,0,a74e27eeac89b88a9c8ee1132f685476f94109e3eda5126b645c75da3f435f31,2024-11-21T07:41:09.767000 CVE-2023-2058,0,0,7c9f16a001fa3b7ff2c114c664cc89e8e9dfec7cc9be872f90e7d915d6b66f28,2024-11-21T07:57:51.337000 -CVE-2023-20581,0,0,ee0efbf31d67c5f74e84e9fe75024ff5b40a51bcdafc29f14c7ab9cfe276212c,2025-02-11T22:15:26.223000 -CVE-2023-20582,0,0,a1b1b10b97a9e2de80b542e8488c952b77378948ca437ea83aa81dcfe464696a,2025-02-11T22:15:26.347000 +CVE-2023-20581,0,1,0d26a3a212c9195160f72441dc1cda72f2c39cbbed9f7448d94bcac034ce6e67,2025-02-11T22:15:26.223000 +CVE-2023-20582,0,1,47515b66610b142d500a4365ecd992920d87eecd553c66bb77b0592e9b03ddbd,2025-02-11T22:15:26.347000 CVE-2023-20583,0,0,9c82a0f82555194c308e135f2bbf526f661f198e5397aa7b7224de98d3bd7748,2024-11-21T07:41:10.017000 CVE-2023-20584,0,0,443b52068f04cd1e6a748a0d46270fa38f125d26e335d79bed3d09147bfd4452,2024-12-12T20:29:14.730000 CVE-2023-20586,0,0,572d39aa8a28ceb0d3230a1f04a10200ca6f002d64a249b0afffdfbd40d3a335,2024-11-21T07:41:10.223000 @@ -217153,7 +217153,7 @@ CVE-2023-22308,0,0,906012441499d1c849365e5400b5357dda9cc467b769670e76ddebf0ea235 CVE-2023-22309,0,0,a7231f19d4cb4ea22c4d4790a3de2cc23a6aa0b434c7b7b587091619c74b99b1,2024-11-21T07:44:30.073000 CVE-2023-2231,0,0,7a123ab9506421883b22a81ab048ba2bb77ff795874a80b8d72ffaa1959d6e3b,2024-11-21T07:58:12.077000 CVE-2023-22310,0,0,e89d325885a14d654c2cee0362e627ca7ab351551936d19e0a6836ce159a1e18,2024-11-21T07:44:30.180000 -CVE-2023-22311,0,0,b720e38b5eb9854c9aa1cffe99e996ec6408cd90a354d36cb99940c84f698d38,2024-11-21T07:44:30.300000 +CVE-2023-22311,0,1,3668f195b27e18c55d05f4d2d2db1d99116a034536e0844f15c9f5e44c4093a4,2024-11-21T07:44:30.300000 CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7503,2024-11-21T07:44:30.403000 CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000 CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000 @@ -219125,7 +219125,7 @@ CVE-2023-2479,0,0,4801134ef77265136ffc1bb85eb06ca5e6918eec27800c07ac6e0c5e0435b4 CVE-2023-24795,0,0,87acf6ba296c42149b10204dfda61069c3419c9d106dea2f2b51cea8de96d935,2024-11-21T07:48:24.910000 CVE-2023-24796,0,0,0811d8124e097273749efb44bf056e7530d4475a682a12a8354f5594791213f6,2025-02-03T18:15:28.627000 CVE-2023-24797,0,0,82fe4745123461bace6d5d2f0677988eb959e24e2dd509bd732deb950dd29eb9,2025-02-13T15:15:14.623000 -CVE-2023-24798,0,0,981fffa34b4fdb09bbdd97d487dd955ec7d56af0ca3e0a76dc2b53b471d30998,2025-02-13T15:15:14.830000 +CVE-2023-24798,0,1,8208b1374b7c89f32a5bff5db2d20d878ed031eab58b048871ee3ec743290444,2025-02-13T15:15:14.830000 CVE-2023-24799,0,0,50b28e2acf121d03751c87c8e57840ea94b9aee29c23a252fb84d47d16b25f3c,2025-02-13T15:15:15.033000 CVE-2023-2480,0,0,223a2acaf49a80ce6277c6688e780a56126fa4cbdf4a2a5c6c2467c3f176f04c,2024-11-21T07:58:41.973000 CVE-2023-24800,0,0,c84f39d907f37a6f0df4a8565286293534d17a25d5039ad424eb260f0d1f7364,2025-02-13T15:15:15.230000 @@ -219256,7 +219256,7 @@ CVE-2023-24929,0,0,10392ef33a8f953951d5f358167592dcf06de88228e77d7c025367d2b0689 CVE-2023-2493,0,0,6fd09106e82f4d15ca0700ed3c72d8ef5c11402ca9bdc4289502812842581d37,2024-11-21T07:58:43.250000 CVE-2023-24930,0,0,9f9e561c144213e77edf7be5969762b4d914f545cf0c22227904b800cf15e12b,2024-11-21T07:48:47.377000 CVE-2023-24931,0,0,4cb3f680aee2110301457c68ae711581649c05db20ed022c69aef2e15fdee122,2024-11-21T07:48:47.493000 -CVE-2023-24932,0,0,e8a46cb1a1efe6585d0924bde867a63f0e2815879b41600f60665d01530ae6fe,2024-11-21T07:48:47.630000 +CVE-2023-24932,0,1,69e57209b8f96c1cad11574f2f7d5e74b2418f4aede963515c0c35c6fc327082,2024-11-21T07:48:47.630000 CVE-2023-24934,0,0,b063256a223adfefb231bf44cf66744c128745708e070ccb4c8cf146c607f43b,2024-11-21T07:48:47.787000 CVE-2023-24935,0,0,a464a2a549bfe1345b9858d182cccaf8f191895f87138caaa3956d068ac27ce5,2024-11-21T07:48:47.897000 CVE-2023-24936,0,0,505bcf4b6a5f58019032a1d5b6159bf29aaa4d730ba53d1a3bb4919bbceffcb1,2024-11-21T07:48:48.003000 @@ -220919,7 +220919,7 @@ CVE-2023-27021,0,0,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02 CVE-2023-27025,0,0,df08cdd42c2b6826389279ebc90283d3ef76ee78cbcc3012cc6fc8e1b5db5686,2024-11-21T07:52:12.293000 CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000 CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000 -CVE-2023-27033,0,0,82ff0d2f3b3fd7d30086afeef97b0224e31b5ec3774969e1ff155559652d5901,2025-02-12T17:15:15.500000 +CVE-2023-27033,0,1,563e9a589bd884d69713b9513c0ef1e92d34512120fc6cc7fb93b1c346976b4d,2025-02-12T17:15:15.500000 CVE-2023-27034,0,0,8464109bca5c284ab1c81c105ef27fefc639a1945af5ecc1a0c6de04b3e8bb1b,2024-11-21T07:52:12.807000 CVE-2023-27035,0,0,44ef166e8ace3fdcc7e292a7632d06c2d3e13c29e7c45f0521367721de449c86,2025-01-30T17:15:13.507000 CVE-2023-27037,0,0,3e02208b736711e0efb83bf4998fb6bac400b97126ddd20a1da0b5fa551abc27,2024-11-21T07:52:13.120000 @@ -221271,7 +221271,7 @@ CVE-2023-27455,0,0,0c6db017efb89edd32317e8d4ba02d492ce629a93070c8e82483bfa3f1648 CVE-2023-27456,0,0,29365b2a4d5dd4930018c52f0496a7068645a3c0c046e876bdda5393db37e47b,2024-12-13T15:15:10.953000 CVE-2023-27457,0,0,db33655e037a343ca2b318f816541e3292041ff8f0e3b127514bebbaaa676046,2024-11-21T07:52:56.920000 CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000 -CVE-2023-27459,0,0,e0b0b644509c19b0e16c0141e28ff04317a4ca941bac84df6c1fd31075b6f604,2024-11-21T07:52:57.177000 +CVE-2023-27459,0,1,52dd158ab4109639424079513a505fc276707ade7fe70bcd50217505d316710c,2024-11-21T07:52:57.177000 CVE-2023-2746,0,0,98242dea1630ecb5d407829a0cfc43949cf4fae0e0c6a7aee7cbf79120ac6bca,2024-11-21T07:59:12.863000 CVE-2023-27460,0,0,7bcf692464f376ae5e5301bda90450c546c10b0805803935c32eda75a8fceab4,2024-11-21T07:52:57.293000 CVE-2023-27461,0,0,175bed00a77c02dfaff0699075240f268538851e9028c34c2c4a73edf53266b8,2024-11-21T07:52:57.417000 @@ -221335,7 +221335,7 @@ CVE-2023-27520,0,0,7cfc86e27d87a04d2be4742a1b2fd83c24b17fbd45830c3942c74c9510e9b CVE-2023-27521,0,0,d0280668b2ed638e8d9575be3ed07dc6ecc1f654fb45c40d020a2f9c3b5a2217,2025-01-31T14:15:30.730000 CVE-2023-27522,0,0,0f4064f7600ff06b1d0a6fbf2515f1b96463167ed2adb01ccbed47358b6bc28f,2025-02-13T17:16:13.183000 CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829c64,2024-11-21T07:53:05.643000 -CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000 +CVE-2023-27524,0,1,3a89b9a9e5827dc76ab9740ee91fee0870f79d1969f43d566be430989d7a864c,2024-11-21T07:53:05.773000 CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000 CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000 CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 @@ -221435,7 +221435,7 @@ CVE-2023-27627,0,0,93aa148cff59a1fe8e6ce90653e1311b6c99b0c629713b534f6d0a09b948a CVE-2023-27628,0,0,d530a6452afe8f32908d7bcaed23914e82db538371b9ffb98587a97a710d6fa9,2024-11-21T07:53:17.720000 CVE-2023-27629,0,0,9d4dac00fdfcac72c69709a22cc5387968b970d9a1dee38c9c09e7e41d9ddac0,2024-11-21T07:53:17.850000 CVE-2023-2763,0,0,a25154db74c5e4cbebd0b512ba1e145e87866ae332841ef87a1791087555b43c,2024-11-21T07:59:14.640000 -CVE-2023-27630,0,0,96c72c0b4d6d5dcc1ac8ef998c6d8abdd8e2f41070832e8fcd6d04e6a3df1a02,2024-11-21T07:53:17.977000 +CVE-2023-27630,0,1,38e76316142afe694f204b8dbf3b9ad8ea59b821709d30d974bb4b2b634eb0ee,2024-11-21T07:53:17.977000 CVE-2023-27631,0,0,9e2e812780f1e11828425e1c96df94fd967a673bee1b089169fd6363fb16b6ac,2024-11-21T07:53:18.103000 CVE-2023-27632,0,0,589b75aa56481da7d8e0a4e55d10552d2f96656d961ce1ff7e1798e7fd395756,2024-11-21T07:53:18.227000 CVE-2023-27633,0,0,9596882cde8a91033c70840d4a7f060fdc78db357ed82968af4c28423dabfc70,2024-11-21T07:53:18.367000 @@ -222400,7 +222400,7 @@ CVE-2023-28683,0,0,61fe5eceabcb2aa38b09688c393a9ae1a5dbeef0f5d1d2a8ca0bc37d8c1de CVE-2023-28684,0,0,4c986b655539f2c1f76d1b090aaba59d8a4ddd92746eea6f1830c296766a165a,2024-11-21T07:55:48.117000 CVE-2023-28685,0,0,658083785298e53ddf6aa90648b9d44e88c968a84e6bb685839c5265a01391fd,2024-11-21T07:55:48.230000 CVE-2023-28686,0,0,9a6bfec58f3de7d5db77eb1c832d421d370eaade63901d222690fac40d1d4224,2024-11-21T07:55:48.343000 -CVE-2023-28687,0,0,d2c035ca653bc8cac64edf153e3b1ee09b48eedb85d2642d9d181eb816044d42,2024-11-21T07:55:48.500000 +CVE-2023-28687,0,1,ceefbdbe598543b06473759f72008a6c46fc5a0e006e0d46fc9ec6c79c82ff45,2024-11-21T07:55:48.500000 CVE-2023-28688,0,0,cd7b143cea73ab0ceb97912669e0bb889aef5ecd6e1e7e361f265c0c3d8fe49e,2024-12-09T13:15:26.370000 CVE-2023-28689,0,0,2bf3d4df15c82e49b60ca9a55d47a6983c22acf0847e9b8f6d6c7ab9c1ca73c9,2024-12-09T13:15:26.500000 CVE-2023-2869,0,0,f1d74ec9bd04bb9988c20b51ba19f55ca39a3718ef5a457487b24a32ea8b2cda,2024-11-21T07:59:27.530000 @@ -222501,7 +222501,7 @@ CVE-2023-28783,0,0,6d842f2a9ea74e22f5f6138cdc29422d2b906f5a7aa6674c08c00e1398fc9 CVE-2023-28784,0,0,7f5b06f72884e16913eb7b24de1fa0c78ac913f3db7893a44e41210861f6dac1,2024-11-21T07:56:00.443000 CVE-2023-28785,0,0,2b47c6a7d60abc0bcacc5b63c9d3d1f88513c23b72e7564ea3b0207d2ade126a,2024-11-21T07:56:00.550000 CVE-2023-28786,0,0,012c9424006607effaa638c30217f6d07b3f6baa4f7406d719fa25483cc31589,2024-11-21T07:56:00.660000 -CVE-2023-28787,0,0,6106c74f8c52427d427496ccd81b6d3977c6e4f98fb6f9b53ee1727ed305f0f0,2024-11-21T07:56:00.780000 +CVE-2023-28787,0,1,488057bd7cb25a29677b0484f2bff485bc78274fd1df13be3136236d4b96bfb9,2024-11-21T07:56:00.780000 CVE-2023-28788,0,0,a5cee9ff3224a56b3f90bd57bf05031cfb3eff440cc84bdd927bb622875f1d08,2024-11-21T07:56:00.887000 CVE-2023-28789,0,0,0d24d4500dd620e22d086e351cdcda7bed4b75aa84c2da7941a97002d85bc51b,2024-11-21T07:56:01 CVE-2023-2879,0,0,5af63f837f7c46749f9f393023b6d68cfefc0bb870e7c96f4f8ad58d9bec8af6,2025-01-15T22:15:26.060000 @@ -222832,7 +222832,7 @@ CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660 CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000 CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000 CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000 -CVE-2023-29164,0,0,db2e21e0f627bb38d2fc63aaadf9708639052758e773cccf73f8be5fd01387b6,2025-02-12T22:15:29.520000 +CVE-2023-29164,0,1,2c2a2be326bd9b2893f612a6fdece181934a14d735d803b0dca328024646730e,2025-02-12T22:15:29.520000 CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000 CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000 CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000 @@ -224397,7 +224397,7 @@ CVE-2023-31272,0,0,248bbd0188eb5bc99415842b4ed153bc83411aa0cb90ab25d35e75e3d02ae CVE-2023-31273,0,0,4524ae58ca14d20067b3c53434664cf4ee02fd40d5001bcc35f96b30738c794e,2024-11-21T08:01:42.830000 CVE-2023-31274,0,0,74afa62a283dbe8ee897d4684b002928801b1434298f025431cf2215ed9ebda1,2024-11-21T08:01:42.947000 CVE-2023-31275,0,0,a92d3352c973a3a3fd9bc60ccb9e2753c16b2828bbbe4829cdff3477cabdfe3e,2024-11-21T08:01:43.077000 -CVE-2023-31276,0,0,d5f393854e2b3d8577207904d880fc0e85866ddb6f78527a7ba76f8979e97ee7,2025-02-12T22:15:29.687000 +CVE-2023-31276,0,1,61078ef8c06b10e6f6cdd3a68e874f7b0e03a6447a5dc7672f4d2b8bda2a7fb1,2025-02-12T22:15:29.687000 CVE-2023-31277,0,0,08b8bbd32f98210a6c89cdb288c882b1eec4c5daab627210049a204ca7a7af75,2024-11-21T08:01:43.197000 CVE-2023-31278,0,0,3a937d5f89c611487800cf4bcb80ec191a0e2f133a03c75f450ca19d48989abe,2024-11-21T08:01:43.317000 CVE-2023-31279,0,0,68068f5854913ace2f0d1369a245a577b6d11aa7976e7a1b388c4382a773d2eb,2024-12-21T00:15:27.100000 @@ -224431,24 +224431,24 @@ CVE-2023-31315,0,0,5009a938e36c7ea72225d8a5217aeb2e701bc89c2e081da93c2cfa110a9ca CVE-2023-3132,0,0,c24f9207d6b5c39a4f607a101b72f44ef2bc2e4c98c06e8e26e1eb3e2a764bcf,2024-11-21T08:16:31.763000 CVE-2023-31320,0,0,40fdd35f915e145cc5cad55ff8c1b58c635fa744757d354f78a9e5b790b2971d,2024-11-21T08:01:46.340000 CVE-2023-3133,0,0,d5f1746339c07f99a99e4b5aaafc3808f2efda9bbec532dbbbe65cdc1103d16a,2024-11-21T08:16:31.913000 -CVE-2023-31331,0,0,e046140d99705d1ececd3a0382c331bc7f6e3f9774e2e662b44c32bf8207d698,2025-02-11T22:15:26.643000 +CVE-2023-31331,0,1,6c1c93160bdc5f8bdc11956d4ff37249b2ec87530252b52fe8036c2466a22cdc,2025-02-11T22:15:26.643000 CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000 CVE-2023-3134,0,0,b41055d7bc0dc4c054369608e6a2b8131a42873b85a487dd8d397c15935034b8,2024-11-21T08:16:32.053000 CVE-2023-31341,0,0,4d30d8bcca3cc5a6fb3cb512a407b048c8089f2e2668f1d6af1cd5e924a75c8b,2024-12-13T16:22:04.967000 -CVE-2023-31342,0,0,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000 -CVE-2023-31343,0,0,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000 -CVE-2023-31345,0,0,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000 +CVE-2023-31342,0,1,5581e3315f33565e8d198caec32b7360c07b3e58671ddf96ad9d3ca7b9eb8c8a,2025-02-11T23:15:08.277000 +CVE-2023-31343,0,1,2ab04ccb78f7e1e3d9f869c51605ee5df970c39ab608cd9f72b408d759a1a64a,2025-02-11T23:15:08.407000 +CVE-2023-31345,0,1,18975085e4d02ffd41c901d1c9c65360a4abdefba85a72a0bfab3961b666d456,2025-02-12T00:15:08.003000 CVE-2023-31346,0,0,0f3aef9cb82d734f42dadff61934c6e7356f408812c277f7c7dc139cdf72f4ea,2024-11-21T08:01:46.650000 CVE-2023-31347,0,0,40bd095adcf20e32bd278c5ac69186bfbd901c6c106b24da3be411afb7fb0f7e,2024-11-21T08:01:46.837000 CVE-2023-31348,0,0,36de6f4439a3c352fc026755e75a90df41c385c2a4dc4700523138475af8101f,2024-12-12T01:21:40.110000 CVE-2023-31349,0,0,71bf4a5703aad3a9f91fdab88a68f528b7c5cf5a77563430c2326a8beb20b035,2024-12-12T01:21:40.263000 CVE-2023-3135,0,0,5525abaed0951618afc57f6ab0cf7d86c246aa704e41354313c6c2430b9e4078,2024-11-21T08:16:32.173000 -CVE-2023-31352,0,0,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000 +CVE-2023-31352,0,1,e3ba8567f5a9f017380b70da8338480db0f5774e1610e855005fa295030c1f81,2025-02-12T00:15:08.140000 CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000 CVE-2023-31356,0,0,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000 CVE-2023-3136,0,0,0082a969c34110c3bc77819ecd8198dbee6358cca1ed9acd2e0be2b757fea739,2024-11-21T08:16:32.297000 -CVE-2023-31360,0,0,e7f92144bd68f5fb73c54ecfe395f6f555bcbb0068d8a55734c120f7f108127d,2025-02-11T20:15:32.950000 -CVE-2023-31361,0,0,3f53f70de9580819e880ee58267a5a944926e79c159bf78735edbe5c8a56f4e4,2025-02-11T21:15:12.160000 +CVE-2023-31360,0,1,ca07e1a3aff16d795ba6ca4ba3b18afcc48c56734cd525eb53aad2c635220055,2025-02-11T20:15:32.950000 +CVE-2023-31361,0,1,3950728b693adaff9a2af5e9818182748c87d397a6b41009b4528c7ebe591b52,2025-02-11T21:15:12.160000 CVE-2023-31366,0,0,56cd8c4cc52708368ee480d321d1f65851f6a7388955145eeaa175ee61128e00,2024-12-12T01:21:40.487000 CVE-2023-3138,0,0,b298f529d2a3adebec7ac1cc8020248642c5a82f64af3207c99b824b1fec255e,2024-11-21T08:16:32.423000 CVE-2023-3139,0,0,03ea8a2258a8de6878e7a0f261295c025d834e2372e626fe4f26aa4f86b80726,2024-11-21T08:16:32.563000 @@ -225085,7 +225085,7 @@ CVE-2023-32273,0,0,dbc475022c89175f11fdad4ca43f4540448222863dd4e5d16f2a947690dc5 CVE-2023-32274,0,0,0b7b3dec85916257fb59243b4648f3caacde127983ed50fc26b64e840ee62cdc,2024-11-21T08:03:01.410000 CVE-2023-32275,0,0,a799c362e16c2f920ef3849f9d4df53d0b136c22ea7da7a5b665b880c2c629bf,2024-11-21T08:03:01.530000 CVE-2023-32276,0,0,d02be46d62a3471b014f25ffbe8b8d0f2be5aaea76861955d2fd7d73e93de101,2024-12-23T22:15:07.457000 -CVE-2023-32277,0,0,a7a68730411cf5302494bc0d9ebd2a100e15e964841703cd53868edf61c8718b,2025-02-12T22:15:29.837000 +CVE-2023-32277,0,1,d28689a68fa298313e4f27c5a29c0fa98cda531dbaecc1b8d59519395e3291d2,2025-02-12T22:15:29.837000 CVE-2023-32278,0,0,3857fac1d586d0ab69b68ddf5e1412a8c03e72178ea8bcbe5480bea560ced136,2024-11-21T08:03:01.780000 CVE-2023-32279,0,0,292951eab2d522ee2c24e4aa1c375e0a56b8a7247fc54c421f69234c131e6dce,2024-11-21T08:03:01.910000 CVE-2023-3228,0,0,766e4cd19f2ab52c2e633f49961af6674b7d054cbfc6685e87b050fdb49e45ee,2024-11-21T08:16:44.790000 @@ -226981,7 +226981,7 @@ CVE-2023-34437,0,0,ffb79324976fbf84ac4d9e947b2be353dc963e1d633e0950540b6e05b6d48 CVE-2023-34438,0,0,b1351877679d083cdea48520114a3ba271110b3005df5aeab817e94a4af9fed6,2024-11-21T08:07:14.577000 CVE-2023-34439,0,0,12d92365a2152a8a9155546ccf2a86cf9c93fef7291f80b49dd113e259a0090a,2024-11-21T08:07:14.773000 CVE-2023-3444,0,0,45ea1c2874b1f19720cd5cdadd30774e072dfbb3393fd7d1cf9abcbdc45755bd,2024-11-21T08:17:16.947000 -CVE-2023-34440,0,0,35485055d832a9d9d24e7ccef65cd202252bd63d11ac4eb54001cfebd345bbce,2025-02-12T22:15:30 +CVE-2023-34440,0,1,0bc1084d33a43ef6cd27444d9e744595300e45c05b5e5df489ed2f7244dd1f8a,2025-02-12T22:15:30 CVE-2023-34441,0,0,709e6ca0756a1b647c79a79106806eec5ec48800f14208889233880446473911,2024-11-21T08:07:14.900000 CVE-2023-34442,0,0,c2b230e98e8578d0642c5ca12d198416aa93a1d597dd2fbe9c88cb899c4d004e,2024-11-21T08:07:15.040000 CVE-2023-34443,0,0,617c269eeda354c21943fffb49606bb198fed49066fafcf1c8d196d78c97b766,2024-11-06T14:25:00.830000 @@ -229098,7 +229098,7 @@ CVE-2023-37479,0,0,3ce00ce6b059b71ec57f98c52c6d42302fa03ccc4d4ceb0e932e3820db679 CVE-2023-3748,0,0,a793bb7a21003612e3fd4e29eab65d28ddae98ad00fb6f9610ec07a14c394a8f,2024-11-21T08:17:58.450000 CVE-2023-37480,0,0,a966e22fdd3a9f60ca71627f6934cec94f6e726127a28efda70d699f8a4e37ed,2024-11-21T08:11:48.090000 CVE-2023-37481,0,0,4bb12b89537bfab67f0c163fe5411fd1a5f53c2adcac3f3669bd8e4bc2304111,2024-11-21T08:11:48.230000 -CVE-2023-37482,0,0,3be698e03b2167c743bf8e432ff79e0463b24f5702cae3a66f833334d5d90329,2025-02-11T11:15:11.427000 +CVE-2023-37482,0,1,fc7465b016fcc32efee63c4e3f2bb41b7d91789f41a562cde0c04e73c91a9605,2025-02-11T11:15:11.427000 CVE-2023-37483,0,0,0414057626a708f713c9ce2d4e6b9d86828873c435da08ecc6b87d32a5204bdc,2024-11-21T08:11:48.373000 CVE-2023-37484,0,0,9c98260222a002a37af1e036f79743d2d2ab724bc43d28ed0c41fbdf5d373bad,2024-11-21T08:11:48.527000 CVE-2023-37486,0,0,eb767853e4f9d9b6b219ac437f14675274e7a8bb9b0b68125cf21f4445aac63f,2024-11-21T08:11:48.677000 @@ -231074,7 +231074,7 @@ CVE-2023-39938,0,0,7e109afc9eac03484142ad7ce4a33710b94b2e3183fb9389d992c4ec0028b CVE-2023-39939,0,0,9ef48a7bfc7f05d96edc1ca825e661088d75871ac2f741da3911c5c17344852f,2024-11-21T08:16:04.723000 CVE-2023-3994,0,0,5eadb5656ef683f50a27dc29b7fb2429811878a8a7202505763e365a3355dbec,2024-11-21T08:18:29.510000 CVE-2023-39941,0,0,e3ac3f7d1daba525a3ab09017ce65465e29792eb0e3d7b5b68368f5a862f5249,2024-11-21T08:16:04.863000 -CVE-2023-39943,0,0,a91acababe8324293387389c3dcaacb69ec2f815b198a7e2efd88beabf7c4b09,2025-02-04T23:15:08.237000 +CVE-2023-39943,0,1,b5d9ece368aaa1e602016fb06b9ff1072f6bb36413e5d106750ccacc75fef3f8,2025-02-04T23:15:08.237000 CVE-2023-39944,0,0,9f6156ae2b84f5ad79f0a55f25f28359e708025cd5e96110436a0c3be335d2a0,2024-11-21T08:16:05.017000 CVE-2023-39945,0,0,ce324f7e0ce427a27c5aab4f1517864e619374db1b79381165b92ad9fb7980d6,2024-11-21T08:16:05.163000 CVE-2023-39946,0,0,11f47a58d2fac4f19d0f78f83831675635eabe780007119732a2ec66fa0b2bff,2024-11-21T08:16:05.313000 @@ -231359,7 +231359,7 @@ CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4f CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000 CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000 CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000 -CVE-2023-40222,0,0,854fb97d9ea76bd0ae2230e0dd169496abd942316e40bef22d3b7e3cdd06a35c,2025-02-04T23:15:08.413000 +CVE-2023-40222,0,1,9a6ed6707f96941aeee682abb38903fae2cc8bab7b61c91da477eafa4244cfe9,2025-02-04T23:15:08.413000 CVE-2023-40223,0,0,9aaaac728328ced048b6d6b5cb0c8d5341ea770b71a983787e5f397c0b28849c,2024-11-21T08:19:02.073000 CVE-2023-40224,0,0,9cd3bec58e8169eaf67cb8ce0484da56183a2fef50788503a91b137a9042fc9f,2024-11-21T08:19:02.240000 CVE-2023-40225,0,0,821a9a37066f54cbe57bb3d978f89daa73ce11405043e140b875f5eb678ef55b,2024-11-21T08:19:02.407000 @@ -231818,7 +231818,7 @@ CVE-2023-40718,0,0,3d0d2c5e24b653d1fccbcd9a19ec5d70a5297153aad8a0f4e8595c0490746 CVE-2023-40719,0,0,acb9404eafc431f6a2f22b63d83343ddbcd8d8fcb1d42ba190543035718d726e,2024-11-21T08:20:01.620000 CVE-2023-4072,0,0,82174d2d178aaae9823279d7c94363a7d8d8c0249d0bb927556aae15a4ef631f,2024-11-21T08:34:20.930000 CVE-2023-40720,0,0,872f2e87477a3acf4f7037778bf724a33680287f443a76024cd4bafc9380b862,2024-11-21T08:20:01.767000 -CVE-2023-40721,0,0,c5611a54c28d269d3462873d1bee84885882759165d38a88a8c91fd8beb70768,2025-02-11T17:15:21.403000 +CVE-2023-40721,0,1,525320d4b38dbb063f7787a42abbae1dc2c7572ad404edfbb6a8dcb204805391,2025-02-11T17:15:21.403000 CVE-2023-40724,0,0,abe3d5cc194993fa95bdc99514308eaf93e09eb564e3440e22bb9515f2b2686b,2024-11-21T08:20:01.927000 CVE-2023-40725,0,0,adfd99195eeb3f34ccc5f2e7792fb5337ad270a7a45216e0d9397d56f8676724,2024-11-21T08:20:02.053000 CVE-2023-40726,0,0,97ba555b44aef4ac8cadb1249031b30ecd84032311ea02ae66df686bdd55cdfd,2024-11-21T08:20:02.183000 @@ -234013,7 +234013,7 @@ CVE-2023-43754,0,0,71f002f331806dfa9b6e8805d3258c2c5f01412d621aec5af63e405d2463b CVE-2023-43755,0,0,8e8150e0b994eb18a50c3504f60c03c91dd5fe130926eade00e6415f3b3ecd8d,2024-11-21T08:24:43.350000 CVE-2023-43756,0,0,61fde12fb5f080294a756377d177abe6a45478ee5fd1594137965fb54afd8f8b,2024-11-21T08:24:43.483000 CVE-2023-43757,0,0,a909ff9b0eff6438b85f276689c98ef73e562427cb41ca9e9696eb6b1201c8d9,2024-11-21T08:24:43.627000 -CVE-2023-43758,0,0,773b9ab1e6cc5689a89f5b1c8dfd369d0b2e6ff6710201ce0abc4e426614c5fa,2025-02-12T22:15:30.153000 +CVE-2023-43758,0,1,5261ddb6e2cc71a5e8890cb2b0cba4f779abe4f4f2b21d7f5393173922edec3b,2025-02-12T22:15:30.153000 CVE-2023-4376,0,0,7dd297ea0aab8429e56e17fc1d50fc1b851b55690736aacaa9c9a5d771b42a8a,2024-11-21T08:34:57.833000 CVE-2023-43760,0,0,2c1d02b36fd094fc6030d1ee93adfd300100ce2062c5046cb3daa7aebf1befa2,2024-11-21T08:24:43.807000 CVE-2023-43761,0,0,c994fda7e5db631ae020ebecacb298bac745fde41a6f1cbc443e84268079e0dc,2024-11-21T08:24:43.953000 @@ -237253,7 +237253,7 @@ CVE-2023-48362,0,0,3cd50e001ed24165cae9366a527aac2f2ef1363120075593a4fe81fd587b0 CVE-2023-48363,0,0,a3ea177f1e519b7d99d7072ae11eeb8c132c1942b1bf876d7af5aee0084834b5,2024-11-21T08:31:34.337000 CVE-2023-48364,0,0,ef5b6a7f1b5f63ceff3cc5ea4e55867a9ab70d4c0184faa8a809aa56956461b3,2024-11-21T08:31:34.503000 CVE-2023-48365,0,0,0cf05bae78dadc6627cfea99a37485b23ebd41a7c3c964bbfb778822775c4d60,2025-01-14T02:00:02.073000 -CVE-2023-48366,0,0,cadf173def996d77d23578ea747d434348278bdafde194b5e62714cdcdee51df,2025-02-12T22:15:30.463000 +CVE-2023-48366,0,1,e5c509cf20bbed6e1206a9f62a8917922bc4dc745c631f6d1ea48a316ea6170e,2025-02-12T22:15:30.463000 CVE-2023-48368,0,0,609d5997260e1bf6b7c4819f19ca84ad3af18f45f72775092f010450f27a00c1,2024-11-21T08:31:34.887000 CVE-2023-48369,0,0,bc61a6d508a3d6393563c443989dec4ec8e15dd321df9cef5f23fb090edc2248,2024-11-21T08:31:35.023000 CVE-2023-4837,0,0,c8afe2fee5c13febea92459e564b09ca1f5abef723590cea9bf7906012fbc634,2024-11-21T08:36:04.613000 @@ -238237,7 +238237,7 @@ CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8 CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 CVE-2023-49600,0,0,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 CVE-2023-49602,0,0,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 -CVE-2023-49603,0,0,ad4bd01af0b43aee12d94a3056c8d163f593d7f5fb8d20a71c667799e139f4c3,2025-02-12T22:15:30.623000 +CVE-2023-49603,0,1,58b794dbf645621c1e750b2b58a45b4ac3c77cf1a198e194c8e58f4ac90e00d8,2025-02-12T22:15:30.623000 CVE-2023-49606,0,0,de58395e940a854debd455905f39ce7fb5cb86ec9f5107aaa70b928793a75cdb,2024-11-21T08:33:37.743000 CVE-2023-49607,0,0,c1d47d2485033d1538c7cfb6f323c8c3e048cbbcf85417d72c0ec588b46db7a8,2024-11-21T08:33:37.887000 CVE-2023-49609,0,0,b73f422c5984e5dd46d62810faadf6b16f12bf840c2578305d1ce83f9f9cc28b,2024-02-14T18:15:46.380000 @@ -238245,9 +238245,9 @@ CVE-2023-4961,0,0,4fd30b7ce60140a70719e18b694005001db9514006d55fc73b4a295c09f84e CVE-2023-49610,0,0,71fa000ee51fd7f605090a98b88cca1255c14527fbb8bcbc39fb0b834efc0b50,2024-11-21T08:33:38.053000 CVE-2023-49611,0,0,768a4d0409bf84bd5c110db296cfb4a7b0f92b989ee5deb66a754da2033af3e0,2024-02-14T18:15:46.413000 CVE-2023-49614,0,0,e29c18258ae1b06a6c9782f0621b997de6655548fc8f11c8f466a4cfa23918f0,2024-11-21T08:33:38.213000 -CVE-2023-49615,0,0,1839adaebacd14d9c361f14bd6c6569080c24febd024a9491b322f34ac95cf5c,2025-02-12T22:15:30.773000 +CVE-2023-49615,0,1,4def4d2af1e15336acffa56dae735fc8c301e0c712e2fd9558761d1edafbc1ef,2025-02-12T22:15:30.773000 CVE-2023-49617,0,0,d3a002973c9a4ddc022d8462107464bfb6b27fe93ecc15957d61de8dc16eb8d3,2024-11-21T08:33:38.343000 -CVE-2023-49618,0,0,df6e52f9d70df89fe897dbf6d4a669430bb588d5b345f50caf7238036345f059,2025-02-12T22:15:30.917000 +CVE-2023-49618,0,1,75769881c0cdb623b907b113b6296a1d1ed00e0043e7e977f822add833d48b85,2025-02-12T22:15:30.917000 CVE-2023-49619,0,0,91d99ac6770adf42d5a2393116d753c25e8951d1e45403cc4685e42752df398d,2024-11-21T08:33:38.477000 CVE-2023-4962,0,0,a5ac70c805f5be56b3f3d66b9497960b85416fcbebeb42a261820fd2b375a7f5,2024-11-21T08:36:21.057000 CVE-2023-49620,0,0,bb69bbb8f134bb94ef5ec332906255bbe83f7d4a8fc04bd38b957390172cf1c1,2024-11-21T08:33:38.597000 @@ -238366,7 +238366,7 @@ CVE-2023-49777,0,0,33c519d5a7962fa4046ad12f5cca27992322c652fb741caea4eb8367807f6 CVE-2023-49778,0,0,32696ac80ddb602c52e8fe776f284fb0ae6da43b7282b564f5a7f39ba2f17407,2024-11-21T08:33:49.730000 CVE-2023-49779,0,0,208a0c4daf9d511825be4208e7428526e848b797a262491bdae905a77266c88f,2024-11-21T08:33:49.890000 CVE-2023-4978,0,0,9bf211ab4eda87736cc28a34ba658d0ccd93638d5da330e5c54fe73d74302125,2024-11-21T08:36:23.437000 -CVE-2023-49780,0,0,9013e7611cf6d23bf15ff23736b8d9b70a7f33951f5ae780b13c0eab1756b4bc,2025-02-12T15:15:12.077000 +CVE-2023-49780,0,1,16847dd2a2a4c00a60add9004862c82ca549f0aa98dec760759be5d958cc4d9d,2025-02-12T15:15:12.077000 CVE-2023-49781,0,0,3563f4405dfa96098f4f59027cce7c23b059b81f69ad6687b4bbd7d42605bb73,2024-11-21T08:33:50.010000 CVE-2023-49782,0,0,d88bb5846ccf235986a34db8ee7ec2e7c4f993cc0c87f8a5d3589de125363ba3,2024-11-21T08:33:50.137000 CVE-2023-49783,0,0,cd66debb4e559f3c84e5128cc8085a7de9859741fad8a54e1384a18a6f8b2960,2024-11-21T08:33:50.277000 @@ -239436,8 +239436,8 @@ CVE-2023-51482,0,0,12b36da84c6cf3f708aea45fbe29700349a83c26c96bc1434ad06e8f9b279 CVE-2023-51483,0,0,45bfe3b3a00a8d6999f00eec00849725dc434824939a1b0939de2e3db4003bfe,2024-11-21T08:38:13.117000 CVE-2023-51484,0,0,94ebc92d848abc91ac49cfda086ae86f7476dde2c1fd6e38bc7c83a8e3b04f17,2024-11-21T08:38:13.233000 CVE-2023-51485,0,0,e11a0e52a85ef1f22d9dd035111143ba8d7908529eab9997225c8ed951a4475d,2024-11-21T08:38:13.347000 -CVE-2023-51486,0,0,91a73f506fe5cf08dac278ef135518b6f0d7a3e1955a5feab8f744f0b951d0ec,2024-11-21T08:38:13.473000 -CVE-2023-51487,0,0,9f52b21ac8a0c7fe0dc787336b17cfba05ad556471c016c534b36243d6721847,2024-11-21T08:38:13.590000 +CVE-2023-51486,0,1,50103122bde8f89ef3db9d816ca0cc03004d6816bb2e2774daf2bb643e4ead27,2024-11-21T08:38:13.473000 +CVE-2023-51487,0,1,6f4818149891741276fefe592e0c0cf05eeba4dbea8e8ed85578bb3cd98c37f5,2024-11-21T08:38:13.590000 CVE-2023-51488,0,0,064ce2155faec6aed65fb319ec3f4b30cfe2dc52690bf718b0795c428007c59b,2024-11-21T08:38:13.710000 CVE-2023-51489,0,0,9275b16eaf303c7b8db918a8ba39c5f57a770ddeb8ddca4382f34d2c1ec94c61,2024-11-21T08:38:13.860000 CVE-2023-5149,0,0,d99fc69d305738a9c8b8cefc06f1a6086946f714cd906288c254343467e734bb,2024-11-21T08:41:09.863000 @@ -240708,8 +240708,8 @@ CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c28167 CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000 CVE-2023-52922,0,0,0257647582c181cfc3c3426a0282aca59fe8801f0370a44aec6ca0f680b7f26b,2024-12-11T15:15:07.500000 CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000 -CVE-2023-52924,0,0,a663406d9b2b74016dcf1ea0a38da294da34378dd34064f9d9bf46c919c85d15,2025-02-05T10:15:21.073000 -CVE-2023-52925,0,0,2124d377c2a4eef9bc2cabba224b6b2bbeffcadc8578c939e127a056358a9596,2025-02-06T16:15:37.110000 +CVE-2023-52924,0,1,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000 +CVE-2023-52925,0,1,088a6b192a99865e539f8003179173ecf52f00cd52002c4bcc1210ba554f49e9,2025-02-06T16:15:37.110000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000 CVE-2023-52943,0,0,f6ed6bafa02a627fd8483d5444c81747a611e4e8a768a1c76804639f41008cc5,2024-12-04T07:15:04.033000 @@ -241067,7 +241067,7 @@ CVE-2023-5659,0,0,90bec3abaabcae7fb3bfa0cf6da0fcefb1e3e730c1c2b218ac7bdca3c49b99 CVE-2023-5660,0,0,00f09116547c937e9c0184ff61209a2d81de417f27b12504918eb6e601a253e3,2024-11-21T08:42:13.240000 CVE-2023-5661,0,0,153d81aec958b8a1d7806537425a88ea158d41f855e567f08d39fe5389f2c85f,2024-11-21T08:42:13.353000 CVE-2023-5662,0,0,d1ccde7b8e95048e20bae2168862020bbd049373c7da1e6a79b1c32f8782b085,2024-11-21T08:42:13.470000 -CVE-2023-5663,0,0,dcf9a315f9c06906b9ee2b36bf0d13f1430ae23439c107763690d5b6a55372a4,2024-11-21T08:42:13.587000 +CVE-2023-5663,0,1,18ebf6ee65b7773acc7ad8d994ddb1825e096911c3a09f4d515207a26a0e924f,2024-11-21T08:42:13.587000 CVE-2023-5664,0,0,e2b99e1c09c1569745a988b9d968cc63f2c56b490c93cc8f8a566dbb1762799d,2024-11-21T08:42:13.713000 CVE-2023-5665,0,0,43ad4254c50ffce86336ed9f68a64e6560d45fcf439f954b8022ed5897f81976,2024-11-21T08:42:13.840000 CVE-2023-5666,0,0,37afafc64470b9c4412022b29b570165476f85d1848a92527d166585715bed6f,2024-11-21T08:42:14 @@ -241273,7 +241273,7 @@ CVE-2023-5874,0,0,dd61cd67fed13703f808971419d344cc716cf5ad7d139407d0801a023b6cc7 CVE-2023-5875,0,0,f1f7faebc6ba4cb15f28cb7ae4bdc4c183d92d4775c3240c6986c2275f2b5151,2024-11-21T08:42:41.340000 CVE-2023-5876,0,0,7092fe874093e7c748a8690b4f8d200e8010fc692198617a50fa4e0b81b9ccd1,2024-11-21T08:42:41.470000 CVE-2023-5877,0,0,73ceb7d5aaf8d15835a0884caddb22352416a5e9bce586b5a36f1744f12e9b5c,2024-11-21T08:42:41.620000 -CVE-2023-5878,0,0,d1e046313c5e717d4b1bbd94c9f87013a0be25caf168e52f894a1724537ea4c0,2025-02-06T15:15:12.440000 +CVE-2023-5878,0,1,10b5e7c02f3f9eaff073ceaac584b5c68c96efdd7eaded46ae795a8dc316888c,2025-02-06T15:15:12.440000 CVE-2023-5879,0,0,fcf4b86da110819690859211077713888e893add9d5e42a19026356852c20925,2024-11-21T08:42:41.747000 CVE-2023-5880,0,0,89b89a6d3786a30714c59d15910e2f7c5af54e211b13f29d200705d6dae8f949,2024-11-21T08:42:41.887000 CVE-2023-5881,0,0,07e2dca3f591fa21ea548af86571d7889d8d5dd21d80026655ea29eb004bae6f,2024-11-21T08:42:42.083000 @@ -241474,7 +241474,7 @@ CVE-2023-6087,0,0,c95a3f15a49185dd173f192494c330c6542c10e6856126500bd668b5e636f1 CVE-2023-6088,0,0,1593e247b5c0e107895d2cbacbbc62dced25f2ce8e8a32dd4c327d873d7ba928,2023-11-14T00:15:09.027000 CVE-2023-6089,0,0,6f90a4364e51fa81b88ac137b96caedddf365534fc1b7e3c574c7e088dfe560b,2023-11-14T00:15:09.073000 CVE-2023-6090,0,0,dcb7365c43afb48932854bbd8d6cd5e54282c729136d407b908a7423f07631d1,2024-11-21T08:43:06.953000 -CVE-2023-6091,0,0,e2f04f679da5adf002704a13456f4d668b5de0e4a32297cf41997a84eea2bcad,2024-11-21T08:43:07.070000 +CVE-2023-6091,0,1,55bf28cffcfc1919e2457bd840d7327a8fae6aef9819c2501da294c7632a5297,2024-11-21T08:43:07.070000 CVE-2023-6092,0,0,bfe88f017f7890c71c9895ad0ac41fde23dbce7447a9c924d23f115a4eebc354,2023-11-14T00:15:09.117000 CVE-2023-6093,0,0,cf81a8f48b0d76a12f0693698c30f44c6645c7bc1929eb05955703beabdfc53f,2024-11-21T08:43:07.250000 CVE-2023-6094,0,0,647d38f09ac8fc5052d2661d96479c78c79535674c9021f536f27c5ef15d2a21,2024-11-21T08:43:07.383000 @@ -241739,7 +241739,7 @@ CVE-2023-6382,0,0,45e895a592b86c31377dbcd30a665edad609e95472ab5c55b6abd3c44ef768 CVE-2023-6383,0,0,59528aa83fcb44c4ddb21de622a524ccd599edf11acdb850f1df2f683548db37,2024-11-21T08:43:45.233000 CVE-2023-6384,0,0,531fd45eb2bfac343d3d0c6d6337e476841abd93ba70599722414ec5ccd5843b,2024-11-21T08:43:45.357000 CVE-2023-6385,0,0,aaefc98730bd631213481acf06dc37b5e840fda532acd38cfd4c3144862e6e8f,2024-11-21T08:43:45.477000 -CVE-2023-6386,0,0,092cdcb2fdabecc7ae6eadb83ee1d76250e496b10ca82f407857f065a508ca7c,2025-02-05T10:15:22.093000 +CVE-2023-6386,0,1,e3f250399fc37f4679957b0d0f5fc5a46bc7177efd09b6d8684d64621bfee208,2025-02-05T10:15:22.093000 CVE-2023-6387,0,0,6045ad16020b717d924348077cac8efa6777d30ff968e045aa8c4bd306773b3f,2024-11-21T08:43:45.597000 CVE-2023-6388,0,0,018e571c76fc5ed3bc4de602bb47f34853389cca44932ab4566ec18b57ff2136,2024-11-21T08:43:45.740000 CVE-2023-6389,0,0,30c0ea046be174f48f1ce6dcf1bbd4a32f375085447b7c52545cca804a006dfb,2024-11-21T08:43:45.890000 @@ -242642,7 +242642,7 @@ CVE-2024-0108,0,0,6439b357fa8fa1da14854e67071d1b4030b146adfc75863fd5dbfa76b8b638 CVE-2024-0109,0,0,4e3c7f891f30f73ffea8812d68ca13e592b4af5ffbdce626b768e60669e5b0c4,2024-09-18T15:18:06.117000 CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f285c,2024-09-18T15:16:37.990000 CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000 -CVE-2024-0112,0,0,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000 +CVE-2024-0112,0,1,a93867826173d52b069ba4bc756915acbff36c5eb60fb96b794508434a58f379,2025-02-12T00:15:08.263000 CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000 CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000 CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000 @@ -242670,10 +242670,10 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 -CVE-2024-0142,0,0,261b501d3b1c6d9204171cc97a2b9eaa15dd08e26ef75f2cf5f87385800414ae,2025-02-12T01:15:08.230000 -CVE-2024-0143,0,0,2d6a775a99432800a0b296cde8d2dfd26489facfd8334a2df675b06faf561ec6,2025-02-12T02:15:09.253000 -CVE-2024-0144,0,0,41cdcf519a880edc9c190bcfa94f26f3a0ac3a6adf8a630f9ea4853703f5659a,2025-02-12T18:15:20.557000 -CVE-2024-0145,0,0,58b871f4d9400f0da60a88f91a5f81be13d81af1d234a6380f51524e5557f1f0,2025-02-12T18:15:20.700000 +CVE-2024-0142,0,1,ab91e4f89023d5fa0e0918df6d387ffb7317705e556bb93dc7ee303e05180788,2025-02-12T01:15:08.230000 +CVE-2024-0143,0,1,373bc5cf4b7b47e3878a4267a11415b51c043adff18c18154b4310affb61efbf,2025-02-12T02:15:09.253000 +CVE-2024-0144,0,1,62b9924272d497b69906b0eab483f0a669dd3b052ae52931761b3c04972ef923,2025-02-12T18:15:20.557000 +CVE-2024-0145,0,1,7d01cb77c5d157bd7abc17279e81a20c5c2c78a8e9874d3f3a50cad415c9ffbe,2025-02-12T18:15:20.700000 CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000 CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000 CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000 @@ -242700,7 +242700,7 @@ CVE-2024-0170,0,0,0f9dd1c463d1f33a35a5d207bdafc403c153f034b95a509f0f65ee7306c516 CVE-2024-0171,0,0,e5692367b7a19552dcf740d572f8052fec23e8056d0a6e4df97a9278a263462d,2024-11-21T08:45:59.980000 CVE-2024-0172,0,0,f01c44612e2bd23d80149f0dca6b917a2f32cd21229a94641cb688740145fbea,2025-02-04T17:34:14.117000 CVE-2024-0173,0,0,615a3a17c62b0ecfcc0bdbda84f3563d03618302b68aa6e74cbe2a296b5911b9,2025-01-31T15:40:26.880000 -CVE-2024-0179,0,0,a064fc3d8d69dd1b588b69953bdecab539b023aa445e184ce09c856decf0962f,2025-02-11T21:15:12.280000 +CVE-2024-0179,0,1,9bcc3c1bf761a102d645e931c255cdc0582fc223930a37da43119a468b4b76da,2025-02-11T21:15:12.280000 CVE-2024-0181,0,0,c83ce8a57dc93c389f92716f87643c4afa6922467926a1ba45c8007bfdfa201c,2024-11-21T08:46:00.443000 CVE-2024-0182,0,0,89049297f896edec5fbcb112b5c26f7f2f44fd567ef0ab71e00e99896a8812ca,2024-11-21T08:46:00.583000 CVE-2024-0183,0,0,a04f5a24b5202aa835a7d1fffb1eea07181808546489b840715904f884892946,2024-11-21T08:46:00.717000 @@ -243172,7 +243172,7 @@ CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7 CVE-2024-0680,0,0,e50d1c64e30fefd809e68c119f37f573f84770ca6e268f24bcd8caeef5483273,2025-02-07T01:27:25.297000 CVE-2024-0681,0,0,f85697f60d4d66e388793935f191c4f5e53ccdfce9c9dccf353e5ec6b0e157e9,2024-11-21T08:47:08.380000 CVE-2024-0682,0,0,7f99e9ee6a5c25acd2747510e7a0fd52f526cf650049286226e9c0f5d163dfb6,2025-02-07T01:26:17.227000 -CVE-2024-0683,0,0,b6f62214b99bc8fc6331030ab27e59470b8707a7711ebaf2c0826c705751f4fe,2024-11-21T08:47:08.597000 +CVE-2024-0683,0,1,80d73a144488042ba926fefd01ea667ebe79230a87167c6a757cfad33dd31029,2024-11-21T08:47:08.597000 CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000 CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000 CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000 @@ -243535,7 +243535,7 @@ CVE-2024-1008,0,0,b40015512ed5e87d02054dd89de2047943a9359fbfa251a46279fc6c655a93 CVE-2024-10080,0,0,43a1f7f93e056c92c1c639ac172ae8b144e833cbd5a522d58f1f49f7054a891c,2024-10-22T16:27:38.840000 CVE-2024-10081,0,0,5c422073043efca649bdbf0235dee597da99b355edaf2c92bc7ed3dcfa93a042,2024-11-06T18:17:17.287000 CVE-2024-10082,0,0,06415cdb965ac64636892c496f9de214d59f82f169c648183613af8a98253c78,2024-11-06T18:17:17.287000 -CVE-2024-10083,0,0,6fed9f75e98b3988fd51b5d761382eae45a7841787eae6559633aa782efef1e5,2025-02-13T06:15:19.210000 +CVE-2024-10083,0,1,ad58817608f7f8afea4f17afed4c607b4026abe408b5fffe3c203ddecbda832d,2025-02-13T06:15:19.210000 CVE-2024-10084,0,0,aa7524ac6f9ff0a4b9d5665381cefd3535aab2cd20f5b5573266707557de2a8a,2024-11-06T18:17:17.287000 CVE-2024-10086,0,0,c34575f938553fa7d7ae7ba88022934e50d186981e616c6c9f4320956c07bcc0,2025-01-10T13:15:08.623000 CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9f2,2024-11-21T08:49:35.077000 @@ -243741,7 +243741,7 @@ CVE-2024-10318,0,0,bb7ee1547db7509ffde7ebdf9a352a1b73dcda716ac26150d44206d2a71e3 CVE-2024-10319,0,0,68d02b703a0a786e535b0c06357fe7c6d9a4d92b566f67658115227be405d0f3,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,c6d8d12d638c10dd834e783d36f86ba17d33a36b799d5e13aadbdfedd22b0728,2024-11-21T08:49:38.587000 CVE-2024-10320,0,0,727a463e6d691153e4adf6d21dfba57d62d85f0e63e6347b0c5272cff36a9bf2,2024-12-06T09:15:04.710000 -CVE-2024-10322,0,0,b97ea147780bf4f5de2803298ddce50d18439c23932d3e2292213faa6a401b17,2025-02-12T13:15:07.997000 +CVE-2024-10322,0,1,65fcc68fd1f0e4f400168da1cf04a0fdedbb0419f9f86e5fc707b80eaf95e271,2025-02-12T13:15:07.997000 CVE-2024-10323,0,0,74c01ce4124a9449f0a3de143c2d6269eaaed2dcc05dfdfdac09c2b033a02614,2025-02-05T17:18:49.550000 CVE-2024-10324,0,0,cfaeca60a4f0aa309330a37a66e2005b2fce423bc7c33f12b5f1c3188e784a63,2025-02-04T19:41:41.250000 CVE-2024-10325,0,0,50164109bc79e97836e82121f62c8560adaed8b05d99b6cbe7e736c6f6cb196a,2024-11-13T20:01:05.097000 @@ -243750,7 +243750,7 @@ CVE-2024-10329,0,0,94fb4c89783f4f56c3fde9a354774d639a28f26feb5034ca8d1df1766578f CVE-2024-1033,0,0,0ebd094b5e36eb84c86356f7abcaa085e713213c3f39a08a73759a5dc273336c,2024-11-21T08:49:38.737000 CVE-2024-10331,0,0,f553670fe3f91baa659bb2c2fe2803f7403a662f96611813506ebaf4caf60628,2024-11-01T12:41:51.470000 CVE-2024-10332,0,0,178b3b2d5779ad727e66a4d765c9c3bfa9f0c7bf18d561efe5247ecb16c1e02f,2024-10-25T12:56:07.750000 -CVE-2024-10334,0,0,4ba8d3dd2cb4d3d361be8c181331baafe515147330a260c0d8665d09a785d2ec,2025-02-10T15:15:12.010000 +CVE-2024-10334,0,1,5181644e523058c9bc955910d6f7e57c21e6d647b22d3e64e8cdb04f0b661153,2025-02-10T15:15:12.010000 CVE-2024-10335,0,0,4c59d1ac123b8e6303af561e960d3d051194aac5e70e303d8fee2fd608db9630,2024-10-28T15:58:13.240000 CVE-2024-10336,0,0,59cc1b27f24abe498031bc6817e57a602ba6914afb3079255af16bfb73c23f88,2024-10-28T16:01:58.393000 CVE-2024-10337,0,0,6b65d20c9682667abc57030505fec6cd1bcd437444a6ea4121f3e754599d7f15,2024-10-30T14:02:45.627000 @@ -243793,7 +243793,7 @@ CVE-2024-1038,0,0,3de9559590019b4d35d9d8fce70a2780968025f8adedf679d6859fd34e5dd1 CVE-2024-10380,0,0,aef46b3de7d53b555c16faf90957b5795e7ff38edc57bb3987b023ae2ffcb5c0,2024-11-01T16:11:00.217000 CVE-2024-10381,0,0,487fc7c9d16cacf4d1afd228d87369ba897cce3ee6a5ff470497aebb255413ac,2024-11-14T21:44:53.280000 CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcbaa3,2024-11-26T11:21:57.823000 -CVE-2024-10383,0,0,8793a56eef4f8cd510365c04b9f5b9ea4a73c3aa189748943d351d80ffb0a3d9,2025-02-07T15:15:16.703000 +CVE-2024-10383,0,1,bb97aed627be562c9a264bc1bf342271b9e8261c12879a229bc7c741c1134c7c,2025-02-07T15:15:16.703000 CVE-2024-10385,0,0,df216807f79e6049f4e0c0d109866adb238dee94592703481f3d8c39123fd3d3,2024-12-20T16:15:21.523000 CVE-2024-10386,0,0,7aff12031680710648573b87d488e50b0294f20a294313dd69f5a61164db5fd1,2024-11-05T20:07:59.487000 CVE-2024-10387,0,0,57470acac2a2dbbd0df691895c55ce7e9f6693f342e79f6c8afed7fe3b526ff6,2024-11-05T20:05:55.323000 @@ -244037,11 +244037,11 @@ CVE-2024-10636,0,0,51d65a9a72ca10606ebab57795a091094c53b3e14bb9b9ea00131b43cbb9d CVE-2024-10637,0,0,93d08933ba9c4ceaffb9a190c50c42965d9f07240a31bdb136bdb3d17454c3d0,2024-12-12T19:15:08.570000 CVE-2024-1064,0,0,7b760eef6fec23e7e81fb51d838ef1bddf15caed76d88b6ad1d3e688cbbd4a4b,2024-11-21T08:49:42.843000 CVE-2024-10640,0,0,a398cd6d72329485656ef5fe95883039ee9518985823ed26e6c02ea5501d6402,2024-11-12T13:56:24.513000 -CVE-2024-10644,0,0,8119fe459c7262a9c79b320c5a1a23cdf16da3012f3ad9684ca76e4ae549b434,2025-02-11T16:15:38.360000 +CVE-2024-10644,0,1,24b1196d3a89910eef3bf89e7297c4850190ffc7a66fef42f48e110e352ea628,2025-02-11T16:15:38.360000 CVE-2024-10645,0,0,4bf8393d98652382c145c8e94d665dfa0043fae11a672b2399957f22677ef320,2024-11-18T17:11:17.393000 CVE-2024-10646,0,0,29bd29c35e84a9dc7ff9345840ca7510d0fba315131aeb752adfa741227a4a67,2025-02-06T14:06:12.100000 CVE-2024-10647,0,0,05b3aabb4778e43bb6f2ea80f3d833ac24d1ab3b06ce7337c8de9fe67f9f78b9,2024-11-08T21:20:50.847000 -CVE-2024-10649,0,0,5b7611da6b2f77bcdb729f265349c1633617f44b3ebee795b58bc864de0b4599,2025-02-11T00:15:27.680000 +CVE-2024-10649,0,1,db16dd80e8448f6d889f81db31b520a6b745a5c4498a8d0f77b2517fc8d93990,2025-02-11T00:15:27.680000 CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d071921c,2024-11-21T08:49:42.970000 CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000 CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000 @@ -244148,7 +244148,7 @@ CVE-2024-10759,0,0,f8bc712fb9410a5ee08f3180d1171d66b15914b48b9a217cb416a2def4d3a CVE-2024-1076,0,0,229c3c3be53023b3f8854e6dfc46fb3635e16fbfbd84ced93f49f0159417c5df,2024-11-21T08:49:44.590000 CVE-2024-10760,0,0,4caeff16d941f4eaea6483471e8bd5b0672f1a62737769a70015e44c6a8cca8f,2024-11-05T19:45:47.893000 CVE-2024-10761,0,0,c6d174b8f4641a03c5bf55f193f6eac898b2be3e32b111450f17980d3bd9ad7a,2025-01-22T08:15:07.060000 -CVE-2024-10763,0,0,5bf807a1e8b588b7b84fedf8f55ce9b5092142517eba54cf122078df9cf07a2e,2025-02-13T05:15:12.943000 +CVE-2024-10763,0,1,9c516ad73a2c8ce3ea86632a23fcf34c60a101b56054affa8414800580dfbece,2025-02-13T05:15:12.943000 CVE-2024-10764,0,0,9403f6bafb5947fdaa7cb8c78451d2ac19b5d12ee73e1a4325fe5cc4119a0428,2024-11-06T14:44:53.410000 CVE-2024-10765,0,0,ed6be3a759d855ad20d58959831792648cd98223f0ea5e3efce60624691a4cd3,2024-11-06T14:45:35.600000 CVE-2024-10766,0,0,97d873f52c572201eba37cf1bcce1c48835952a8e15078f1553c16d85428be93,2024-11-06T14:59:34.303000 @@ -244316,7 +244316,7 @@ CVE-2024-10957,0,0,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 -CVE-2024-10960,0,0,f6f04c2d504363196566ba45106f4e31accdf575bb36d57f608126e9167098a1,2025-02-12T12:15:28.027000 +CVE-2024-10960,0,1,d6fb983e120feec96a65fdddc45b3a1d64427c9905644918906bb7d08d47354d,2025-02-12T12:15:28.027000 CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000 CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d31c,2024-11-15T13:58:08.913000 CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000 @@ -244333,8 +244333,8 @@ CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000 CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000 CVE-2024-10976,0,0,add1dc642ca0b3839b02b45025e0871bcc2dc4571c371fa1948c8c2b0fc1c9e1,2025-02-11T17:46:21.280000 -CVE-2024-10977,0,0,e54cdfcf4a6415150b7b9a534f3117ac0a47dcbb5949b9162862d5471ded9bdf,2024-11-15T13:58:08.913000 -CVE-2024-10978,0,0,a9a3fbaed2064a9cfc13aac9855e4de7204f4fc549701a42d57df44ad9ce8b58,2024-11-21T22:15:07.033000 +CVE-2024-10977,0,1,7e77acbad52c6027c704b593926f8450e38a8ef011adc268448e2f06c6758e02,2024-11-15T13:58:08.913000 +CVE-2024-10978,0,1,2ad1fe4e28705cc365a72d5a36fdf3bacf7244c37418175735413c023fdc2b3b,2024-11-21T22:15:07.033000 CVE-2024-10979,0,0,c563f753316fdbc35fc0c4266561157efcd47ba87314ae829bfbd5ca249cb75d,2025-02-11T21:27:49.273000 CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000 CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000 @@ -244654,11 +244654,11 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 -CVE-2024-11343,0,0,a869a0de2f9f6fb54c13515db8faa67b688fcfdf608d6e35180cbeee3b1374a7,2025-02-12T16:15:39.100000 -CVE-2024-11344,0,0,576942d92da4460d0b1cab9ec9c5374abb29e203ffad910820657abce86266b1,2025-02-13T19:15:13.020000 -CVE-2024-11345,0,0,aedf7ea764616cdb3862713fd3a4bc40f91e903915d5c7b3e048c5e702d16f90,2025-02-13T19:15:13.200000 -CVE-2024-11346,0,0,a9882561ee1be25ab1f6d246ab04e07b20472ddaa82fe8c127ae843e54d9b74e,2025-02-13T19:15:13.370000 -CVE-2024-11347,0,0,78f54793f5b4904690f145df3318fb3f2b02537018fe8c54bc96535b2e8884c6,2025-02-13T19:15:13.537000 +CVE-2024-11343,0,1,937fe08fc4425ad9451e9ba00801962f0ff5ccaefc6591b3c36aafaa3ccc1ab6,2025-02-12T16:15:39.100000 +CVE-2024-11344,0,1,e6342777e10c49d8f8dd1d3feaec76045ef8ccbb7652024ebe12214a7509208b,2025-02-13T19:15:13.020000 +CVE-2024-11345,0,1,b0193e8bcc6651ee58c016e00012426664190f835932fe57abac48d9675da659,2025-02-13T19:15:13.200000 +CVE-2024-11346,0,1,3425b9a47d57b0164e7b92c83802ad6edfb00b4ab0a36872cfa3d63c715b7bfc,2025-02-13T19:15:13.370000 +CVE-2024-11347,0,1,195f2fb46bbbacc8b867805c523e9ca73f40f5b8b6faffc787df1c9d1a7f1a11,2025-02-13T19:15:13.537000 CVE-2024-11348,0,0,ba9d86f6b53ac054d57d01c4d74e28819553b70bfa2bfa989e191e835487e4ec,2025-01-27T14:15:27.973000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 @@ -244779,8 +244779,8 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000 CVE-2024-11465,0,0,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000 CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000 -CVE-2024-11467,0,0,1195e4e11495e598e498646614d4e7c4dad044afa5163bc9291f8ac8dba86cd7,2025-02-05T15:15:20.253000 -CVE-2024-11468,0,0,b4aa552391dd63e230c76f48ab2d0fdd6f4c1ce6ffecdc72e828b03888fd83f3,2025-02-05T16:15:40.103000 +CVE-2024-11467,0,1,e8d3552b8d6629152b6fbf5ef36a135ad1702840fb4b58ca1e2e5cdad2fc0577,2025-02-05T15:15:20.253000 +CVE-2024-11468,0,1,697dce48fdb8aa9d6f93b3632b2f39188405d4ef43cfe18ea18c8d4283667ae6,2025-02-05T16:15:40.103000 CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000 CVE-2024-11477,0,0,586a2ebce80575ccd11b918994aeff6e6ed77d12ff6932b404f28ef9b1ace4c0,2025-02-15T01:15:10.080000 CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000 @@ -244922,15 +244922,15 @@ CVE-2024-11618,0,0,faa524e213716321f8f8b440fa9593fea7194f824084fdf0ccb0ec4689ef9 CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee713,2024-11-22T21:15:17.500000 CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 -CVE-2024-11621,0,0,d0a700e235ca93ad230c31f132f2f9df320a0d74bc60d8a49069450f51603f24,2025-02-10T16:15:36.937000 +CVE-2024-11621,0,1,b329e79916cee7e61bce0b4c4fc0f8c914ac36e6f0c6fffb8c59ef58794213eb,2025-02-10T16:15:36.937000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 CVE-2024-11623,0,0,76bda1a59b3719e7eda66c30b095d988d77d18e39c7f7f479470e5eb406f6005,2025-02-04T14:15:30.480000 CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 CVE-2024-11625,0,0,c71612eff4dbfdfd57dcd77786b9f90aeda1003c787b3baa9b3e022b7aa38e14,2025-01-07T09:15:06.560000 CVE-2024-11626,0,0,e05f68563d0cfe4fcf37166c88856797ec0301944e16df5d7b6760557f29956d,2025-01-07T09:15:07.533000 CVE-2024-11627,0,0,9ff1a8df860daf1368acfa4151c0612097655e3c1d986846213632a0d4bd06d7,2025-01-07T09:15:07.633000 -CVE-2024-11628,0,0,0d30c4ae124cfdfb86ea24ea9ddf8a0a0cfcbb22b3e296f47d174f80c98a5817,2025-02-12T17:15:22.067000 -CVE-2024-11629,0,0,d07cb72e6980995220f25d3903fc054cd90e77a97b8201f93450450507de9de1,2025-02-12T17:15:22.200000 +CVE-2024-11628,0,1,702b95bca9dfca9e62eeaa1a623b8c1f804ea09880c2a2beee620d96779775db,2025-02-12T17:15:22.067000 +CVE-2024-11629,0,1,d967427ddfc2c6ae94c2653c1540417c27ac6b7fc588103f27ec05c411143607,2025-02-12T17:15:22.200000 CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000 CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 @@ -245051,7 +245051,7 @@ CVE-2024-11742,0,0,573cb42c588bd214b3269f0f0837d622553f326ed266e544aa54ab8c35016 CVE-2024-11743,0,0,f820c67dcaaaf23a6b1da5f22e8dfaf3af6e92af3da2964cdf1cbb12adde80f2,2024-12-04T21:07:20.510000 CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000 CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000 -CVE-2024-11746,0,0,b62812152bb8fff8b6d4c5efd6354c8a88cbfbdafc50017c916a571485720200,2025-02-12T05:15:11.307000 +CVE-2024-11746,0,1,c07ac24996c3d702ac6d0b9a1d0e0b8bd64acb1ed2f4503edc4b306d27dc6116,2025-02-12T05:15:11.307000 CVE-2024-11747,0,0,3759ff4fc6bacdbc93b41c30e49e712686d53794386a1c516e9d37a83c4db995,2024-12-04T03:15:04.933000 CVE-2024-11748,0,0,e7645e460b472de84c1c6d90ad8d3f118aede3a0d553d462a4edccc0cf16cb19,2024-12-18T03:15:25.943000 CVE-2024-11749,0,0,412b5ccfe042bb9b7fe2980bccc2ed3ddba78fe36c90d8d8dcbef6203be2391d,2025-01-07T06:15:14.713000 @@ -245077,7 +245077,7 @@ CVE-2024-11768,0,0,34ef36c44e937086acd9b4d0ddc50813053ff17d5da5d8f9d18abb6fce208 CVE-2024-11769,0,0,7c09ce15e3c33c67c82c4f8389595c27e00e07d607e16c4d909baefd0cbdfd8b,2024-12-04T08:15:06.680000 CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f88097,2024-11-21T08:49:58.233000 CVE-2024-11770,0,0,811fe48f54a597d0d878563d5e3c6ae267f413b42e3fcfc7383af1a6019b7d76,2024-12-14T05:15:07.627000 -CVE-2024-11771,0,0,3b4ce8b1a57e88d1ab7854333a4d2a76913aeaa0020999dd21c659722097bf3a,2025-02-11T16:15:38.520000 +CVE-2024-11771,0,1,836eb1dc8ab851d40e3f116e82ff6b6a1b7b6c076a1584921446ad8b06bda9e1,2025-02-11T16:15:38.520000 CVE-2024-11772,0,0,b31e7eab1d3591b26e66c024fb786d86ba840ba76e4420f4d7e4a7cf301cac00,2025-01-17T19:40:52.337000 CVE-2024-11773,0,0,4b3745f64612448355fff5a57f3da9fcc76fa6199f1570739cf6dd2889fe60fa,2025-01-17T19:41:50.450000 CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a46b,2024-12-20T07:15:10.393000 @@ -245086,7 +245086,7 @@ CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2023,2025-01-07T04:15:07.200000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000 -CVE-2024-11780,0,0,12ef96885818aeac2421fbb830c7e8c234e09bd078a7555ec2e45076bb97e66b,2025-02-01T04:15:29.523000 +CVE-2024-11780,0,1,c6444630583b2209a32c825c71dee702f00b48010f91cb4fad7b61435fdcfa0e,2025-02-01T04:15:29.523000 CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000 CVE-2024-11782,0,0,32efa64b128c88aabdfed834337ad65ab786b6692f5faee3dcb9cdb0f84122ef,2025-02-10T18:10:42.510000 CVE-2024-11783,0,0,a1a89800681b730546355720a381b5c434c9a4d5304a89bbf16fe8919a3038c8,2024-12-20T07:15:10.777000 @@ -245307,9 +245307,9 @@ CVE-2024-12006,0,0,36f18b21148a0ee67abb3880ad49f0f8c4ad811090df2db1dbbfc11fa749b CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000 CVE-2024-12008,0,0,c6233d44f9ccc9833da766f9738aceabd906dd7310efd71abd35e6e9b4e35a50,2025-01-16T21:30:41.017000 CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000 -CVE-2024-12011,0,0,184f47e14be07ae553507a8fdb2b80104a108cc404e6158c4d4263863fbabab9,2025-02-13T16:15:43.750000 -CVE-2024-12012,0,0,eef43acafda7e61eefa2cdb5fbbb986ea290fde2587957bc20de781aa6fea1d5,2025-02-13T16:15:43.913000 -CVE-2024-12013,0,0,3a8cef75452e633b8f49bb2286b264b0483dc0d0c9c0712d458ee426c77ff958,2025-02-13T16:15:44.050000 +CVE-2024-12011,0,1,0f6f68e8d37d4c19c05769b393e533228632d01f9d5845f4745581d3d1c7e951,2025-02-13T16:15:43.750000 +CVE-2024-12012,0,1,14e98b5ac64b0045db87c72ad7846ff409f949761b743388daf77e1918c1b3cf,2025-02-13T16:15:43.913000 +CVE-2024-12013,0,1,0cd473350b3884feea6dfce21eb5c412ab8c70283b9ee64d68edf79d425156af,2025-02-13T16:15:44.050000 CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab749,2024-12-20T16:15:23.030000 CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000 CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000 @@ -245329,7 +245329,7 @@ CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4 CVE-2024-12037,0,0,a5255c9116afe4d4a53b9c568ed836bef1995aac7d6a54fa894f842257c6e06a,2025-01-31T11:15:08.517000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 -CVE-2024-12041,0,0,4aa1d5803d0c3e562dbf55f5562274833525c2a9ff86a6cdf1bcbd9c62e30925,2025-02-01T06:15:29.527000 +CVE-2024-12041,0,1,8515c8b28663eed2614fe641527dc4136160dcbb328d2d8f1d9931556c3e1e12,2025-02-01T06:15:29.527000 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 CVE-2024-12043,0,0,0b4fdcede937ae84ff81a2ab905da8f11d94e67d0f40a0aefefaaf9cf7c57c04,2025-02-05T18:52:58.717000 CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 @@ -245341,7 +245341,7 @@ CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496e CVE-2024-12054,0,0,4ba12ec29f03e1b31732298e7df713c42f5671645c234efaa4d4cee36bba5e97,2025-02-13T23:15:09.823000 CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000 CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043848,2024-12-09T19:15:12.750000 -CVE-2024-12058,0,0,1297ad1337a6a14996d96d7694aaa54397421de227302137e2c91e0896f21be7,2025-02-11T16:15:38.663000 +CVE-2024-12058,0,1,30c22f7be7c3f1b207f93ab8480a170bfa1d3a5ae9ab44b79f749c82b604db70,2025-02-11T16:15:38.663000 CVE-2024-12059,0,0,9c6b9e40ba3530efc99fd3b20a62c2d64e18bfab9b7e6210831ac824ade4b6d9,2024-12-12T06:15:23.167000 CVE-2024-1206,0,0,e6f906610cc8644e5dec32911bcdfaec3d978e30884ee402a8df2dfa2fabd584,2024-11-21T08:50:02.327000 CVE-2024-12060,0,0,00194c71df08040c99f5a5536b3c32fccdf95c506294b164954268126957b170,2024-12-06T09:15:08.117000 @@ -245408,7 +245408,7 @@ CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31 CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000 CVE-2024-12131,0,0,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000 CVE-2024-12132,0,0,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000 -CVE-2024-12133,0,0,2e92cfc57618b377942ca1ff17e6cc437c09fb9bf38fad3c9392e7618917b3bf,2025-02-10T16:15:37.260000 +CVE-2024-12133,0,1,2a5834cce8e50191d97409470104657512e1dc91407b2b2698e08f3342d92ebf,2025-02-10T16:15:37.260000 CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 @@ -245430,13 +245430,13 @@ CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2 CVE-2024-12161,0,0,b207c7a86bd84eca9a3e0c1da8f1275c869c8c594c4a05a5c0a83805aa79287c,2025-02-11T02:15:33.603000 CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000 CVE-2024-12163,0,0,0e05ce4e4fefb76b04e78c5c9bf6047281613a653da27713de68b43a91c65ccb,2025-01-30T16:15:29.770000 -CVE-2024-12164,0,0,d4fc62ce142271f80ee66b061c95a1427bfc27530a72366c6a6314e9fa3d0a41,2025-02-12T05:15:11.483000 +CVE-2024-12164,0,1,42814dc109daccf92ed403163a6c3be4ad17998c46a4db084b091203856a0ef4,2025-02-12T05:15:11.483000 CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 -CVE-2024-12171,0,0,579f30d37a4ee8076336826700857076371c55ea3fd448be309e2f0d29318a65,2025-02-01T04:15:30.303000 +CVE-2024-12171,0,1,02bdcd1ee67eefd33d15b29c0f023f4ae1c93e77bdd7b1fc34ccf1ee81e2337a,2025-02-01T04:15:30.303000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000 @@ -245449,7 +245449,7 @@ CVE-2024-12180,0,0,25613c8b94aac2cf24513985a7e8ce52f62a7fb91248d4df9e059f6214997 CVE-2024-12181,0,0,2f8ddb76759020891581c20b50823d1952e3d03370eabe8b27bca8702bd25159,2024-12-10T16:29:18.917000 CVE-2024-12182,0,0,99729c3af2a19c744d32ab48ea2f407c48703d1d78f2fc596c4a0dad8235db7f,2024-12-10T16:18:29.027000 CVE-2024-12183,0,0,82e7d00c0d43970561dcde149328e37153ec341d20500330a205d615cf7848af,2024-12-10T16:05:39.010000 -CVE-2024-12184,0,0,aaf7f2cb6253a7be2a509bd7156ef2ad402bcd283d4b4572466d4b20f5decf17,2025-02-01T04:15:30.443000 +CVE-2024-12184,0,1,3968ef89b1dcff137b3000fdfcf3dd74793ed0550fd33d4bf370b3ef9bd60df3,2025-02-01T04:15:30.443000 CVE-2024-12185,0,0,2794475f4c291bccc75d891cf053c96f74c5bfa44bdb40ae143fb3a0b3833593,2024-12-10T15:57:03.543000 CVE-2024-12186,0,0,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b60d,2024-12-10T15:52:39.487000 CVE-2024-12187,0,0,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000 @@ -245480,7 +245480,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 -CVE-2024-12213,0,0,43fea85fb3b17ef500b815b15aafeff02cdcd2f122ce566f9454ab67cc1def40,2025-02-12T10:15:08.737000 +CVE-2024-12213,0,1,77dd0769fcd1ec64c147536ecec19775a8e1cab6ffc264bc896be8253cf11377,2025-02-12T10:15:08.737000 CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000 @@ -245506,14 +245506,14 @@ CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 CVE-2024-12242,0,0,2f55c665eef830ff2620035cbcfe4292d890dc745ab209f9df7f0382ca44ae3c,2025-02-11T02:15:33.653000 -CVE-2024-12243,0,0,334aa78761e245e73a4c86f0c5e05960c94c49de916a29ea149fcb5aeb9b3c8e,2025-02-10T16:15:37.423000 +CVE-2024-12243,0,1,264020b64fc2d581d2d85d299954d12d2f4651ffd7136fd5c2085841e168782a,2025-02-10T16:15:37.423000 CVE-2024-12246,0,0,25e368b7b625668da07b20dc2399fc14978a413e8f5dc9b92a1c223e61cf9256,2025-02-11T02:15:33.710000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 CVE-2024-12248,0,0,e7cdbc5747de6d45abf0c689b43595399b382712b0a5e35e02147e9a512885a7,2025-01-31T17:15:11.797000 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 -CVE-2024-12251,0,0,a7e8f48e925dc3d26a8ab48e5a089f2a8baa40b5e154b9242b9d105f912d40a8,2025-02-12T15:15:12.370000 +CVE-2024-12251,0,1,9cf682eb792a88329a4175a37946c2a785f1f0822dc8df3132bc2b25a02e9333,2025-02-12T15:15:12.370000 CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,3280f773a0ae5e7bd29340849e7be011f89e7cf22544cd6c884ec0f5814a1b90,2025-02-03T18:15:33.110000 @@ -245554,7 +245554,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528 CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 -CVE-2024-12296,0,0,f4a075247b74dcdce18f90e756037116afe74f235086e1a7462ca397c76be5ae,2025-02-12T10:15:10.230000 +CVE-2024-12296,0,1,cece6230a00a6654d5de87f2517ca2b8fe46b44a0e3e2076c03724581a429faa,2025-02-12T10:15:10.230000 CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000 CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000 CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000 @@ -245570,7 +245570,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12315,0,0,c81368421291799946c1993986f600ddb83244553db2c019eb5b39e19e5b1fb2,2025-02-12T15:15:12.527000 +CVE-2024-12315,0,1,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000 @@ -245619,21 +245619,21 @@ CVE-2024-12360,0,0,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac CVE-2024-12362,0,0,3d126c7d5b2c7c892f0afca83b7e5d0a3fdd9f8568569cdb62c20aebeb726e71,2024-12-16T10:15:05.097000 CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000 CVE-2024-12365,0,0,e44342e05a0b6e2262a493fac9edc68519495d51c0acf8bc24f40ad738356cb8,2025-01-16T21:31:22.633000 -CVE-2024-12366,0,0,cd4898a44c06624b889fc55de14aa18a4ed7612cae85c29ba32fe4f4e301eebc,2025-02-11T20:15:33.247000 +CVE-2024-12366,0,1,bf8b8c2c212f453e6f6d5dc642f1270129eabc7111c7a613295f8bc64058885c,2025-02-11T20:15:33.247000 CVE-2024-12369,0,0,fcd74b43ea72489fd8099497c673c3afa2054b03bb7ec4819b8a995ebe30e685,2024-12-09T21:15:08.203000 CVE-2024-1237,0,0,73d890f90445a3f466d07e44bf460923510366d9a99dc79ba53fedc006c8a010,2025-02-05T18:13:17.037000 CVE-2024-12370,0,0,d98e18bb49c3fbc75f1f7f6601e58a6353c9748a641846c6cbd7e3ecbf6b2cbb,2025-02-11T21:42:23.220000 CVE-2024-12371,0,0,ad8806dfee353fdb9887f497d244b3ccfcec0ca669e819f5ec6c72aa1dddd27b,2024-12-18T20:15:21.193000 CVE-2024-12372,0,0,61d0814cd7351773a7f17ecab5c027fade58fdedeaf091e4269b15064d9c21b9,2024-12-18T20:15:22.167000 CVE-2024-12373,0,0,83b846beefe400aa9231cc84fd600de52fbf3fd7f422b967ec41c6b980048087,2024-12-18T20:15:22.280000 -CVE-2024-12379,0,0,7c6f0d0b2f16fe5189aa74951fea66b9c06c08bd48b3a0d0b83c0a9d5d2e2dd4,2025-02-12T15:15:12.707000 +CVE-2024-12379,0,1,f751596890d1da9292f6f651d82c595b06ef1a948298f28a52d9ac6be211efc3,2025-02-12T15:15:12.707000 CVE-2024-1238,0,0,5414902a0008d4afb8cb32eb99f42faf6e277ff4edad81d014f1587296eaac4f,2025-01-16T21:19:46.607000 CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000 CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 CVE-2024-12385,0,0,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000 -CVE-2024-12386,0,0,c30949953adb6eca0654450839c0a0d7f3d41f69b724089ed2a6d6ef3b2c3792,2025-02-12T12:15:28.470000 +CVE-2024-12386,0,1,e653ba6addd0b76a37cea5332e53d1936d52b392d8f071196bf6a21de1e07dc5,2025-02-12T12:15:28.470000 CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 @@ -245777,12 +245777,12 @@ CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b889004 CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 -CVE-2024-12547,0,0,735afe86223af51f7882bca25662d5ad27bf66cb0eee7abc37c344bb7a14c51f,2025-02-11T20:15:33.400000 -CVE-2024-12548,0,0,a3c2764092d64605667ac69dd553134cdf84bf971c7cfc9dd573009681929bf2,2025-02-11T20:15:33.537000 -CVE-2024-12549,0,0,cb566f76540da610dd4fc6629bd76652a5fe25d6bca30c3c083d327d65666194,2025-02-11T20:15:33.673000 +CVE-2024-12547,0,1,bb88e9f94d0a82c6a85ab1a16cc6952eeb8cadefdd4485f7d7f5bf85a0f87674,2025-02-11T20:15:33.400000 +CVE-2024-12548,0,1,c2001cbc00a18ab0dc77e964badae1d5fbc504ebecede575ea63805378d9f617,2025-02-11T20:15:33.537000 +CVE-2024-12549,0,1,518df6e3601180c8cb0b3321203c67319e3bc7226b68f1b485d53fa155fb8d5e,2025-02-11T20:15:33.673000 CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000 -CVE-2024-12550,0,0,3ccac108ec4be878722d872aadc1319e45b8bc9e96f143d32c14632eb4b07179,2025-02-11T20:15:33.800000 -CVE-2024-12551,0,0,01e6951f34641d38ba955c92e3ff9a6877901ba2648ef5cb0567a5b4ad0785fb,2025-02-11T20:15:33.940000 +CVE-2024-12550,0,1,ce35987631aeae68370296bb98f0ac6cdc9ccf871b6be5fcf0b50bad33472e95,2025-02-11T20:15:33.800000 +CVE-2024-12551,0,1,e85b865a7ab9e1f0de85711dcfaa92b7aa71cd64de5bf2529aada2adceb8c8ac,2025-02-11T20:15:33.940000 CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000 CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000 CVE-2024-12554,0,0,03325541f88792da1f6e44f52ff0851958b98ec9e3aa0b4c7708f85287495a8a,2024-12-18T10:15:08.493000 @@ -245811,7 +245811,7 @@ CVE-2024-12582,0,0,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12586,0,0,e523746525f112350eb7888b7e497f2d49aaebf013c7e745296edf45c4b4de56,2025-02-13T15:15:17.200000 +CVE-2024-12586,0,1,45f01f1b478cb869be989e26e8c0f02fb866364f791fd6d1e880ba3f24fe15c3,2025-02-13T15:15:17.200000 CVE-2024-12587,0,0,7960172962a4bd5df694844fdf178521cdb4dbd17b76b544453367f416394602,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 @@ -245824,11 +245824,11 @@ CVE-2024-12595,0,0,d10767ce84f7e81d5a6ad487503289a59f4d01b86cd7eb0b224ee74e49237 CVE-2024-12596,0,0,5fc66f30988060a8b7bb1a593c82bd6c3fc2c995268e617c35d93ef410dc9a09,2024-12-18T04:15:08.253000 CVE-2024-12597,0,0,fa6e46b2c507115aae1eeb61d57b8709f3b297cf5808fdd7f912f6df3d0250c1,2025-02-05T14:58:45.730000 CVE-2024-12598,0,0,2c0e6e211745cf2c8a775604eda102619f7e15adec08efbb58ccc8f252ed3240,2025-01-17T07:15:26.577000 -CVE-2024-12599,0,0,2e5bd9bfe5d06728f965d1512f0bf2020cfd81ae4c338b21831c5920f5ce7ae5,2025-02-11T05:15:12.790000 +CVE-2024-12599,0,1,9297193506a5cdcb15e452d02a3e08c400deb976f6e004f06c7aaa320f94ff89,2025-02-11T05:15:12.790000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce66367f,2025-01-25T07:15:07.807000 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 -CVE-2024-12602,0,0,c9ef0b6e202da7055045d9a5cfb6607e3e69103ce9eb7f5c9762e5f841c72462,2025-02-06T13:15:38.907000 +CVE-2024-12602,0,1,6a6f401c6c4934c31c54c267328b5cfeb9b2f93f94e5b5a1cce33d5e69f2089d,2025-02-06T13:15:38.907000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000 @@ -245840,14 +245840,14 @@ CVE-2024-12616,0,0,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d44 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 CVE-2024-12618,0,0,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000 CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000 -CVE-2024-12620,0,0,3cd7f21867cb83492956b1e17fd253ff4e6bb9a46bb34636f35b1ebd218d8614,2025-02-01T04:15:30.583000 +CVE-2024-12620,0,1,f9caf6581b7ceb0ca0f0dd311812d90d3a9bd26b1462923a1648a78a9563e80b,2025-02-01T04:15:30.583000 CVE-2024-12621,0,0,c2adae066a86c184a771a0d948073e2bc06ef58867852e158c90f4e2e54ac114,2025-01-09T11:15:15.417000 CVE-2024-12622,0,0,44dabce1b6e9706e1913dedf06e830c5e84e3b2aacb10e32270b16def1e102ad,2024-12-24T06:15:33.433000 CVE-2024-12624,0,0,5e7ff0728298740b51bc71547c6153c6f49e2311f395bfc0566af7f4601437d1,2025-02-04T17:09:29.943000 CVE-2024-12626,0,0,dc01f58442ef4eb4425488c755c4a1d0852a1ed618c4541c829e9e2584781b84,2024-12-19T12:15:06.160000 CVE-2024-12627,0,0,022af0cec2036ad3cef4dfbe1da5009a76ffbe6b2f826e6feb835dd2d0810966,2025-01-11T03:15:21.587000 CVE-2024-12628,0,0,f48463b1ecdc4a2ff76d188b8ae44a2e0e32ef1e929dc806ea33e24839d1432f,2024-12-14T07:15:07.213000 -CVE-2024-12629,0,0,ec3e1b882941cc355ab466f5080549c5df178dc523a474039dc4ac567a86a536,2025-02-12T16:15:39.810000 +CVE-2024-12629,0,1,563cf19459f5f9c445cb0a62c384cc3b51d65783a2e3b03649bd915915d507df,2025-02-12T16:15:39.810000 CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 @@ -245890,7 +245890,7 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33 CVE-2024-12670,0,0,9f9e9a972c818427164d5a512ee821794945d0e32c670f3566ae0a957d76dd82,2025-01-29T17:15:28.263000 CVE-2024-12671,0,0,441fb4f886bb1a3c921dca3496ca3677fba560ac91d2b335dc3087f471044b0d,2025-02-10T21:15:16.977000 CVE-2024-12672,0,0,00e4571ac5db391d0331dd0f9a276714a2a8b762e3ba5c7d99196d198ee4680e,2024-12-20T18:15:27.537000 -CVE-2024-12673,0,0,3a8f2c4d64c92710a1cac26d5719a9f62bb1bbae7a324855d61b62c8dc357d10,2025-02-12T21:15:12.697000 +CVE-2024-12673,0,1,4ca92cdbc8c9f47c35ac3ff3e86386be4a0da3c4cc96a10fff2674a1cd3eed0f,2025-02-12T21:15:12.697000 CVE-2024-12677,0,0,ccd8b506bfacb9c40e488bb490cdd9ad4a8e9ff8c396c0cc1a946f127ae87a52,2024-12-20T17:15:07.757000 CVE-2024-12678,0,0,28e0a51eba0e228488d0a1909669e7638d8e1e56059290aeac6b07f40c822b06,2024-12-20T02:15:05.500000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 @@ -245943,8 +245943,8 @@ CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000 CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000 -CVE-2024-12755,0,0,6869d8a8a8b9c529ce6e591af84408794ba2d2665277c022da5e69e094db9624,2025-02-11T17:15:21.610000 -CVE-2024-12756,0,0,c64460186993e1f5aa773b98e2ef872c20ee05039473102c6bd2f75d0e84a826,2025-02-11T17:15:21.730000 +CVE-2024-12755,0,1,b5362f9e3e31c0b57869006d2298d31591777230eca5ce4b5a5213307978f44c,2025-02-11T17:15:21.610000 +CVE-2024-12756,0,1,2562079d9e4656b46db8a610d92e6c92943f02ef7d0890d38121747eb6e998b8,2025-02-11T17:15:21.730000 CVE-2024-12757,0,0,001b6506f2f8c2c25161ff7428c9761e0eb53687dc4724791aa2f4c1d089377a,2025-01-17T18:15:24.690000 CVE-2024-1276,0,0,f50c16503844f6c3e1c1a0a387b576b44fb3755a2ee23646c803c74e182e6a73,2025-01-08T18:37:36.067000 CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda161f,2025-02-11T02:15:33.770000 @@ -245988,7 +245988,7 @@ CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12821,0,0,7372c2b0dab41e9efab53321f64857db82fe2b13cccde335b3d3062f730a0707,2025-01-30T14:15:32.843000 CVE-2024-12822,0,0,1237e8d30b34608b9228bf4eac8a25382e97ffcf3e8959f1fd3fc8d0a61375ef,2025-01-30T14:15:33.017000 -CVE-2024-12825,0,0,c3a1ea03f05c54094c459ad52358861fdb34d8ae985a94ae8562799a16a91822,2025-02-01T08:15:07.337000 +CVE-2024-12825,0,1,fff90398db967ce777c79405c02ad9a596440f4eceb2da8480b33bb2172afcad,2025-02-01T08:15:07.337000 CVE-2024-12826,0,0,5299c46313436d68c9289650a6ef6457bf429f032709c773f24c86ea6949c331,2025-01-25T08:15:08.463000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000 @@ -245996,7 +245996,7 @@ CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db CVE-2024-12830,0,0,18bcb0e40539df86d5019b2e3a08e03e4a9e7df31568fecf257a302c1fc01bc8,2025-01-03T17:47:52.397000 CVE-2024-12831,0,0,ff4242668f135de6fc9c699db6062145287dcf5202b9f05a586e3bb6a651bf5f,2025-01-03T17:48:53.940000 CVE-2024-12832,0,0,46214a3c8f752d4a2eed28a89cf2d84504348b14c7a5e391464558b4113950be,2025-01-03T17:50:27.337000 -CVE-2024-12833,0,0,dff9bbfb6b1c76afdf6b1c7e6492fce4c8d02e5bd648c6a3fadf8a9e24590c64,2025-02-11T20:15:34.077000 +CVE-2024-12833,0,1,a6f282ad14af21ffcaf456767f41701eddfc505dc4176fa386a1fddac76e0b0d,2025-02-11T20:15:34.077000 CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000 CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08 CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000 @@ -246074,7 +246074,7 @@ CVE-2024-12935,0,0,246cb0571f2507038660c0e81ab4ec24b070071c999a554a789bc643b9365 CVE-2024-12936,0,0,e5d2746e3685c47179c98ceba36645686b2bcf170b130292c0e1cc384dd3fd5e,2024-12-26T17:15:06.487000 CVE-2024-12937,0,0,b02f4e3817e0fb9a6280a4eb3a77c4cf6f0aac28b5fe415e4a1cc8de68c81754,2024-12-26T17:15:06.873000 CVE-2024-12938,0,0,815ad1fbb5ef85a31a9ed236c3e67b238fa902a4432946f8c612da393635402a,2024-12-26T06:15:05.987000 -CVE-2024-12939,0,0,bb96e12f045bf71ee86639633ca2288c3547939cf92a39a5f0b8113d6f200ff7,2024-12-26T07:15:10.967000 +CVE-2024-12939,0,1,ab7bf76242f343e8c9130dec93392fb3e0cc7565ecfb07a7696c24f1462e5214,2024-12-26T07:15:10.967000 CVE-2024-1294,0,0,b71ea2285980093702250bdd703066da616a4eac45cb0506e646936d244fcc0f,2024-11-21T08:50:15.277000 CVE-2024-12940,0,0,d7f154d179611651af13505b53d20f7105004eee3149ed750a04e34ae1addbbe,2024-12-26T07:15:11.637000 CVE-2024-12941,0,0,fd9696d2eb12af21d8cd287056b6ce693c42b5c4d791e1be7e6c47bc4d272f95,2024-12-26T08:15:05.117000 @@ -246100,7 +246100,7 @@ CVE-2024-12959,0,0,5225592e400663837fc5548274da6cb321b7f3df19f7584dc1065af38a815 CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000 CVE-2024-12960,0,0,efd466cfc9f2f6251ddec4531038becc9445ea6af683699e7ee7017154c34377,2024-12-26T18:15:21.027000 CVE-2024-12961,0,0,291b46c6482f64b2afbe8eb7bd6d496579d9c717a7992cb4d0a3a6798792113c,2024-12-26T19:15:07.563000 -CVE-2024-12962,0,0,89df782ff1ce72c8082b2b682647d5b7782d8547b26cf8085cd25b8697f020c5,2024-12-26T19:15:07.710000 +CVE-2024-12962,0,1,7da95e9585c1afbd89165dc7fede25d7b9ca4d6c693429aada8872653af063dd,2024-12-26T19:15:07.710000 CVE-2024-12963,0,0,57f82207620016a08e0cb80b0791f36983b5234c758838adbd8c3ad91e56b9fd,2024-12-27T17:15:07.317000 CVE-2024-12964,0,0,d513e19faa5f3847ffc26f78baf6678142a42a5a46d88fa1ccbe6fd4373f497d,2024-12-27T17:15:07.477000 CVE-2024-12965,0,0,ccbeba69b88040c2173fe476b8addcc60118e660d17fdf7387364ed0552b4ce6,2024-12-27T17:15:07.593000 @@ -246112,10 +246112,10 @@ CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5b CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12976,0,0,43a9acc7b69e46736fdd09ae24588944ab6f6c791f8fe6b3bbe2688255c67125,2024-12-27T19:15:08 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 -CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000 -CVE-2024-12979,0,0,34576d038f9f444209d3272d5dc2cecad67ca3f4c10f69c5541de5b6a303bda9,2024-12-27T05:15:07.130000 +CVE-2024-12978,0,1,c376c8c32a61e17330cbb26bc78f66ecd82bd4792c38c1ee17dcd118f404361f,2024-12-27T04:15:05.603000 +CVE-2024-12979,0,1,3febb0786be4427a4e4f8746fc33981a0689ef410a4f5e0e987dc6f4515bca1f,2024-12-27T05:15:07.130000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 -CVE-2024-12980,0,0,fbb5abb4cf20ea4aba77a4d5110264d797cefd1940b18598b775a14d42a1f93b,2024-12-27T05:15:07.353000 +CVE-2024-12980,0,1,2c44cd3c209159ad2d04bae7492d3a83d84c8b9ef9023ff460d136df0cf0203c,2024-12-27T05:15:07.353000 CVE-2024-12981,0,0,cc3a9baaa165fd598580712be925ef902feba7ee246b99e3aafc65513c39771b,2024-12-27T06:15:23.463000 CVE-2024-12982,0,0,893f77442fc90837f9fe8793b451cee087a15ccc8805ad197e0839b6fe5fa954,2024-12-27T16:15:23.540000 CVE-2024-12983,0,0,660e4511105a84d2089d110a972b11b03704d82ea07b70bce67e29a844922ccc,2024-12-27T16:15:23.683000 @@ -246146,9 +246146,9 @@ CVE-2024-13006,0,0,af1a02cf49c3a90d0ec7910348bc61092d31bc966eb80840ec9cbdf291ced CVE-2024-13007,0,0,ca32b617503e8f771fde7638c1cd97e0017950fa620056cf698f8dcf9607be48,2024-12-29T09:15:05.580000 CVE-2024-13008,0,0,08e0acc08ad511d4aaf66d53e013ba4bcad724dbdcb83eaf558ce18506f6cd89,2024-12-29T10:15:05.853000 CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000 -CVE-2024-13010,0,0,7fa99752085a248bf079fdcf478f26169e13a7a7b318d5b77acfb515cef36f5c,2025-02-10T19:15:37.283000 -CVE-2024-13011,0,0,5ff687c449f5b196b4d19ff0d182de621f08cb18923c9de073ebfe7c4e338302,2025-02-10T19:15:37.440000 -CVE-2024-13012,0,0,e88e43b5941f9d1f30a78ebe9fce26be273deb2877a458c06d8546ffd5d53b3f,2024-12-29T12:15:04.970000 +CVE-2024-13010,0,1,6128af853809df81eee18f8a73cc49e9b80723ec8e3b72221c6cf24311d0db40,2025-02-10T19:15:37.283000 +CVE-2024-13011,0,1,362d1d0e4eaef25be8bfac936a6d705b5bfeabc389aabfe60750090901182522,2025-02-10T19:15:37.440000 +CVE-2024-13012,0,1,6e9a44ae8a28dfef14f0abf6b63707a2494b4e800a2093faa5d818a3802aed3f,2024-12-29T12:15:04.970000 CVE-2024-13013,0,0,32d3d4504fff1b55efdca0cc73fd891662772b6f391fb1a6020ef9adb0a6dc01,2024-12-29T14:15:04.933000 CVE-2024-13014,0,0,34d8db6155c1e8864813ba6d4ba84300a0edc5c6bbf2734421a8a89cd4922927,2024-12-29T15:15:05.530000 CVE-2024-13015,0,0,83724ac0eee08da2b535c9278f6eaad5343673e241624d7bd1478c15016912ed,2024-12-29T16:15:05.100000 @@ -246196,7 +246196,7 @@ CVE-2024-13055,0,0,09b763a8620362f48f2d0fb0b63fe742835d9c3509618b79d5517fbd898a9 CVE-2024-13056,0,0,2a579c70383af6c1823f3194e42b18390b0b4f81be433e074d29e63765e5e705,2025-01-27T20:15:32.990000 CVE-2024-13057,0,0,b4317fb8b1891e8395b711e805931c5a80c442d3f400a693a4524e7a3dccacf4,2025-01-27T20:15:33.200000 CVE-2024-13058,0,0,abdb337edf72c5329320ede11c3fbd3acf68763ab2a7c2b467362f2f7d36268c,2024-12-30T22:15:05.957000 -CVE-2024-13059,0,0,db58119badb7ae5dccc061dc8674011cd768fa73bf518e3f883e3136b9873dc5,2025-02-11T00:15:28.563000 +CVE-2024-13059,0,1,2d881063a2f558168a4ad177a9a31536f3417e4d6cd540b2c801f355fb5578a9,2025-02-11T00:15:28.563000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-13061,0,0,f0d229ddc53c34e4105e6b89d4e6cbe6fcae50e1fc38e3eb92bb7d84d07d1623,2025-01-02T02:15:19.897000 CVE-2024-13062,0,0,bfb1ffc886a0949d9ed69f7e0da80e7f91792af21c2e02f1c9f10695e7c5c742,2025-01-02T10:15:06.153000 @@ -246247,11 +246247,11 @@ CVE-2024-13114,0,0,0294bf3cffe33550cb4e4f68d18089dfac8f013192677ef679fc2a8b508cb CVE-2024-13115,0,0,13b8199069b20efe9868960868ade8b98a30fac2dac411b23e0856355daac94f,2025-02-04T19:15:30.240000 CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43dee6,2025-02-03T15:15:16.290000 CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000 -CVE-2024-13119,0,0,7240d21657a449709e2ceeb11a676ba74ad2599a30a3e4419f0c805e572b7945,2025-02-13T15:15:17.360000 +CVE-2024-13119,0,1,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d96c,2025-02-13T15:15:17.360000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 -CVE-2024-13120,0,0,10492a308c67c78c69c61944548fb579273daa12bd1ae68a787d1f1a16e58d86,2025-02-13T15:15:17.520000 -CVE-2024-13121,0,0,400cb6a6458fcea63bb0abfca45b1de45b0b3f23ff4f2af5f948d3f4940e0b5c,2025-02-13T06:15:21.050000 -CVE-2024-13125,0,0,a81585c57e23fbe08648b139f20ab4084b413b412946f0295543270276b031fd,2025-02-13T06:15:21.210000 +CVE-2024-13120,0,1,4a722c39c0ecec3ebf7ba191280a147f7889b83493ac413c6a2d329ea02a1302,2025-02-13T15:15:17.520000 +CVE-2024-13121,0,1,1cb32d5c81759826371137dab28ea20a0e9b2ee291d28fbf0b4811af4929e454,2025-02-13T06:15:21.050000 +CVE-2024-13125,0,1,452c89b1ee668e5d6e54699ad9837fd5a4d690e2d0944aa8dce85aa2417bb1c7,2025-02-13T06:15:21.210000 CVE-2024-13129,0,0,c8465ea9fafd80ae001698785c09dec31df42294cc4a62b87a1aaef854b51892,2025-01-03T22:15:06.677000 CVE-2024-1313,0,0,5d5c863029cde245502adfa3f378d81753a397aba6af910968a8b199199267f6,2025-02-13T18:16:23.613000 CVE-2024-13130,0,0,11faf417785d12b2b829d9b6bcccc37fdbc1730d9810cb9c4f93c832649c2012,2025-01-10T14:15:27.740000 @@ -246299,7 +246299,7 @@ CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000 -CVE-2024-13182,0,0,ef7cb61dda1d7aecd86c8e3d6e4d0d893d86c62c523bc2141825c453e531fb02,2025-02-13T13:15:08.290000 +CVE-2024-13182,0,1,86bbb053757d1fdf8258ab7a69f7f814be6ad9d2a59f017bbdc4daa6d3ee1792,2025-02-13T13:15:08.290000 CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000 CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000 CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000 @@ -246345,8 +246345,8 @@ CVE-2024-13223,0,0,7b6514669964c43964feed3c6cf2542df0b09778a89a37fa663f94bf88ff0 CVE-2024-13224,0,0,5b837998456d69f57f92f54fe581798d78b4a9cd50e5d6a94dbcf214ddede567,2025-01-31T16:15:32.273000 CVE-2024-13225,0,0,94019de9ef351f6f8bbbc82a565d38e218a78321cab8c9f489a569facf419206,2025-01-31T16:15:32.403000 CVE-2024-13226,0,0,5b9d889c58e6e93e7ddf59213d7cc5ae3d20f838a8db712a9f4b833405dda9db,2025-01-31T16:15:32.537000 -CVE-2024-13227,0,0,0104c1e9279cbd79fb5f7979880c0a168f560f07286d214061a6e3c5037aae63,2025-02-13T05:15:13.727000 -CVE-2024-13229,0,0,146bc2f1a373090b5ad0d19ea72c34662f1c63e16e134a41d372bdefddf09acd,2025-02-13T05:15:13.930000 +CVE-2024-13227,0,1,f396acd62ff517fde269ff6e013e5c0bee9fbdf4ae486ca2fb2f74214892dda6,2025-02-13T05:15:13.727000 +CVE-2024-13229,0,1,8005008cc5eaf6f49dbd4877e33b66dc904c20bdee3b20c47739bf10cb4a210c,2025-02-13T05:15:13.930000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000 CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000 @@ -246454,23 +246454,23 @@ CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655 CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 -CVE-2024-13341,0,0,e43398e65368f93393a8598b94f4d8598c35ed2b7e39cd8a0a6767b19e28b9cf,2025-02-01T07:15:07.900000 -CVE-2024-13343,0,0,65025264d173a6aa1246198ffba55ccecc79c0c655222416b13f6ea4fbd5b301,2025-02-01T04:15:30.717000 -CVE-2024-13345,0,0,72e0e2d5caa0e0d4f97c703e45fc469f0ad660966db5cb4375bbfcd3579b2704,2025-02-13T07:15:08.177000 -CVE-2024-13346,0,0,02a1a198f62d131268b4b01ad7a96d270da82768f16aaf56b6f5009d014d8733,2025-02-13T07:15:09.760000 +CVE-2024-13341,0,1,d1044f531e9718ed5ff21a517ae457f54f64b706f2e309176203ab8df13f04c9,2025-02-01T07:15:07.900000 +CVE-2024-13343,0,1,bc527145f8c71b096b9e058e2eb6af0513530e49a2213ad37da3c9d8054436b1,2025-02-01T04:15:30.717000 +CVE-2024-13345,0,1,6201c4257ed3a1ebbb87baac8176155e7c93515b6dda93cfafdaf22ca9b1cc80,2025-02-13T07:15:08.177000 +CVE-2024-13346,0,1,66f93cf3bfe9465a49d11c88fea5d478d98cfe45b424ebdbe43b702973f58f32,2025-02-13T07:15:09.760000 CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f0474b,2025-02-03T16:15:32.580000 CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000 CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000 CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000 -CVE-2024-13352,0,0,141b744127eddc696fe73de93ee8200c45f9bb2fee40077a7939b58f0d3b821d,2025-02-07T16:15:35.960000 +CVE-2024-13352,0,1,e3b517ead7778233dbb1fb4b3ec3651780c4dec33a82aff69cd76909bd75eb05,2025-02-07T16:15:35.960000 CVE-2024-13354,0,0,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341f09,2025-02-04T10:15:07.920000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 -CVE-2024-13365,0,0,f75700e6ee33a9e00b3278e7bccc8d0b2f27b23b1f758ef9ab41966511ac111b,2025-02-12T15:15:12.860000 +CVE-2024-13365,0,1,b2637bdd89ea551a910692a25748d06b3664b9f07ef48e088d15324cf8639f1a,2025-02-12T15:15:12.860000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 @@ -246478,7 +246478,7 @@ CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0 CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000 CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 -CVE-2024-13374,0,0,ba3c04a8c8e918cc64b0d478c51d7cea41827b25210b2c940417898fbbcfddae,2025-02-12T06:15:19.303000 +CVE-2024-13374,0,1,27ad55dfbaecf19f5383dba0dfa1e5687077e4f4d072c627b9b0d19e085af069,2025-02-12T06:15:19.303000 CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000 CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000 CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000 @@ -246507,10 +246507,10 @@ CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332 CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-13415,0,0,20f4b651b70587580f805a97274e0650f9bb61a3067aa9a0bda1ff129a051ce4,2025-01-31T06:15:29.287000 -CVE-2024-13416,0,0,6f24f732fde1e67f8f77c4dc8cccdfd774f9fbcd7abfaf363f668eb25a2fc1b5,2025-02-06T19:15:19.220000 -CVE-2024-13417,0,0,c8aaf385ae8bc4d9995cbe900cbdda43be9443ea50e0cfe5b1e6f2b0b4839ab4,2025-02-06T20:15:39.273000 +CVE-2024-13416,0,1,8ad08b3960e2b2d4c6644ae345c6c571f903315ed0f985d54f77df4fa51b72bc,2025-02-06T19:15:19.220000 +CVE-2024-13417,0,1,38e6064a571c4d048cdc5ef6ae47228b6b31b2af2307c872610581c0fe53c957,2025-02-06T20:15:39.273000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 -CVE-2024-13421,0,0,5c1ca015db0a09aef5b6ea25cdd8af1735f909887563a7ad2c5cd17b519195d0,2025-02-12T05:15:11.653000 +CVE-2024-13421,0,1,aae3ef0eb8d6c0cd7f92da1264e974f580e1e1fa3a4819378de00b044a858918,2025-02-12T05:15:11.653000 CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000 CVE-2024-13424,0,0,370975f1d5c5dbca69325f5ce6d38bab2ed23e0268961523b76c7b51bd5cfd1d,2025-01-31T06:15:29.443000 CVE-2024-13425,0,0,237ea5cb491f715b975686bb5ff57420b8d04b440f81d846e123cb2cd3c6bc41,2025-02-05T16:08:25.610000 @@ -246521,8 +246521,8 @@ CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f07 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 -CVE-2024-13435,0,0,6836fa547d4932c702deb0657bdaa23c9b9d93c4dd8c924aedac3276df2cc3ed,2025-02-12T15:15:13.093000 -CVE-2024-13437,0,0,503d6adff5da567fee536ffb324a5ccc786c3d759f53a9923743108aaa32218f,2025-02-12T10:15:10.920000 +CVE-2024-13435,0,1,d15c9c331d26c4aefe3cc08b7475a5a438e857c1614d3c9f92ce729847209da9,2025-02-12T15:15:13.093000 +CVE-2024-13437,0,1,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000 CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000 @@ -246535,10 +246535,10 @@ CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649 CVE-2024-13450,0,0,43fcdfa95c84c4f9958bcf0ed96f0c3b1c10185c108adb08c789dbe5f2feb02b,2025-02-04T20:48:58 CVE-2024-13453,0,0,06294509141aad47f8448241fbfd046c29dc34b48e64b560f728719f3766672f,2025-01-30T14:15:33.873000 CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000 -CVE-2024-13456,0,0,684db7350be6005d533aca579f8375efe6909d8acb4ce8d28aecac2ac529d9f2,2025-02-12T10:15:11.240000 +CVE-2024-13456,0,1,8ae271cb88225163ad5e7c38bef05ea0477f45cf928a6e7997913ed30ed7628b,2025-02-12T10:15:11.240000 CVE-2024-13457,0,0,51be24ad36e285925bb980a73e7213c707c5621ab118dd91f24b07146640a607,2025-02-07T15:34:15.553000 CVE-2024-13458,0,0,b0c82b9a6a2ae8ab3e75191e77bf09ecd6761e542d7fe4c0d50e106a0dd3473b,2025-02-04T19:35:30.473000 -CVE-2024-13459,0,0,1c840751e10f8e0a793feba978ea30eaf7ef513ec8c1cab3ce518e5a5a1609b8,2025-02-12T10:15:11.440000 +CVE-2024-13459,0,1,74cc2f10cd16edbcf5659e7d8fe3729e3fc652b8068739b9dd5ffb5ed7a1940b,2025-02-12T10:15:11.440000 CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000 CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000 @@ -246547,17 +246547,17 @@ CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 -CVE-2024-13473,0,0,0f99b6e2c0673e2e27c424ad6afa1fbe1c67cf81cd73e5628ef39646bf0f2643,2025-02-12T15:15:13.270000 -CVE-2024-13475,0,0,58d8b87c302e2e66d53481676d4898485dca464c18876016c693f276944834c7,2025-02-12T10:15:11.777000 -CVE-2024-13477,0,0,5921551f3a00d1e0f2abcb662326962b5a9eabe718bfa89afb4754cf920a7cfe,2025-02-12T12:15:28.660000 +CVE-2024-13473,0,1,6be75970459d75e2460a9f7533a8a3bdd952b09ffc2fc6a74caec379c907a870,2025-02-12T15:15:13.270000 +CVE-2024-13475,0,1,5092e9173eadac632d984f8d6b080371e4a16d09f059f921441142bd53ed3c18,2025-02-12T10:15:11.777000 +CVE-2024-13477,0,1,994d41dcdca8ea2949161c6a3039cf39facb69cdf429b9bbd695e457cde87ed6,2025-02-12T12:15:28.660000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 -CVE-2024-13480,0,0,d49c8370e7e39b031003ed9c57a49bfdefc2c8a040e71164a34ff996e4336b26,2025-02-12T12:15:28.840000 +CVE-2024-13480,0,1,321567d1345fefc0890e4d3a03a4c0335890e5df8d4b67eb97bbb9ba1c937e06,2025-02-12T12:15:28.840000 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 -CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b809f,2025-02-06T15:15:12.660000 +CVE-2024-13487,0,1,4f31a984cdd99e8ec303634359afabe9b8a73999d02b0d6bf58a350f614edb5a,2025-02-06T15:15:12.660000 CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 -CVE-2024-13490,0,0,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000 -CVE-2024-13492,0,0,b366a1d0934eccf698617fb1fc1f766d6bf66d42fc2eb6cd7208ba290ff487ca,2025-02-07T16:15:36.123000 +CVE-2024-13490,0,1,261a201adcbc7bc2dbe4303b4c424a3f72ae3e81ef333b356e5b443e47516d97,2025-02-12T10:15:11.973000 +CVE-2024-13492,0,1,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000 CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 @@ -246568,7 +246568,7 @@ CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000 CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000 CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90dcc,2025-02-04T17:20:18.253000 -CVE-2024-13506,0,0,fc1479263ea5e165654740dad534c2a9cf8d3bed80ff56459ed9839cdb2aeb4d,2025-02-11T11:15:12.263000 +CVE-2024-13506,0,1,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000 CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000 CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000 CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000 @@ -246585,34 +246585,34 @@ CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70 CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000 CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000 -CVE-2024-13528,0,0,cd44b8b64bd470349066ed39405dc062a72d3f9ca0a92d916296984162aedc00,2025-02-12T10:15:12.130000 +CVE-2024-13528,0,1,0d789a8dfbf444e422c6778fb22b658142aa2f2a828cc3fc991f1ee4d9c57658,2025-02-12T10:15:12.130000 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 -CVE-2024-13531,0,0,725576a974d2ed87163ed893a99332425d0718be0c9a94f638f432ea423a76a4,2025-02-12T10:15:12.317000 -CVE-2024-13532,0,0,1d2f63373cda32e6294aeccacd5a54144dc758aa60c0257c4c3620fc880d1352,2025-02-12T12:15:29.023000 +CVE-2024-13531,0,1,d0896acc17735e856b06d8e0c3a5b2f52d9e0cbd22880e913d28c402f6195055,2025-02-12T10:15:12.317000 +CVE-2024-13532,0,1,afd84c2f186b0b681f34e67a86ddb00ec0310f61d9e69cd64ac60428b6884a22,2025-02-12T12:15:29.023000 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 -CVE-2024-13539,0,0,a61aa965cdeae0ee338ee06125441cf5e68ab079c32a2caa32c5b0a3f9f3e038,2025-02-12T04:15:09.197000 +CVE-2024-13539,0,1,4b7e0c70558e34f6819b9b46d3f48cda096658439289d18effcd3cdff1bec624,2025-02-12T04:15:09.197000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 -CVE-2024-13541,0,0,ceb8b1801a8af5937aceb9f66ffcb4e92006967a0ee46e860d3155bf2a801b3d,2025-02-12T04:15:09.347000 +CVE-2024-13541,0,1,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 -CVE-2024-13543,0,0,f241176c01100baa307c5aa5a86efa5cd59edc42a9eedf390e69ec28d54dcebe,2025-02-11T15:15:16.633000 -CVE-2024-13544,0,0,bf7d41a86c98c88bca94911cbd528336cb0bbe9d970ccdbc9fdee8b7f3815a24,2025-02-11T16:15:38.953000 +CVE-2024-13543,0,1,e978bc49ff488db2b344d5d8ed3663103952e081a7e5e2e0d652ffcd5a679db1,2025-02-11T15:15:16.633000 +CVE-2024-13544,0,1,ab4ac6cabc7b36f3edfcf2efc7c25d339765c5d6b37adf1ffeb2e251cad13a5b,2025-02-11T16:15:38.953000 CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 -CVE-2024-13547,0,0,7bc61f8bd2585849d7dcd128a8d53d2f00de64f6697a93f2ea4ff6fbe699ea72,2025-02-01T04:15:30.857000 +CVE-2024-13547,0,1,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 CVE-2024-13549,0,0,bcedd6d4c0f25a57faa8365d40ac3a95b68e2d0adaafc3f3f6fa713e56e46afc,2025-01-31T18:10:28.800000 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 -CVE-2024-13554,0,0,fc921e7035b2c87e563c8e5fc027ea8bdb8b05e2b7f4073b2982935d442a459a,2025-02-12T04:15:09.503000 +CVE-2024-13554,0,1,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e060,2025-02-15T09:15:09.897000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 -CVE-2024-13570,0,0,649b3b85caa228e4615514b0159ba64f995080ad2b3e353a4474585b40d23567,2025-02-11T16:15:39.090000 +CVE-2024-13570,0,1,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000 @@ -246625,36 +246625,36 @@ CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 -CVE-2024-13600,0,0,f8ef83aa6715ca8b6c0e61cfb013e3367b59e14d9c803eabf95a7804b859bf44,2025-02-12T06:15:19.643000 -CVE-2024-13601,0,0,c5aa89fa0254e42c8fbe9bc753dd834887c287ab121e2a66395308a629a28f13,2025-02-12T06:15:19.830000 -CVE-2024-13606,0,0,8f673a1a1f479f7ac98729ebded1eacfae632dbd32c07280028a95c21d69507f,2025-02-13T10:15:09.310000 +CVE-2024-13600,0,1,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000 +CVE-2024-13601,0,1,e0015393c764a503ff79d329184d467cac0f9703697b52d602663376d3e165e8,2025-02-12T06:15:19.830000 +CVE-2024-13606,0,1,1cbdd85184ccb544c93c1632b6d2d3443b7aae450a16746f7539ee65d5330de1,2025-02-13T10:15:09.310000 CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13612,0,0,a0694bea38b2f6801bd5243cb6f5207a64a4aa279fb844241fcbb45b913e28de,2025-02-01T13:15:21.320000 -CVE-2024-13614,0,0,9848a1a23f4415d6f5bfe8c7f43a3e780e98d4689a117426e81fabb135056ba5,2025-02-06T17:15:18.080000 +CVE-2024-13612,0,1,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000 +CVE-2024-13614,0,1,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 -CVE-2024-13639,0,0,4407b7ba25a3acfefed293f60c57e90651a998c527d7ca15ce0c95a01e3346ec,2025-02-13T09:15:07.273000 +CVE-2024-13639,0,1,2fa3cbcf0e6974db61fb65364ec620ba817caf77aea64fecbbfef94d3304d5da,2025-02-13T09:15:07.273000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000 CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 -CVE-2024-13643,0,0,a38744f20924e820268602d30e3b0d726767a57f9b6238974eea21b5a7b2b1af,2025-02-11T08:15:30.450000 -CVE-2024-13644,0,0,11d1ee1072eb0a7c54d807f92bf9d118898d798d047f0051b16a3f45360f7464,2025-02-13T02:15:29.320000 +CVE-2024-13643,0,1,976eb3748a453f62f41c154b29792936c30855f6728fa73bdd9cf169ffa6a36c,2025-02-11T08:15:30.450000 +CVE-2024-13644,0,1,103d60e076f3c7bd4ae30253359a8c34e6a584ab6c0d85823d2a2e5827ff1420,2025-02-13T02:15:29.320000 CVE-2024-13646,0,0,df579ebc80f166383afd2bf72cceedaa012995a592dad78c8758f9a4e2dd62bd,2025-01-31T18:19:45.780000 CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 -CVE-2024-13651,0,0,49322289cda957418a9eda0243f87dceb1d7e8aa86893e964823b95cf6b183c3,2025-02-01T04:15:30.997000 +CVE-2024-13651,0,1,7254671bcf096b25864421ea702cf7c7150d2b6e2d950cb4a4179c92a42d85a9,2025-02-01T04:15:30.997000 CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f04d,2025-01-31T18:21:53.167000 -CVE-2024-13653,0,0,de1b736972fbca468521837fcb88104303bff2b94da2675d28ddbd24ffa67e0d,2025-02-12T05:15:11.820000 -CVE-2024-13654,0,0,ae2e2832487d2a0625f33d8fa038bb5fcec760d860bda06b30b737a30566fa54,2025-02-12T05:15:11.987000 -CVE-2024-13656,0,0,492f3813c45d402b27ec9581503019514bc9ac6d167491bed2f736f0cfaea6b8,2025-02-12T05:15:12.143000 -CVE-2024-13658,0,0,8c1da40d2f72635a5b64ed937dfc2b74719d072e53ed1a506a4ef464798885de,2025-02-12T05:15:12.320000 +CVE-2024-13653,0,1,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000 +CVE-2024-13654,0,1,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000 +CVE-2024-13656,0,1,0b9d444c7c97e411e4ea27cc87641e7cb92ad285f00faceee8008c4cb10f50a1,2025-02-12T05:15:12.143000 +CVE-2024-13658,0,1,d03a5dca2864c8417f9018e7bf90bf0489d89a07c14724289f58406d6fa3a508,2025-02-12T05:15:12.320000 CVE-2024-13659,0,0,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000 CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000 CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020b33,2025-01-31T18:08:05.420000 CVE-2024-13662,0,0,56f3ccc8e33600f927bf8694da0271aa04060815d9c0913215c0208ea29f19b6,2025-01-31T16:15:33.593000 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 -CVE-2024-13665,0,0,51af4803bffc100753b3c4b815c8fea0a3a307d74e414445c36dda0781cf7857,2025-02-12T05:15:12.483000 +CVE-2024-13665,0,1,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000 @@ -246669,60 +246669,60 @@ CVE-2024-13698,0,0,ea43a0ffeb82eb62bdf790bb3904a4694fa6ec80884e9d936dc30a8e05897 CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8ab3,2025-02-05T18:33:09.660000 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 -CVE-2024-13701,0,0,31a9729a0276d6621fdf755ba9bde37cbcbcfa4244828d9b62b7693d2ba69189,2025-02-12T04:15:09.647000 +CVE-2024-13701,0,1,f834def27c90b870381ae372b4e05326550a31cd496de38386bfaad9d9f3cc5e,2025-02-12T04:15:09.647000 CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000 CVE-2024-13706,0,0,92bfb58090ec2cfc6ac0f1405cc2482324ffba82002ca538da8b57da6032c8b7,2025-01-30T14:15:36.180000 CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000 CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f03af,2025-01-25T04:15:07.670000 CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000 -CVE-2024-13714,0,0,0cc5e1375d079bbcc54a8fa5776a617dc2ec8fee493d4eafe4959a2e20b52b00,2025-02-12T06:15:19.987000 +CVE-2024-13714,0,1,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000 CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000 CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000 CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000 CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000 -CVE-2024-13722,0,0,7306fb56ed5965b44340768f0a8910eb1cab3f09db3148c500f3aaeb1bc44b3e,2025-02-06T15:15:12.867000 -CVE-2024-13723,0,0,600a5c5526201e2ff99f92af892f4feb671cccfa846ec078e384c904fd421caa,2025-02-06T15:15:13.050000 +CVE-2024-13722,0,1,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000 +CVE-2024-13723,0,1,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000 CVE-2024-13735,0,0,5831f6a512bd98ee3e9e0b41a189da9a28ce9d6efc5226591d1a0439e0759ef9,2025-02-14T10:15:09.207000 CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000 CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000 -CVE-2024-13749,0,0,fa49a56d794b918ee6fa35ef50df2653d252668435c8dac71b45b6f7e2100eab,2025-02-12T04:15:09.793000 +CVE-2024-13749,0,1,80f262ecaea974125eab2d55e54ea371d41d3a900599102c4f121cdbe4bfacc8,2025-02-12T04:15:09.793000 CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000 CVE-2024-13752,0,0,90982070281cf6fac387cb369b7b78fff5885316e613711da2e6fb3910f9109c,2025-02-15T10:15:08.533000 CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 -CVE-2024-13769,0,0,36e50521c0bb73916a53ae4ab4011fae4b8d9c6f3961785a0f7ccd04cbcf7378,2025-02-12T05:15:12.637000 +CVE-2024-13769,0,1,26bbc21522452466dab58f2b2fa970f1902e5186563a0e8366a2567b1804b1d3,2025-02-12T05:15:12.637000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 -CVE-2024-13770,0,0,d13bd531ee0ebdf4997e11d8335d5ed003498b54f6fbd68ad07b3520f8fe51d7,2025-02-13T05:15:14.177000 -CVE-2024-13775,0,0,1960bdf058198508440d85f951a3bd6116d9785e359b0700d7138122fee08aaa,2025-02-01T13:15:22.847000 +CVE-2024-13770,0,1,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc27c,2025-02-13T05:15:14.177000 +CVE-2024-13775,0,1,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000 -CVE-2024-13794,0,0,ba7ef0fca3cc69b7258b8ab7e3c3de5879491f3f931ecafb8b722ee17f4e0d5f,2025-02-12T15:15:14.040000 +CVE-2024-13794,0,1,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 -CVE-2024-13800,0,0,d24862aeca571805a2d7558bc0f1c00468e4df7532225a53769a89d86c445f41,2025-02-12T05:15:12.810000 +CVE-2024-13800,0,1,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 -CVE-2024-13813,0,0,6191208acb6a8a8377d4636aded0b7fea86db6b2ce6012bae163079aa1f69cb4,2025-02-11T16:15:39.220000 -CVE-2024-13814,0,0,66e4c5f712d0d3cac700cf324f2c7529d43feaa35c8e1c5e7d866503db95b7b9,2025-02-12T09:15:08.433000 +CVE-2024-13813,0,1,a0414a00a2a30561fb3007f9bc2cc4b58102a245d589b97ea6ee429ccb8e907a,2025-02-11T16:15:39.220000 +CVE-2024-13814,0,1,926ac7ba555f373e009e96f6ea518de03ed4e3d0caa0470806ccc3f9ba0042fa,2025-02-12T09:15:08.433000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13821,0,0,5b1ee3d380f6761fb93008f96f770c5f4e5b232778bb2785f2bf8699e79c82fa,2025-02-12T15:15:14.643000 -CVE-2024-13829,0,0,b39aa81be1f98cadde5a8564db1794206153bbf387222b17a1b12873f0417acd,2025-02-05T06:15:31.257000 -CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000 +CVE-2024-13821,0,1,65c4b871166a4f4080aaa963c4548c4e1480b7070090634519cabc498886cf1c,2025-02-12T15:15:14.643000 +CVE-2024-13829,0,1,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 +CVE-2024-1383,0,1,aa117bb4caae4c90c9ef562f3b17aec83c186c85e2ed83fcc25ce7b11090cff4,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 -CVE-2024-13834,1,1,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2403,2025-02-15T15:15:23.423000 +CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2403,2025-02-15T15:15:23.423000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 -CVE-2024-13841,0,0,4c93b1db402e8de05f25325df5694695bb31198aa5a04ae7b8d4b41a4bbb57ba,2025-02-07T07:15:14.573000 -CVE-2024-13842,0,0,2715c109473c50e2a4032d622fe5c5afbf3812f1d195d7554a06494928d68374,2025-02-11T16:15:39.513000 -CVE-2024-13843,0,0,8ea9ece1fce76c0b87d40742dd94ef82fb51e9943ddab2ef79ee4990e926f610,2025-02-11T16:15:39.667000 +CVE-2024-13841,0,1,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 +CVE-2024-13842,0,1,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000 +CVE-2024-13843,0,1,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 -CVE-2024-13850,0,0,24dadca49b30006dad33c09aeb25da492a708093f04782121927d8066ffda3df,2025-02-08T13:15:06.840000 +CVE-2024-13850,0,1,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 -CVE-2024-13867,0,0,0335b6a6ef969393ade476f2886d2e3ddfe58e3ef2205bbec484df0cfd4b61e5,2025-02-13T10:15:09.847000 +CVE-2024-13867,0,1,b22bb2f54b64760b76b696bbb0a0a23f6d99826e999c63e0854f07bc507510b1,2025-02-13T10:15:09.847000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 @@ -246867,7 +246867,7 @@ CVE-2024-1535,0,0,ef4dcb63d4badd77faebb93e8f7eecb2b02295f04c9cd4b7e8a26737f96f07 CVE-2024-1536,0,0,023e19a4489077c813c066348aaf224c88bb591decf7e8833d04e1eb872272a8,2025-01-08T18:32:08.960000 CVE-2024-1537,0,0,c8662283caeaa194411559f4eaf87902e84fb8d45c0d4f42cd07747e7c973505,2025-01-08T19:09:15.633000 CVE-2024-1538,0,0,f692a13d2117fab62bd43f3c930015d27dcdfedb4ea2c6fbf2a4f89e666d71a5,2024-11-21T08:50:47.027000 -CVE-2024-1539,0,0,0784310c71ae3ff091271ad708b32ae0e4132bb28adc721a994fcf70cbee07f4,2025-02-05T10:15:22.327000 +CVE-2024-1539,0,1,f8550391140f05a10ed28baa76221d7ce204f05731898b7d4e95884929692403,2025-02-05T10:15:22.327000 CVE-2024-1540,0,0,dcc5f7f06abf726edf9706049e280bf2503f16b7be61b8dfaef13d5b5b992664,2024-11-21T08:50:47.170000 CVE-2024-1541,0,0,4b2d5b7e49160c1a07da99bfb618ab29a30c8b85927a1cc1ce15d0c4b17a57ce,2024-12-12T17:51:27.017000 CVE-2024-1543,0,0,4a3f54efdb30bd1f479ccf7dde939a4f2178814d69c046c674cf435f75183c15,2024-09-04T14:26:29.407000 @@ -246884,7 +246884,7 @@ CVE-2024-1553,0,0,31524ffd32c6d5503318c6507795348d14b0ae538e98c3f1b0435b84a3f104 CVE-2024-1554,0,0,92740764d0b165b43dc1e93df2a20e8cb503081ce22daa73ea01466314888905,2024-11-21T08:50:49.137000 CVE-2024-1555,0,0,986df4ac39abfabad3447d158a21265dfb176f5818ffaea2cdf898cd8c79a865,2024-11-21T08:50:49.350000 CVE-2024-1556,0,0,cac3820a27ba3d3f659d43b87b40e988c3c3ec064d201d4816073cb562f7563a,2024-11-21T08:50:49.550000 -CVE-2024-1557,0,0,a65617e7c23e3011423f7a7948944a6645a4308b0fc8e2bca8a4587b0a39c9c1,2024-11-21T08:50:49.737000 +CVE-2024-1557,0,1,374a761a7d722a8b725964e9275a694a8a4d84aefec059cdc71a9b266cac1466,2024-11-21T08:50:49.737000 CVE-2024-1558,0,0,29cc6e2f52359b5acbcf7461e2a23aaedc291b42bbfc4a8180f15c938150248e,2025-02-03T15:14:41.203000 CVE-2024-1559,0,0,891a13443ada731ef29bcc4ef703fb2cfeb261a153538106d2f75cc21397715e,2025-02-05T22:35:20.253000 CVE-2024-1560,0,0,6f199301d1f89102841c93f85db0b5c7e4f3dfead0e3c937048a787e8e13678b,2025-02-03T15:18:54.417000 @@ -247194,8 +247194,8 @@ CVE-2024-1883,0,0,8c261cc228d1b82620cf2cdef8c32777357acb917a78f3f5e7773813436c2d CVE-2024-1884,0,0,dd9991f23f96d1475f8f87eedbe9dab6f95e7451746a5525c0e25a086339b8ab,2025-01-23T21:06:27.910000 CVE-2024-1885,0,0,3b404c4d727f26b10689d0b87f5a5b801d5412d486ea1d87a5c30d68f6e37071,2024-11-21T08:51:31.503000 CVE-2024-1886,0,0,59411db0ce15bfc54901e0de750b51fe06e0b5421d72fc6b15b7ccd2c430d464,2024-11-21T08:51:31.620000 -CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 -CVE-2024-1888,0,0,686d9dfa2f61081fcb36c9d67a30cbcb804ac5568ad19af5f4e97270f289a5d9,2024-11-21T08:51:31.867000 +CVE-2024-1887,0,1,3a6c37c6ad6ea6516f490a44664b2b3310aeecd928db7fadf43cb3b00ee5b4d1,2024-11-21T08:51:31.743000 +CVE-2024-1888,0,1,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000 CVE-2024-1889,0,0,bbec90f94e410af96ec1a71c20825f6011a10d67397b8e33b7d0ea3552f52308,2024-11-21T08:51:31.993000 CVE-2024-1890,0,0,c5f46dc2a333094435e2b609540134b0c26e8e3f3e7e75cc9ac13010af4ec50b,2024-11-21T08:51:32.120000 CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000 @@ -247475,7 +247475,7 @@ CVE-2024-2021,0,0,7ae26cd1123e8d499b9a5184d6d2b0677840f3b5d1bed749a8d9e25393e7a2 CVE-2024-2022,0,0,0dc2752b097d5cd1dd4883d63d3316b17f7c227f69335690399aeec0de63b4e7,2025-01-21T15:06:02.787000 CVE-2024-2023,0,0,af1bf29d0113799e098d2cfbf157a0bda24c0e5910a3b834edb94dde9be5adc1,2024-11-21T09:08:50.197000 CVE-2024-2024,0,0,a1997ce935dd2b9a070dcf5fc5501bcdbb4db0c1a6915c1fae085c47b5c17ba9,2024-11-21T09:08:51.093000 -CVE-2024-2025,0,0,4527d6fe9f7317c9197027fa43877931eca8ed461c4640f9a80ab02c51e6dbbc,2024-11-21T09:08:51.250000 +CVE-2024-2025,0,1,39fcbd43a4e1ac5a6320b4582d791fccb4faa57299a19a93e8ec77ca724113e4,2024-11-21T09:08:51.250000 CVE-2024-20251,0,0,3531e62b39fdc8c3653ea080bb0e4127764d8f8a9ab8e30c6e8fdf2cb10d81f6,2024-11-21T08:52:06.593000 CVE-2024-20252,0,0,69e6cb09cbe2ea4295625bb46e8fba5f1d3f6b9c9bbe7f08c9d653e7d91d1775,2024-11-21T08:52:06.800000 CVE-2024-20253,0,0,20e01c8a396f8c03aaf9ed1ee39e56c9a6cddc53e9e3b819841691f742eed614,2024-11-21T08:52:06.980000 @@ -248818,18 +248818,18 @@ CVE-2024-21673,0,0,5386f3f2c2fa5608e4337b427600a7f7550c9a783b6835c57637521e3c38e CVE-2024-21674,0,0,f39a3f923353961478c76c0c23bc6ddef3aca571421fbf8b0854074283374e7d,2024-11-21T08:54:50.740000 CVE-2024-21675,0,0,6538c81fd77ee7ef3434b476843ec466c1e70ac0dd0540cdae914ba927668538,2025-01-01T00:15:07.193000 CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc610b,2024-04-18T17:15:48.620000 -CVE-2024-21677,0,0,eba5049340c0ab4142bcbe491686ce4ed70569bafeab697ee4759197e78b6fc4,2024-11-21T08:54:50.897000 +CVE-2024-21677,0,1,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000 CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 -CVE-2024-2168,0,0,c02254fd453fd438a6064b8fb092c5540a1ebcef3a158b83520fcf4262210538,2024-11-21T09:09:10.260000 +CVE-2024-2168,0,1,3461f696aab79988d4e87234d76a778efc4506b3056dd37de5dffa764a6ba6a7,2024-11-21T09:09:10.260000 CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000 CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 -CVE-2024-21685,0,0,468e5359f34e3d02010595cd81cb836ca13ba9284b6d0dfad4c9b0f50c1369c0,2024-11-21T08:54:51.630000 +CVE-2024-21685,0,1,50571aa3bb92a821e1540150182cfb9d537ce1d1406edcf43f003cba0675c54b,2024-11-21T08:54:51.630000 CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000 -CVE-2024-21687,0,0,17598b7556472ad0a7cb6bb3720bbbc218bae6b01e497b2f4b50268975b74616,2024-11-21T08:54:51.880000 +CVE-2024-21687,0,1,61dd115c9b058b7191477ed6f478ab4abf9d9c1c2c09f46ba6956bd27091cc8b,2024-11-21T08:54:51.880000 CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000 -CVE-2024-21689,0,0,1ade07fe1c3e21e598fba3f258fad5dc343a968dd476652377c79c984e954246,2024-08-20T15:44:20.567000 +CVE-2024-21689,0,1,a01a1bca13f2c42e57e070cc6d909423aa132c1df6ed296e0ae2b6c0052407b9,2024-08-20T15:44:20.567000 CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000 CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000 CVE-2024-21691,0,0,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000 @@ -248968,7 +248968,7 @@ CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 CVE-2024-21829,0,0,a3890329332bbdcce67fee09f03e9c5301416e681ea55a6663f4bd36bb9063a7,2024-09-16T18:03:16.707000 CVE-2024-2183,0,0,c646a897725dabe5bcb9009da3bad9a6c059b95445a34a278392561629394b06,2025-01-09T17:18:25.953000 -CVE-2024-21830,0,0,e78d9f1d1be06435b245d72caeb31ed36d510fcaa93fd2ede2f9d98048e593be,2025-02-12T22:15:31.073000 +CVE-2024-21830,0,1,4174748e717b7c945912d4e75af7ef7dccb32dd6197c125dd50f3e612dee09d2,2025-02-12T22:15:31.073000 CVE-2024-21831,0,0,ffab4fc0733292e4ab0051dfbbe5d66d4a29c6dfbff84c323978b1e919252979,2024-11-21T08:55:05.050000 CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdbee0,2024-11-21T08:55:05.190000 CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 @@ -248993,7 +248993,7 @@ CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0 CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000 CVE-2024-21855,0,0,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f2f5,2024-12-20T17:05:24.753000 CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 -CVE-2024-21859,0,0,41d3b6eb39d5f20fc5a581695e58504951c3dee461c4e4a467a981631c9dce2e,2025-02-12T22:15:31.227000 +CVE-2024-21859,0,1,1240444cbc4bdfc671da3cb2a21d2670c6456003982968aaff921c7604c46211,2025-02-12T22:15:31.227000 CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 CVE-2024-21861,0,0,3a7f9befc113ffb23875efbe3d70cf01c22adb8b0631739aca4be1bb65b609fe,2025-01-23T18:36:34.593000 @@ -249051,8 +249051,8 @@ CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4 CVE-2024-21918,0,0,dc11a3a57567440eae7517d3e5698262bbb92a09771b9dc937c33b65f9af3ee3,2024-12-17T16:15:50.300000 CVE-2024-21919,0,0,e32085602e3d28ef958a012fb2a33eb2af98476272747f23edd8cebf66a80352,2024-12-17T16:16:16.773000 CVE-2024-21920,0,0,272e163c2f3b6945c5a2836dd0a4057171bebc3edb08dc255719f5183cd499f0,2024-12-17T15:52:01.670000 -CVE-2024-21924,0,0,2af3aa5e9e68f00f65b800491cc177cbc513060c3257ce2d380c907c1294d3db,2025-02-11T21:15:12.437000 -CVE-2024-21925,0,0,548bf4c8da1643eda2902729574fea342efc68c7741366410f42ba1d86e4828c,2025-02-11T21:15:12.577000 +CVE-2024-21924,0,1,7427060de6eeff8e36d04b75f3eef8db12effe54f7e1d999f555836a3540b436,2025-02-11T21:15:12.437000 +CVE-2024-21925,0,1,5d12736091154171fdab0e2c769242edf2ff4b1d9049b60e44cc6e5a6afc41df,2025-02-11T21:15:12.577000 CVE-2024-2193,0,0,d1b5d58eb23650603dde2193fa058a7052b07b528230b86e43f08c6748cd11c1,2024-11-21T09:09:13.693000 CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000 CVE-2024-21938,0,0,f574890406a7b177a1742f2618034b6cd7667e5ef65e202f3261fea549242e4a,2024-12-18T19:00:09.733000 @@ -249065,9 +249065,9 @@ CVE-2024-2195,0,0,9b9d803ecfaa60d982c73cbe1fe9fdc5686e5883eb3b22beda2b81d48f010f CVE-2024-21957,0,0,4a3eba3de32b7b0f601588dedd4f2703985975a2f28eb66b6938f622e608d27c,2024-12-18T18:58:19.103000 CVE-2024-21958,0,0,e5206ffa0444f8572c1e9e167d9a12d914a6e0246055c05b0d98e9036149b514,2024-12-18T18:57:53.727000 CVE-2024-2196,0,0,b69b6a180eaa2677dec83ce612fd6894dd1a1d839791fdc8c079145ded6dd346,2024-11-21T09:09:14.183000 -CVE-2024-21966,0,0,95a7f244be612e572f7740e2431610bd1fd7003e288efea01d1c8140b03e252a,2025-02-11T20:15:34.210000 +CVE-2024-21966,0,1,9a094229e44deddc43e8a16be15f49a1dc46fa8cc346f3ca6509ae8a41584ec4,2025-02-11T20:15:34.210000 CVE-2024-2197,0,0,a2f883967a50a9a8d4e6369039be76593be79f2ff1288beb4c800f9afb124cb4,2024-11-21T09:09:14.310000 -CVE-2024-21971,0,0,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000 +CVE-2024-21971,0,1,96f20d0c24d4b2d98748a9ac273eedf9658d623f5b9a59df015139714d1b55b5,2025-02-12T00:15:08.750000 CVE-2024-21972,0,0,39505a9051e09d87e478fcc5f7515870aabb113eb6e35a2873ad7cf108e230e1,2024-11-21T08:55:18.060000 CVE-2024-21974,0,0,23f4ca1528e717237fe841fef4e4a6ef8c37c85aafce9b5c42cec363da075a34,2024-11-15T19:20:09.980000 CVE-2024-21975,0,0,85139c939620bb495fd621b698ae8c235d9f4ec5c4743aa119dda8b2c0db20fc,2024-11-15T19:15:18.770000 @@ -249998,7 +249998,7 @@ CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000 CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 -CVE-2024-2332,0,0,19662dfad3efbbaeffc3d81c4603f9ef82278956a2fc493d27380dd57bc9724e,2024-11-21T09:09:31.410000 +CVE-2024-2332,0,1,304de721ecdbe8cab233056d0e153a006f00a79af5e1adc8c9aeb46c3b898c39,2024-11-21T09:09:31.410000 CVE-2024-23320,0,0,5358fceafc65b7c895824a066eb3639945e8b03f1c69910f4d447f806474bf37,2025-02-13T18:17:01.897000 CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000 CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000 @@ -250174,7 +250174,7 @@ CVE-2024-23483,0,0,35765b9f4b356e15e6e9871c794545e74df2d881a1951513f786aedadb918 CVE-2024-23485,0,0,404b0dd0c57a14646a247c565360895178a1dd9620d1a334ace32f573a870cc9,2024-11-21T08:57:48.497000 CVE-2024-23486,0,0,17fd313f6701c516294ce7a750a27ded8ac5ba56a30197c75d7299cbaabe23a3,2024-11-21T08:57:48.630000 CVE-2024-23487,0,0,a6c554adaa70f1b163226eaee0b255fa9779c4866103e57e83bfc3ddafbf5afe,2024-11-21T08:57:48.820000 -CVE-2024-23488,0,0,8a668d23e9514deb241913244da855b76db8ce1d9c3a692bbc93656691fe2abf,2024-11-21T08:57:48.947000 +CVE-2024-23488,0,1,3d64aa440499d35f614198bd6e8c86d15311f90ac0c0cafd2949318f5e0ae3ab,2024-11-21T08:57:48.947000 CVE-2024-23489,0,0,2f1c7040c28578859cc62c33e9def7324caefd81ec04dd9ba2fec25d07880211,2024-09-12T18:11:09.677000 CVE-2024-2349,0,0,8c63339920fc156162d73ba58fde151c2cb3e8522b28748cc2e7252c0bc45137,2024-11-21T09:09:34.150000 CVE-2024-23491,0,0,fc3a3c05294904d030f2fb1ecc0d204d3cdfa4b0ec09d0724dfa8542ba2b38d0,2024-08-31T03:37:08.710000 @@ -250240,7 +250240,7 @@ CVE-2024-23559,0,0,c99cfd0fdf47b74263bfd3b28969d0b295141de4804e47c5696456fb67797 CVE-2024-23560,0,0,1ac21c967a6aa34f56a2141c43d6dc2d801111e3b28b514636b28c289a780afb,2024-11-21T08:57:56.477000 CVE-2024-23561,0,0,4c70648585cae8e25c85c736c78b97347e5c7300ec23d97d6f188bf631ec2b4b,2024-11-21T08:57:56.603000 CVE-2024-23562,0,0,3bb828292c209fcec85e3a252b2fea62176f8c8bb9b39bd91c753893070ca596,2024-11-21T08:57:56.743000 -CVE-2024-23563,0,0,76e975c2080f3bcdc51a228538ab7181294692203d42d9b22415e78088a6c664,2025-02-12T14:15:30.317000 +CVE-2024-23563,0,1,f9e9926719c593ac853dee4b0e48a00a8157c3f26978ae9e180340425e960cb5,2025-02-12T14:15:30.317000 CVE-2024-2357,0,0,9db9e2d982cc7f87c4deab786615d4c2491074f7901aaf72f0e7eb4e46dabe0a,2024-11-21T09:09:35.103000 CVE-2024-23576,0,0,ae2f2574293dbbf7382406a21bd77da297dc368e0a3b7483251968e11d54c7ee,2024-11-21T08:57:56.943000 CVE-2024-23579,0,0,d24661721a28ef998bb0b5017df483b369b29abcab71f13d97c35966d3d2cd62,2024-11-21T08:57:57.097000 @@ -250462,7 +250462,7 @@ CVE-2024-23810,0,0,f2f5fad1095108d3dacd61e6f85b7446124baa2350c0d88169d5c5b20a046 CVE-2024-23811,0,0,0403fc7b759c5031a0e3964d5cd968c4b8d98cfb4b93f144bb06accdee9c592b,2024-11-21T08:58:28.397000 CVE-2024-23812,0,0,cd0bc601708660f70d1d037eaa9637828cd5126193d2146674f74e975f2d8f4f,2024-11-21T08:58:28.530000 CVE-2024-23813,0,0,7330b340114f720605e701199802bc5852dd2e3b4502cb55004dd32904df5d45,2024-11-21T08:58:28.663000 -CVE-2024-23814,0,0,a31fd65136e6f44d6ab8ed3cbba71dd3534561984ca2e44d8ee168ae95726cf3,2025-02-11T11:15:12.430000 +CVE-2024-23814,0,1,a42be384cf854aa976e50623f96664407141677737c2335bcf60723341aa7972,2025-02-11T11:15:12.430000 CVE-2024-23816,0,0,45b8ab6d18f8b3a36dbb4f3268f40cc0794948c265f9b28a0d995f2e4e9bb44f,2024-11-21T08:58:28.797000 CVE-2024-23817,0,0,ff6dc4a22b7866d3f24198f333bbdc1cd88d8e8378a66f3e4e7d9f3932f6d7bb,2024-11-21T08:58:28.927000 CVE-2024-23818,0,0,1d11e94beef8b992781ba366a04aee82b4d83880b6bc21b8f750e61622e60900,2024-12-17T20:13:27.330000 @@ -250580,7 +250580,7 @@ CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2c CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 CVE-2024-23928,0,0,aa893d0bd03b0fc4eec222c87d3670cc0bd053b0b68fc8887badbad0acd19fb1,2025-01-31T17:15:13.030000 CVE-2024-23929,0,0,f24b814b1ed24e572e44263ae81453a6c749c950d9f79f981f97ff46f8081fe5,2025-01-31T17:15:13.177000 -CVE-2024-2393,0,0,b6127d3f8197d098d229238d65ed3c274935d9588c7b7a15821e57a641aa69a9,2024-11-21T09:09:39.413000 +CVE-2024-2393,0,1,0458f4543c8a844640151e34e9bc015928e878b95038e499e97f09aef67aa751,2024-11-21T09:09:39.413000 CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000 CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000 CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000 @@ -250718,7 +250718,7 @@ CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2 CVE-2024-24160,0,0,e19b8014b49c30329495072f174bac90c20d64ed22c36b21f9d4c3477741d674,2024-11-21T08:59:00.147000 CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e8440e,2024-11-21T08:59:00.290000 CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000 -CVE-2024-2418,0,0,769b409c00ad186329e29f8e4ffbf0e753cd37fff5131aefec0b34f7199bc48a,2024-11-21T09:09:42.670000 +CVE-2024-2418,0,1,154509dd2d91315c00067f4186c9636530cc59e8e86ab27eb13226ae6ce7d6ef,2024-11-21T09:09:42.670000 CVE-2024-24186,0,0,07767a469bb9f886899dec5f70186dd871757234273491c05682334a187b13be,2024-11-21T08:59:00.440000 CVE-2024-24188,0,0,c6ea63f8b5a602ecddf385c0ed8349db234fffb3df07bfe2900c73a158dad28d,2024-11-21T08:59:00.590000 CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000 @@ -250935,7 +250935,7 @@ CVE-2024-24579,0,0,5b750dc9276586545591c5f17c685da900cca7fa18a626d3a0cea44f176e0 CVE-2024-2458,0,0,d3a43945b002bbe4dbcc775cd2d9094cda2834583bb42f76f13ae769b4a19a8f,2024-11-21T09:09:47.697000 CVE-2024-24580,0,0,e9b3c63c841b56484e9a7cf6be12569b58937f5d37eaaf95d5cdb644623e864d,2024-08-23T18:51:20.207000 CVE-2024-24581,0,0,36fae7d53f9afffd69c2bce98990b53d6cc54ce63ef6e7416027a1f6696d8f33,2025-01-27T18:00:59 -CVE-2024-24582,0,0,631b617f4e07e5e2b30f1ff6679924bc05fc602050c95d81cae94f75e9c9950d,2025-02-12T22:15:31.367000 +CVE-2024-24582,0,1,0ca2055c206a9e72f74996eede2826c4a0206f2229d2de4178b3f7d037b3696c,2025-02-12T22:15:31.367000 CVE-2024-24583,0,0,bcc0d97b1272a178e3384040a9e79397ecf386dff5ae4277decbfeb02e16846d,2025-02-11T22:25:31.757000 CVE-2024-24584,0,0,6aa61e7cb66d06f7ba7f81956e3714ba73bfe1296669178782f9d4955fc09571,2025-02-11T22:29:21.440000 CVE-2024-2459,0,0,25a3e13292c0e654cb7fca3dafd8a2a21d524bd7d615cdbca42cdbb547eef683,2024-11-21T09:09:47.813000 @@ -250995,7 +250995,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000 CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000 -CVE-2024-2472,0,0,3ca526c05c321b70bd0de98836b2b60d996eeb70eef6a25e4d7f34885f8c19e9,2024-11-21T09:09:49.730000 +CVE-2024-2472,0,1,1b52ea4958b068d45766ffc212459cbf6a4302f92eb304d3cdb6ece10b845ad4,2024-11-21T09:09:49.730000 CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000 CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000 CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000 @@ -251123,7 +251123,7 @@ CVE-2024-24849,0,0,d6fa97d34a9f8ee5cd27ec0b205f20369d7c9f2e74bdce13f8ada0b878bef CVE-2024-2485,0,0,adb1797256b1beed5858dfc25960a724942db9de19f1b038e5acd84a4e61c2a0,2025-01-14T15:04:40.223000 CVE-2024-24850,0,0,358a48632f493dca7103f0e0c7ddd1ca29e6043f56e8ec4ac8435732328792c6,2024-11-21T08:59:51.027000 CVE-2024-24851,0,0,8a0de2d372cc00e0501058469de2ba4c4c3dd1c300c2bacaa49d22d23637a75b,2025-02-12T17:30:47.617000 -CVE-2024-24852,0,0,cacb9a3cc601a743270c3e9f2019f093018be83f1abcc74f92020f16b2ce18fc,2025-02-12T22:15:31.513000 +CVE-2024-24852,0,1,0e7379ff324f9721d02f8d9e948cb593c2e8741e491f3429ab1f15ea90efa204,2025-02-12T22:15:31.513000 CVE-2024-24853,0,0,cabcc981e6fa2d934ba79408b0a2d2dcaaaa86c51cc576fd027cf73ab1548003,2024-08-14T17:49:14.177000 CVE-2024-24855,0,0,2d2cc7e7d5fb06a33f26ef44e1f1e7a2395fd03f1ba9c19687037bbddaf43e03,2024-11-21T08:59:51.400000 CVE-2024-24856,0,0,edb9e16ab701f1d81ac7cd6a8857e1142fec8ecd54bd3157273d221937841e28,2024-11-21T08:59:51.540000 @@ -251182,7 +251182,7 @@ CVE-2024-24907,0,0,a4ea414f343ecf7afc1b453c69047fa5e86e608436cc607d44bd97223fa35 CVE-2024-24908,0,0,3fe8a4406d98df79c31854dfc70dcbb01052c410a9cc2527fc70de1a24e6240d,2025-02-04T17:16:56.643000 CVE-2024-2491,0,0,89f0ea744341245ddf2590c596f0d2277cd047aba3e8200dedbe9df25ac5534a,2025-01-15T18:41:29.187000 CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b57b,2024-11-21T08:59:57.760000 -CVE-2024-24911,0,0,d5711d8df9b6d237e83a8c89b9e1195ab47ff808bd0c0872ea602e30698250c4,2025-02-06T14:15:29.577000 +CVE-2024-24911,0,1,000ec366e410a6c31f93ab7f8a2e5fcf30159e4251e9a0263b609a65802a079d,2025-02-06T14:15:29.577000 CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 CVE-2024-24919,0,0,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000 @@ -251598,7 +251598,7 @@ CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52 CVE-2024-25527,0,0,2feec88a1a9765ad44469f5aec4158d93cab6f4269704036d841801342c53cda,2024-11-21T09:00:57.100000 CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000 CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000 -CVE-2024-2553,0,0,d4520c317cf5f55b34d936049b9a018287afee9a7311c49cd1ff45fe12fd9335,2024-11-21T09:09:59.753000 +CVE-2024-2553,0,1,574625102f38d8b2819cc74581faca98e0492649008616ccf5e43d086bdb38f9,2024-11-21T09:09:59.753000 CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000 CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000 CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000 @@ -251622,7 +251622,7 @@ CVE-2024-25567,0,0,2479aae2067cb8e8b74bd9f271cad1b096929a79210b4dd2452e7fb7b11fb CVE-2024-25568,0,0,333fdb1a883138fafe3ec5ef5628a51adf91d816de772be7c9870a36d4af4fbb,2024-11-21T09:01:00.057000 CVE-2024-25569,0,0,b037d1dac321d0fad4f682820302460ba3789c0955cd0c11614e35160f41fd7d,2024-11-21T09:01:00.260000 CVE-2024-2557,0,0,67a259b4af3e70193e67c621b23a4258c6c329ffc2454edde4f3adef49c00463,2024-11-21T09:10:00.307000 -CVE-2024-25571,0,0,f0bcb01ece624fce0bdc9c6484f12f05f24eff40c38402114790b7e6b0c4e24e,2025-02-12T22:15:31.667000 +CVE-2024-25571,0,1,a033dc338f3323de872de3be9c0cf5fa2d9aeec22dc20530918f06e8608393f1,2025-02-12T22:15:31.667000 CVE-2024-25572,0,0,3b91a9b2b3340e450f0ace2854bb810c9267cbdf3d9a3da323e758f101a51695,2024-11-21T09:01:00.427000 CVE-2024-25574,0,0,31c112accbf17d2b994dbb76497de7bac711140b2a7549d57fd0373c5604c7bb,2024-11-21T09:01:00.637000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 @@ -251786,7 +251786,7 @@ CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253 CVE-2024-25763,0,0,b88e8c350b416b345655932a9f416e922f06fbf90349fa5914aec08ad9918eac,2024-12-06T21:15:06.113000 CVE-2024-25767,0,0,0ca78670771c5475ecaa5b22e5b07acd76b8ce6bcee60635d4c63930e9338774,2024-11-21T09:01:21.100000 CVE-2024-25768,0,0,ca5e5fafb79a5045a2f311eea8b17b095a90d33f4f213631285129e72bbe41c9,2024-11-21T09:01:21.313000 -CVE-2024-2577,0,0,2c58443f93d69225bfb390b4ffc804103ea4e73a0863c5a86e905c6d91f34f0e,2024-11-21T09:10:03.103000 +CVE-2024-2577,0,1,0cffc6b89093ad2aec228544183866929252f57ef89cf6d6524c201756e21d21,2024-11-21T09:10:03.103000 CVE-2024-25770,0,0,398f17523c9506a877868692f911a4e483227a4dd1226854f612f5460a815c77,2024-11-21T09:01:21.520000 CVE-2024-2578,0,0,dcf3a8c7eaa2ed6078005c88780e68cc6d17ce19d2e3cc6e2a9c1f77cd939559,2024-11-21T09:10:03.243000 CVE-2024-2579,0,0,f36838f8c9e0fe4fa638d23b3b6348547666dfbb79b14e037d8d241191eb52f7,2024-11-21T09:10:03.367000 @@ -251972,7 +251972,7 @@ CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000 CVE-2024-2602,0,0,b857460336cfaac03a8a27b20498855f2d404a18cc4025919d0ba50a6e4b42f9,2024-11-21T09:10:05.910000 CVE-2024-26020,0,0,c98643c2f54952d5dbaf94e38093f64912c8ba6dd48c8f46422b5568790b1c7e,2024-11-21T09:01:46.630000 -CVE-2024-26021,0,0,d3d7563a706b88712310e97a1ac3145ad544c19bd53641b9802aae7b008a583e,2025-02-12T22:15:31.830000 +CVE-2024-26021,0,1,37b945d0d909e03a984f0bc8b11c74c1b75badee8aed7342a3fe0392dcf38548,2025-02-12T22:15:31.830000 CVE-2024-26022,0,0,62def4391953a1347cbd7cb8238b342a4564ced73a07832771fb61c2cae55a69,2024-09-06T20:16:27.330000 CVE-2024-26023,0,0,ecca437928ab5939dcb72afcd1f9882735a76a4700af515a957792560ea24f83,2024-11-21T09:01:46.910000 CVE-2024-26024,0,0,9a14a4249aa54720419704a007104a85741c0e50b67ccf19857114c30b57ec4b,2024-11-21T09:01:47.107000 @@ -251992,7 +251992,7 @@ CVE-2024-26036,0,0,c89078d2640557d42002c59b6c23f030456f9cf19ccf42c7bd166a37f62ed CVE-2024-26037,0,0,ee3b187d755281195fea0d34713edfc54bd1e8caad64ffdf4172fb2e73159f5a,2024-11-21T09:01:48.790000 CVE-2024-26038,0,0,99f155613d21632a277dfd118476d120f86467a9f4a5cf62b544fefa8a620499,2024-12-03T14:38:32.390000 CVE-2024-26039,0,0,0758c554d26e899a855564f8b9668eba7e11a31c7d695417bcfe5e8499e97843,2024-11-21T09:01:49.037000 -CVE-2024-2604,0,0,9b96abd65fe71f9bc76911765a179f99be7d2671311a035c832b8d8f7ec1491f,2024-11-21T09:10:06.217000 +CVE-2024-2604,0,1,bc3d2cfa08c69ef2d30c263dfbbbba9c1ae9d290c03b7696e00266258712a075,2024-11-21T09:10:06.217000 CVE-2024-26040,0,0,ee064050749987ff4e3490a03c514c88e4f33bf4ea6ceebd750b9b5d4a90fc6c,2024-12-03T14:37:58.917000 CVE-2024-26041,0,0,88991b2be8dfad92ffdc3159342033af65617a54b341f1ea4fba1cde1ba2b7e9,2024-12-03T14:35:05.120000 CVE-2024-26042,0,0,901d79a01b4e04fa43772a4abfbf6e0bb650c9e04e0f866ada0dc0dd8fdd36f0,2024-12-03T14:34:28.220000 @@ -252718,7 +252718,7 @@ CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000 CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000 CVE-2024-26899,0,0,b25c468fdd9a5dde607d7e60e93a4f4378e05bbaed78a1b87031bd334bf1cf78,2024-11-21T09:03:20.160000 -CVE-2024-2690,0,0,7772a732f877e8d72f441b418dfdf2daf8e2505f3807dfe04f000d12282043a2,2024-11-21T09:10:18.073000 +CVE-2024-2690,0,1,cb8394cf256eaae4e0bb95e296623bc5e9883d493c3bc191cade85f8fd8f451e,2024-11-21T09:10:18.073000 CVE-2024-26900,0,0,89eb36b4021cc9aa920b6f52a26d6c2b349256cf670208b8b8832bd853f9efc2,2024-11-21T09:03:20.300000 CVE-2024-26901,0,0,ce718d6c1afabba164002b2247fbc0f74d9cb4434a3cc5019738d6e3fcfac2ba,2024-11-21T09:03:20.453000 CVE-2024-26902,0,0,3fd3400946dbfe9fc533be7b14f34ebccba35c6430809af9d495947e583d5c1e,2024-11-21T09:03:20.690000 @@ -253033,7 +253033,7 @@ CVE-2024-27190,0,0,4dd7b45e54db536c4c1ac27098c3a62ae0ef3aa3e6cecd975e6330cc3209a CVE-2024-27191,0,0,7e1a337757b8aff8d2dc69e1e28fb2265d47c37e53b8f0b5f2b0f8fde7334696,2024-11-21T09:04:03.993000 CVE-2024-27192,0,0,767670ef275580ce021e633de9a65889e976bf6dca5c2f5778f38bc12d297187,2024-11-21T09:04:04.123000 CVE-2024-27193,0,0,f07656366dc531df102a1404f6e00426e458de4576b2777141c911593e2bcd50,2024-11-21T09:04:04.250000 -CVE-2024-27194,0,0,ebcd81c443fa6bec97b34b74a40634a8c3555a9ab55349b11cec76932c7f5f5a,2024-11-21T09:04:04.373000 +CVE-2024-27194,0,1,3b3b95ae5f3ac8c153a8afac08adae95e7b7ccdc0a032278c805a2a29b6c32a4,2024-11-21T09:04:04.373000 CVE-2024-27195,0,0,68f85d3e1201e3452938e14e0e91cce1f14d6d9125dae2a69df328af01a2534e,2024-11-21T09:04:04.517000 CVE-2024-27196,0,0,c974b6c0b1f82a6c341ae450a21ff1f8a075bfc0feac22ce9dc831baf4cb8b9f,2024-11-21T09:04:04.640000 CVE-2024-27197,0,0,08fc2d714f1d12ab320703fdbc50d6a91db99df17169281351a6ffac5a71715b,2024-11-21T09:04:04.763000 @@ -253329,7 +253329,7 @@ CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab04 CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 -CVE-2024-2754,0,0,cc2292d8077675ecc2c9299c0518bb6cf96aa883088f48a6efb0e8cfe1805888,2024-11-21T09:10:26.530000 +CVE-2024-2754,0,1,7d8d4f5a2d4f72cb98a0a5ce1488f82fcaee7d8e42d70a3878c3fdc55b64191f,2024-11-21T09:10:26.530000 CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000 CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000 CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000 @@ -253448,8 +253448,8 @@ CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0 CVE-2024-27776,0,0,ef49ef17c1210e0ed2c1ff489a27f0662db66dc8a6e90113cd624459aa34be3a,2024-11-21T09:05:02.433000 CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000 CVE-2024-2778,0,0,da9799ba1a896260f3966e85cd8ba6bdf1155e8b3eb8fb7ffe9ea6d0361cc9d7,2024-11-21T09:10:29.870000 -CVE-2024-27780,0,0,a3c2c5a5eecdcdf6c7f7cfe0176fe8b230fe06174ed271683d26c9b2036a7101,2025-02-11T17:15:21.850000 -CVE-2024-27781,0,0,e2b1ed95ce7947ec2133d0c138dea27566f42e8f1c3ef9424e45cf789092ccd6,2025-02-11T17:15:21.980000 +CVE-2024-27780,0,1,f04cd8a4518fae52b47e1499947545d117e7ab549094d2b1c1a46aabc5c3aa05,2025-02-11T17:15:21.850000 +CVE-2024-27781,0,1,0130e91964b45c066f777dfb4fe85552f6a357216c61f934c4b42ddf6711019b,2025-02-11T17:15:21.980000 CVE-2024-27782,0,0,b01afce97382f5347b598b12017d99ef6ba8abe65ad6d5215e9994d037f58038,2024-11-21T09:05:02.573000 CVE-2024-27783,0,0,f4ab6f1bc78e2b58465d6941ea5ba1a40edd430586869d7f6403e5f08823a681,2024-11-21T09:05:02.727000 CVE-2024-27784,0,0,05b73ca80afec01627c20e6d7f3e5b351af6eb724ec1bec4bf87dc73aa679b79,2024-11-21T09:05:02.883000 @@ -253528,7 +253528,7 @@ CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556 CVE-2024-27856,0,0,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000 CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000 CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000 -CVE-2024-27859,0,0,add02e341dfcd0209647bce02670f08753b79c7a590a8c30c0018150a40a284a,2025-02-11T15:15:17.040000 +CVE-2024-27859,0,1,1c22629af303da5eacb412f4faf65eb3b45f9544979366ae0760ea33b5d08609,2025-02-11T15:15:17.040000 CVE-2024-2786,0,0,fdc7011c4f0b705afb5fcd1f3a67915269e31c824586b5ff624ca764a8b78249,2025-01-07T18:17:10.187000 CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000 CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000 @@ -253771,8 +253771,8 @@ CVE-2024-2811,0,0,7ca649efe599a5e9071e040230504b89a79c0c012685e27d28102b0fe39088 CVE-2024-28110,0,0,02bed29e56bb2de858376e909bccd6140b6410e0e47c817033bde5090de34af9,2024-11-21T09:05:50.160000 CVE-2024-28111,0,0,099cc0d37be85ae64372808397b692b5eba198e1e4d4fb2a3d8b654e7c3d3b33,2024-11-21T09:05:50.300000 CVE-2024-28112,0,0,6392a4bd3c2c9ff4058d8417c21cbb729ef04ae5623dacc788aba6d2230d3901,2025-02-13T17:12:42.737000 -CVE-2024-28113,0,0,9b8c73c9ff3fea79e3fbcc33b04dde7743e184772506cb28653635c6d809e8b7,2024-11-21T09:05:50.570000 -CVE-2024-28114,0,0,0b7402e2578b0040178c2684509e39513cc4c2ae64c74eb0e94b399d23f36ec5,2024-11-21T09:05:50.730000 +CVE-2024-28113,0,1,242345c5a7c05643c8552ec8949a72af78cfd10b31789018575b3b5bf3509171,2024-11-21T09:05:50.570000 +CVE-2024-28114,0,1,1c68ef300c720fd0e2779aa4d4bbc4e06c19751805537132151bdc1431bf65ec,2024-11-21T09:05:50.730000 CVE-2024-28115,0,0,22c183804756e395faece574c368d4cae136c9c5ac642ca5fa899dd4c72bdc38,2024-11-21T09:05:50.867000 CVE-2024-28116,0,0,06ab2acc19d3b1b085641d8b752eae550641fce1928137c9f5fc8bf2298f4ec1,2025-01-02T22:57:51.510000 CVE-2024-28117,0,0,25a818d5b218e308783785ed799f95754af9a77920e6452a88595579929a615b,2025-01-02T22:58:56.197000 @@ -253785,7 +253785,7 @@ CVE-2024-28122,0,0,e3d16868d7774e283044aa0f03af6142658f7d2fd8130130495f2d2fa9dfb CVE-2024-28123,0,0,5099212f57d318f83757e71a466b9bdf4be2bbcb864e78e89326cbc09e003e14,2024-11-21T09:05:51.980000 CVE-2024-28125,0,0,a964f3be7fbf693cabfab1cab21a25243643637360f3b4dfc76dfcb0e2a98c0a,2024-11-21T09:05:52.107000 CVE-2024-28126,0,0,bdca6710977b6c4816da9b6611740c12aabc24c1dc8b3f05e1f936957ab23ed5,2024-11-21T09:05:52.337000 -CVE-2024-28127,0,0,7a8d1745b63aa80e27efe7ef0ec060a273762cb546f254d6b5030c4c878e6ead,2025-02-12T22:15:32.137000 +CVE-2024-28127,0,1,1dd259a2284ac2e004cca75cbbf9660b432fb75a0b2f7d22f15ce33cd2d4e285,2025-02-12T22:15:32.137000 CVE-2024-28128,0,0,905e2e65bd3c88d0062f27c4d32549f77f596cb69c56f5abf237d71a5aec9ff8,2024-11-21T09:05:52.533000 CVE-2024-2813,0,0,f6cf44b143c45f427a4e19d3a3c84fafa892be9cdc350a85d194bce1d00ab565,2024-11-21T09:10:35.157000 CVE-2024-28130,0,0,69640234ddd8399b998b711ea548de6aa4b7b8289789fb11379a6d5513f1b0f0,2024-11-21T09:05:52.640000 @@ -253931,7 +253931,7 @@ CVE-2024-28303,0,0,cc9962bb9c810b91c2e702a1cd75dbbe01254ddcbe7ebada5a07f031ba243 CVE-2024-2831,0,0,46af6348b329d2dfc198fe1539e3605e6e4c554559dbe5d1d756cc0cf6bb1a4d,2024-11-21T09:10:37.903000 CVE-2024-28318,0,0,a3097b47a933abcb0bedd806254eb8371d5cdbce9b80173dbc5f3461847aae12,2024-11-21T09:06:10.323000 CVE-2024-28319,0,0,adbb9262fe095c1ee41b752e8e7ce767756f12f9e01c77d91fcf8570d7a4e12e,2024-11-21T09:06:10.557000 -CVE-2024-2832,0,0,587988d554d5a6603cdaf0c7a9b3938f2cfcd5075983e932eb5098786681d997,2024-11-21T09:10:38.020000 +CVE-2024-2832,0,1,5d907d9ba66f185faca0a75e9347295f2d6eb86c36962ff89343f7ac82cd3cdd,2024-11-21T09:10:38.020000 CVE-2024-28320,0,0,156b627473e5ac6bcd288f42ccc346804a8651dfc17bef3f6969a7ebea1ce1a6,2024-11-21T09:06:10.710000 CVE-2024-28322,0,0,4d8f57dcf95c839919bd19e58d706ebb428b316858edbbc8a9f943ea2521b9e8,2024-11-21T09:06:10.940000 CVE-2024-28323,0,0,9e5e2a70f2e5e23491acdbf55cb239ce131de5927f67f0ce1e28bc2023e2002d,2024-11-21T09:06:11.183000 @@ -254000,7 +254000,7 @@ CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f72 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 -CVE-2024-2849,0,0,be0d823eb91295b3ed3558d150192e3f464598f63342cd150ebb9db2bd196ffc,2024-11-21T09:10:40.303000 +CVE-2024-2849,0,1,80bbcec0e80b63db2644b6fb7139b90a8664f7a4ff1e3076cb89ee2bdc2f8e32,2024-11-21T09:10:40.303000 CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000 CVE-2024-2851,0,0,f1913ee0996b40befd8b28b4cfd22ff585e0781b3db3dfac02bb2a05a881b3ea,2024-11-21T09:10:40.600000 CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6a01,2024-11-21T09:06:24.533000 @@ -254146,7 +254146,7 @@ CVE-2024-28771,0,0,a0137eeff8a509a8fdb4e37fb64616fdf842469ff599fe3f95344835ee73f CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 -CVE-2024-2878,0,0,e71e1b6b18416c1a4fac2b9b4bead5166c5072c6f5ee0831e3bfd20416e2d7d2,2025-02-05T20:15:44.637000 +CVE-2024-2878,0,1,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000 CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -254333,7 +254333,7 @@ CVE-2024-28983,0,0,853eb2b12a9ad3bf106c30e0e1489518e0cbe87352e67323535e3cf905652 CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000 CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000 CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000 -CVE-2024-28989,0,0,f8726514c482d01dc3a5d5cbdacb79c21a49db04ec93e2ef378ee7cffb575d85,2025-02-11T08:15:30.787000 +CVE-2024-28989,0,1,3a5fbb78722563529bbe91969fe23a10daa5e0319513d9ee987c051de5cf3047,2025-02-11T08:15:30.787000 CVE-2024-2899,0,0,7cc8b0c8010df9303c19753fd59ebd4f763921e3eca5004a65c9ef3e83d4668f,2025-01-22T17:52:49.950000 CVE-2024-28990,0,0,cee78bb41c487ff5287bc312509ab2a1c6447da39e21d14ddee35c76b2524b3b,2024-09-16T18:05:28.957000 CVE-2024-28991,0,0,162d93769e8b87d4db4424fce1391a16d64fa7b50a85c14e446e72b5f1e1c43f,2024-09-16T18:06:20.037000 @@ -254514,8 +254514,8 @@ CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e CVE-2024-29169,0,0,d2a39941096d1cea2fb67256e6d405f7dadbfc7f6cf149bb994f4d72fa9e7ae2,2025-02-04T17:21:08.633000 CVE-2024-2917,0,0,b5f4311ed824c628747b6d6d6b66642d4215c934be667bd71791c2a5029b2dec,2024-11-21T09:10:50.053000 CVE-2024-29170,0,0,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000 -CVE-2024-29171,0,0,0c7b29e322ec5ec7605787faa00e201458401074d4e8ee1bf7d931eb58bcb08f,2025-02-13T04:15:07.557000 -CVE-2024-29172,0,0,6539f73e12d6daaa4dc2aff6ade5b3eb08181a6d7b325f81e072d01b7819dca3,2025-02-13T04:15:08.653000 +CVE-2024-29171,0,1,9193d5225387baf02b80fe5d52fe873b0cb2760f99b8a1870df710cfee8ceea8,2025-02-13T04:15:07.557000 +CVE-2024-29172,0,1,06956eede9ca6480ccc6cc79448b0f192270a27224802bb283756300480e0503,2025-02-13T04:15:08.653000 CVE-2024-29173,0,0,8f66bdd18b6f7192b1d98e3f67c2fa7b88807a5fecb3bffa3f651ea2750e1735,2025-02-03T15:08:59.513000 CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000 CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a616,2024-11-21T09:07:43.653000 @@ -254560,7 +254560,7 @@ CVE-2024-29210,0,0,0b9e1da3e79f2303b1e56f9a5c9d0f9d5677bc9bee283f6034952eed6ce58 CVE-2024-29211,0,0,0331567c6af8fd83b1e0a24feaf54333b88f51ecbe3f9d759c864c4433a7edc5,2024-11-14T19:09:01.213000 CVE-2024-29212,0,0,57ad6f456ad8c4e58aee0ad243fdb4a1692ad3d121ea88d523c26b7fe273ad46,2024-11-21T09:07:49.800000 CVE-2024-29213,0,0,61bda94bb80bd9efe67a9b541d0650b3359ce1773787183c478a7e9e9ab5bce6,2024-10-21T18:35:11.263000 -CVE-2024-29214,0,0,75163c16789f5e60becacd1eed045be4ae4ffb02f6cfcde6415050636375c295,2025-02-12T22:15:32.283000 +CVE-2024-29214,0,1,e899680ba18c3d8f52a09f3672c1d79d78304725f284ee4aca7d4edf4d72f391,2025-02-12T22:15:32.283000 CVE-2024-29215,0,0,a59670544aeab731fa7af3698a433038d405eac09c2d1eca820d543764a65d04,2024-11-21T09:07:50.043000 CVE-2024-29216,0,0,e44e229411bd5856010008f153d4c35e919f7a6598100ee6516223b5fee2cda5,2024-11-21T09:07:50.187000 CVE-2024-29217,0,0,4ea4b901287d41ebffbcf3f192058b6981ed122912e836284758bb50f222ce01,2025-02-13T18:17:50.230000 @@ -254569,7 +254569,7 @@ CVE-2024-29219,0,0,6cb3862cf8e230d62963f8de8034eafbf8d60054c65832a91b376f342bd42 CVE-2024-2922,0,0,83a5afc25d53992abc547c7cb27befd6cb6f77e10eac60e242613cf364f65aa9,2024-11-21T09:10:50.853000 CVE-2024-29220,0,0,d56b29bab759f632fe7a8d7605fc23ec1fd1d59c76310b000cb1d69498dd3c7f,2024-11-26T18:15:19.007000 CVE-2024-29221,0,0,719f02c93cb7da40e2b1e83286b78d24631abaf4b186686cd86793f230a27b56,2024-12-13T16:21:08.447000 -CVE-2024-29223,0,0,346935bf8be6a1801700e935fe905a0ecc30223e58861338986e37df973a2458,2025-02-12T22:15:32.433000 +CVE-2024-29223,0,1,799772c2d4e8867f39f2b8f345d76745d0a55ee9ca545e44c02655d5ee194a7d,2025-02-12T22:15:32.433000 CVE-2024-29224,0,0,51a97a451d23c0ecf1555d53913f72b7a59110c340a56174e31f0dd604a53a88,2024-12-17T22:20:34.167000 CVE-2024-29225,0,0,987e1bbdbd14475e79c4662d58c64e48774254cfe2bcd4f86e976712c6a388f6,2024-11-21T09:07:51.173000 CVE-2024-29227,0,0,31b77c1c8f454c07924ac023a7c3d78c956f56b867623e641096ede40d6734c2,2025-01-14T20:13:16.757000 @@ -254606,7 +254606,7 @@ CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524 CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000 CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000 -CVE-2024-2930,0,0,30862fb3142d5ea5eb8fc279ff4e7a8cca2ee70b52462de4decfe58919de3f51,2024-11-21T09:10:51.980000 +CVE-2024-2930,0,1,6664f147975063a07dcc29c53c207c9ea3b0aed5e2de65f4ee1816ba878242e1,2024-11-21T09:10:51.980000 CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066114,2024-11-21T09:07:55.647000 CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000 CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000 @@ -254615,12 +254615,12 @@ CVE-2024-2931,0,0,06ccc2dcd781809116ebbd74f9b3f6ebb8a8544b117075c949793d8040784f CVE-2024-29316,0,0,fcf08fc934238242be85211e527308a25a1845e213d3df0567dedd77f3e73990,2024-11-21T09:07:56.540000 CVE-2024-29318,0,0,6b7a8de3b5f73b6e00b5cb422aecae397836bdfb0435783acd4fb94fb5e7b3ca,2024-11-21T09:07:56.760000 CVE-2024-29319,0,0,69fb3b2cb652eb32dd1d717d0873133a6783ff4c6e6a16c234669dea86327af7,2024-11-21T09:07:56.937000 -CVE-2024-2932,0,0,a926383c67321ec61cbead5b81962772595cc9531055b1ee789e804a9da82637,2024-11-21T09:10:52.247000 +CVE-2024-2932,0,1,3d8fa2ca8cef04776b0156545950056e9fb0be6e00cd4fe1db4cd99986d942cc,2024-11-21T09:10:52.247000 CVE-2024-29320,0,0,9982221ae2ee12973c2d99f649aa7d2d34252735124519ff1ea14f9a4a1f1f89,2024-11-21T09:07:57.167000 CVE-2024-2933,0,0,aa36ab561887564bee0d2b5b8199cbbcfe3b5235044831189f4ad1e0368010a4,2024-11-21T09:10:52.387000 CVE-2024-29338,0,0,1aaa1318dec73367eb36a5d0cd1abeda9170c9dd8d554a9376a051f01884cb6d,2024-11-21T09:07:57.383000 -CVE-2024-2934,0,0,a79132ce1f770e0dbdf5b3d9a28a95080f08689160653590343cd59f6873f28b,2024-11-21T09:10:52.507000 -CVE-2024-2935,0,0,87d4d1a948c9f460a27b0ef24185f29f2a8adf55150b5faacb6d45570cef9621,2024-11-21T09:10:52.647000 +CVE-2024-2934,0,1,10f3e23b5b64aeec8fb2216c4864f1d9d80324e07830cba6d5f245af9f906be8,2024-11-21T09:10:52.507000 +CVE-2024-2935,0,1,bca26df077a2e6144fab89178b1b8ce212817f44efda38492b2bc35e3dc1f66f,2024-11-21T09:10:52.647000 CVE-2024-2936,0,0,e1637e9751cd50192c775246bed8a5a935eb4d558daee53b8066da607cc107cb,2025-02-13T16:31:06.233000 CVE-2024-29366,0,0,a4c37234f5475bf3e0db182bc2ff356efc3d9687878407fd7f29d2e5e10e4975,2024-11-21T09:07:57.600000 CVE-2024-29368,0,0,a20f2f01e4025099be3f62f18aff11b356a455644c555ff93a8794b70467bc8f,2024-11-21T09:07:57.823000 @@ -254703,7 +254703,7 @@ CVE-2024-29515,0,0,4c7d3b5dc409348876dc1c9451a2b74aca5498a484337cd93ba972321229d CVE-2024-2952,0,0,86f83cf0cce7a7fbabeb7daf8a8b0958c74c3422adf9a77157f3abb0d3c7274f,2024-11-21T09:10:55.170000 CVE-2024-2953,0,0,fe0c95ef397a97d7bbb4e0de661b60ec52f5f63cc8250bdaa006a983beaef204,2024-11-21T09:10:55.313000 CVE-2024-2954,0,0,dbb7d9c4d9f4170c1a78605c6d88825f4158e4842cdbaac47670c8eafaccd6b7,2024-11-21T09:10:55.450000 -CVE-2024-2955,0,0,f29f108a1c2b5eec0ef6b7793c0d4bd2bdaef45f9b1b51a3fa709392b8cf3aa3,2024-11-21T09:10:55.577000 +CVE-2024-2955,0,1,420657a43dde0ab938ceaddb77748ca7f47b9e7c4f2c6d78bbc949386f6ee08e,2024-11-21T09:10:55.577000 CVE-2024-2956,0,0,ee35a1837ec4a4cb126daa569e6aec5c705f36676ded3fdf2be5c2b9fcde5ad5,2024-11-21T09:10:55.720000 CVE-2024-2957,0,0,f9a1c843e62657fa10197867d25d9608c11fa033333e2c1c375aa097ac937bcc,2024-04-24T16:15:08.880000 CVE-2024-2958,0,0,c63f70cf4eb3b27a7b0a6f8d25ef39152e42c6ab788235eb6159a513a87f6ab5,2024-11-21T09:10:55.860000 @@ -255166,12 +255166,12 @@ CVE-2024-30132,0,0,54d98f7843dea94372252c73cd7990d839c54a6dd19fa7023c76c99fef58d CVE-2024-30133,0,0,e08425978db173a70b5a5b6cbb9315d57d44524a2c8d71711218342162ea4294,2024-11-13T17:01:58.603000 CVE-2024-30134,0,0,0cef8ce1964aae6b64f5864e5e70c720c24b9d27f4ed9dcc50f333c0826d36fa,2024-09-30T12:46:20.237000 CVE-2024-30135,0,0,22cdcc2f12827ed25b0e7c8dae426864d180e7d98fe178047460a585e791d16e,2024-11-21T09:11:19.007000 -CVE-2024-3014,0,0,9b69f90623365e6f2b7527d06e67b86d2db855612a63cb97ba93b05899c80dcf,2024-11-21T09:28:40.910000 +CVE-2024-3014,0,1,c8543ecae1aafcc51ed26c316497f44c81b26f823cbe6a92173a4d15837dacd7,2024-11-21T09:28:40.910000 CVE-2024-30140,0,0,97eb4e1fdb06d6da2480e9307bba333bc05d393382a682951a75739434930a5b,2024-11-08T19:01:03.880000 CVE-2024-30141,0,0,366cb3a10440e3b30cd871e21bbc3f740fac05dab178efaf9985b3ce33a272a9,2024-11-08T19:01:03.880000 CVE-2024-30142,0,0,363bc8d9ef2cad1109db0231f1d9e043ce9476ebb48510d5ff80d7b6f8e54e19,2024-11-08T19:01:03.880000 CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d679,2024-11-01T12:57:03.417000 -CVE-2024-3015,0,0,bceac85cb426e042ac90e6af76071494e2aec23317698a112e2b97a34d86f8d6,2024-11-21T09:28:41.097000 +CVE-2024-3015,0,1,05f5bb37dc8a3d22ba33d8caf2864b7f47e6f12d954d75d0efa934bd109df0e9,2024-11-21T09:28:41.097000 CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000 CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000 CVE-2024-30158,0,0,95d9ce829a91f171649545534b80b43680e23fd13b3b02f53cdc5be44785afcc,2024-10-25T16:30:09.927000 @@ -255227,7 +255227,7 @@ CVE-2024-30208,0,0,321298c6b7af7d77c3325579105e5107ec9351301112fceb4ec5139171fc7 CVE-2024-30209,0,0,ba2e037ae866c0f8e19f9a3711c41a43737060d5df5e6b04219eb9e16ecf5cf2,2024-11-21T09:11:27.037000 CVE-2024-3021,0,0,c64d16447d9dcc7f24589371d3498df62e6ba0c645dedef2f89fdf67b3627425,2024-11-21T09:28:42.063000 CVE-2024-30210,0,0,3a08b9c96cb03cec454cac12dbca9a8c5edd82e12a8c0690eea58e499f6599f9,2024-11-21T09:11:27.183000 -CVE-2024-30211,0,0,6d912e2ee56955c03be8f1ca2e037f419007030ce2098a5c7261f09b8fd8bd57,2025-02-12T22:15:32.587000 +CVE-2024-30211,0,1,78b609edaab894c17611fa75ac01e4d35027e5629d6a786a9cd885b7c30ea101,2025-02-12T22:15:32.587000 CVE-2024-30212,0,0,c6295405f4ab389a3bff2b8965d1c9443fc59d1654ed4157dd33277efb1bc9c4,2024-11-21T09:11:27.310000 CVE-2024-30213,0,0,81cccf16a59749811319b7d8ccdb8da9e5d700a9f128f9fa6df5d2fe3870fe29,2024-11-21T09:11:27.447000 CVE-2024-30214,0,0,b906288fafe2f4886559fc63d602d720565c2a460e6118d70191a96450bb8edb,2024-11-21T09:11:27.673000 @@ -255435,7 +255435,7 @@ CVE-2024-30416,0,0,142a4699c921d39a6a1085b38da457359d5ae8dfbc5ebeccb2654877c0be3 CVE-2024-30417,0,0,2cf21bb8014d9ec6a1076bf83313210b449483943717552923dc32d6eba112b8,2024-12-09T18:04:36.110000 CVE-2024-30418,0,0,ce97772cc55f1a45081c10537d2ef24ef510491122d6cbf04b45dd6e108ac342,2024-11-21T09:11:52.750000 CVE-2024-30419,0,0,4ce0d791ec8405789a5547d96555f558222fea0d6abb07ca21579b1a05f2e1e4,2024-11-21T09:11:52.950000 -CVE-2024-3042,0,0,1035f79872360bc59d8efaa2fba122980688369c23f92dd365edadbcbff99c50,2024-11-21T09:28:44.810000 +CVE-2024-3042,0,1,fa44d97de69aadb81436d089ed7bf08945f10155ee5167e7285e098cda829b81,2024-11-21T09:28:44.810000 CVE-2024-30420,0,0,403a0bdc356df9601fc5ecf185347c2ed0664384c1bbee678bcce76af9aa6137,2024-11-21T09:11:53.143000 CVE-2024-30421,0,0,7afd28cf0a598ceb77ce8100ff766dd125654c211246f23a4b533003549add26,2024-11-21T09:11:53.343000 CVE-2024-30422,0,0,f01c0a64f32f26d00ebfc1ca76e0b1a2419fd37cf4fbbeb43bb30f715e41b580,2025-02-05T15:44:01.870000 @@ -255863,7 +255863,7 @@ CVE-2024-31062,0,0,13e4515ecf9fcb213077f696f7680dde95f02f5a87629595a47a0df0986fe CVE-2024-31063,0,0,b1a298bb0ba6c4c6d6137ab2a5b0c69d571b1288ce8f85730331fa203124c17c,2024-11-21T09:12:46.863000 CVE-2024-31064,0,0,4412d32292f4f1a606e86dde19af7fec75a1aa99b33a1873a73f9908346823b3,2024-11-21T09:12:47.083000 CVE-2024-31065,0,0,a00112f4528754b8c1afee754696d282ee5e69a60575a305b812e8485c2614ed,2024-11-21T09:12:47.320000 -CVE-2024-31068,0,0,a6cea92f6f7dc33b55815e41684c6e2e1ec47a8e7ccc61330f0590ec34f88609,2025-02-12T22:15:32.747000 +CVE-2024-31068,0,1,d076246b383feb46e4e8a93222de57f716b2e170f8b79c6f79b95b8ca915c385,2025-02-12T22:15:32.747000 CVE-2024-31069,0,0,fb53502e6d7be7a5a82d5cf9033afaa2c76b005b5ac9eb9741b945f53d80a4ae,2024-11-21T09:12:47.533000 CVE-2024-3107,0,0,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f19e,2024-11-21T09:12:47.663000 @@ -255937,11 +255937,11 @@ CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56 CVE-2024-31151,0,0,c8e26cb5ed6978918a8d1613d27ab52104f4526b7030bbf53b06c79c6dc8c489,2024-11-13T18:19:26.453000 CVE-2024-31152,0,0,cc4117e6b18b0ecba71b54acacc4e5dadac3f57360de9df64e46f495cb1e444f,2024-11-21T09:12:55.860000 -CVE-2024-31153,0,0,c7e29e67243d6990737706f6c42c25c1b02a37d3f23d78a88c6cd098e3bf0638,2025-02-12T22:15:32.900000 +CVE-2024-31153,0,1,424660226780c38f86a9a1eaf214d1ebbd20cfe639bb327a83ab9cc4fc8e8f31,2025-02-12T22:15:32.900000 CVE-2024-31154,0,0,3de23bec22ca3d834838adfb94cfbba600144a24e0ed4809e5c78539a55fdaa0,2024-11-15T14:00:09.720000 -CVE-2024-31155,0,0,6a095fda672da021d98fd0b5f249799f361ba3ee00dcce1af3ee1f49c6b0e058,2025-02-12T22:15:33.050000 +CVE-2024-31155,0,1,f8a6ed7feda1b2af25ba70053d4b5de9bf32ec33745c3cbaa6135398ecce8819,2025-02-12T22:15:33.050000 CVE-2024-31156,0,0,3a0b783c9ac720f743a65169c3dbf3b752abca84fb06686f38385be2e0b538ff,2024-11-21T09:12:56.110000 -CVE-2024-31157,0,0,0f021729c454de975a4b1d4bcf66adc4a955ec021e86d37439770e38bf6b698d,2025-02-12T22:15:33.197000 +CVE-2024-31157,0,1,a9adc96a663c1f4f48a92124b3950ceb9bc8319c067f00b3316573c3b4ed626d,2025-02-12T22:15:33.197000 CVE-2024-31158,0,0,f9e7f4412c1dd1ebd0eb0da31e4b498df17e718a8cc7086161634ea84816114f,2024-11-15T14:00:09.720000 CVE-2024-31159,0,0,03c6968dc84b6c9c621449721b8162808e91282b21ae57f781c1a323ad26b62c,2024-11-21T09:12:56.343000 CVE-2024-3116,0,0,b91a582f6a01f93260e3574dee05f49654acdbf2ae873a0b0cbd2cfd6f666a15,2025-02-13T18:18:09.673000 @@ -256086,7 +256086,7 @@ CVE-2024-31286,0,0,8cb4d2776a899976f4b52fbf3c33f33f7868f31fa4de397d72adeff1eac66 CVE-2024-31287,0,0,6e255035924784963a55950bf126c2572390ab8e81fe7fd85d468acc0be12a0a,2024-11-21T09:13:12.063000 CVE-2024-31288,0,0,2b19b0e014e1e4912faa218f24b28c2de879b6c8414f0ed3a63b94bdcb56dfb5,2024-11-21T09:13:12.183000 CVE-2024-31289,0,0,88d9c29509f6f719a6479864ae9ee57dd29a7f2d90461fb049d2035e0db0275a,2024-11-21T09:13:12.307000 -CVE-2024-3129,0,0,81f130e894b7efd13c9d3c538abadf6522974591924d1d900b4052870a96795c,2024-11-21T09:28:57.870000 +CVE-2024-3129,0,1,5e12b69e1724075d04f87fcd205051b40b1f25e928f33cd080b63046ae58ebae,2024-11-21T09:28:57.870000 CVE-2024-31290,0,0,a3b16a01eedbaadee93677d6efab2ec7e168b89434364778b22224ed2f482e98,2024-11-21T09:13:12.430000 CVE-2024-31291,0,0,7867576f6e716d6763fc5a9248e4282573409254821978301a641b3c05f6b233,2025-02-04T20:40:37.137000 CVE-2024-31292,0,0,986b0ab4060b29cfcfee9fe97b6b0ff950c81bb21a038d80f5fc683b5e6c2812,2024-11-21T09:13:12.690000 @@ -256304,7 +256304,7 @@ CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916 CVE-2024-31502,0,0,e1a3371156b5bfc652018b1d8fcd99dd9bbdd2be7fa3fdac29255561faa54a60,2024-11-21T09:13:39.480000 CVE-2024-31503,0,0,518cd08ef865de234cd65cfcb97b45b19d6b39872e738ecf53628254de118758,2024-11-21T09:13:39.700000 CVE-2024-31504,0,0,e609fdd3d56331d45ea8d49c7af4d1de4b29d053dc7ca378918a58ec72a1ae55,2024-11-21T09:13:39.917000 -CVE-2024-31506,0,0,cd17ea2848d5ccec38bd35723f7d11207d5bdaf059ac84bc39dba582cc8ff9f2,2024-11-21T09:13:40.153000 +CVE-2024-31506,0,1,202ef4bc66e0a7ae999fa116df265291b3d753f185f2487992f023f795a97e45,2024-11-21T09:13:40.153000 CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7bc74,2024-11-21T09:13:40.310000 CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 @@ -256459,7 +256459,7 @@ CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83 CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000 CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000 CVE-2024-31857,0,0,8ccaeff2e48a5a06dc8b607f81d3ae85f8bd08deb2ade42799168b9bafd37d10,2024-11-21T09:14:01.880000 -CVE-2024-31858,0,0,19a8d3c53c07de5bbd97f861e89b140f050f0b324d7a80b37145aefc827be5ec,2025-02-12T22:15:33.340000 +CVE-2024-31858,0,1,953c4b9b6ba10eceaacf68cd9ac3aeb56a4706abaac248b5b968bfcc9075141d,2025-02-12T22:15:33.340000 CVE-2024-31859,0,0,5188bfcb73daa943c532580bcafd9e1ae4e11ae27457e4083ab53378c72ba6e7,2024-11-21T09:14:02.070000 CVE-2024-3186,0,0,6a202e3b12d67ed267f46ad36df1ad5893d1c9a9eec4366d9174b91b675690fe,2024-10-18T12:52:33.507000 CVE-2024-31860,0,0,94691afad815d0c94e35d39f312e0a31084992999d666d7b6d43b4f5329859fc,2025-02-13T18:18:00.030000 @@ -256624,7 +256624,7 @@ CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce39903 CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000 CVE-2024-32035,0,0,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000 CVE-2024-32036,0,0,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597a6b,2025-01-09T18:14:46.097000 -CVE-2024-32037,0,0,eb5396ead139b696ae22f76dfb2119081bc37b5e05cd42a46b71a559dd046c42,2025-02-11T22:15:27.930000 +CVE-2024-32037,0,1,949387a92a73eceb7807931e568a1355c21b628d8d44a2415cefd9b4784da648,2025-02-11T22:15:27.930000 CVE-2024-32038,0,0,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000 CVE-2024-32039,0,0,e75d836ac2de29a0c0b50581e5d6dc6ab8a2307f840547494c81dc65cfcfdadd,2025-02-04T18:03:30.070000 CVE-2024-3204,0,0,f13d158bcc7e48b79878b6554bb4571b63a14430974be7abf4a50cd3a1dd815f,2024-11-21T09:29:08.737000 @@ -256741,21 +256741,21 @@ CVE-2024-3219,0,0,613f24a90b9d07df734e813c77dec022a198bc783ddf69b77ff7279e0db84b CVE-2024-3220,0,0,cb62f35fb890d6a2137630b575bdebb720f057fb6855e72ca11d364191332ae9,2025-02-14T19:15:13.770000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,82de9fd2512155ee1b039d671013d0c708a38fc533bf235bc5023a60a9960005,2024-11-21T09:14:35.290000 -CVE-2024-3221,0,0,37c469ccfcd488c2405edea3944c4cece27262f26ce3acd8ae4229b31da0296c,2024-11-21T09:29:10.600000 +CVE-2024-3221,0,1,8a3e7967f04a5cbc8644aa96bf5091869ae98ba4f981da9454c554a2fb9431f6,2024-11-21T09:29:10.600000 CVE-2024-32210,0,0,175315f9813fd6f2ac4a742dbd54281d7bee9ff41ab24185218217ee2af870be,2024-11-21T09:14:35.530000 CVE-2024-32211,0,0,7aeac149ce230244d2b917a1cbedf2ade22ef2010393663a9a7c7fa147fe421a,2024-11-21T09:14:35.807000 CVE-2024-32212,0,0,7cd205f7167ada2f68e262de4294c6c67108c8ee8cd5d0da8a582987800d41d7,2024-11-21T09:14:36.050000 CVE-2024-32213,0,0,19c43429bb818652ab99bbe37809d02ce3f96c90b91ce1bde49a718b22b44a4a,2024-11-21T09:14:36.277000 -CVE-2024-3222,0,0,dd1dcb4ccaee8a19b7cfdd2503d4d5ff1e79ccbeb78be83e9952b909fd924fa4,2024-11-21T09:29:10.753000 +CVE-2024-3222,0,1,5c17a89a8780551f489e31d2c851d2c5f2e00001f7e2be9d318d2ac679c53646,2024-11-21T09:29:10.753000 CVE-2024-32228,0,0,e57d95e8f71189130c733a36f368f79ef579cdde5db0685584478be60c584dcb,2024-11-21T09:14:36.510000 CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc23771a,2024-11-21T09:14:36.740000 -CVE-2024-3223,0,0,56722c9e76a9b0ffdca94ec5b76f1f953f848c3f14af14ebb6c407a466218ac2,2024-11-21T09:29:10.893000 +CVE-2024-3223,0,1,8a09fb60c59f271424290cf19e687e718d369921310815723eee4465084c3161,2024-11-21T09:29:10.893000 CVE-2024-32230,0,0,3a6294b82cd700b32f94546a71177093b3ea39c8512a95b325e1336833ebc65a,2024-11-21T09:14:36.963000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 CVE-2024-32236,0,0,fc34b21c4f3444da90a31820b43bcfe52e5dd20b58b8287749526e7c509dae7e,2024-11-21T09:14:37.230000 CVE-2024-32238,0,0,a12c22dc2403ba80ed1de919c44facc67baef0612fb0b9d0851801fd325df7b0,2024-11-21T09:14:37.450000 -CVE-2024-3224,0,0,d5a0bfa84ed5fe4876b86651122ae76b4298308eed744a933d02c9dd3d5d8f88,2024-11-21T09:29:11.040000 -CVE-2024-3225,0,0,0602c4a05668f1024cf9bf752a3032cf9230c9b83369e2804ca2357da8362cbd,2024-11-21T09:29:11.177000 +CVE-2024-3224,0,1,acafb05740ce847481d7536fba2276d9f8a8a9818421e36b2ae9f8144a1a105d,2024-11-21T09:29:11.040000 +CVE-2024-3225,0,1,01f3b17675f18d457a780167dd94c5f2717c8890ed3782f699c5fdb5381d33b7,2024-11-21T09:29:11.177000 CVE-2024-32254,0,0,27db2cf4047461feeb9a479dba4cf663e9a27869b2fe97e4d3048977601a013e,2024-11-21T09:14:37.663000 CVE-2024-32256,0,0,e878fe31c26ddc2ef1ba0d5960e20d26b67e4ede83d59e4dfc5d31992bbd2f30,2024-12-03T16:15:21.697000 CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242344,2024-11-21T09:14:38.023000 @@ -257264,7 +257264,7 @@ CVE-2024-32833,0,0,2f6b6db4ebf550ab6abc8090dd8e329317573fd251f942534bdd268f93130 CVE-2024-32834,0,0,a227e1ccf0152a47fd85db9549d82fdb8761b715ed85b010cbc316593bbd6e17,2024-11-21T09:15:49.263000 CVE-2024-32835,0,0,05b62705f8fe1947a07363b4e892df8f42409b05042069433afef41ce49f6c53,2024-11-21T09:15:49.390000 CVE-2024-32836,0,0,ea0f93a2bb527667ea20b3ee245821cb666f4877955ddb999c58bdb00d1eda3c,2024-11-21T09:15:49.520000 -CVE-2024-32838,0,0,78ad5fff7c8a99e3af60c547fd4db8c66eded26a140133d5161245ff92121229,2025-02-12T18:15:21.633000 +CVE-2024-32838,0,1,7da924939837b9beaa7b06d14b3659f9bebb0d86974d68d381ef4a50816f9617,2025-02-12T18:15:21.633000 CVE-2024-32839,0,0,effbb78e054c1e702b27672f49d98c97e8196be19e4c903bd6639cf8548989eb,2024-11-13T17:35:03.780000 CVE-2024-32840,0,0,f81f56762fcdecdeada25fe978b6c3c4e0defbd18145eaff57266ffe44bdeb6a,2024-09-12T22:35:01.747000 CVE-2024-32841,0,0,cb04c1ed9fc3a164fd94ab42162387504166891d188c1af1c4f36b0577f48202,2024-11-13T17:01:16.850000 @@ -257367,11 +257367,11 @@ CVE-2024-32931,0,0,7262373b6131b09140041a357633a042862c3c2d05bdb15c6102f74b1aa6f CVE-2024-32932,0,0,03fb6e4c4b12271acd1aacd7a0e3a7846b170d0f71885b34358047364915e7a4,2024-11-21T09:16:04.437000 CVE-2024-32936,0,0,a920e2eaad4cb1078b59e395f36060b6b4406460276e884b945b0c064520d87e,2024-11-21T09:16:04.560000 CVE-2024-32937,0,0,b6ab1f5425f3b1e104bf451b1bab49b4053a822f8579f494a4b154b8379a897a,2024-11-21T09:16:04.697000 -CVE-2024-32938,0,0,5fbc5aecf1bb3bd17204edf1f38e31d25405985ec6d5e0c0e558f01dc48afc8e,2025-02-12T22:15:33.490000 +CVE-2024-32938,0,1,6035ed7592a62ceeca75388bc0c341e36adbf89fcb86534612288e135ec3eb83,2025-02-12T22:15:33.490000 CVE-2024-32939,0,0,c463a196aa4ffbfb5d2a4b3e459b316ded0f7f6c6516bb76ad5ef95da42520da,2024-08-23T16:17:54.027000 CVE-2024-32940,0,0,9f62ba9ea89d9593b83c13575e4294425bc96ea23edbba9e716ed10164e27514,2024-09-23T14:44:21.763000 -CVE-2024-32941,0,0,b869289b5ffa47719d86e2a373eb11663a831001185766c0af4b6c0f4ac18e2e,2025-02-12T22:15:33.643000 -CVE-2024-32942,0,0,21d25e1a288b7b2777f7e0a2a19f461215ce9ba4728ff74410ec00ba7577cea5,2025-02-12T22:15:33.800000 +CVE-2024-32941,0,1,67151be3e28f5dea03f5e66d700407a7c9850f0193858b0e324acb883ff20e08,2025-02-12T22:15:33.643000 +CVE-2024-32942,0,1,9914b502cdcdd0c1c2bda48f09c8b176f1bc5f45577759a8ef7c77cf543969a1,2025-02-12T22:15:33.800000 CVE-2024-32943,0,0,c559b36f29631d781d7f0fb512e91a929507292fb2de31b044f3ca7e33ca72f4,2024-11-21T09:16:04.987000 CVE-2024-32944,0,0,c428ec58cbbca7922580b86a8a87f1543307386b8440bdea49f79c12be73d56d,2024-11-21T09:16:05.130000 CVE-2024-32945,0,0,205936e7d9cd889187ee5e83510c414305d028e03cfb5a9dfb07b21ca62b8455,2024-11-21T09:16:05.340000 @@ -257463,7 +257463,7 @@ CVE-2024-33026,0,0,7d9c4646c995d08755ded153498d16ddada321cd1186a0cb2b2dbd281e6c5 CVE-2024-33027,0,0,930403508bb2300362dc3847091f80f780f03e2c275934829fc6e2ee9af2c439,2024-11-20T14:38:17.037000 CVE-2024-33028,0,0,bae4699fa24bd0c49167cdbc5528a824d42dfb2ea2bd20205563f35fc1391a6e,2024-11-20T14:39:07.953000 CVE-2024-33029,0,0,7db5a0f9333ed0362fedbea99e3d3e2afd3821812c79b70decffeb99832398c3,2024-11-07T19:54:49.197000 -CVE-2024-3303,0,0,a0607225671b92806272c6a281f88939ccea65ca538379da28da3a8d1bf4dffd,2025-02-13T09:15:09.653000 +CVE-2024-3303,0,1,7f323854db9cc4ff76031143b345e578a18d0d62052d27b48e9fe79a50d305fe,2025-02-13T09:15:09.653000 CVE-2024-33030,0,0,97c4cd7972a9af64f9a977eaee71f74d014ab07ff6c4fd7cfca7e2e0bea460bd,2024-11-07T20:04:32.803000 CVE-2024-33031,0,0,b9ac7a932ac93cd25c1b7cc5b66be2583ce61835df3acfd1b694585564eadd68,2024-11-07T20:02:31.203000 CVE-2024-33032,0,0,cd45c6e9b4663da19a70c87fe3f8a0d813e016caaad69933ae5ba086c8c1f150,2024-11-07T19:59:54.363000 @@ -257546,9 +257546,9 @@ CVE-2024-33180,0,0,da9399b180b9c898b2bb285cf6b5a084c60228e1911eb2c12238944928c62 CVE-2024-33181,0,0,f77fa0ff338a41c5a3ea92c069373f41d26a4ee1881aedefdc2e883542dba133,2024-11-21T09:16:36.363000 CVE-2024-33182,0,0,754b1bfc82877901f30165197be14c23bbe45adf5924139bc6152a54a503022e,2024-11-21T09:16:36.590000 CVE-2024-3319,0,0,6b2384a192ca6a5ada4bcf578ef4395282aa89a8c79f10a6f0748f979a25337b,2024-11-21T09:29:23.250000 -CVE-2024-3320,0,0,f48de4d4ca0aafcb63143c8f586110d62ba23772f9dab562873977611e91133c,2024-11-21T09:29:23.370000 +CVE-2024-3320,0,1,cfcbf61a2622860951e581e18777cb05bbab5ce5e7aee6d4a3370b7f8ba346cb,2024-11-21T09:29:23.370000 CVE-2024-33209,0,0,52675bf6875d058490a503b6a06218f66186bebf48ce6c2d6ed1557d4a1dfe58,2024-10-16T13:33:21.313000 -CVE-2024-3321,0,0,0ec641d42ad636223916513baf22827ddd93bf74f9575e4e077e55da9cdcbe3e,2024-11-21T09:29:23.510000 +CVE-2024-3321,0,1,7c035b6aae08aca4e31fa20e5970deea247fc1ef9f6b1b2baa05f2d98e34a3e6,2024-11-21T09:29:23.510000 CVE-2024-33210,0,0,73743f20708c4f9e949787dea033b0608d5587bb97ca1e4ca545d2d98b4d206e,2024-10-04T13:50:43.727000 CVE-2024-33211,0,0,97cf4451472bb1b67607226de425c4bb5ff9be780697933cf5decb769e9b944f,2024-11-21T09:16:37.163000 CVE-2024-33212,0,0,1319b7a4e155dd81813c77216d4a0da85219f64dc863466a0f0451f213e05bee,2024-11-21T09:16:37.397000 @@ -257683,7 +257683,7 @@ CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774 CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000 CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000 CVE-2024-33469,0,0,6f6ff2b75c61ae05d3d69f5eb1b127ef03a506ff53818706f0c7cad14959a9ab,2025-02-13T15:15:18.157000 -CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000 +CVE-2024-3347,0,1,010a6f05339340c9755bf7a91eb4682737b55415634be3619f65f969c059d3b4,2024-11-21T09:29:25.703000 CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000 CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000 @@ -257704,7 +257704,7 @@ CVE-2024-3350,0,0,e59786b43aa812e979d218752afde9eb031596b29f2efdc76a2915844b443c CVE-2024-33500,0,0,746323f4fb4b9901ec2db4b5c0fb0d198abd8dc5a220cdbb454eaf0948907ee7,2024-11-21T09:17:02.433000 CVE-2024-33502,0,0,b03ad6bdb7d50af328d0ec93aa8c63cc9d0b53d31f47494a80e249bff05450e0,2025-01-21T21:03:02.247000 CVE-2024-33503,0,0,0c9f63716718c75aeaccba8cd0b99b5f4c042abe278d330de5d973c399a6c93e,2025-01-31T17:36:27.323000 -CVE-2024-33504,0,0,6f8efe94d29af37f10672ddb8626f605f2201cb3fdbe23445b429c041e6cf563,2025-02-11T17:15:22.110000 +CVE-2024-33504,0,1,4f7a7e539d3a7bb985456ceaf1379824ec92908fe83342e88d744ac81e0ced13,2025-02-11T17:15:22.110000 CVE-2024-33505,0,0,a334504fc0c41d99f72f621572cbde02a51326f39650a51a2d767998a547e522,2025-01-31T17:41:27.897000 CVE-2024-33506,0,0,66c88001b522019186ed21baffd5dd012c47a67ae4dd08d2a4bb7bfc1bc4d418,2025-01-21T22:01:13.280000 CVE-2024-33508,0,0,3b76b0d03aba3d39a9333effe55dda5557e5f1c6adb532df7c6b80bfe8c854e4,2024-09-20T19:48:06.197000 @@ -257830,7 +257830,7 @@ CVE-2024-33626,0,0,98636f90c26fefb664facad1c749c9c80bdac5f793b6178479f366ac7b5ce CVE-2024-33627,0,0,a7e429fc28c825b791367c547d1de2f36810d89fa94a9a5f549fe9410be0f6a6,2024-11-21T09:17:16.470000 CVE-2024-33628,0,0,95701764c29a5edb4f90ca71a2dc0b00c6f0fd68df1a062eca4cf6b3b8a9258b,2024-11-21T09:17:16.580000 CVE-2024-33629,0,0,51f2fecb5a81d323d5391ce88d9e4df586d601d67656a2f2beb995ecda78dda9,2024-11-21T09:17:16.690000 -CVE-2024-3363,0,0,31e2286679c3a818bb99ca7c3878ba2e11d5e0bf8d89b6d7cb6e54f76d8cc145,2024-11-21T09:29:27.830000 +CVE-2024-3363,0,1,7900a216a414322def733d4cd70583e59772cdd772e0520f4eb3aaa2adb5684c,2024-11-21T09:29:27.830000 CVE-2024-33630,0,0,c7946779691e07f8d8be839b927395b4aefd957bfb5abcc3be1692ee815cf3e0,2024-11-21T09:17:16.803000 CVE-2024-33631,0,0,ff271002fba66b3bdf0de8e1c3e1aa80a3f2583884cb0809afc3a2475c17272e,2024-11-21T09:17:16.920000 CVE-2024-33632,0,0,eab283a6021a651e97ec2b7e8fc9d9db013e87a534a2c6e52df8a4826694a734,2024-11-21T09:17:17.110000 @@ -257862,7 +257862,7 @@ CVE-2024-33655,0,0,de93781cf66822a33a28e3d65450990b089e0fa18d88669cbc9a6e40b730a CVE-2024-33656,0,0,c4dee97415c96965744276a271ca4ea6d67279b386b7e2c6c20831508b30939f,2024-08-21T17:24:59.627000 CVE-2024-33657,0,0,90ce9be009fa7f2f1e0676159d1ea146f159c1dd2c64edb8dc766f1b5805908f,2024-08-21T17:24:59.627000 CVE-2024-33658,0,0,9b9d8ce9f60f7bc4d86910be879720cf522af474333ff6c04f94c537d736e09c,2024-11-21T17:15:13.010000 -CVE-2024-33659,0,0,201e39dcba4db522e6801c68b37debcf4efa487a0b633d7f014183f117a56727,2025-02-11T15:15:17.200000 +CVE-2024-33659,0,1,14e6151dce48086096089ded2ffb7ae180a47a95c4869cdccbd712aef7c1544c,2025-02-11T15:15:17.200000 CVE-2024-3366,0,0,718e6e412ff1af315ae8ecab14ac93b94247f7e00c8b89332d1bfd718812e811,2024-11-21T09:29:28.237000 CVE-2024-33660,0,0,f1d67d54532e54afa3197079e90f01f216181256b3b286362935839adb2439bb,2024-11-12T16:35:09.330000 CVE-2024-33661,0,0,d0203b9f259aa756d9a65df8b74f44f9180da446ac1bcc946b8e08bf8d9e9d00,2024-11-21T09:17:20.750000 @@ -258166,9 +258166,9 @@ CVE-2024-34062,0,0,3e3d7a23f0ddf40bb9b7e477a0b08aa1b4578a3842d34dce881954b773b52 CVE-2024-34063,0,0,b643c186253dea78886cdc164848b2150252d41fc3260449c6470a9b018af9ed,2024-11-21T09:18:00.687000 CVE-2024-34064,0,0,ba07e5a57e091536ae38201a75b8c1e3b5eedf3dcac1d8fb41d7408878690c9b,2025-02-04T17:15:18.667000 CVE-2024-34065,0,0,4d85ab326ecb53235af3ff0a7f41a0c6b0f15838f98dde2b100e9a0c37c4fc30,2024-11-21T09:18:00.980000 -CVE-2024-34066,0,0,dfe57ac7986caf4b7535632556c642eda0f358f4fcc1db9c5da66e784eb03ac9,2024-11-21T09:18:01.130000 +CVE-2024-34066,0,1,d8842beea19d45223a1f6f8b4e8702ec6593bf082876f7f6a6c67e4e1c93a3fd,2024-11-21T09:18:01.130000 CVE-2024-34067,0,0,9cf35acc8d550e37df248e2c0d775660104cfca0398d1074bdb86cea57aa25bb,2024-11-21T09:18:01.257000 -CVE-2024-34068,0,0,7f74bbca4e2db397199e15e665a073c5d30a617f5b6e634f61d035c77e231e27,2024-11-21T09:18:01.393000 +CVE-2024-34068,0,1,951dc9e498bac293d43314856bc4540b6c168113d2d16c0db0fd0aff77224d18,2024-11-21T09:18:01.393000 CVE-2024-34069,0,0,272daf01091fd40b7e79c1d5d4afc7c83f6a52a4b429177799d0b69f29ec7ffa,2024-11-21T09:18:01.527000 CVE-2024-3407,0,0,1dd5d82b06a7cc20a14e63b07e1ddd6e99e77ef41257161f9f7dfedc8de831cf,2024-11-21T09:29:32.093000 CVE-2024-34070,0,0,5f1575a2d850d50c576f98c42a1ebac69cc9b6e5bffefc5b41bc301cd97009a0,2024-11-21T09:18:01.680000 @@ -258511,7 +258511,7 @@ CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c666 CVE-2024-34517,0,0,e9e99883991af2360e74003fd76d7d9474c4615f3c04d4c9966be6f605ba3976,2024-11-21T09:18:50.990000 CVE-2024-34519,0,0,9923095c8ead28a85094bbf98c9269e81fc27f56b86f7b0b473592a53f6f330d,2024-11-21T09:18:51.220000 CVE-2024-34520,0,0,3940f2626dfd21cc81f4f316b6ff90f799fda5e2ff7bfc481835fbee1c70daea,2025-02-13T21:15:14.113000 -CVE-2024-34521,0,0,e26ea59913eb8ed4248c06c253cb04fc81acdd8fc9ce6901db39d7797658eca7,2025-02-12T23:15:10.730000 +CVE-2024-34521,0,1,f08821afeed57c81bcdca080554eb39d4ccabe69863f13b18c99a3b58f37f804,2025-02-12T23:15:10.730000 CVE-2024-34523,0,0,9238c9d15fb625bf913096c040c0bef2ba8c758ca26eb1436542b02504490f9d,2024-11-21T09:18:51.440000 CVE-2024-34524,0,0,c38382eedbf78ed000ded50091e5476087f57b5ee1f5f0c45a0fd37c8ca78066,2024-11-21T09:18:51.663000 CVE-2024-34525,0,0,f2c29494afa2efe63cdae519b001bbdf25bbeb671cc3855c6a3e64317a54613d,2024-11-21T09:18:51.893000 @@ -258955,7 +258955,7 @@ CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e3 CVE-2024-35134,0,0,d26d5f4664f75376b585e85b9180927a86bed28e63c4546da4618292704c5ab9,2025-01-25T14:15:29.377000 CVE-2024-35136,0,0,7f9b2bcfec1e00e4c5448e8eb34d153823c83bc999a69fb0df8058180c228751,2024-09-21T10:15:05.673000 CVE-2024-35137,0,0,8a304cdbaf59bb986c8c3f32bdf1739c04b00c7f60b0a646c085f118d8cde7a8,2024-11-21T09:19:49.143000 -CVE-2024-35138,0,0,4eebd6b9224a1962b9a858dbb07608051267b0b08b1e85d6210b8a614423aa76,2025-02-04T21:15:26.213000 +CVE-2024-35138,0,1,feb85db8632371e38d3b01ac126eb698becd7fa6210fdbace50c61a59c888519,2025-02-04T21:15:26.213000 CVE-2024-35139,0,0,be4c987cfcddfe8d90c735ee236dc1ac4502531a983ac5f6945739f9557c9cc3,2024-11-21T09:19:49.280000 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 CVE-2024-35140,0,0,770c8244045ddd75036b0b1cda33ebba5d78723f4407acc629cbd1e3a77e1329,2025-01-27T19:27:14.327000 @@ -259088,7 +259088,7 @@ CVE-2024-35275,0,0,1c3a6d0efb883d25be56aa776adfb6eb5edd5e25f63ff3a90035908521a4a CVE-2024-35276,0,0,1937e4da4ebbed6219ab7acef031d83c083e4d1d9f42b35bc42e8cd536e76972,2025-01-31T17:04:42.240000 CVE-2024-35277,0,0,9b1c46c6fad3b7b9cebb1e68ad6e16a0a56d16503c2cc4664845a580d4c08994,2025-01-31T17:08:01.087000 CVE-2024-35278,0,0,ed7a7296d05909d4bbaa5fc3371c1f92af247b6b0ef38af5a59952281601061c,2025-01-31T17:09:31.407000 -CVE-2024-35279,0,0,6d23f3a4274c949cd4ff00e4dd0c158c4e7a7a85bc7bfb01e85d0778f1e2b36a,2025-02-11T17:15:22.253000 +CVE-2024-35279,0,1,5551850c15ca9e26ca25fb77699a179113a6dfe402df2633c39d7bf79794bb88,2025-02-11T17:15:22.253000 CVE-2024-3528,0,0,73792362235e828bd56025419c83c67ec901a0e2b04dfa37d11c551a857b0238,2024-11-21T09:29:47.207000 CVE-2024-35280,0,0,dd11101af525380e833a1f48135fdb75854382d9758352e56925ab58457069e6,2025-02-03T20:55:26.147000 CVE-2024-35282,0,0,174e154b42e127fa67b7958222015b753e479a85266f575b2e2ca4b3057942d7,2024-09-20T19:44:17.557000 @@ -259292,7 +259292,7 @@ CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615 CVE-2024-35637,0,0,9cb867c19f8006ef50e305ac0fcabaed89e8159eb2e4ffdf558c884c5c38b50c,2024-11-21T09:20:33.200000 CVE-2024-35638,0,0,e61de469a2786f9aa846ec4370d46e98924aa27b0a12eb528a1d8281826602ca,2024-11-21T09:20:33.323000 CVE-2024-35639,0,0,c1c3140f21137b15d0050023371e3efdce6f35ca6c3876825bc93d445a0b36fc,2024-11-21T09:20:33.450000 -CVE-2024-3564,0,0,22430078707f5bca6aebb329732cf433bfb4283f88b591073b6a31b7247ddacb,2024-11-21T09:29:53.153000 +CVE-2024-3564,0,1,c1eb6cee1e1c5ce656c0dbcf14b712479f3168dd2bf2e48c97d19a902204585f,2024-11-21T09:29:53.153000 CVE-2024-35640,0,0,0c90864f477ffe1ba66b00c51a04a27e372eff6a6b02cf6a105a750de1d0b8c1,2024-11-21T09:20:33.573000 CVE-2024-35641,0,0,3457fedc6b80777ce0968e010e69f9bd148c14d13719b302b790f3f8bd620832,2024-11-21T09:20:33.703000 CVE-2024-35642,0,0,c576a129dcdb2fd620b58c13cdcd6fc75c73e48dbf4cf648db0b11b0174d6781,2024-11-21T09:20:33.840000 @@ -259301,7 +259301,7 @@ CVE-2024-35645,0,0,1a4fe6dbf283588f6424cc1c82260317da6dd7827170952c599b4f175218c CVE-2024-35646,0,0,5fba6f679908112bc9c3dc4b4d2cca1d68ee5565f7f8be9760b539a5159b4326,2024-11-21T09:20:34.230000 CVE-2024-35647,0,0,dfee17ffd98a0207bb2d9e8bf833b18d652d24f34d008cff892fca06d0528e83,2024-11-21T09:20:34.360000 CVE-2024-35649,0,0,ea73fb4586c69ffec476186be8f6bf4c9bb27270430f8692b34ada168db146c4,2024-11-21T09:20:34.480000 -CVE-2024-3565,0,0,e1c1d4d2593eb6c4dfcc75afbb864d5ee5d589b57e6ede306b9d2d6d5fc8d60d,2024-11-21T09:29:53.280000 +CVE-2024-3565,0,1,b05e02047eb718b5a5d80706cdab856c3be9f4a043ad8365a16a1f8d2be13c6b,2024-11-21T09:29:53.280000 CVE-2024-35650,0,0,e15230b78c33719d35f0fd447377d3fb3a48989ab6f1b6ef89a7a5d21df7b997,2024-11-21T09:20:34.633000 CVE-2024-35651,0,0,e5d05d661fab16634d324d95db351ad4ae02a3dab9c9c81b3f826ef45321c0ab,2024-11-21T09:20:34.773000 CVE-2024-35652,0,0,550577498d4aa6c6e98718bd96d79908cfced34af736df304ac4ede4b362d65e,2024-11-21T09:20:34.910000 @@ -259783,7 +259783,7 @@ CVE-2024-36116,0,0,ba2a8ad9731057f20d6e03ed1a8894458f3c315983b209d5e4b4c0aa55ede CVE-2024-36117,0,0,a1aba93efbe2397d37a6a98f5e1e8c202b911a71e7effbb8eab9fa3fbc43e3c4,2024-11-21T09:21:39.390000 CVE-2024-36118,0,0,55aed2553bb46dfac59fc7234ccc37b510c4f807b963515186e7b76a1ca890e3,2024-11-21T09:21:39.527000 CVE-2024-36119,0,0,febce6423dc1d2e5233bfe9a4afca8e952278d09d11f845e3d3d4dcea34721de,2024-11-21T09:21:39.660000 -CVE-2024-3612,0,0,d4ad09a2349cfb3559c79fa4ae28390659bba4980cefc6f48681f025aebd7d72,2024-11-21T09:29:59.263000 +CVE-2024-3612,0,1,37261b1f8d4f8f3e60a4ba7545fbff1de5625e8f2a102c4e896cb5c17e55333c,2024-11-21T09:29:59.263000 CVE-2024-36120,0,0,924fe4e240283c9e4b09122242d43b6afa36ddb4998623fff938f881394386d7,2024-11-21T09:21:39.810000 CVE-2024-36121,0,0,ea5bca8e895d35d44db7855d1c126aa065d33ef7972857b1e702a1fb865283d8,2024-11-21T09:21:39.927000 CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139743,2024-11-21T09:21:40.070000 @@ -259792,14 +259792,14 @@ CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6 CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000 CVE-2024-36128,0,0,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000 CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000 -CVE-2024-3613,0,0,8c49e72e9406a68c2f73faacb5db14b0130a295cac3973946f145897d312d626,2024-11-21T09:29:59.410000 +CVE-2024-3613,0,1,bfdd3d9764417c982e88482e60e6b0bbe2fdb29c42418a4ff4a34629450e7794,2024-11-21T09:29:59.410000 CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000 CVE-2024-36131,0,0,82e9fc077a37365f43bf6b187ecca0faec0000657c69313b67fae1ba4e75f642,2024-08-21T18:35:05.670000 CVE-2024-36132,0,0,5ec3d6df968dae204600f4777b4a75c8223eae8a0b29788bfbc9e03973d335e1,2024-08-12T18:53:28.710000 CVE-2024-36136,0,0,d89aed94871ac8cfa059496af404f5c0b7ae2e5b24b85fcc746aaf0e4f46af03,2024-08-15T17:31:15.880000 CVE-2024-36137,0,0,9e34edecbe1bcdaea980fdf3ecba53c1e1d2b78171ae5b3668bd0b30495a6ea6,2024-11-22T12:15:18.817000 CVE-2024-36138,0,0,1f704156cf983572fed56762ac2168623bd5a8662a04d481cdbc1a6f8d203327,2024-11-21T09:21:41.500000 -CVE-2024-3614,0,0,fad6c4e5199ecf38f1f8ffba2f9268aa7a520e7b22b870d8bd62c0639f2a0abf,2024-11-21T09:29:59.557000 +CVE-2024-3614,0,1,9207d62c0e40d7f82f5563b59defea942108ce11edd7d364dae15546f9f218fc,2024-11-21T09:29:59.557000 CVE-2024-36140,0,0,9f1e3de454ca7f9731012af21b569b657fd8599720b9322b4c808b170265e415,2024-11-15T22:53:26.063000 CVE-2024-36141,0,0,6aefe2803cc19479c8c322c648889d80bd2f0fe49e60c34dc243950214b0328f,2024-11-21T09:21:41.830000 CVE-2024-36142,0,0,b38edc47b2d712fc8fcf7da5698e486729fd33fa9cde8b20f1156d9eda5bef28,2024-11-21T09:21:41.970000 @@ -259928,7 +259928,7 @@ CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 -CVE-2024-36262,0,0,30d0810e6955ad486de6ccc2c338b9b2a41f50ad343bed22cfcc26352fdbd6f0,2025-02-12T22:15:34.110000 +CVE-2024-36262,0,1,20fc102a9cbdbf04dcaf7730e030efba05d2e492106f5a6176789a1ca0b9940b,2025-02-12T22:15:34.110000 CVE-2024-36263,0,0,f09e8a3287eddd607f9d6f0d56f84686a478025a137c31455da3455bd15eb63c,2025-02-13T18:18:06.243000 CVE-2024-36264,0,0,1183540ced40f2999375d457c8902ecd0c4e6588a721ea9cf51f8e304905c117,2024-11-21T09:21:57.363000 CVE-2024-36265,0,0,ff2772f9f2b1d603dcdb578e06841c01a00711b22b26ced8c442dfa882426f68,2025-02-13T18:18:06.453000 @@ -259938,26 +259938,26 @@ CVE-2024-36268,0,0,6bd7f2a08d60f857a812fd35ccc84177256999f3bb9a77410d2e76736e372 CVE-2024-3627,0,0,ef339dc21a5b1fd1421fb7d91956f750751521bfa12e27bf4e270f0ad2130a0b,2024-11-21T09:30:01.343000 CVE-2024-36270,0,0,acaf2ccc273dd2e6490c172039e027026cc310fbeda3126ff89ca0ef8ad854e9,2024-11-21T09:21:58.203000 CVE-2024-36272,0,0,a7dbc0cbeae123fa36835ce40bba69633c7e84046585c1b19cb882cc5e2500b6,2025-01-14T16:15:29.360000 -CVE-2024-36274,0,0,569e52028323169cc3f8ea738ce7c1f32ecb7775f090c5a54eb9f40b7f7e9aeb,2025-02-12T22:15:34.267000 +CVE-2024-36274,0,1,850dd17d0ab3592696add456b094fd8bd83970a62ce31fb8309363d62b1e9a16,2025-02-12T22:15:34.267000 CVE-2024-36275,0,0,a220a1a2c9428b373009c8eab26f07177e45f382eb9f965967e2c51f4b4ce45a,2024-11-15T14:00:09.720000 CVE-2024-36276,0,0,6c89873627f11666f7742f2615181900d2baf2a5e434ededbc3f14578e7fd943,2025-02-04T18:28:18.110000 CVE-2024-36277,0,0,badb4cc53c7202f17ca4e4f181b5ea1b2e562b954d3fa837092b06388881e158,2024-11-21T09:21:58.537000 CVE-2024-36278,0,0,823563aeddfd98d3e93f22c26b562542e8ad7cf7063e2491371a5c535851f7e4,2024-11-21T09:21:58.730000 CVE-2024-36279,0,0,301b02b4e0a70f551decb44b8d794050e356973281cfe9dbc17669b0dba3b799,2024-11-21T09:21:58.870000 CVE-2024-3628,0,0,d9122ea95c68760f6c82e514b7bf2614f4957fff6146aa16ce6a105c301b1be9,2024-11-21T09:30:01.490000 -CVE-2024-36280,0,0,7f5ce874f020cff1c8527a0ef81de7bf1cfb263d21d264884b84bc06d9332ddc,2025-02-12T22:15:34.437000 +CVE-2024-36280,0,1,71e7af78604811970e7b4863744bbca72d3bd051bb56e67a6ef582476f0a7bc5,2025-02-12T22:15:34.437000 CVE-2024-36281,0,0,fc8e6e44e243630297f09f054a7c0a2dabfee41c676b2a632e48ca708c74a3cc,2024-11-21T09:21:59.083000 CVE-2024-36282,0,0,a2590150cfca5dfddf6e889ff7dbd39d67cfcaf459962141a39b085d34dfcd1d,2024-11-15T14:00:09.720000 -CVE-2024-36283,0,0,d15f0948b0763b60d1750b15f13762029b453f41577153dd99ac227b4dba8a23,2025-02-12T22:15:34.590000 +CVE-2024-36283,0,1,fea72ecb0a35caeaca7f5db768539044ce864c5bdd23fc6ef4a3473ca07134cd,2025-02-12T22:15:34.590000 CVE-2024-36284,0,0,68deabc42822058ffe26432b6898ed761bb9edadc01c7c7df784af68b0c22ce5,2024-11-15T14:00:09.720000 -CVE-2024-36285,0,0,46e0d712b15aa8796b2dd3ca6655ac6ca90adf768ea5c72ded792678c381e9d0,2025-02-12T22:15:34.737000 +CVE-2024-36285,0,1,35a4497222ef0cd5989b0eb6a743801addccb07041a09d98598dd30aa04ff568,2025-02-12T22:15:34.737000 CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000 CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000 CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000 CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000 CVE-2024-3629,0,0,df403ccbf1837e11a032a9bb80d87536760e2eeafe99d76ff9b043ef1d743b24,2024-11-21T09:30:01.633000 CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000 -CVE-2024-36291,0,0,5a9889606f41bbb4d2800cd39de94ee7c22074fc6f9f789abe8bec05040a833a,2025-02-12T22:15:34.890000 +CVE-2024-36291,0,1,1371fb21855910870d8bf66cf0f84c4884913b00cd0b6949e32124db84a688aa,2025-02-12T22:15:34.890000 CVE-2024-36293,0,0,a3f93a031712ca210280980814adf571378777654de6d36369fba092cdc66713,2025-02-13T16:16:23.727000 CVE-2024-36294,0,0,eb134be872ea12d25047633ce9f4e6d06cf7b25c0b58ceeff6fc0a24899cd955,2025-02-04T18:32:48.410000 CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8adb2,2025-01-14T16:15:29.580000 @@ -260119,7 +260119,7 @@ CVE-2024-36504,0,0,2d3d1a9ba4e09c32e56fd18eba2d5db8deb83b32a2af249edb6af606405a9 CVE-2024-36505,0,0,fb291dd94dce4e50449c9e877ac2ca2ff61e5da72ca7ade21bdb425debb63d84,2024-08-22T14:36:31.643000 CVE-2024-36506,0,0,4b58ed9191f815166205949df7f6298ca044435eb5f93f3f4f4024c979b61044,2025-01-31T17:10:44.853000 CVE-2024-36507,0,0,04a24cb7eb80c7ce5b0cd930e917054d877c6b282e7beecab850e0815de29b70,2024-11-14T20:31:45.367000 -CVE-2024-36508,0,0,93ab89571cb2a9d0676db4c3cb88f8261cbd3a2302851930e896eefdd326721b,2025-02-11T17:15:22.393000 +CVE-2024-36508,0,1,78edcfb421b1da3e415ac361a8e80339104b320b3f5d14facfa1c3a58af7a228,2025-02-11T17:15:22.393000 CVE-2024-36509,0,0,51a3ce39b65e0ccad621c0235a19da7b333d1a36b9c66eded9ef595731c58b4a,2024-11-14T20:33:44.727000 CVE-2024-3651,0,0,ccda00a280c38637cc17b638d5c91961891d001821e1052b9fc773bf82e39d71,2024-11-21T09:30:05.170000 CVE-2024-36510,0,0,fe69599f5214a3d1f352e3332d4d70721aa4940108cde0a83d6ccf2b69b4e1ed,2025-01-31T16:30:50.753000 @@ -260162,7 +260162,7 @@ CVE-2024-36554,0,0,f8d706217a60ab16cfa9b3f8e3b7b1e81809d356093f7600ca75266d11fc4 CVE-2024-36555,0,0,9468850dce0d096d85b037330c9fc9e9381dbe018405c81cc0bb05fb093e2c28,2025-02-10T15:15:12.500000 CVE-2024-36556,0,0,c629170e84ff10c4cebb48d6b96f6075467d18ea21231b8a7deee30a76017354,2025-02-10T16:15:37.740000 CVE-2024-36557,0,0,8ea3f3db69520721b9eb7d3aa54b7fabd58fe0f15bcb3b4e093355d1f4a54502,2025-02-10T15:15:12.720000 -CVE-2024-36558,0,0,7f89c530798777d93307bcbe5f1facdda82317cb90fca82a608f23c8cd8e965d,2025-02-07T16:15:36.323000 +CVE-2024-36558,0,1,3eef99d7f2f1ab45215ec1d530d0754399299d75641595c2e163c4da0384bd34,2025-02-07T16:15:36.323000 CVE-2024-3656,0,0,cc6741c2183e9b71634bb4ef1d35a6085988e0cc98193d8f3bcaf2ac00dfb710,2024-12-23T14:15:05.553000 CVE-2024-36568,0,0,4dc3650ba5db2618f853f2d8a4fc5d941192ca1d82f4f78ca0f379bf1740efe1,2024-11-21T09:22:24.367000 CVE-2024-36569,0,0,237834c9de6e90d428bcfe4a628116c726e8895e63611649f26cb41fa5adc5f6,2024-11-21T09:22:24.610000 @@ -260786,10 +260786,10 @@ CVE-2024-37351,0,0,9a7dc59a36afb09dc3d9fccfe9a0ce93419c46a4d31b061e10fc20ad6e4bd CVE-2024-37352,0,0,3f023f1fb2a769ea46547b210828a58497c5cf6630361c558ccbc529aea792d8,2024-11-21T09:23:42.400000 CVE-2024-37353,0,0,7ff7b7453550602b650cfdec5ef1242f502029e3779b416a04c17939bc6e63d5,2024-08-22T00:15:05.760000 CVE-2024-37354,0,0,8714660eea3ed91e9b81cd464e3754efc32fe0d558dd6abd8ab964c32e5c5bd4,2024-11-21T09:23:42.537000 -CVE-2024-37355,0,0,9decaa094fea143b53b0cfc7c2f75302b7a98c145dce66517118c4d928ca2557,2025-02-12T22:15:35.330000 +CVE-2024-37355,0,1,232a4434f17e0bc8751d82efdfca0c13f1c3ff54d2c9e7b03357ee342b2056e8,2025-02-12T22:15:35.330000 CVE-2024-37356,0,0,4fe4d4a17eafd229e9050e6753d570a71ec28698aaa6438baa1abb86c96de84d,2024-11-21T09:23:42.667000 CVE-2024-37357,0,0,fc7134e6eb69001209ce08e10f760d544b4fb396e8ea209636530f56b5eb787e,2025-01-14T16:15:30.027000 -CVE-2024-37358,0,0,b8e0b6a893852de0dcf56fed78f0d082b71a965f679c8be9f89a9809a8a79f11,2025-02-06T12:15:26.343000 +CVE-2024-37358,0,1,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5b7b,2025-02-06T12:15:26.343000 CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000 CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000 CVE-2024-37365,0,0,92f445546c97440aae8023b82925d87a3f96476cde45f92ebb44b9fbc714aebc,2024-11-12T15:48:59.103000 @@ -261575,18 +261575,18 @@ CVE-2024-38303,0,0,48f740ae5336dea6993e1df6502cbae19e1e53f943bf40615f10bf1afa498 CVE-2024-38304,0,0,93fc20945861e381c6a93babdafb378ffefe909e70fe03228cef160c3626e6fd,2024-12-20T14:41:01.273000 CVE-2024-38305,0,0,b50204d0d2adbfeee4304f94e93a151274edb07a1881b5e4d7cf38bf07c62bde,2024-11-25T18:16:27.450000 CVE-2024-38306,0,0,923ef8f5750ef5dc8b1aa0f80ec3ec7f20d2a05cc416d49512377e1d2196c5c7,2024-11-21T09:25:20.867000 -CVE-2024-38307,0,0,524368a473d51931866c40a5c1f1d3365ccd90b6323a7959563d510b3f9f749b,2025-02-12T22:15:35.480000 +CVE-2024-38307,0,1,4cdbafefaf2c0ed719e6f5aeb26d55d0e05554a40e1629fa6c3f8b36f69bffbe,2025-02-12T22:15:35.480000 CVE-2024-38308,0,0,aa0e1dcb340f88b60a097b1f78e4419b606f07980132596118f63e0ca049be13,2024-10-07T15:24:34.517000 CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 -CVE-2024-38310,0,0,b4b50080a4a69ab2d065a230e3e92479b4698618771c786fe6a03b13fcb3b079,2025-02-12T22:15:35.630000 +CVE-2024-38310,0,1,186c7c8200495fafafe6a7fa12fff39a1608a850c68d0256ef507140ffd59271,2025-02-12T22:15:35.630000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000 -CVE-2024-38316,0,0,24e08104becc70b8ae756f2b5f9c739071ce1b09e44fe0af2e6c423d5c00950c,2025-02-05T23:15:08.480000 -CVE-2024-38317,0,0,26ce3c02234e5824168d6b4cc845c869576e268710495284d7fbe4765b467e9d,2025-02-05T23:15:09.407000 -CVE-2024-38318,0,0,3195a83cb5beb00ac4d1d4654076b74ced5001dfcf605f30c3a519ba06d00310,2025-02-05T23:15:09.557000 +CVE-2024-38316,0,1,7759cef0359b74f344f72362758e6f0e6e9652bcdcb1fc4407dc07e1e25b7af1,2025-02-05T23:15:08.480000 +CVE-2024-38317,0,1,a05b76f8d0d39a5a54de8123fa1133391f93806d6ae27880b27880b9af3bea8f,2025-02-05T23:15:09.407000 +CVE-2024-38318,0,1,4bf8d34e9a88e56cc6923122e607a3d4d0eb45a05823a692769d300db93ecfac,2025-02-05T23:15:09.557000 CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 CVE-2024-38320,0,0,4bb869c8ea82ab12a47183ea9bdc7cf49478a8454232d78ccf2ee6bb1582e818,2025-01-27T16:15:30.973000 @@ -262205,7 +262205,7 @@ CVE-2024-39027,0,0,9c0579dae898d595139f332264c60946a6305463079e5e828b96e35983d71 CVE-2024-39028,0,0,655f86c8b3e4e1291e9d2943922a75fa2fc9393ff19cad0b2a5dbdcb29dc16b3,2024-11-21T09:27:09.863000 CVE-2024-3903,0,0,3abc3093808cbf33494e777ab78a2a1f0d0a381b5e414e8aae50b0d04cda30b0,2024-11-21T09:30:39.727000 CVE-2024-39031,0,0,31600cbde8bea78bc56e4a9598adfa8ee74fe57d43a5d0365ca0ab764476d743,2024-11-21T09:27:10.103000 -CVE-2024-39033,0,0,ceac2bf5e5cb2b3e16ba71bb87e14930af026b0b87fd855404a7b4e4900402f8,2025-02-06T22:15:37.803000 +CVE-2024-39033,0,1,770e831cd5ad75f8569556d95315468a19908d64e268b20afd9e5db9dbe05ecc,2025-02-06T22:15:37.803000 CVE-2024-39036,0,0,b4bfbf7ae964d272ab5cded04fc4273edac34005bdb2e82fca5b7e2e2aae34a3,2024-11-21T09:27:10.370000 CVE-2024-3904,0,0,ad761d288d957d794b31c5702f59b35dfd5c44b747d0c7e16f2e403dae30a0d0,2024-11-21T09:30:39.910000 CVE-2024-3905,0,0,9aec538ba78b45e146b8f6c24f3c93fb5bc07cae6875cd9278304145b8c7d491,2025-01-21T18:39:28.047000 @@ -262294,21 +262294,21 @@ CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb55 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 CVE-2024-3927,0,0,c5a7a83540dd0108e0c95456e196911f953d1c089ad9153186ac7abf5eac21fd,2024-11-21T09:30:43.063000 -CVE-2024-39271,0,0,3af5cf36f37cb3e144a8a2f7b73da6ced963d03a83949aff6eab11692207c03a,2025-02-12T22:15:35.777000 -CVE-2024-39272,0,0,f8e9336eb1899af6a9546b5b8faf6552c3341b9738bb42d5b5f9d7b3cf623fd9,2025-02-06T19:15:19.357000 +CVE-2024-39271,0,1,2d8fab4b9edf416d64399c253af2018a28bd65c0605b6f3c8fa3de43efa988ed,2025-02-12T22:15:35.777000 +CVE-2024-39272,0,1,ba3bebfcc345dc2a1c8001426741e93bbafdd11988fcbfaa2c8e5c9d028cc691,2025-02-06T19:15:19.357000 CVE-2024-39273,0,0,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 CVE-2024-39274,0,0,6e7d1a33b0e5d020249e1265d5c2fe803a054c23d02db7f7ac41bcc85d95ece2,2024-08-23T14:39:29.247000 CVE-2024-39275,0,0,3a30aa64f40c900af2046a32b51bca26459d15ed56339ef5c87dcb823873ae2a,2024-10-07T15:25:17.050000 CVE-2024-39276,0,0,dd977f122c99547ae4b07eb5192e163e6e3e61789006652d41f5a5fbe512a712,2024-11-21T09:27:23.107000 CVE-2024-39277,0,0,26080347ae1771d5f6c59abbd813475f28a4e34b16949734c9b3cb30c815c0b6,2024-11-21T09:27:23.317000 CVE-2024-39278,0,0,08afeea0ff66f11774d46076ab58f2f6cb47799fe9878a2833101dc3a7d96dd6,2024-10-04T14:36:35.340000 -CVE-2024-39279,0,0,2fad314fd1001cfade5c663da24f2233013ce1c2dc23d374c006254eb80ea848,2025-02-12T22:15:35.937000 +CVE-2024-39279,0,1,f0d5a3a37a4193f47b8df49b71a11b85938debb751646c910e057ece08e49a45,2025-02-12T22:15:35.937000 CVE-2024-3928,0,0,80eb80995ed734a4fd6c40cf49e2905ed9643c2a1a0d85ff1158531da5501ded,2024-11-21T09:30:43.180000 CVE-2024-39280,0,0,c9a29d8ab16a066b50b7f63816b23b3ffbca89715f819ee07f0b80811e3858e3,2025-01-14T16:15:30.337000 CVE-2024-39281,0,0,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000 CVE-2024-39282,0,0,8d19a62ea2208ee549ce1ae639673f7c6307b394f865aae3ba768260c976d255,2025-01-15T13:15:09.740000 CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000 -CVE-2024-39284,0,0,bf29e3976b7c47cc358bc0a4008cac0bd13f578b0f3fade923a176e2a8aab00c,2025-02-12T22:15:36.083000 +CVE-2024-39284,0,1,1ced544d2c3aec8169b03633bb811885aa5baba3cd663fa11a379c2418618891,2025-02-12T22:15:36.083000 CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000 CVE-2024-39286,0,0,b83e502113ee35e1e88247625b7d73b3650cfb9e05c07677ff5844be7bbaac18,2025-02-13T16:16:29.157000 CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000 @@ -262376,7 +262376,7 @@ CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5 CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000 -CVE-2024-39355,0,0,67ce69f8d190cac8a35e3e8a44ffb847f26721d8f1861f540b2f9bbdf03b0374,2025-02-12T22:15:36.380000 +CVE-2024-39355,0,1,d2ad1313fef6b57baf9787c0b760d9dd53ba30e8795f5c7b4ce0f2c1c93d6468,2025-02-12T22:15:36.380000 CVE-2024-39356,0,0,5803746f35c634e3fbe6d9debac0f05899b0fba5f7fa27ec12c4acdf0efbadab,2025-02-13T15:15:18.507000 CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000 CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000 @@ -262393,7 +262393,7 @@ CVE-2024-39368,0,0,8d0beb90981772e56cdc456383e0ad76416c3ac8910086fb0eb28318814c8 CVE-2024-3937,0,0,45bcfbffb0cc9dbb6ee7014f6348017c5f9d7762fdf9bb269b80a174f4d59cc1,2024-11-21T09:30:44.430000 CVE-2024-39370,0,0,2831f53cf04707a9b504d0a70bf0135e102149552b32023438e88a1fa030a808,2025-01-14T16:15:31.430000 CVE-2024-39371,0,0,720a71ad5bece19f2267d5063ec8544c29d6cc9e6cdf7e6a5c5d88623672c625,2024-11-21T09:27:32.667000 -CVE-2024-39372,0,0,0ca683254c72864cea49b2c1c27b7005490feeb14daa5c214c0cae671ecc1614,2025-02-12T22:15:36.820000 +CVE-2024-39372,0,1,c0c7db1f9113495cb66390c62a5a98a894b71f1b27d9b8459f24beff6d66f2f5,2025-02-12T22:15:36.820000 CVE-2024-39373,0,0,c9f21aedca8aeb11477ede49acfb175851a5381d7367fa191f175fef22650e7e,2024-11-21T09:27:32.823000 CVE-2024-39374,0,0,a4c07ccaadb829fd966842f0cd7fd5f4d48639b87a267dd4b005f9ad138e642b,2024-11-21T09:27:33.003000 CVE-2024-39375,0,0,844fb48648151d2959893b2eeef45a29c5411771e91fd583d1710323ce8a3a2d,2024-11-21T09:27:33.173000 @@ -262584,7 +262584,7 @@ CVE-2024-39560,0,0,88eafacaed1840d39a37f33beb4e76b0e883f299a72f71f2957d33fda68a2 CVE-2024-39561,0,0,129105f153bb211354d859daf2f1ec70e81851adc189be0ea8b99636fc1c328c,2024-11-21T09:28:01.113000 CVE-2024-39562,0,0,5a2127926798bc04e33036e0aaea6d51bd2b1aa48ba0d1b8ac2f5559a1f75d57,2025-02-07T20:05:34.960000 CVE-2024-39563,0,0,e4017fb4c173cbef6fa8e4a9d945f6c438b962727d3cee4871551dc266a31030,2024-10-15T12:58:51.050000 -CVE-2024-39564,0,0,c76aaa01bbb0dd53ad14b3a07dd0d09c1c14fedf37a807e1291baa9bddeb77ab,2025-02-05T16:15:40.270000 +CVE-2024-39564,0,1,8877154739dbe900c1162635bc186a1ae9afa9fe69cb2ed00ad12975499c990d,2025-02-05T16:15:40.270000 CVE-2024-39565,0,0,a43a2fa18dee435a7afd7aa616f891db93192eeeee36531ec4da585ba34ece95,2024-11-21T09:28:01.577000 CVE-2024-39567,0,0,71539119d2ce1198f19acd4e87a68c7cabdd0a3662eecc27368e9a62e07c5a54,2024-11-21T09:28:01.753000 CVE-2024-39568,0,0,7a4a8537e7aed931a024eab8deb65d1bfefb3706ef563f723bfc76d0f28bdaaf,2024-11-21T09:28:01.897000 @@ -262624,7 +262624,7 @@ CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000 CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000 CVE-2024-39605,0,0,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000 -CVE-2024-39606,0,0,30fdb0cdeaf411929dd4809218555971308583412ca84168568fb0cadd00a2c5,2025-02-12T22:15:36.960000 +CVE-2024-39606,0,1,6e7a7045b70162a36f6e9de467afb3add68b13cba13169cfb6520e33b35ca5e5,2025-02-12T22:15:36.960000 CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000 CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000 CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000 @@ -262777,7 +262777,7 @@ CVE-2024-39755,0,0,c89983064fbb3672e96d95936bac6d3850b3b1cd085c9bdec08e8d8a80f60 CVE-2024-39756,0,0,10ea94389121a31c4ad5704d9d41b2d815ca27a65d291dd42d05234b1c6df1a2,2025-01-14T16:15:32.090000 CVE-2024-39757,0,0,bbffe30d38694551e04e11303255d7ab5ea0236256ee220b4a6990792b47defe,2025-01-14T16:15:32.197000 CVE-2024-39759,0,0,ebffca9cd95163f774063fc7fdc49a900b70132b12ffd2a9e61778e3dc71c363,2025-01-14T15:15:21.057000 -CVE-2024-3976,0,0,0b47976a1f8e68c143da18d864badc0df291caeb0e4127e767b5c410b97def6a,2025-02-05T20:15:44.750000 +CVE-2024-3976,0,1,0b477bffbb1d5ecbdefe089502863c2c47b9f093596f51f0536c2fe91a46e12d,2025-02-05T20:15:44.750000 CVE-2024-39760,0,0,4850d0213ec10332b3444f4b371ec4a26720c1891607b32b2dcf97fb4a47dbde,2025-01-14T15:15:21.213000 CVE-2024-39761,0,0,9e9befd3f760889dd9407cae8625e94e60480751e0a84c9926e7130c0e12d076,2025-01-14T15:15:21.363000 CVE-2024-39762,0,0,491e6d275828bad868000496c94368ca66a463268dcc0b64e081b5f6fe0db9a6,2025-01-14T15:15:21.513000 @@ -262798,7 +262798,7 @@ CVE-2024-39775,0,0,9755b0d11cb128cbd71f3ab95f30a15bff4bad6969790236412ac10cc2cc2 CVE-2024-39776,0,0,47015231b132d702adc5e908b384445bac8e422abb123c6994d64454c8ef88a3,2024-09-04T18:25:51.920000 CVE-2024-39777,0,0,d544fb5c8af3d11cc0bf86238933c07737b24f611dcb10d9d356ddde3e445899,2024-08-23T14:36:48.817000 CVE-2024-39778,0,0,54090db86e8d38e017cd2ddd1031fafce658bb8e4578d3d0c24cf22544ca372d,2024-08-19T16:20:52.980000 -CVE-2024-39779,0,0,fb815f0c3f399a427da6b109cf267bbdd896e9e96d02bbd66608ffd9edeb3cb9,2025-02-12T22:15:37.117000 +CVE-2024-39779,0,1,1216e0ff1a6068e92a273688ef079f057ce68f27479e9251644a65a446e6e499,2025-02-12T22:15:37.117000 CVE-2024-3978,0,0,482c21d01e49c69bca4dc15aede6173bfc8d79c5700a49fac23ff27e1403ed25,2024-11-21T09:30:48.857000 CVE-2024-39781,0,0,cd7ec078c3d17c622583b3e23660ac213bd8eadef2f1c6639a74be6e2f789062,2025-01-14T15:15:22.900000 CVE-2024-39782,0,0,2c4a0c996115cb53bacadccd26e56de9d86433511bcf2ca9387251a8d2006990,2025-01-14T15:15:23.090000 @@ -262816,7 +262816,7 @@ CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997c CVE-2024-39793,0,0,41497e9b4532e6ba7660bf3fd4412ba05d0cc12136a31e4a2d487c533d2f3ce2,2025-01-14T15:15:24.510000 CVE-2024-39794,0,0,837f4f6ff378c23c3ca990a9eece931e17432e19bc82c2ef37c2593d934ff0f1,2025-01-14T15:15:24.663000 CVE-2024-39795,0,0,5b42de05552f2a4e48bd5faa081f43d44850af50223f52ce7a4eafbf5f864221,2025-01-14T15:15:24.817000 -CVE-2024-39797,0,0,20343ff0c5034c98d43bee9b5ca12ba56b22cb94ba024b43b848c23784b55e1a,2025-02-12T22:15:37.270000 +CVE-2024-39797,0,1,fd58d93f830d231ee552b8be1fab8f5fd4aa421b340daf5c23e48e8622ee0717,2025-02-12T22:15:37.270000 CVE-2024-39798,0,0,e93b265d472121bc280dc37329e6e8e82ae098059ce87403ae85505fc8c92de1,2025-01-14T15:15:24.983000 CVE-2024-39799,0,0,8289bf452953f094a08219ab8c654ff0bfcc5c545dcae60ec2de1540806f29e8,2025-01-14T15:15:25.167000 CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000 @@ -262825,7 +262825,7 @@ CVE-2024-39801,0,0,91ddbbca5bd46d44f56f74a71907defef9881e8952c8cd461d8441278f032 CVE-2024-39802,0,0,4e08d5343d9311b0c46e76a6590e6658a6bcfaae0a93fb3c5fc18c7f14912bb3,2025-01-14T15:15:25.677000 CVE-2024-39803,0,0,d0e062b8d8498e7853bac6593c0ac81a9efaf7a0824ffd8f4776c9c517e1a2a7,2025-01-14T15:15:25.840000 CVE-2024-39804,0,0,970bbd5e70b5a1ae4ce845ef93df8f5df4fa3a408ddbe562f3bc62cf1c781211,2024-12-18T23:15:07.640000 -CVE-2024-39805,0,0,8280f20df5ffd4e9d6f8dceb7c9cd5ea39a422ef7095f1ea5c0351240710402d,2025-02-12T22:15:37.420000 +CVE-2024-39805,0,1,5f3eac0c2e2a9fe672cd382b306fbd479694997a9c4f8879ccf852de86f664ee,2025-02-12T22:15:37.420000 CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000 CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000 @@ -263001,8 +263001,8 @@ CVE-2024-4013,0,0,8556aeeea1e36569486b525769c885cb61d42521e2f43cf44889bf303d52aa CVE-2024-40130,0,0,5900a04ff1e4748611902a7db6eab7d22cf66d2e61a51fe706f327620bf2ffc4,2024-11-21T09:30:58.570000 CVE-2024-40137,0,0,a4fe87ceb3789c5206c87fe9295484b6c1e0b9695241b68e71ac76f00df4e8f9,2024-11-21T09:30:58.800000 CVE-2024-4014,0,0,d8dd467295cab371719c2ac00bec372a23c25ce5af28e8afcb8f0ac49be4dc72,2024-11-21T09:42:02.117000 -CVE-2024-4017,0,0,b74cace4cbbe5e64e2021a8f1582d502c2fd62d955b99fed5a5c51db5cb1a362,2024-11-21T09:42:02.240000 -CVE-2024-4018,0,0,cd5c14acf125e869c6b84c844dd0f7059166644a12703b700d24b64dd32ebf6d,2024-11-21T09:42:02.410000 +CVE-2024-4017,0,1,f783a50d5ec6473e72572840dca331e1122c5a318b2eddc5c5296323941583be,2024-11-21T09:42:02.240000 +CVE-2024-4018,0,1,e93d494ed70b12bf00fdfbf61d8137e8f4288becf4316d18479d4e42d5b1bc41,2024-11-21T09:42:02.410000 CVE-2024-4019,0,0,3aea9791ae6e9b7233884532fbd0a9983fbad081e331a0aa1b6a93ec2e0d9097,2024-11-21T09:42:02.523000 CVE-2024-4020,0,0,aadaf10c72ec95ec88ee3d6fe43b87c2902cc2c3fe85cdb0e9aa2093c718fe2d,2024-11-21T09:42:02.677000 CVE-2024-4021,0,0,141a8c3549b72a2e6fc7167017c78fe404ecf5a3430c27e6b0d3092ae59f1574,2024-11-21T09:42:02.813000 @@ -263148,11 +263148,11 @@ CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da1 CVE-2024-4058,0,0,41bd13730a967fba6dfa98e0a473274805b3a9521fbf9427b1f8ca715400dc8e,2024-11-21T09:42:06.270000 CVE-2024-40582,0,0,dd0f2a6d540adec2bb9dbc707f94fc9dff9972da1e4d33c84f17f86b02c0ca18,2024-12-11T16:15:10.873000 CVE-2024-40583,0,0,060f59166f99bc729cca84acecd51bc3d35affc7058999b403ee573e24158633,2024-12-11T16:15:11.080000 -CVE-2024-40584,0,0,d990be92505f72080abf586656c482bb399a28a55f7c21c214c5f0f766a8d9cd,2025-02-11T17:15:22.540000 -CVE-2024-40586,0,0,a4d5d3f14f4c39af03fc3b7119ec71c2f704de7addc4aa77e906e253bc7b2924,2025-02-11T17:15:22.683000 +CVE-2024-40584,0,1,47900c93570e7eb552e292857883b68b4e31ad2a59fc1e0340e58d431c1a6404,2025-02-11T17:15:22.540000 +CVE-2024-40586,0,1,edf532244e9d4f3f710d6611abcec2ddafc23b7e2ee6987f2706d8a1b6b8778f,2025-02-11T17:15:22.683000 CVE-2024-40587,0,0,de0c24e4e6a8866fccaaacb21ee1c63e90684efa6aa26e616d976649f617d5ad,2025-01-31T16:34:37.880000 CVE-2024-4059,0,0,a7395c4133ca68cf195a746536b2a10391759a1b7af0981398c03fdffb32f8d2,2024-12-19T18:56:45.140000 -CVE-2024-40591,0,0,3a2a58e3e37ac604d6a4688a4939d6b1e2e288cdfa11b126a959640d5813c304,2025-02-11T17:15:22.810000 +CVE-2024-40591,0,1,70c59ddda7629e1c082b5b948d65adc5f2ebe759d2e9b040cf087140e04072da,2025-02-11T17:15:22.810000 CVE-2024-40592,0,0,70d588c7e0dd63c3f30c565c48cdd17864cf3988f3b717bd753beb73e71e83a3,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,bf65899143a2f4c0e93f528c3b9a7873123db8d586300b13b7dc1af3be463ad0,2024-11-21T09:31:20.467000 CVE-2024-40595,0,0,1086c58a18861988742c11b047f1900d16c515d21111ee56b1cf972adc3e9a0f,2024-10-25T12:56:07.750000 @@ -263237,7 +263237,7 @@ CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650 CVE-2024-40696,0,0,0fffaf3f9cb548de841ac140d5da7ed3f05e1de3fb6a83e7dee96c1e37b258e6,2025-01-31T16:15:33.913000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 -CVE-2024-40700,0,0,3f4111a05bf17bd7cfc4ec7d046e7f6d6a34ee954c296b9e8c2023d4e1942f2c,2025-02-04T21:15:26.380000 +CVE-2024-40700,0,1,8b4edc4aaa85574205612781de1c4b0ab2e351bdfa9b39c9eecc15bed6118758,2025-02-04T21:15:26.380000 CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 @@ -263407,7 +263407,7 @@ CVE-2024-40883,0,0,e322f6133df143969f657d9cc6a7d6b368bf5e5b48f0fbcf0c8a3964addaa CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6ca7,2024-10-17T14:05:16.247000 CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000 -CVE-2024-40887,0,0,661c5f8415a367df6222e2150be83f047a3eac222666221189b9b3ae12991a95,2025-02-12T22:15:37.710000 +CVE-2024-40887,0,1,fcecbee6a9e5eaf110465d467a261ace07771b48b31c709cddc1a15098cd39c2,2025-02-12T22:15:37.710000 CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000 CVE-2024-40890,0,0,aa090ac05e8963e1ca90e2c05cdc3b230d4c12a97e1ac99273701898832d1be2,2025-02-12T18:12:16.130000 CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56dfa,2025-02-12T18:11:58.790000 @@ -263693,9 +263693,9 @@ CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138 CVE-2024-41163,0,0,a875db94bd67413b4697a424258164328dfe7ad33e562b13cbadb5e9474a22e6,2024-12-18T15:15:10.730000 CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000 CVE-2024-41165,0,0,f2cd16e63216ab00fb4b5715186a0a48b1a1a4c2af03934e45bd74947acb94eb,2024-12-18T23:15:08.300000 -CVE-2024-41166,0,0,8b37a263066b6092311992a1e790156d8450683043907099955c2cca130e8027,2025-02-12T22:15:37.870000 +CVE-2024-41166,0,1,beb0be1f9a611a9268392b52f12a9dc078bef0ac2987c9a834ae4c741a83c67d,2025-02-12T22:15:37.870000 CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000 -CVE-2024-41168,0,0,66e6fb61440946775acfa45a5359980fa158f4b7526eea83ab34b73d764189d4,2025-02-12T22:15:38.020000 +CVE-2024-41168,0,1,4b3e203eb19c69fdf1cc10015044618d82e9e46e4e1e365c87ed0bb0dba14686,2025-02-12T22:15:38.020000 CVE-2024-4117,0,0,c6b705cffd774bf8f4b3a2f240f3907f970fa0e3e102d32f20420757d7159768,2025-01-15T18:42:42.367000 CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000 CVE-2024-41171,0,0,0dca69f1495b394ad73f5a01f9a137638e2f9b54f6b0f4440abd7941e198b487,2024-09-10T12:09:50.377000 @@ -264171,7 +264171,7 @@ CVE-2024-4193,0,0,2c348f7f2f87544d588812c852bddbfbf63c657e73a923d4b668c311de4e39 CVE-2024-41930,0,0,9970243747a2426495d5267f7aec4e4ab9cce4ad5c0b5449a838d166e239dacb,2024-11-04T22:35:07.177000 CVE-2024-41931,0,0,8055ba2b4f57b9b2835ae4697ec8b13da4a3ea06ed170c08866a5fcbc2836aec,2024-10-17T17:15:11.773000 CVE-2024-41932,0,0,1abe0cfce1ee58b08103c4b11983b06cf9d6d018f246ca811a21294fed0afb3f,2025-01-11T13:15:20.930000 -CVE-2024-41934,0,0,4f03c2e4a3142fcd6eb39ab0249f529e7c4b4e7264c2b901f9f1c381dcd6c50d,2025-02-12T22:15:38.313000 +CVE-2024-41934,0,1,378af0e9ac34e232cc3c73071b97efa3f5d63d901670084a064596c1ec9b7df5,2025-02-12T22:15:38.313000 CVE-2024-41935,0,0,97e87f9da1b20b0c02c2d1055e7a663ebdcd03109f5d41c24a14b0c4db033df8,2025-01-11T13:15:21.083000 CVE-2024-41936,0,0,bc5263d793837e387ee98a53d893cb418781f457dbe691d4096c5aa745312359,2024-08-20T16:26:54.663000 CVE-2024-41937,0,0,908baea8d6075c024574b677758230bec5903572013c4b3c9a48a3ee7bf5b699,2024-11-21T09:33:18.477000 @@ -264427,7 +264427,7 @@ CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e CVE-2024-42195,0,0,25be1bbcfe19ccb6d2a3ee91045d9ea1242797e882b8752f28a38a75bd1e17af,2024-12-05T05:15:06.923000 CVE-2024-42196,0,0,74165ceca6e8e10016e2eeb4a033a572e7a1426e3140b48f5bdc3f16162b9281,2024-12-06T15:15:08.550000 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 -CVE-2024-42207,0,0,0cc0fca0e71a3453f96116b19ab1a1b794767d9b043c4822666e2c1685e29917,2025-02-05T16:15:40.447000 +CVE-2024-42207,0,1,7999bd374d3d2e00ca96b064d6050023c869b6b304031749819fd6f354ea6a70,2025-02-05T16:15:40.447000 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 CVE-2024-4222,0,0,78ad3754433d9edd7ad7b04b2e437643c27bc5a8227a6a311a1fd475543e40e7,2025-01-22T18:23:01.487000 @@ -264631,14 +264631,14 @@ CVE-2024-42406,0,0,27ec0815435bbda0c2431d4630bea0ca6b595a1297245017087d145f127b6 CVE-2024-42407,0,0,f0d739bc84cee721cfefadcf95caf855718a30db3f3991b30a719354873792c9,2024-12-12T02:15:23.017000 CVE-2024-42408,0,0,fea0cc9e4f3c35832fcef20074d7bda9403a00e74d9e32437a4416b7b17d8e5d,2024-08-29T14:22:45.603000 CVE-2024-4241,0,0,7c626df675573c13887e12ea562d8d3f15e47e4402d7c6d9be6badebb23cf773,2025-01-27T18:29:59.080000 -CVE-2024-42410,0,0,a879a277f9a2be698868b822ae6fc8ddfb14ccae6707b07219a9f9e014bea6bb,2025-02-12T22:15:38.627000 +CVE-2024-42410,0,1,3eaa111ac2d5c56c52c6a0d25439d9e00af19db5c38022db628a159cac15dce8,2025-02-12T22:15:38.627000 CVE-2024-42411,0,0,4ade0497533c50e3de8b82e11fd54f8955ce17bc8d332a9a9a0d03574bff419f,2024-08-23T16:04:26.227000 CVE-2024-42412,0,0,25166e54538fd07ddb221cf849e12a37ba336aa564ff3a3b17a2568fe13b34b5,2024-11-26T08:15:07.073000 CVE-2024-42415,0,0,c1b377a5ad366a542f1771b25d0456c8b94faa8823ef3c03f81c602fe5a4ac6d,2024-11-21T09:34:00.623000 CVE-2024-42416,0,0,613a492b868ab9acf279167eee40f4fd55cddaf34a95f955477eda14651880ef,2024-09-05T21:25:09.273000 CVE-2024-42417,0,0,f1c80c711a679210ceb5e01a64e3cd4fa77e11abf5bc2a3fb017e31ac06ead65,2024-10-08T15:43:05.720000 CVE-2024-42418,0,0,d8c279b34a2436c7978f2dd5ccc38b1a5c29d1a2243b3f21749da924dbafbcdc,2024-09-04T18:22:22.583000 -CVE-2024-42419,0,0,6bd8150860595d7e3fa19075dbb3b8aa6c652b7011176f783238731d2a3ba1a2,2025-02-12T22:15:38.780000 +CVE-2024-42419,0,1,b414554f853d5a2cf52832c0c073b9201b60f8a52073823661a919f4716868b0,2025-02-12T22:15:38.780000 CVE-2024-4242,0,0,4ff5a517ebe58f036a76713683ac8fcf9970f47f5a76e6ec9a8aba3ffb1d13d5,2025-01-27T18:29:46.497000 CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000 CVE-2024-42422,0,0,a234770e7b65a5a9c7aeea5fe74966a3b1bb651be5713a21eeec2a7c5dc12323,2025-02-03T14:40:15.143000 @@ -264708,7 +264708,7 @@ CVE-2024-42489,0,0,8e38c6dffabed3c3efb732ec4d9a919dc6b3fac404852967d434dd179919e CVE-2024-4249,0,0,a72dbba20503da07cc3ddcece24be97e2fd00bb72e6f5901be2b6b5c31c88060,2025-01-27T18:25:30.817000 CVE-2024-42490,0,0,550d80cfc0d653c4329d06e9e408c8c4e16317fcc8b2d04396c03c01ec573efc,2024-08-23T16:18:28.547000 CVE-2024-42491,0,0,8a9b0400d0c20078bd76bf8031432bcb00200f7bd0b355a435062fdc969a90d9,2024-09-06T12:08:21.290000 -CVE-2024-42492,0,0,0ceb33a4976fdafc3d4092fe85dd3265cadf8c6e5e4be9e0f28bb26ba5d10e9f,2025-02-12T22:15:38.923000 +CVE-2024-42492,0,1,9d46e60c0dcabf91045ef9ed4443c7c84935ad6acdcf29258846dade4855cbd3,2025-02-12T22:15:38.923000 CVE-2024-42493,0,0,47a925cbc13f370892e423ab30b6f060aad684f013e0acd9d4deb7da7003a2d0,2024-08-29T14:24:14.373000 CVE-2024-42494,0,0,6197ed8a4b9a3b8482f87bacc041d69eb869be1ddf3ed684a5ffa276dc920cfc,2024-12-10T18:38:23.260000 CVE-2024-42495,0,0,ee3925134b1396bfaa53570094be7e292b01da9faa4b048760c4c0dc97507a2e,2024-10-04T14:37:36.703000 @@ -264727,8 +264727,8 @@ CVE-2024-42507,0,0,13023674aeb3a0b8ad91b43058bc9cfb766bbd64576b39f32341fb17667ec CVE-2024-42508,0,0,ec42824e3746b3aa7a087cfdb36acdbd5e330e597ee83b078dbadd61f7936aab,2024-10-29T17:38:49.330000 CVE-2024-42509,0,0,eca853432fd85e8e27d923a0722a00e8ab0664b46803cacaccfabef1e63cca54,2024-11-06T18:17:17.287000 CVE-2024-4251,0,0,6a333dd704aaa4313e0204d6e743164fe6a8a7155958341655c766a433d4252d,2025-01-27T18:22:36.203000 -CVE-2024-42512,0,0,bc9fe8b7b9e577fb67abadaa1c6fac361f1581fc785174d816a5d852c650f96e,2025-02-10T22:15:33.307000 -CVE-2024-42513,0,0,0953b6a73d0f3892f10ad19f822759d37b35da4c8d919a1870a19326a6ea10a8,2025-02-10T22:15:33.497000 +CVE-2024-42512,0,1,3dc22e96500ae6f3fd8bb28e53fdde25e5a2eabfed0c97b7b9f47bc751ab5787,2025-02-10T22:15:33.307000 +CVE-2024-42513,0,1,cab1d1f044f1d50b40559be1018cfc2ad7835e203275e93c1a591001b61c9da2,2025-02-10T22:15:33.497000 CVE-2024-42514,0,0,054904ffa1271a48858c27639a4f212945cad4d4eba2b0403080625082e79d9d,2024-10-07T19:37:19.973000 CVE-2024-42515,0,0,b4ba8f757b46c5b5582e08c4488010c57606be0ab98ee3dd9524f14ea7dfdfcb,2024-11-01T16:35:25.690000 CVE-2024-4252,0,0,b027ab4b8de5ee8c4baf37e041444c874ccee9af350563490b809bedf82aa24f,2025-01-27T18:27:19.633000 @@ -265076,7 +265076,7 @@ CVE-2024-43124,0,0,87e691970b8bcbfe678960a0eae9c1aa60d7340308bd42dce1d4b95039d0d CVE-2024-43125,0,0,3750a57950db46b41ee59afff69bcf68dd54b677c9e77994379d5ba1ca050de1,2024-08-13T12:58:25.437000 CVE-2024-43126,0,0,ecee5d13e2dbf283e94aa3f331dfd8b8853b2c925b8433ca5b13f875405cd45e,2024-08-13T12:58:25.437000 CVE-2024-43127,0,0,2ff32e86cfecbe19f35654c7b2c64ac55864d7c6b6bdbe90d8995363ccef2996,2024-08-13T12:58:25.437000 -CVE-2024-43128,0,0,13c29b60782507ce2b67ebc2dc87bfd11496cc81006c7a0f14620643bdaf1b01,2024-08-13T12:58:25.437000 +CVE-2024-43128,0,1,d1f1998378bddc897801375f3fbc9a08480ff31cee50926fa9471bc2721c6b06,2024-08-13T12:58:25.437000 CVE-2024-43129,0,0,eccfd1f47a2b86bde49817b8084396180f74acd6b6a15987af2613212feff4a2,2024-09-12T21:21:39.970000 CVE-2024-4313,0,0,7d942770a1a4dc49c5d51e9696d69566959c4a585714bdbe873813ae04ebf906,2024-11-21T09:42:36.327000 CVE-2024-43130,0,0,1e591c9775a6b821f95179556691b7dbf7fca248e7b7a0986bc948da7925664a,2024-08-13T12:58:25.437000 @@ -265126,7 +265126,7 @@ CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 CVE-2024-4318,0,0,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 -CVE-2024-43187,0,0,403669df6af4ad424f10e33f1decca9957cd436cbd5a02e3842d5a0e38699304,2025-02-04T21:15:26.537000 +CVE-2024-43187,0,1,fd33b957fe7572397f42a8a7c31de1a30c4e04d56478fd2368be62bcde069816,2025-02-04T21:15:26.537000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000 @@ -265700,7 +265700,7 @@ CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd76 CVE-2024-43775,0,0,895151aa205f09b9fadb348edccc220463b0287de3568477154d6fffb476bf97,2024-09-04T12:27:22.670000 CVE-2024-43776,0,0,0e7377c058f9e86c53a9fbcebac62784c97230bd50dee78fb2efa5dfee29a277,2024-09-04T12:27:40.113000 CVE-2024-43778,0,0,93d68d17e0a2e000a95bbf7644af02e0b191bd578d600aa43c2fc854145868d0,2024-09-20T12:30:51.220000 -CVE-2024-43779,0,0,1673b0ccb4f71e295107bf1f32608553cd3d5631d345f13dc6e26c4772d714d1,2025-02-06T19:15:19.447000 +CVE-2024-43779,0,1,1ee49b72e21339b4e4610a8211493b26f819a34ff0c9035415e58bf1092d8414,2025-02-06T19:15:19.447000 CVE-2024-4378,0,0,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000 CVE-2024-43780,0,0,46050aabd5861673e59431ba81794de47ac0366f2a10d4dfb8ab15f44f094284,2024-10-16T20:07:50.637000 CVE-2024-43781,0,0,169ded40ca31dbd1f0dfd97b5659e936ba8664c1c6e73ed600899e39b741292b,2024-09-10T12:09:50.377000 @@ -266229,7 +266229,7 @@ CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2 CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c22f,2024-09-09T21:35:11.347000 CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000 -CVE-2024-44336,0,0,186d91dd65d0e16a41d7eabfa389a4457219d4f135453c8a67141781ecfb28de,2025-02-12T22:15:39.070000 +CVE-2024-44336,0,1,846148ce6b40c88498b1a8dca516e2832404a8fea9424f9c84bb8daf58a511fd,2025-02-12T22:15:39.070000 CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000 CVE-2024-4434,0,0,7c3e3d7c9744d63a28cc3bc3d3c440c5b3c9ccfe3f078d9d12a3b43c238ce6e4,2025-01-15T20:05:02.353000 CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000 @@ -266696,7 +266696,7 @@ CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344c CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000 CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000 CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000 -CVE-2024-45195,0,0,342f0a98e5a9e3f3efadce0277aa1afa0c0fcf49ef1de377ceb006160be59a37,2025-02-05T02:00:01.767000 +CVE-2024-45195,0,1,cf816ffcad66cd1790c759ffe0962c9c7ca15d04497b53b3356b6c253bdba65a,2025-02-05T02:00:01.767000 CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000 CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000 CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000 @@ -266841,7 +266841,7 @@ CVE-2024-45382,0,0,cd17bb10b42a7a52154b8f180f6a96138cbe671bc16e0955e6b9f0951bb6f CVE-2024-45383,0,0,18b2a12c0247f6bd404573e4f3025c14dad6c1dfae1f9cf4c31db12712f62634,2024-11-21T09:37:42.043000 CVE-2024-45384,0,0,cbfb50bafa8517a7944bff5db1df53c710c3eadab72436ecb1123d86217adad5,2024-11-21T09:37:42.190000 CVE-2024-45385,0,0,b38907c3c7b76d562808754d87a2b74dd59151e3345fd4bc12154a559e7a51ba,2025-01-14T11:15:15.750000 -CVE-2024-45386,0,0,f469abb7111a68c38df1ae42cfe8d7836b6cf0d6e888c29bb99a1ec7ac387927,2025-02-11T11:15:13.627000 +CVE-2024-45386,0,1,eec410884b7bbc56570580ae41ba2f05dcee0506cee58da94588de78683deab9,2025-02-11T11:15:13.627000 CVE-2024-45387,0,0,48ce2df68deffe7788a781cd699bc4467be59ebce1dfa9b06148a8e931572db1,2025-02-11T16:07:15.220000 CVE-2024-45388,0,0,5e8b5ccfdf2c3da6b5d7948eeb7403963fce2832acccafbcb71f9440d5a08c72,2024-09-19T15:18:32.007000 CVE-2024-45389,0,0,7edb5866be2f947d92ed825c273c577f4ddbd466128d69408c1eab72a19e26af,2024-09-12T20:17:31.767000 @@ -267042,9 +267042,9 @@ CVE-2024-45652,0,0,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2 CVE-2024-45653,0,0,d5f910fd8739708cf51cbbec066e6e9e75fa42921b46a68d0a44ce8674d18967,2025-01-19T03:15:07.643000 CVE-2024-45654,0,0,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 -CVE-2024-45657,0,0,fdd5f20f082e51f1979acdd711d7ef3b1ab82a611d6177f84553a4f4e31a7c8f,2025-02-04T21:15:26.687000 -CVE-2024-45658,0,0,aeaaa85bec14a9a66345d8e2347e69ab5e592a7c7aeae42de6cc8be9cc857681,2025-02-04T21:15:26.833000 -CVE-2024-45659,0,0,8876001399e4bf402b911f682ca7727588c218e8e7f972d9979ea8e9844c77c0,2025-02-04T18:15:34.723000 +CVE-2024-45657,0,1,cd6ce7bd5396679533d6fb9b8464015de524871bdda0dd5d3a77a5111128b375,2025-02-04T21:15:26.687000 +CVE-2024-45658,0,1,31a85bb3422a372e0b185ee9dd4ee56c4a518ef334840b7222ae3d01e2eceef8,2025-02-04T21:15:26.833000 +CVE-2024-45659,0,1,0895159fe44731498b416385a0a001615f3ff6fe1f25bbc34c263b64f34b8934,2025-02-04T18:15:34.723000 CVE-2024-4566,0,0,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000 CVE-2024-45662,0,0,42e3213cdd9e0313fa4ca25aac2349a283b3056fe3b2b35deed0feef55505b61,2025-01-18T17:15:07.343000 CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000 @@ -267077,7 +267077,7 @@ CVE-2024-45713,0,0,666522689d545773fb4d393ba17dd5329ddd1a19e8fc068f6a0a4d4daa205 CVE-2024-45714,0,0,c21a61c96d9ad07289ac1311a92c3e561bfa126cb238bbc3e6ffd66427ef24a4,2024-10-30T20:33:59.393000 CVE-2024-45715,0,0,d3fb9264b9b6b17a27e9bf802a32d0a997e0ee9ae039d618bf7318b8cba5cd8a,2024-10-30T20:59:19.737000 CVE-2024-45717,0,0,b575beb45bb97ad466302a3dccc5d8dcfa46f4979fd443a555c6f8535e51957f,2025-02-06T16:23:40.557000 -CVE-2024-45718,0,0,222ad2a72def1134b3e940307e7fe4889668d61a6c09c95b4cdbaee55fbff78c,2025-02-11T08:15:30.953000 +CVE-2024-45718,0,1,fae355081d93d47b01921ee9564e86155829bdc64689b3f978e6eee5fe91f3cc,2025-02-11T08:15:30.953000 CVE-2024-45719,0,0,6ca7636d4f46abcbe25b85f74f485dd396329e29ed902891ee416ba7b0049fcb,2024-11-22T21:15:18.130000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-45720,0,0,6a86ba9cdfe5ac34417d8fbd51dc29cc1d2649bdc73492c87e204c1b7f018bd3,2025-02-11T17:22:19.050000 @@ -267385,16 +267385,16 @@ CVE-2024-46410,0,0,31e03ba0c54c3d457ace9a72e0933a7183f5084a10c157e4925b9d8e3c1ca CVE-2024-46419,0,0,7af2356fc4a4cdc079ec535cf9b6451b04fa1664f50917e909fd51e655efa97a,2024-09-17T14:35:29.797000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 CVE-2024-46424,0,0,2273b0f58286ad09b52a454674cc24b223f9c5afb4eee6fc1ffbbf08a1bb4cd9,2024-09-17T14:35:30.557000 -CVE-2024-46429,0,0,194a6ff4e3916e63573fd231367a9c21da1d8c6a1dd6f268001e308be3ca06d2,2025-02-10T22:15:33.690000 +CVE-2024-46429,0,1,739fa3118cff78097d28e21a1b72b8fcd899f443d9a782c6501d16d09f3c3ae1,2025-02-10T22:15:33.690000 CVE-2024-4643,0,0,efcadbb3309b78f5cf67ed2cf30f7177332b3f74fa06b30eacdef749adb487da,2025-01-29T15:44:01.137000 -CVE-2024-46430,0,0,80a87571d55f7a1d0f8508f4ab858bdb322f83f70339270d4d6e6af36daa573a,2025-02-10T22:15:33.870000 -CVE-2024-46431,0,0,ac57e4bc5628a770301007145a2f328466b67878f02599f8193368efb990049c,2025-02-10T22:15:34.060000 -CVE-2024-46432,0,0,c6e579473edc07cbdb509ee36b6bd6aa46a5dac4df4ec087513f7f70e491e0a9,2025-02-10T22:15:34.243000 -CVE-2024-46433,0,0,14954dfb6ea73ab184b45efa8765063fbd179ddd9e2eb0dc899ab72fdc8e1d88,2025-02-10T22:15:34.430000 -CVE-2024-46434,0,0,1c432b7555f6225d67b2884e31c4ea07289bc92b625fce657a353e2c40818d40,2025-02-10T22:15:34.620000 -CVE-2024-46435,0,0,c8c8841c2b2d92b6f0005510be4b9eede96f8fe283be6c4a0b88f5813ade2361,2025-02-10T22:15:34.813000 -CVE-2024-46436,0,0,476f0561c5b620f7e4e3743f37749c7ec7631d73c99cf33a4990ec4e8103a34a,2025-02-10T22:15:35.010000 -CVE-2024-46437,0,0,3656fbee1d22ab4a333f844195b312fcb2a8638553e4e58644b4f464e4c1fc10,2025-02-10T22:15:35.193000 +CVE-2024-46430,0,1,1ee894be928faf493feb96f529ad6b851b2ff9e3b3b3424af25f9b3c775df0ca,2025-02-10T22:15:33.870000 +CVE-2024-46431,0,1,069e038e360577610f8b2a8f105b2dcc881adb230a72e90e54cd3d68d4d6f803,2025-02-10T22:15:34.060000 +CVE-2024-46432,0,1,ff447f49518319034eb075da0b0d7f0b2accbb64e4970329f8e4614130d59ffe,2025-02-10T22:15:34.243000 +CVE-2024-46433,0,1,a4630414f726566f0094d18d74749ee5f083a86024a679b9daa8975bdc4a2230,2025-02-10T22:15:34.430000 +CVE-2024-46434,0,1,946bdd54abbb5cb8b65748f86e805e91924a762b9f89d436c8f56eb912d18f84,2025-02-10T22:15:34.620000 +CVE-2024-46435,0,1,6db8ef976792279053eb64844b5d98712d1c1c34a5fd385405e45a9db4c7cfd8,2025-02-10T22:15:34.813000 +CVE-2024-46436,0,1,4ca07945749edcf90b25e2d3efee30f1404818663c2aaaa843c8c7f73631b687,2025-02-10T22:15:35.010000 +CVE-2024-46437,0,1,b81bc30be66bb857cc0fc6754bcafd3bb6f1d20bc75e2d1bf57341ce42cadad1,2025-02-10T22:15:35.193000 CVE-2024-4644,0,0,869d9d2c45015905b3e93f683113105cb048cc09d3bd4955db388902b51daa8c,2025-02-10T16:09:40.303000 CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194c52,2024-09-30T12:45:57.823000 CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000 @@ -267783,7 +267783,7 @@ CVE-2024-46906,0,0,9392cc16a6f8541a5ae7fa23a655b4084d1de04fab349df70429579f7befe CVE-2024-46907,0,0,078e0a524a643e2b9cff1a23a8c0882ba95612d7520992e82078626dfc38983e,2024-12-10T18:23:41.573000 CVE-2024-46908,0,0,55b70ed532f1853f99cc2c331e5a024319deea33e2ff1a3d0d6d3f10416dda38,2024-12-10T18:23:09.100000 CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8c77,2024-12-10T18:10:35.043000 -CVE-2024-46910,0,0,19c35e4a586a075f1d6c3c0126830f7f29749b700c6bfb541416c07500b10fd9,2025-02-13T21:15:14.590000 +CVE-2024-46910,0,1,b74f3887e7f31d62c757fcdf3dfbdb112077fe3d46b36d62f95a49db2ae8ba4b,2025-02-13T21:15:14.590000 CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000 @@ -267858,7 +267858,7 @@ CVE-2024-47001,0,0,82512b739d599a177453c09e314861017847d0227aaef8b1ee95f2f0a3f45 CVE-2024-47002,0,0,5c919a7b5eed1045781701efd4624c6ef2b2f30ba79fe4aa6e689aa93aabf61c,2025-01-15T17:15:15.883000 CVE-2024-47003,0,0,525372da90b89830fd41e0c884d9afded05f7a8947d62cb01c2a85154f0d7a86,2024-09-26T18:42:29.383000 CVE-2024-47005,0,0,d90719cbe514c55464440f47622554265d33eea28544c444cfe482b6e25c483f,2024-11-05T19:36:41.127000 -CVE-2024-47006,0,0,fe2be82050e35ab3fd23ec2c1c4c4d51fb456392b8464b3d92ed967c4074fcdd,2025-02-12T22:15:39.453000 +CVE-2024-47006,0,1,1f83cefaf30e468830886ef3479447e8055da38409e26b81d27328d0bebfd191,2025-02-12T22:15:39.453000 CVE-2024-47007,0,0,89fca0e021dd1dcdcc40431a1d37a47d29be0898f47767c4ce5f1f63d928d850,2024-10-16T13:23:03.467000 CVE-2024-47008,0,0,c3234378b4c9f9e8181fb1cd2d9194cd5eb402f69b194159ecc416569a5ef0ae,2024-10-16T13:24:32.130000 CVE-2024-47009,0,0,4ff1892829116a088472044089003c5524ee70bdbc79bf25ac8d489028da7a75,2024-10-16T13:26:39.990000 @@ -267906,7 +267906,7 @@ CVE-2024-47049,0,0,9435c3feeabad953f768be0dab3a8c5de1fda327c2cd4383c7019bbd8d92f CVE-2024-4705,0,0,70c389ca67ab3379e01e7be3997ee96e6665f685a382d4b4294d25153d98d41e,2024-11-21T09:43:24.977000 CVE-2024-47050,0,0,0ecdbbebc96569da8fe90045f207bda8eb6f3c0a2e057e37f2da498fe1d2b9d9,2024-09-27T15:29:21.450000 CVE-2024-47058,0,0,edde224a6d4e66b56d994d6f32d48711ac34b74b7c4338e5ce4a876e2e9cffc1,2024-09-27T15:31:30.917000 -CVE-2024-47059,0,0,f9b7c116dc9b64d147d98c0f1f25d762f07d8c0cc11ddd204d69e164771a4703,2024-09-20T12:30:17.483000 +CVE-2024-47059,0,1,a179fbcadeac2ac36464946db2605fea6e8bce1b21e66df8aaaa15d1eef57d90,2024-09-20T12:30:17.483000 CVE-2024-4706,0,0,3149e088dc20e2874012557f7a93cad12bf94c4bd0ac600fc84f4786a2c39491,2024-11-21T09:43:25.110000 CVE-2024-47060,0,0,494f551f24292d732b229fd2807625ebf7e1ba719a57e100d6197f38db195de8,2024-09-25T16:43:47.267000 CVE-2024-47061,0,0,f64d0349b66721eed4f56e73b4a8f0b9e381fe2723201d46573bd287af5cf69c,2024-09-26T13:32:55.343000 @@ -267921,7 +267921,7 @@ CVE-2024-4707,0,0,e65b188ea06841988570af59fea3d47c9f9ac747dd0bff4b49dca436b75799 CVE-2024-47070,0,0,f44cb16339f89c133e15084d069c0fb846144ea38144e388a800586a53fe0e83,2024-09-30T12:45:57.823000 CVE-2024-47071,0,0,ba349c35770c0b38461f4a8cd0cb017eb80bd299da2b0136e08a2f2a4f3af1d6,2024-10-04T13:51:25.567000 CVE-2024-47072,0,0,5396eeb2e43ea0b6080e1687e9e26b1d765ba3b900cbaf26034407d05f09195a,2024-11-08T19:01:03.880000 -CVE-2024-47073,0,0,8b4182e375a4a9e18b86ee0856bcc01c7bfe28872ceaf633e69f22d9fe4333ee,2024-11-21T17:15:16.160000 +CVE-2024-47073,0,1,3d093396fb3f062c2b9f4c4828481f73c2760c30da62b1bc38b8b8ddb3a2d9a0,2024-11-21T17:15:16.160000 CVE-2024-47074,0,0,5945c0ec22658edf552da4d4d0e2c77a971cac91f2ef7f591a767b9f728bed9b,2024-11-12T19:52:38.023000 CVE-2024-47075,0,0,a2d6efb1d41afa02c7ea509cf6e92889c9a139c99ce90d9a00872aa72d65ae14,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,66607a2d6fa007363ac6549c2a23f1ab8af8f0bcb4165cd6338f82d994cf0c10,2024-11-21T09:39:23.823000 @@ -268061,13 +268061,13 @@ CVE-2024-47250,0,0,11c644dbe63a41f5d721b32a69341c30ccc7630321c43481390341a1ac658 CVE-2024-47253,0,0,530ab00b63e8441eac6af22fa0a9abb006f28bbe2de90227cc8791b7979c1184,2024-11-07T12:15:24.630000 CVE-2024-47254,0,0,2ab452b813a2090516d8f238800b10e27c786f7540ac56e33f7f38e348d84cdb,2024-11-07T12:15:24.747000 CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004efed,2024-11-07T12:15:24.857000 -CVE-2024-47256,0,0,d3d8c30b0f310b3ff28cf03b3779bc7395e68e4efa72ca3bc434e2dd34584a51,2025-02-06T20:15:39.533000 +CVE-2024-47256,0,1,03d9dcd9246ea96d9e0eff043db015bc1d1c14db43fb45d7f7cea0ff4d23b5b7,2025-02-06T20:15:39.533000 CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000 -CVE-2024-47258,0,0,189516206f0cef8a9e06ec5598c1fbb82e722c7ba999c79ea446ac0086a46e1a,2025-02-06T20:15:39.643000 +CVE-2024-47258,0,1,300c90dbd855da523ff0d398327bbde67775e3f8dbffd37edbf2f5fc3dcdbf07,2025-02-06T20:15:39.643000 CVE-2024-4726,0,0,3e61e14a791c8650d0008a4e96317f2512c59da3e1881419f89f3069e84d077b,2024-11-21T09:43:27.817000 -CVE-2024-47264,0,0,74dc43ad03023a4ab226f24b451936e53ee67d8f09fb8c16e76c79c0ccd6c006,2025-02-13T15:15:19.400000 -CVE-2024-47265,0,0,0878d1b3612af62545b3bd4bb7a19f31f9753614371f1915874b0fefaa7dd399,2025-02-13T15:15:19.600000 -CVE-2024-47266,0,0,a8ed9826685d0f6b2fef8dcda57a85927d3994f6db0eca6e3be975eca01e8139,2025-02-13T07:15:10.383000 +CVE-2024-47264,0,1,bdb2ae61f681beec487e8af25d3a11ed486b12287057019c3e76e8a436874932,2025-02-13T15:15:19.400000 +CVE-2024-47265,0,1,8efdd4318786503cf0f39cc0c8ad040b17c802a2f969a2910ba793ae4b4f6dc6,2025-02-13T15:15:19.600000 +CVE-2024-47266,0,1,90cb14c9aceeed35d9c240ff0c2975561e1a5559a7d8f6e46559ec80407f7fd4,2025-02-13T07:15:10.383000 CVE-2024-4727,0,0,b5703c16f288dbf264e85ffadf388498a97a674e06139b3dd73d60060608ca96,2024-11-21T09:43:27.953000 CVE-2024-4728,0,0,07486e4cc1c7316d942acf75d8218bb01b9e16e07ced0971b743aa5d379224fe,2024-11-21T09:43:28.090000 CVE-2024-4729,0,0,38d98e689ed38290aad0e2be8440d8dd68c9fc563c9eb0f6007820b5dbe83342,2024-11-21T09:43:28.230000 @@ -268670,7 +268670,7 @@ CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d4 CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000 CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000 CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000 -CVE-2024-47908,0,0,7e19fa566229187f23e4705bf65d7946467d812b041aa38bde3faf9de64da800,2025-02-11T16:15:40.247000 +CVE-2024-47908,0,1,e7271cdf8a9626532e80846e60acf4fa03f1b58c03117b023ce1ae3ef0c92d11,2025-02-11T16:15:40.247000 CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000 CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000 CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000 @@ -268736,7 +268736,7 @@ CVE-2024-4801,0,0,e0d479fe6684bd964a945f41a70cb47e198c82f5bb4ffc4ee13b9c7bb6b509 CVE-2024-48010,0,0,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000 CVE-2024-48011,0,0,d0802d36d8c16d447cb26517cc8d3b6131002351b295b4fb171a8b113f998f1d,2024-11-26T02:12:04.277000 CVE-2024-48016,0,0,04cb598db2857d7944cce50bcf619a0dee145ba07ef43a0beebd957b9209e96f,2024-12-13T15:13:14.883000 -CVE-2024-48019,0,0,8c92923663092bbb34076fbc509d873d21552bffcff1e5d8b90c6f4185513487,2025-02-07T22:15:12.300000 +CVE-2024-48019,0,1,bda8728269b6297881c31e465d3ca1c4d84e83ad589447c2af586de2bd65bc03,2025-02-07T22:15:12.300000 CVE-2024-4802,0,0,e263708704854f9521e2dc0c2169a85a7654b220f9b4af0cf405f000d5eacaca,2025-02-11T18:30:08.557000 CVE-2024-48020,0,0,66d35d0e43259dac4ce8f67fa430164a93786f466a2ab3da417eb0d47f384ac7,2024-10-15T12:57:46.880000 CVE-2024-48021,0,0,bd1b80eca231c15d52a9386c09058579df399b553f2fdb9b275ce81686277fd2,2024-10-18T12:52:33.507000 @@ -268790,7 +268790,7 @@ CVE-2024-48075,0,0,c750cfc63f2eb9e37fb6c605b4fffcddd3176068f4b6ccea67410855bd98f CVE-2024-4808,0,0,5b86642368366b6191d981112f5ed07c26a5252bae16c28238118354653ee5e5,2025-02-11T18:35:06.960000 CVE-2024-48080,0,0,4ff34a29c96f255ae676e73783c03e8fe60d402dc4f0862dbbcd7ea38c00a682,2024-12-03T19:15:09.947000 CVE-2024-4809,0,0,d32cec06d3a1285b2919824b5678e22149fd6eb4acf80605ad5ac14ea1e6e44f,2025-02-11T15:29:21.893000 -CVE-2024-48091,0,0,ca258332ac88289dbb71ea2389c333c251eb7bc6eb17c6a779898e2bbd1313c4,2025-02-10T17:15:17.513000 +CVE-2024-48091,0,1,f11cffbd3be09ef09f61433586fcca7a0cd8e4d256b3d2e4d6e7fcf55010741e,2025-02-10T17:15:17.513000 CVE-2024-48093,0,0,5d2687b42ea5091a471e0a05e1b5da269e599c88de65d10bf1edcc9d58bd7eb7,2024-11-01T12:57:03.417000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 CVE-2024-48107,0,0,b5b8b343747520d221208e32b51858629d40939b404e026dbb08a7426b04cc09,2024-10-30T17:35:10.860000 @@ -268820,7 +268820,7 @@ CVE-2024-48153,0,0,8f8abb4c772e2c722ff428fe00187f9b6c882572e02c4e3368b92a462f733 CVE-2024-4816,0,0,fef5824bd2dfc2b3cc7b7819e3a058275a15a939e06187fc90b4f9ac47eddd43,2024-11-21T09:43:40.753000 CVE-2024-48168,0,0,c8182ce0d3356b936019874b976817ca2e205233549304053f6c152dd63c77c8,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,69b54e13904730a2cb8b3640e98d901bcd198715db2965178e6e36fa08e9e5ee,2024-11-21T09:43:40.890000 -CVE-2024-48170,0,0,74185f0945114786d8cc5d25a13cb23548a2cd058ba7911af9637ea64f1176ce,2025-02-10T18:15:26.243000 +CVE-2024-48170,0,1,8fb631e53089fd82c126747eaceba5ed0afb0e2912caea1fe7313c091e4af608,2025-02-10T18:15:26.243000 CVE-2024-48176,0,0,361e37561a50782b7c3bb1ddcf565a9526e0808df3a2cfee43b6842d60dab4ca,2024-11-06T18:17:17.287000 CVE-2024-48177,0,0,b59cc1c2e42f675a1362418899fda46dd8119ec25122c12b9138beae75e838dd,2024-10-30T17:35:11.637000 CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000 @@ -268914,7 +268914,7 @@ CVE-2024-4837,0,0,bf6369bee9a6dfac96ce0733693f5a63eb4e5fe5734ee8dad577fcabd78256 CVE-2024-4838,0,0,c0d63d16282dd18c836e8aa545fdb45b66bb486d6db7456648ee8a63dd42b02f,2024-11-21T09:43:42.687000 CVE-2024-4839,0,0,a7d79def0ddf9d653428a5a591ff65b460cad2e8b5231f743494cd8efe4a3d5a,2024-11-21T09:43:42.800000 CVE-2024-48392,0,0,1c11dce693d0ee4995c004b60cd37a77352c7b39b9fd83c1c36edbec976ad14d,2025-01-22T22:15:09.283000 -CVE-2024-48394,0,0,99cbb0dc2afe2b9c23e20d05289d801556755b19b67b72fa590439f8187ba4cd,2025-02-06T16:15:37.697000 +CVE-2024-48394,0,1,da54c046e87cee6773e87f44467cf5652ce32f1b8fa2c5d4b496d3dd860e8270,2025-02-06T16:15:37.697000 CVE-2024-48396,0,0,02200ea69824b1ea09777c3c3c73e74f2ba131f00cf994b110bfdb34b8d358bb,2024-10-30T20:35:31.167000 CVE-2024-4840,0,0,55ccd5cd93de647439d058661ef78145ac46b40735b9afde6747455bb308fd17,2024-11-25T05:15:11.437000 CVE-2024-48406,0,0,29efd63958fab2009ed4fc9683ab93a6a59efd85a7c3925c93c76285d2372909,2024-12-04T17:15:14.693000 @@ -268939,7 +268939,7 @@ CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc0 CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000 CVE-2024-48441,0,0,e18fc6f4de2b212db2b7205e1d5eeff25b33b83c871c639edef8600af54d0283,2024-10-25T20:35:12.680000 CVE-2024-48442,0,0,2d256703959d5674c7059d0fc373d70703c32fa535ede7e1382722511cb6ae8e,2024-10-25T20:35:13.447000 -CVE-2024-48445,0,0,06b04c8eac23dd0587253e126013e66013d0d2b584c72a5190da80109b3d6053,2025-02-06T15:15:13.440000 +CVE-2024-48445,0,1,aa32dd325003947750a89c9feb58e02bea2cb8d49a4661a06a76a034fdb89080,2025-02-06T15:15:13.440000 CVE-2024-48448,0,0,a99f12680e27f2aa26c82e15e379e1be001a083141c2de9e36bbeee9d3fd22db,2024-10-29T21:35:22.540000 CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed01,2024-11-21T09:43:43.393000 CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000 @@ -269525,10 +269525,10 @@ CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4e CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 -CVE-2024-49348,0,0,88c8c60f3e2853f1a65b5f70e7f2444d2ffeabb2b11ec2a7babd3d05f126a7c8,2025-02-05T12:15:28.570000 +CVE-2024-49348,0,1,0c6cdfcb5307c005a68c1aff02f6722c257087813897611dd4477d2e900a8fa1,2025-02-05T12:15:28.570000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 -CVE-2024-49352,0,0,635dfd94e76e135a953ae64f6125529f1aba9b6bbc9b85ee86124e3f934a20ae,2025-02-05T11:15:14.540000 +CVE-2024-49352,0,1,5b54f9b75518511305c412ed74c5838fc4e1568e8431a075550c1b801ecdf820,2025-02-05T11:15:14.540000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000 CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000 @@ -269796,9 +269796,9 @@ CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944 CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000 CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 -CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000 +CVE-2024-4972,0,1,b69d91344e41c4f2a660891995563a25561e7bbb9d6c34c0719d004a3e9665a6,2024-11-21T09:43:58.863000 CVE-2024-49724,0,0,637db4c25d376d3a19176854d6160eb38bf1f0ef1a09f7ddf8eb8fc3d6832b42,2025-01-22T18:15:19.813000 -CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000 +CVE-2024-4973,0,1,b32b47435c7859fa556e15b843ccd74930f612e66861e62acec45b15f4650de6,2024-11-21T09:43:59.010000 CVE-2024-49732,0,0,eaa81fd8137bac828d101bdd530f7768760d875c02577de9f14f1a9fe4855dcd,2025-01-22T18:15:19.960000 CVE-2024-49733,0,0,f12eeb4f15bc9bf4d1aaa92a71a5f99b7e6aa378d95604f3e55971ea1ab22ea4,2025-01-22T18:15:20.100000 CVE-2024-49734,0,0,36a9153682a6cb411a63baccea4cf9acdd7c90027f9196887b4109cf5a0d1c34,2025-01-22T17:15:12.253000 @@ -269806,14 +269806,14 @@ CVE-2024-49735,0,0,d4d6038ee7adfbb8925ca5b3f33aab509d0fa4098005ce7e48d03b419e4e3 CVE-2024-49736,0,0,27824dd9d2ea2e1d6b6c0698e076e4921aa534d7478a119fbd62cd04551fc526,2025-01-22T15:15:13.007000 CVE-2024-49737,0,0,471846391ec1276ebecf5b9a1f7a6bcd968da433a39a8b7e36647c6217d6187d,2025-01-22T15:15:13.150000 CVE-2024-49738,0,0,d313b71a89808187a6f044b9b2d8417504970cb0a631e642bef9da559eab0a9a,2025-01-22T15:15:13.280000 -CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000 +CVE-2024-4974,0,1,e1f8d8b7975885dcc5d2de2e977286c41f55043917d4b19c76575b6d6b8cd203,2024-11-21T09:43:59.157000 CVE-2024-49742,0,0,6a74f5edab050210b51e228389fc2d915bf71adac5d8b52f4d66829ed59a9e42,2025-02-06T15:15:13.597000 CVE-2024-49744,0,0,d9149b626b0551bdda033e6c3e5fd7e77a236d3e100e0971825e6b3f10894dc0,2025-01-22T15:15:13.557000 CVE-2024-49745,0,0,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000 CVE-2024-49747,0,0,acb3452eca834436ea1a62003adaf88e40e233842d86f28389761b776989bc13,2025-01-22T15:15:13.840000 CVE-2024-49748,0,0,c403f929b3a3b1bc4a6890a72c6e134c8d820307a8bde3466befbd92b6ee20a6,2025-01-22T15:15:13.980000 CVE-2024-49749,0,0,84864c9edb5d596202ddd37a4339885684fd8bd32ff322d7abfc57ec8adc3f5e,2025-01-22T15:15:14.110000 -CVE-2024-4975,0,0,d158c3c26e7b9ed3b1558cbe1dfa904308e63625da2b58fbfd707b0851aa6e0c,2024-11-21T09:43:59.293000 +CVE-2024-4975,0,1,49c1119b57824f1000c19d23ffaa04c3033873bf24120b59267c9e33a6809a5c,2024-11-21T09:43:59.293000 CVE-2024-49750,0,0,b8c0592657dc23f5dade6581318fd4431bb1aa3486d0f4172a6b42fac1aa50c3,2024-11-06T14:58:19.993000 CVE-2024-49751,0,0,b6ddfe86ed223562a30da85143aed986d928de448e01372a87230a49d1f635ac,2024-10-25T12:56:36.827000 CVE-2024-49753,0,0,3f663b961aeb9320e44ea5cd43eae20a14133b4b1c320ad771b5faf187c0b73b,2024-10-28T13:58:09.230000 @@ -269861,7 +269861,7 @@ CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004 CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000 CVE-2024-49806,0,0,1e9e7366d429bfe4288411d8922c4ce74b00945547b83f0b9b47dea0218eb8ae,2025-01-29T21:25:06.310000 CVE-2024-49807,0,0,68d646b93ca169d9246962a92303d7bb36c19bfd79c59c0a41204a851f5cb51d,2025-01-31T16:15:34.647000 -CVE-2024-49814,0,0,4fee9b0e85e37e410504710a20628ce6f1d942efed7cc71c6e24f8dfe725acc2,2025-02-06T01:15:08.230000 +CVE-2024-49814,0,1,7744698f5403f3ee924254eea82f65e46ab706e1ab470d95397226a3223d99c2,2025-02-06T01:15:08.230000 CVE-2024-49816,0,0,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000 CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000 CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000 @@ -270636,8 +270636,8 @@ CVE-2024-50561,0,0,6e9638f0f60e16338236b907a1e47f7b7327afa6eab4f536c2f1ce7c47ae2 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 -CVE-2024-50567,0,0,d14de7fa5cf1b490d186d51c1d9bae37fed9df5bea2590c772e94a885e73339e,2025-02-11T17:15:22.980000 -CVE-2024-50569,0,0,c27c73a3f8136fd9aa5ce6df39b8809e31126b0c676dbd0616682c1c20fdb98e,2025-02-11T17:15:23.123000 +CVE-2024-50567,0,1,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 +CVE-2024-50569,0,1,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 CVE-2024-5057,0,0,24284bac69b4c25212e4a35daa692adcac74ee6bf20853c9d795eba1dce69ef7,2025-02-07T19:44:53.660000 CVE-2024-50570,0,0,2d9dc66724750d347def0458b21203e33f8d848938408b5276fa284db7ba2a64,2024-12-18T15:15:12.660000 CVE-2024-50572,0,0,e0c52070c79ff3d38f8e382d0def90de0475159b8e5dc64d0e89e7edb9e51fd2,2025-02-11T11:15:14.237000 @@ -271029,7 +271029,7 @@ CVE-2024-51440,0,0,791aca99f0e4fa3be44b578d371a5bd0856e20a6890653e6d757068785da4 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,026f2f79f883da59dbffb9dacf2ddcce01313f0fb97ba3b8dc804a5b33e0dd57,2025-02-10T13:57:18.723000 -CVE-2024-51450,0,0,f890ff049092a49cdb7a4f47bd683a7b97ecf69edfa3fafd635ff5fa3a5a5bf3,2025-02-06T01:15:09.420000 +CVE-2024-51450,0,1,daaced1779c691b607ff843bb370a3f42aeb8807361c3f8517017dba197273ad,2025-02-06T01:15:09.420000 CVE-2024-51456,0,0,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000 CVE-2024-51457,0,0,893cef4ae9e43d4b9742e779f4c414c0a3f89b1dadab33af1538a6b7624beabd,2025-01-22T17:15:12.390000 CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310af,2025-02-11T02:15:35.307000 @@ -271111,7 +271111,7 @@ CVE-2024-51543,0,0,2e5257f71ed91dbe805d033e4a6755a3128eea835afba16fb7592fead3d31 CVE-2024-51544,0,0,7efd9c63e1ba6e4739e8df404675fe83bcef56d7a820892978f28dad5fdcc658,2024-12-05T13:15:07.767000 CVE-2024-51545,0,0,12784dd02658da51b8fd924393f44f530cd7fafbc95dd8f22bad4eb10273a07b,2024-12-05T13:15:07.920000 CVE-2024-51546,0,0,5c6de9d868a42f3fc08dc14cd51663420600f19cb389c7f5f42de4b279edee8c,2024-12-05T13:15:08.077000 -CVE-2024-51547,0,0,678da1202b8fc596083b055dffc9cd8cd98110b83676801bb6b9148defd5b0cc,2025-02-06T05:15:12.850000 +CVE-2024-51547,0,1,1e3ee33e81c62d0d6c24af32c02715f546def02ecfddfc726ab45c749dd59cae,2025-02-06T05:15:12.850000 CVE-2024-51548,0,0,e88659b0097cab2f2778fcf3118d332e05ca9d29ffa98c4c01f12c464b76742b,2024-12-05T13:15:08.227000 CVE-2024-51549,0,0,cb39e548643b0e1d431233e25114b65e98b55fdbfea2fc2ee3734fd0108cd465,2024-12-05T13:15:08.397000 CVE-2024-5155,0,0,2801a7861c6f621ab1aeda3d9644689e4c7101f0c6cd1c35db7e5ad1a20fc106,2024-11-21T09:47:05.140000 @@ -271643,7 +271643,7 @@ CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f4 CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000 CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000 CVE-2024-52294,0,0,6292d16468fc827dd6fc5e9bde5041230ca83aa97d2fa7a45b6fdf7131f4357f,2024-12-30T17:15:09.467000 -CVE-2024-52295,0,0,e730c6e09fd9fd9e28e10b0ed526a93e0a22272d88079810e21b865a0086f60a,2024-11-21T15:15:32.900000 +CVE-2024-52295,0,1,e1efe4101b45f07177f061e2ac83f686fb357430fe974441f146b398fc7fd083,2024-11-21T15:15:32.900000 CVE-2024-52296,0,0,b562f18595b8ca53024157f705b18f7c73f8b643fe6d08b20dc5b815792285b0,2024-11-13T17:01:58.603000 CVE-2024-52297,0,0,5528a19c9c06652e4abd378b7e62659078889b6d0c1cac57d71cfe9d52fe1e73,2024-11-13T17:01:58.603000 CVE-2024-52298,0,0,0e82a2c04d492598179d5deb8d7d99c3d515ec084ea8200a762f2512cbb5ddcf,2024-11-18T17:29:27.170000 @@ -271713,8 +271713,8 @@ CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca61 CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000 -CVE-2024-52364,0,0,7fce64dfa312c02995bfaa59cb094b5aa54badb30a5a269f0b64faa8114ce6b1,2025-02-05T12:15:28.743000 -CVE-2024-52365,0,0,d7b19ea0e5e47add265a34664a3c2dba07da6753dba22d2ea077951c3c895f93,2025-02-05T12:15:28.917000 +CVE-2024-52364,0,1,11ebdc4f029fc92efbe785c04c8edcde23c1939eaef3d0ba101c2de72270cd25,2025-02-05T12:15:28.743000 +CVE-2024-52365,0,1,927d2f6d769f42b151d1930d90c89aa267bb96e1faf5415104568e34dc5ab589,2025-02-05T12:15:28.917000 CVE-2024-52366,0,0,5eb5d532a2a455b08ea0a92266486ecbd59be84360d732dbaa7ab966f9474b5c,2025-01-07T12:15:24.680000 CVE-2024-52367,0,0,c8bd249cf84afc9db3295deb602b0f010566468527c0212f3c545dd982041f33,2025-01-07T12:15:24.847000 CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000 @@ -271954,10 +271954,10 @@ CVE-2024-52599,0,0,0db0a011c2a72c6bb6dd64e9b34949435e5305b006875a178839b0fbb4bb2 CVE-2024-5260,0,0,8aeb5f59e0af1434aed2a86695fc7323d358843f1ec9f9fa343a3c87b2dc49d8,2025-02-04T16:52:34.487000 CVE-2024-52600,0,0,a943c0271bba15206eb04ad43ca34044fe44d51a2cff4ca3141bbb7e1938b0c4,2024-11-19T21:56:45.533000 CVE-2024-52602,0,0,dbb3f6bfc53551d2091c95c757df3cb100dad25fbc396d181000dd0d2ef91aa4,2025-01-16T20:15:32.503000 -CVE-2024-52606,0,0,c39458dca7f3f245ad390f83e3085b252bbc20a83a1a5644f42c7b93ebf450bd,2025-02-11T08:15:31.133000 +CVE-2024-52606,0,1,e84385c24089fae677580c8c955393bcbba3884dc4ac97e4179162f4ea490f64,2025-02-11T08:15:31.133000 CVE-2024-5261,0,0,580aa98e51c4d4415b97bb4b6e967076a591fa4b24cde3cedd85bd2f60c23569,2024-11-21T09:47:17.947000 -CVE-2024-52611,0,0,4af670a903a33ef2db5879e5d71f1d0b685bff1a2f1e3cf0eaad6bba74be6bec,2025-02-11T08:15:31.280000 -CVE-2024-52612,0,0,916b0e50c325cc316dfb1bf446655f765e2e53c3e75a8504d9336c92562b724c,2025-02-11T22:15:28.570000 +CVE-2024-52611,0,1,c665a76b5ab89c73ee88ea04df5ce448822bb16c3c8e82c95c840ea972e724ca,2025-02-11T08:15:31.280000 +CVE-2024-52612,0,1,f5e485e16df900256b30261136ffdf6187ab63caeda82b28e74d932afd875703,2025-02-11T22:15:28.570000 CVE-2024-52613,0,0,ea4f19d3def098c89d96f3bdc7b096fa414b50502db28af233d85fbd71ae6cda,2024-11-20T17:35:28.730000 CVE-2024-52614,0,0,7f2270286c9c1ae4321e62b34a3d4e298b4e533b10f50a6189cade1437a72fbd,2024-11-21T13:57:24.187000 CVE-2024-52615,0,0,9014df92921c1ab65234bc6cbdb4eabe2f462bdb364c05aad94f8209a173e832,2024-11-21T21:15:23.807000 @@ -272096,13 +272096,13 @@ CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a4392704 CVE-2024-52875,0,0,1ac4526d2c044d382cc0f35ef9e40c2813ed4958da8686e71b5eb97bc5d89bd5,2025-01-31T08:15:07.827000 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000 -CVE-2024-52881,0,0,a1d4e9f578a8b78284d95a103202b360e106dc391e402f36a6258b1af74e0981,2025-02-10T17:15:17.687000 -CVE-2024-52882,0,0,d43038b7437cf4ae0fef8f9c75f5568d8379e32ae461ec0ece0270ce57fc5df8,2025-02-10T17:15:17.860000 -CVE-2024-52883,0,0,2c1dec563f419b2d0f1619caf14b0a5b8e59819e630c75e97af3d6e7475f65b0,2025-02-10T17:15:18.027000 -CVE-2024-52884,0,0,ede7e3d2e03e84874f5cc1e36340a8d09e4fb5a3bc2291321ff16fcae0b8052a,2025-02-10T17:15:18.190000 +CVE-2024-52881,0,1,6827d5b00e4d65ecef084d42789cd1b28668fbddfe238fc2e2c516c9983ea948,2025-02-10T17:15:17.687000 +CVE-2024-52882,0,1,0e9b7e7fc9ff7df204d4c4669c35379bdd8bdf36506c56aa49c6db64563e7a8b,2025-02-10T17:15:17.860000 +CVE-2024-52883,0,1,52d7ad1ab3055f670faacd58028c9ee893ca0da51fa82feaca7a6e676a1b1814,2025-02-10T17:15:18.027000 +CVE-2024-52884,0,1,3227498fd6659af285064d680f971c699a66d023f187f44698185a705cf44c56,2025-02-10T17:15:18.190000 CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000 CVE-2024-52891,0,0,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127010,2025-01-07T12:15:25.010000 -CVE-2024-52892,0,0,51b120f05ecc561fc57785048af19814a6f54136bb2b0442dcfc94ac1c7528d7,2025-02-06T20:15:39.763000 +CVE-2024-52892,0,1,70788c25d86f20ecd74fbe3cd5b1e787e63f4f7af2ca750bfad2d4b05106647d,2025-02-06T20:15:39.763000 CVE-2024-52893,0,0,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 CVE-2024-52895,0,0,7f4a5ce15883b62a7aa1b544cdc19f80b65ed4bfb8b25711977644f659f94848,2025-02-14T15:15:09.210000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 @@ -272147,9 +272147,9 @@ CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549 CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6b64,2024-11-27T06:15:19.083000 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000 -CVE-2024-52966,0,0,c70df96cfa9d25f808b45e91621e40b1d3878bb66d24b154be6bf01fc49f8fc1,2025-02-11T17:15:23.260000 +CVE-2024-52966,0,1,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000 CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000 -CVE-2024-52968,0,0,b49dd9810fb69b73e8f8e06a4ce520c85214e990e3f0e78252064d8635e3d5ad,2025-02-11T17:15:23.400000 +CVE-2024-52968,0,1,ff2b69e32eba4e9c984463e355806da0ee95362a6b2e0f606c9a874c6c5045d2,2025-02-11T17:15:23.400000 CVE-2024-52969,0,0,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb5572938c,2025-02-03T22:01:44.330000 CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000 CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000 @@ -272425,7 +272425,7 @@ CVE-2024-53261,0,0,e0db8a3a963673511dc9fcf9efc221aec217f488643d1b352acc2373992c4 CVE-2024-53262,0,0,a30976483b4a3447c0f3cd137bc9d61475976254751462f53de127c8053e7844,2024-11-25T20:15:10.423000 CVE-2024-53263,0,0,700cdfed8f741f2d8aa9ece089ed6727ccce007d7d0acc16c4683f8427dbca61,2025-01-23T18:15:30.630000 CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000 -CVE-2024-53266,0,0,69b8fdb2e3853bac8ddb13f2d6220f8d05a668ab752d03ce1dccd3b6859a6899,2025-02-04T22:15:40.347000 +CVE-2024-53266,0,1,ddb9eb1f47a1a9d580514c0cd9bc837bd66ac77ee28f373a559fe11e9a7d8135,2025-02-04T22:15:40.347000 CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000 CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000 CVE-2024-53269,0,0,10f17034cc92e946addde968e4d2b396d89d8d27bdb763a678137e91a2a2579b,2024-12-18T22:15:06.763000 @@ -272566,10 +272566,10 @@ CVE-2024-5363,0,0,79eb8456eb19fe19c5c77bab3a49769c95ea98313c179862e34c094f4a39d1 CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,56b33ec45d578038390bd0cc730f3f372f3f8862a9da9d08d1b53ba0a0bb643e,2025-02-10T14:41:25.130000 CVE-2024-53647,0,0,cfcb346f723938ad054c8fdc72391827a75db16440dc5160efbbab2c409a3044,2024-12-31T16:15:26.437000 -CVE-2024-53648,0,0,18848d221b42555081a4141ceb6315d3bd67c966d5a4e593216e21035d683220,2025-02-11T11:15:14.460000 +CVE-2024-53648,0,1,16a74bbbc3e58adaa3bf6edf8dc91f7ebcec68f5c8aba6f611e8ef950fce6267,2025-02-11T11:15:14.460000 CVE-2024-53649,0,0,9ded9a1225cbf83b2783d3206ba523c1709b770ea01a16ddef19b3e6d5621863,2025-02-11T11:15:14.710000 CVE-2024-5365,0,0,13ce404c3c262f018a05345bfa8eee6564eca44619831f9aaf69bfe2ed9c4891,2025-02-10T14:41:59.380000 -CVE-2024-53651,0,0,1e6737cb02397363d533a9b8196bed754d51e03d92250649b34503ac68356bae,2025-02-11T11:15:14.880000 +CVE-2024-53651,0,1,1d79adeb9f4569ae13e4f774a519f1069b4e6b3c314248f9f7361b9af679eaeb,2025-02-11T11:15:14.880000 CVE-2024-5366,0,0,9d70b5ed0e8d066f5d907cc746ac0c9d553ad9ef89670eaa776caa3eebbd1fcf,2025-02-10T14:42:23.697000 CVE-2024-5367,0,0,ee6025327c1c265bd1d888b77c34f3bb2d3f68a060218234e4a4842e48086d8e,2025-02-11T18:33:01.067000 CVE-2024-53672,0,0,c034dac4c4637a95856788fb40ca70c5483331e0a98b00ebbe100e048ed73860,2024-12-06T20:15:27.883000 @@ -272751,7 +272751,7 @@ CVE-2024-53848,0,0,5d7406bf40d4383800e1de0c70eb6032691db24ded6c883df8d312fa0222f CVE-2024-53849,0,0,f7fd156ba960e1400032bcd2a440eb2ecbbd580ba41ebb3240bf91e42f2c7ef6,2024-11-27T00:15:18.223000 CVE-2024-5385,0,0,fa21eaac1ccc1dd83453f73d0429f6b092a76879b602ed8821e28b1a64ccc66d,2024-11-21T09:47:33.243000 CVE-2024-53850,0,0,48a6f71fbee98798011e6cf7341c60a302489e4c611f91cc0d1ba8661e4acb7f,2024-12-26T22:15:16.373000 -CVE-2024-53851,0,0,a8f2c278a7dde3d2cfaab6df4382b1d5379533718ee76976e5ad88fba04b6af6,2025-02-04T22:15:40.490000 +CVE-2024-53851,0,1,e74913921a94eb67264fa905881d348ddc324d61b5037aa74b58288010584fcb,2025-02-04T22:15:40.490000 CVE-2024-53855,0,0,dd3ea65b274a6507459e81e4f9ff698173afb5798aaa47c5c658783336d2ea0f,2024-11-27T19:15:33.563000 CVE-2024-53856,0,0,d77350d79c13ffba33e17939c04869d767b27648ee4c25fe3529c0b3250035fe,2024-12-05T16:15:26.237000 CVE-2024-53857,0,0,3a14a169c4ddb5115a7dce43c38c55cd1de16f9407cd80c9b2efbf2e14145355,2024-12-05T16:15:26.393000 @@ -272768,7 +272768,7 @@ CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 -CVE-2024-53880,0,0,34183cceeecf9f65c439b51cd1afbc636f6139fbfbd07e606a43b81980ad32fb,2025-02-12T01:15:08.940000 +CVE-2024-53880,0,1,8dcea8918e1ffca5996c89b6398d03de8dcf18de3593db049951713706669fc4,2025-02-12T01:15:08.940000 CVE-2024-53881,0,0,9961109f8d29619e875e57c963e9962bf41cbd2a63df9c973c97fd1f736a0a6c,2025-01-28T04:15:10.170000 CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d1409,2024-11-21T09:47:33.420000 CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180bd9,2025-02-10T18:12:06.107000 @@ -272831,7 +272831,7 @@ CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85 CVE-2024-5397,0,0,564acdcbfc9dac7a844ec06f4ef19eb7d83976348ee7d0a1a270c23ed8471553,2025-02-10T16:20:41.830000 CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 -CVE-2024-53977,0,0,31ede8bb6db43a11eb72a516f21cf5a682a0da8f496841c8eb0956f4f177750c,2025-02-11T11:15:15.063000 +CVE-2024-53977,0,1,12d017cb33e32f23864efced2c126af55eb60414ad0aa463f96d4912a8bf85d8,2025-02-11T11:15:15.063000 CVE-2024-53979,0,0,172b408869a05417a1da8cf6907f79662a75490e703fbb88a760f582875697a1,2024-11-29T19:15:09.847000 CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000 CVE-2024-53980,0,0,64ddd32930006aa2796d65647f09fb8f5652d73c826cc47097c0f7c8027a4a9c,2024-11-29T19:15:09.993000 @@ -272848,7 +272848,7 @@ CVE-2024-5399,0,0,288e52e14a6c0d307abe51f4547e4c97fb8609187689201d5c80525711bdfe CVE-2024-53990,0,0,c12d8d6491761b84e3c9cbf6d8d0ec68eb0e2a55a4d29316acb646b0bf606b88,2024-12-02T18:15:11.753000 CVE-2024-53991,0,0,1aa3d39cfb5149ae5d3c6a1fbecf948ce6ac704feca22e25e4683b08ebe298d4,2024-12-19T20:15:07.670000 CVE-2024-53992,0,0,0b3a35495bb74067a0d76912041d2b5ea6535fc009d5110d24df3f489d2b8ff8,2024-12-02T17:15:14.113000 -CVE-2024-53994,0,0,6cbb997feb467472b020b66a1f362f2458e39b0c53447580c2c8abe570e059f2,2025-02-04T22:15:40.640000 +CVE-2024-53994,0,1,e4fd7d1433ea2d2045c5c35bea5f1bf7a01f256f2a3382035223ecd4f6dab31c,2025-02-04T22:15:40.640000 CVE-2024-53995,0,0,bb00635dc35c619dd42afff400a8261ef12f79fde565f175ef58b92669e140a0,2025-01-08T21:15:12.703000 CVE-2024-53996,0,0,d36e247a06b1f41c7c1e65228887c2c12a82ebc001f7a83b885b351bf294ce08,2025-02-11T22:15:28.677000 CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000 @@ -272865,7 +272865,7 @@ CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c2 CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000 CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 -CVE-2024-54015,0,0,1c55fa54b3c222e06324fc1ae227933618a648f41fcf84bb0b8217ec7cefd073,2025-02-11T11:15:15.227000 +CVE-2024-54015,0,1,119980f1865b8ef12715fd3e69dcbb1b603c95c65360577e99ee3dc072f0bdb0,2025-02-11T11:15:15.227000 CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 @@ -272896,9 +272896,9 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 -CVE-2024-54089,0,0,25eceab8b77e2f4783c76f04b3ec5dcdc41def731f9a57b61fc27ef3726c1ca3,2025-02-11T11:15:15.423000 +CVE-2024-54089,0,1,57816272aa638f6c72a9100770aae69d31a8208a1267259237f9c21a90103301,2025-02-11T11:15:15.423000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 -CVE-2024-54090,0,0,f463ec504b55adf3a71d9e14876232dff28983d36d93083e8d968f2c1979ecdf,2025-02-11T11:15:15.647000 +CVE-2024-54090,0,1,2ff8ffb3be368d902078ee8d661ee8d2259cfbf69ab911c39749c42731cffe81,2025-02-11T11:15:15.647000 CVE-2024-54091,0,0,dc5c73da9eed4ea1b769bbbff881c5fabd4f746f0337a6f741715e6c55e58677,2024-12-12T14:15:22.953000 CVE-2024-54093,0,0,9b4c9fb3253eae2faddaa5bce4d624f7927535a01dc9c7aeeb4d509f723ada4e,2024-12-10T14:30:47.350000 CVE-2024-54094,0,0,cf96d6d8d60da1a36d1a1bfb1632bde8be180877f2a723a0aa843c80fa8b603a,2024-12-10T14:30:47.507000 @@ -272973,10 +272973,10 @@ CVE-2024-54157,0,0,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e21 CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 -CVE-2024-54160,0,0,f1c40d3cda0d23d0f4928e272d371e80332a2621ca29b9d07b061a13560813a7,2025-02-12T15:15:15.050000 +CVE-2024-54160,0,1,4df1c13c84c21e9aa7050ae9319fa9577473b95f44c8e77953e28575fc0cc4c7,2025-02-12T15:15:15.050000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 -CVE-2024-54171,0,0,0b1e68485272d4832574ebb9e2b9b7d4e5d9f12a8c58fc003ccc374e2ce65830,2025-02-06T21:15:21.453000 -CVE-2024-54176,0,0,1d22afff13116a5ec5700906a2d882f14295c99348d00475c7572a5a8fb2a6c7,2025-02-08T17:15:21.643000 +CVE-2024-54171,0,1,a280ad61fd608c1b98587e9d28d9bd94ac1778ae44bdf28b8d1cc31a429024e5,2025-02-06T21:15:21.453000 +CVE-2024-54176,0,1,3bc9287e3e58e7e6c0a7e2abddd56567ffcfb09091c3a0c19ab5f7535da36a73,2025-02-08T17:15:21.643000 CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 @@ -273337,7 +273337,7 @@ CVE-2024-5462,0,0,f749f3060428a6b147d3ac48fccb7b849dbfaa192c07033d90585346180915 CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 -CVE-2024-54658,0,0,7a9cdc0222e0b461e63d80c8fdf54d6610859eefa7c8a263b09ec91c3e1b32af,2025-02-11T15:15:18.440000 +CVE-2024-54658,0,1,217a4e7373d6be90c50ff040d7146caf1b6101267d372975ea04351bf9add79a,2025-02-11T15:15:18.440000 CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000 CVE-2024-54660,0,0,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000 CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000 @@ -273377,7 +273377,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231 CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000 -CVE-2024-54772,0,0,15ee2c55e7b8d4b5a34ddfd20373f69766975811e41631266ca6ca59f9bbcdb4,2025-02-12T22:15:40.110000 +CVE-2024-54772,0,1,797ee5bb9c2306ea02eb560cc919f540f274a171c19996dbc7d95acf5ef4ca0d,2025-02-12T22:15:40.110000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -273404,7 +273404,7 @@ CVE-2024-54849,0,0,ecb2618b47660945a630d6edeb58e480eb8019d05c1f299b012bdc19f7f45 CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000 CVE-2024-54851,0,0,d7885353e775e9c99d1dc919070d791fc6607741a3c016a34ac8fa9ee5a638aa,2025-01-30T17:15:17.957000 CVE-2024-54852,0,0,41333591f66a37f33b5492d418fe447aed9ada0b2abaa9215429b1ec759ad02b,2025-02-10T22:15:35.837000 -CVE-2024-54853,0,0,d3e83722ee1cca91e686daf4a8be9a73e0c715b87c9d674006b26be75a74850f,2025-02-06T16:15:38.767000 +CVE-2024-54853,0,1,5d19b1be52226811bcb5ba8503bb54b739be8cff483ac2279a0ef19305af7548,2025-02-06T16:15:38.767000 CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000 CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000 CVE-2024-54879,0,0,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 @@ -273417,7 +273417,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18 CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,0,0,7a0dccad4793c9d5ee8482e55eec1c618ab1c20951125a4aedd6dcbd29752662,2025-02-12T16:15:42.160000 +CVE-2024-54916,0,1,e835ac2857689021bda0b5abb003714b1275993f6d062fa760d1f53e9f8e4ef8,2025-02-12T16:15:42.160000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -273444,7 +273444,7 @@ CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 CVE-2024-54951,0,0,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000 -CVE-2024-54954,0,0,250bc145ec3f51ab356a556d3d29ab0cef21c9b82ddd8fae33865ef33a929590,2025-02-10T18:15:29.663000 +CVE-2024-54954,0,1,ea2e7989196e0ca78538061e8245a722c8247faafc7a9c565c651ca357e96580,2025-02-10T18:15:29.663000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 @@ -273509,7 +273509,7 @@ CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000 CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000 -CVE-2024-55215,0,0,203ba3b88f1c1684dc8407da99d6c212d46fe9465840c31d9c317c1457f3dc9e,2025-02-08T03:15:11.687000 +CVE-2024-55215,0,1,10278cf82217e9abfc194b431e15b6849fabbd6a8cb80b5bd4631d1d050ba4d1,2025-02-08T03:15:11.687000 CVE-2024-55218,0,0,975f95aadd728c60a4527fcf8a0550d504208f5abb7909e62e4e8433964174c8,2025-01-08T14:15:26.803000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c49f,2025-01-10T18:15:24.053000 @@ -273527,8 +273527,8 @@ CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674b CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000 CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad558f,2024-12-11T17:15:20.920000 CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000 -CVE-2024-55272,0,0,1165ace596d0aabc4b23c0a1f1142922a2bba75fd8c115bb903daa5fa30aae40,2025-02-08T03:15:11.840000 -CVE-2024-5528,0,0,a8d528b2ef1fba7c3bc74d65ef72b47195d650d508a7e6f8f2330c5edea4496b,2025-02-05T20:15:45.090000 +CVE-2024-55272,0,1,1610383a4d07f2e736ad411dd01c42049d38a97d76ee9e5ff9c6c65406be8243,2025-02-08T03:15:11.840000 +CVE-2024-5528,0,1,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000 CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000 CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 @@ -273638,7 +273638,7 @@ CVE-2024-55626,0,0,0952a5ecd227cb571e4adbe45943220192fb5cc5d057dfdd2d117bc04f36d CVE-2024-55627,0,0,cd19919b57922329811e2b9b9dc695b16e6595c5efa5239d13931a5499f421ca,2025-01-06T18:15:22.757000 CVE-2024-55628,0,0,4da72569e9fb9cf38780b6a6412844833656868f72da7feb8ac72f5657cd0a37,2025-01-06T18:15:22.947000 CVE-2024-55629,0,0,780c4ce46e3fedeaf6697f3af5ec57ff4a22df8fc3c5787a22f379165797aef2,2025-01-06T18:15:23.130000 -CVE-2024-55630,0,0,461e7ca4168571cb7872317b8b85a2b3692fe26b6a4de15aeaee0a48767f2f22,2025-02-10T18:15:30.540000 +CVE-2024-55630,0,1,960413056761f5da44770e7213fe4176cf1ef657dc1834f9ac2e9f258b2f9ea6,2025-02-10T18:15:30.540000 CVE-2024-55631,0,0,c61e02e505f7e07e3ce0e8957584b0fef970130675c3fb922500870845563192,2024-12-31T17:15:08.870000 CVE-2024-55632,0,0,b094f90539addcb66cb3e41a3fa71e13de9a88f56b85fd9467860f7182935280,2024-12-31T17:15:09.007000 CVE-2024-55633,0,0,b920c48d6d3db0695cfdb30d126cfa5a69f028868bcabb84fe2eb66a7b7e5dc9,2025-02-12T10:15:14.143000 @@ -273727,13 +273727,13 @@ CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436 CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000 -CVE-2024-55948,0,0,92ffadd77865526725fb923ebe203249daa2dd7f62dcdf9cdd66b887575d4cbd,2025-02-04T21:15:27.123000 +CVE-2024-55948,0,1,8c02e3bc6d40278967a7465617cb785091fc3213fd87927e50db0201db91aba9,2025-02-04T21:15:27.123000 CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fabe96,2024-12-27T17:15:08.480000 CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 -CVE-2024-55952,0,0,40f06e6cb54766cf7357654cb464e4bb21c58158c39af1ac076f236e96ec903d,2024-12-18T19:15:11.933000 -CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519feab13,2024-12-18T19:15:12.067000 +CVE-2024-55952,0,1,c5c9e3ddc2dde0fdaafe60e16029d6acd7a5c8b9fe490f67edd3c62939aa431b,2024-12-18T19:15:11.933000 +CVE-2024-55953,0,1,db9cd8f82466bee8b44b5fcb7d2ef52f7e161949a8e96e2914214fd35e1b6b39,2024-12-18T19:15:12.067000 CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000 @@ -273874,11 +273874,11 @@ CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 -CVE-2024-56131,0,0,51f1aa39b637d3354df7f7acfa4dc1cb0474eaaa99727fe92f7cf6281750da98,2025-02-05T18:15:28.507000 -CVE-2024-56132,0,0,51cba6a989e6018ec87d2d6a76e7b79cbade9681aa71b382a034591922cf9180,2025-02-05T18:15:28.700000 -CVE-2024-56133,0,0,3ed52040b3f6a778b41bebb1bb4b4f49f9a89c10a8be8120fae2976b0d0f50b2,2025-02-05T18:15:28.880000 -CVE-2024-56134,0,0,7bca2aa416abafccc0e4a5ae0fec240646b2c7ca489ae63f094c3f8976026580,2025-02-05T18:15:29.050000 -CVE-2024-56135,0,0,87a87ad0f74e70f2bcf63e79a31d59e216ceff4daa79656094e6e9240c739729,2025-02-05T18:15:29.210000 +CVE-2024-56131,0,1,e03c74e08a86e48652fdf2cc130c3b7c6baf01ca676e49d473d6c2824d8fd92b,2025-02-05T18:15:28.507000 +CVE-2024-56132,0,1,085d6f51ed1ecabb93d11abd980290b8ba6d65ff9f708fdcc95b36fb4fd29b27,2025-02-05T18:15:28.700000 +CVE-2024-56133,0,1,4d3b5a45f620024c205db01f76645a53f3bfccf0aea77f4ef2e563e01df832ec,2025-02-05T18:15:28.880000 +CVE-2024-56134,0,1,017556e5d22fa48dd193b96709690ca9dad5bad14aa06f8294c35866ee390d83,2025-02-05T18:15:29.050000 +CVE-2024-56135,0,1,adf7f304991bae30aa204f5c1488353e6f106f7ed9032bd64a85da0cfe135cc6,2025-02-05T18:15:29.210000 CVE-2024-56136,0,0,3233f503c5171e4ba11df9e13150ae4049de7b6a390326df6fe239b64631c5e7,2025-01-16T20:15:33.047000 CVE-2024-56137,0,0,5dfe89d1ae5911eb9a89f977030c79ce761d66499f995b20161d28de051d48cd,2025-01-02T18:15:20.213000 CVE-2024-56138,0,0,56bd8032a118db50efc637f56ac5577457d98d6e38b449027a5f8c36cc988ac7,2025-01-13T22:15:14.313000 @@ -273901,7 +273901,7 @@ CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,859a0a214e880c431d953ea42b93fc75dbc38729b9f116959536aa113f3fa28e,2025-02-14T17:15:16.317000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56197,0,0,4632d5e45b087fa49b33344dbbc8320feb12c67835a43623389cf108d1856ef1,2025-02-04T21:15:27.260000 +CVE-2024-56197,0,1,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 @@ -274032,7 +274032,7 @@ CVE-2024-56323,0,0,7363c537a56ea671200a79ef9b8f6c044f0ddf41d99e23dcd3f0f679453c1 CVE-2024-56324,0,0,1ba8ed12eb3c68f3a00dead310264c1c177b76fd79da0868f4a6a097d58c19d9,2025-01-03T16:15:26.643000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000 -CVE-2024-56328,0,0,f136407be55d61239d5aa04f531262f7b36019b13712b592ac1e1f7a2568523d,2025-02-04T21:15:27.400000 +CVE-2024-56328,0,1,15361150e4c4eddd938c28dee0249fee42e046eac1018161ed075ca63881925e,2025-02-04T21:15:27.400000 CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000 @@ -274114,12 +274114,12 @@ CVE-2024-56454,0,0,9fe32f3b9015db86e1a4a24c1fea9536d34d315a1d0f17a6f977857204a2b CVE-2024-56455,0,0,db2c9c4d4290b1bfc3ae388650ee55637dbba19ea1aad42dbe4095f066ac1885,2025-01-13T21:49:20.337000 CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d499,2025-01-13T21:49:26.503000 CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 -CVE-2024-56463,0,0,27cc10ac00b18d337ecb9af82de18e317e29ab38f779b71c11d36e7b3b65920e,2025-02-14T17:15:16.420000 -CVE-2024-56467,0,0,0e97a4a5265bbd7255518e121a1e18bf2ca6ad42df9cea99b9d152f96bc13bb9,2025-02-06T21:15:21.600000 -CVE-2024-56470,0,0,ac7fe5deb1912e1f7152ea1243f737adbd1bdd50d580b0117deddf92ad654d20,2025-02-05T23:15:09.707000 -CVE-2024-56471,0,0,2645dbc79a9d3c52828807159e2c2a82f0a0970b230000e9b5230ed2f60688d3,2025-02-05T23:15:09.860000 -CVE-2024-56472,0,0,e15762c5079dea6e6225e08a85b40a4a9c0b267bccd52e8548e093166c94a8ae,2025-02-05T23:15:10.007000 -CVE-2024-56473,0,0,af8fefb91c24b56b2416c301d8ba2fc9a8baa58478021f1b63fe5eb7afccaaa3,2025-02-05T23:15:10.153000 +CVE-2024-56463,0,1,e2b73e80548b2c9708e1a343eee80d7db08ba2945bfa3a46a81a810daf6fd8df,2025-02-14T17:15:16.420000 +CVE-2024-56467,0,1,13891879ca313c8cb226e6ca0ceaced74e48f609731ee2455e1c59f775ead668,2025-02-06T21:15:21.600000 +CVE-2024-56470,0,1,7e01545c3941e3e7ce420883b8077787aeccd34edea59f0be4c24f50aae0e3ff,2025-02-05T23:15:09.707000 +CVE-2024-56471,0,1,56b2c377f9ffa15c294942a5ad0898fe9aff16332c2eb19e271fe1907ff61444,2025-02-05T23:15:09.860000 +CVE-2024-56472,0,1,2f579974ab3d56b4fa0cb9f07abc76e41253508e1c38a779ee9f61c290ed9211,2025-02-05T23:15:10.007000 +CVE-2024-56473,0,1,b00f2cefa56bce9690bcb1d47d0343fe5ed0b7ea46fcb3c0c5485a3ec1963ebd,2025-02-05T23:15:10.153000 CVE-2024-56477,0,0,ce1aefc7a0166760d03634da05dcc562842beecbab4a5b636c9a146472fac741,2025-02-14T15:15:11.887000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 @@ -274130,7 +274130,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3 CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000 CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000 CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000 -CVE-2024-56511,0,0,a32b676c6fc5236481962ab182b1fc05a7ba04f1e84fea7b90de8ae50325f284,2025-01-10T16:15:29.510000 +CVE-2024-56511,0,1,00b81ec3fa7f59774b13c1a985c50c77979e7bf8e4540f7395f2c60a588f7023,2025-01-10T16:15:29.510000 CVE-2024-56512,0,0,599da64766ce0e1c2bd7cfcf30544268a9ad3bb7673ddbfdef2855ca9f183344,2025-02-11T16:10:28.690000 CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 @@ -274445,7 +274445,7 @@ CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 -CVE-2024-56889,0,0,e110c9a2d5890a0c46911d59408463e7d71f04221a3f2eaeac5b2e341b81b540,2025-02-07T16:15:37.680000 +CVE-2024-56889,0,1,9fbc9aa317ff4af614f166aac56ac8e5170223605ace3a1bd1e7aa8e5957fa09,2025-02-07T16:15:37.680000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56898,0,0,707f540df9bad40fd6a0dffff09717bab11cd135fff5e7588c850ba08978f0f0,2025-02-04T16:15:38.523000 CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000 @@ -274527,28 +274527,28 @@ CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 -CVE-2024-57063,0,0,2fecbc2103ea200f5ba13c9f12d080428615d31e0d3b984b53c8f139b1182638,2025-02-06T16:15:39.023000 -CVE-2024-57064,0,0,da6a0f9dc3cc6a91fe129a3eaadee2f18485150e3540d7efb81bc8a48a440a73,2025-02-06T16:15:39.347000 -CVE-2024-57065,0,0,5853bd5a0cfac3911d89a9239f95e27c817cdcf0a6b4e14425712a7bc77ac79c,2025-02-06T16:15:39.603000 -CVE-2024-57066,0,0,4756d883d6d97a12c7fe683bf21981f578b74dab49898ee28414da8237ad4516,2025-02-06T16:15:39.803000 -CVE-2024-57067,0,0,4394f9e32c024d8a3d10d2f11622ba82bb25acd4c682842453cc9cfd79267ebe,2025-02-06T16:15:39.980000 -CVE-2024-57068,0,0,6cbddddd900614e2f3a0924414cb60a804a1dcba3fd390608d93afe8db659787,2025-02-06T16:15:40.150000 -CVE-2024-57069,0,0,5833874420a5b55d33b4ba199729e3dc6d3cc8cbe23b5e3c7ecf3d1fd2607b1d,2025-02-06T17:15:19.647000 -CVE-2024-57071,0,0,2d256581cf4b947033630c13b7529b8f367bb35cb5bc03ff5c6e7e7ccffdfd4f,2025-02-06T17:15:19.793000 -CVE-2024-57072,0,0,5ffa872ededabdb0739a5d0405a390fff41c788fb3613d132bbb706c968c40f2,2025-02-06T16:15:40.310000 -CVE-2024-57074,0,0,2ab2e028fa5d834db13ae60448602456812e0885ccb3626ff8affd4719b73616,2025-02-06T15:15:15.347000 -CVE-2024-57075,0,0,970568121a59cc35ea6582e0d23d90946c2caaf344af4e3af0a34eb61c5861ea,2025-02-06T15:15:15.500000 -CVE-2024-57076,0,0,a90d97f8e41e25ee7fdc4138eb2d14e42111717e863c59e4710f345ea8c2e21f,2025-02-06T15:15:15.643000 -CVE-2024-57077,0,0,0fd5457281886f8ef8ff1e57793f38e12666464c86810fe2e03063742fc7aa39,2025-02-06T15:15:15.797000 -CVE-2024-57078,0,0,ad1da0644d0ebb1d77f3f782cd38741010af2e2697e047a9b09abf14e4667141,2025-02-06T16:15:40.497000 -CVE-2024-57079,0,0,24c4041620fe4eb666480c9134c43daa9029b729bdfa84922c2c31ea99d7c95e,2025-02-06T15:15:15.950000 +CVE-2024-57063,0,1,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 +CVE-2024-57064,0,1,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000 +CVE-2024-57065,0,1,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000 +CVE-2024-57066,0,1,9f715954ea971b4d1d25c40c38035cabc1d38fcea115ceb055b4b2227dcd1941,2025-02-06T16:15:39.803000 +CVE-2024-57067,0,1,cd7e64784c62ad9238926b63024a621c822b21b9ab52f7c517976f23a99e2eca,2025-02-06T16:15:39.980000 +CVE-2024-57068,0,1,1fc48883f7937c6d47a4ad37c7a1cd706a9e6b3e5f7b36071871e315393f2f8b,2025-02-06T16:15:40.150000 +CVE-2024-57069,0,1,1b7110c3cc15407d6ec4a733f2dc9c835df48ea5c2e686b6a6817e80f3287109,2025-02-06T17:15:19.647000 +CVE-2024-57071,0,1,d08d42177fbaa6c61deb2a562161f57867e423aae1688949d3d23f6b9232d689,2025-02-06T17:15:19.793000 +CVE-2024-57072,0,1,197e19b80145f8e974874e9aa97ce94bd3c41f9b5ec01e77d0ec842e83b1387e,2025-02-06T16:15:40.310000 +CVE-2024-57074,0,1,76118937d56edfe04c27955a0733b5e85ce3b96b8d34cb65a168c0128aa49054,2025-02-06T15:15:15.347000 +CVE-2024-57075,0,1,5a6a2908b7f1584467c18eb88b18c721e3b8adff4cbac702d26338646242b928,2025-02-06T15:15:15.500000 +CVE-2024-57076,0,1,7f973ce41a1fcdcf5e7d603b28fd3b0352ea1483b3b0a3d74483aa36fd95cad1,2025-02-06T15:15:15.643000 +CVE-2024-57077,0,1,95efc8ca224fb8745e0de33be793c2a626c56a32bcb8a6ee13e8068c1b57ac13,2025-02-06T15:15:15.797000 +CVE-2024-57078,0,1,8a97c0044f9389b0d62cf913697a59c2df3cf0e5be07cc788ae566056503f0a1,2025-02-06T16:15:40.497000 +CVE-2024-57079,0,1,90c43612b7f025ad01936cd0d82120f12a2304f4f4508c3bc57c1548aa087a3e,2025-02-06T15:15:15.950000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 -CVE-2024-57080,0,0,c27a3693dc10c1913b168b61f0caf829d1e7fb1490217b7be2daa22dca9603d8,2025-02-06T17:15:19.933000 -CVE-2024-57081,0,0,7cac20819fadca6fc4259ab8bc88daff5fdd9d3e1ff95215ab57c09708d35617,2025-02-06T15:15:16.100000 -CVE-2024-57082,0,0,197407c0de09474d05f334c12207fc39d0d46c4fc5e8c0007c65360a32ec8d15,2025-02-06T15:15:16.247000 -CVE-2024-57084,0,0,4ca07421ac28c46845de0b24a3fcf241d68acbf740c5251ea45804ef23bffc84,2025-02-07T16:15:37.847000 -CVE-2024-57085,0,0,6c933162c254c702d391cb2d1984a69e8dee7f0c4841adb9392ab8f81c6da474,2025-02-06T15:15:16.390000 -CVE-2024-57086,0,0,35fb361e0bf59457b906a3f99dedd4143894ad38875963914f72babb151071fe,2025-02-06T17:15:20.073000 +CVE-2024-57080,0,1,ed4464ba7930048d62a3426c26c5515301e6750f4a9c17de192f847c86cb0b80,2025-02-06T17:15:19.933000 +CVE-2024-57081,0,1,f97d4adbcea5ef38b8d646c716aefdea0bd528c4eee37d5b6c43c27392f7b813,2025-02-06T15:15:16.100000 +CVE-2024-57082,0,1,69c88eecd609f448159b13115015472311a2c800ae471b6a2fa8fdb660098502,2025-02-06T15:15:16.247000 +CVE-2024-57084,0,1,184ce2bdca2221f2a823d18b34616bf9939630c2fe93ea49ee84bec6316efcf3,2025-02-07T16:15:37.847000 +CVE-2024-57085,0,1,96e472c75ef3af701eebfe26246ecb9070446416e3cbed324346aba36d408f02,2025-02-06T15:15:16.390000 +CVE-2024-57086,0,1,135d1edb19b1262b9b20dbcd6b814388e529b0c3b7b36d652139ce6df6ff31a0,2025-02-06T17:15:20.073000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,feaabc133222d755bb64c81b7f48c86d504504845f631c6909ee10ad4152eadc,2025-02-05T17:15:21.720000 CVE-2024-57097,0,0,0aa8def038760d05af55113d0f7b35e5cb38896a4bdade8a82816b6ba1b36976,2025-02-03T21:15:14.450000 @@ -274560,15 +274560,15 @@ CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000 CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 -CVE-2024-57159,0,0,bea9b261af3163b5fd86d5922e5e2e3ee5fbac4f0e45b7bbf59086d2f729fecf,2025-02-03T19:15:12.880000 +CVE-2024-57159,0,1,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef975,2025-02-03T19:15:12.880000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000 CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000 CVE-2024-57162,0,0,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000 -CVE-2024-57177,0,0,af4ee297e8efc1a99f6b834c238ea4254f7a7f95f5c97411a817a65af37e4854,2025-02-10T22:15:36.257000 -CVE-2024-57178,0,0,05fb576db5212112f257b5d12c7e3f9be4bf91b811042323ee143d1b149567bb,2025-02-10T20:15:42.013000 +CVE-2024-57177,0,1,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f217a2,2025-02-10T22:15:36.257000 +CVE-2024-57178,0,1,1f6e448ac583dbc5dc66b3e862fb64a834e1fd6ac65d6692ba488ccfc0af0396,2025-02-10T20:15:42.013000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 CVE-2024-57184,0,0,3fd914158434721c2565c1759ef928a3f64e92f246b28f05ed1e4a71635f067b,2025-01-24T15:15:10.523000 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 @@ -274591,7 +274591,7 @@ CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 CVE-2024-57241,0,0,f88252f93812dfd93d00fb4d7b494f823afd7db94b241dc55a38faafcfb5ae78,2025-02-14T21:15:15.833000 -CVE-2024-57248,0,0,63bc83c581d829aea526a5d2b3021ae292975fb4c1ccbec5467f8650b7b23893,2025-02-10T18:15:32.563000 +CVE-2024-57248,0,1,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000 CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 @@ -274600,8 +274600,8 @@ CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d32 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 CVE-2024-57277,0,0,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000 -CVE-2024-57278,0,0,f9b79d4596ed7f08dedfab311e68c23d3374cd06194b1d626d40a4477fc9425a,2025-02-07T23:15:14.230000 -CVE-2024-57279,0,0,10d4aa701350f0c49daa06d05bee533c57b1abdcd7846c7c1fd588e69664af43,2025-02-07T23:15:14.400000 +CVE-2024-57278,0,1,5802b511c82f2f71ef9a786cc45e5ccdffc451e02dca104a266adf57fe298a49,2025-02-07T23:15:14.230000 +CVE-2024-57279,0,1,dae481e317502f20401cdfb37ef6c453d988956298697d36cd45f92b2db8efca,2025-02-07T23:15:14.400000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 CVE-2024-5730,0,0,7c8f1898d38c08e8565f96fa000ade8830daf4e5695b898fe37d498e1b84f28b,2024-11-21T09:48:14.723000 @@ -274613,7 +274613,7 @@ CVE-2024-57329,0,0,0fef9f5ceda046114647cee1595a2f5f9e8310debafdf99a1a89de6298c7d CVE-2024-5733,0,0,08c79914b3b228d8239c5511d15a5ec639094518968ef7bdf362b13a6205828e,2024-11-21T09:48:15.130000 CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac34828502652b,2024-11-21T09:48:15.300000 CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000 -CVE-2024-57357,0,0,463e772a26d5355d08a065fa0c78d794af4bc9faffad115e39d0de913fabf32c,2025-02-07T23:15:14.550000 +CVE-2024-57357,0,1,7a4bd99721fa027b620ab5a55131dc9d19154d8b71aea2a7b20fcb3acdf7626e,2025-02-07T23:15:14.550000 CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000 CVE-2024-57360,0,0,b55b093ca2518eac39079440800bfb25c14c6bd692dd0f78a706c0ccb71a2e4b,2025-01-23T16:15:36.437000 CVE-2024-57362,0,0,50988e95a9041076561946b9e88bf3f17ff6cab2639092f1509fed53be144855,2025-02-03T18:15:37.613000 @@ -274623,23 +274623,23 @@ CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279f CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000 -CVE-2024-57378,0,0,60220413d47246cdaebafb55bd59c289f14acd59650a423e904224ff431c74c9,2025-02-13T22:15:11.167000 +CVE-2024-57378,0,1,dba15be377033085f8e2bb66f3dac5e129faa6437c41577ff7a42e407eb15a43,2025-02-13T22:15:11.167000 CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000 CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 -CVE-2024-57407,0,0,b6c37ab1572db62a059239dfd04f316b94f02ba645902b99641d6e4d02070ca9,2025-02-10T18:15:33.160000 -CVE-2024-57408,0,0,b571fedc0ef83181213144b8d18306daf9d2575cc6e18991dbfc7a0a89482ac1,2025-02-11T00:15:28.707000 -CVE-2024-57409,0,0,b02537812e70819fc29708df3694f416f258bc49cc6f250311db6ea582133c05,2025-02-11T00:15:28.863000 +CVE-2024-57407,0,1,519d93e222fba014aafcf09142ee7afdca984100696a6ff228516b94f2538422,2025-02-10T18:15:33.160000 +CVE-2024-57408,0,1,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000 +CVE-2024-57409,0,1,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000 -CVE-2024-57427,0,0,650390e9ebe961c25bf71715b8d6aa6d381680a0715451974b588e105b859c85,2025-02-06T17:15:20.357000 -CVE-2024-57428,0,0,7b1f0afb88ecf06e3f74e7ede9877d42b425f5e1c82a40b2b39de9d832ec4e33,2025-02-06T22:15:39.223000 -CVE-2024-57429,0,0,37e561477385732915b9e8e2cdf204890ffd3c12cacc5bf2c4d9cc01268a89fa,2025-02-06T22:15:39.360000 +CVE-2024-57427,0,1,ebce508e94de8a5b34edd05d80160e23d0760d35cafac1cba9fd80ea5c5ca427,2025-02-06T17:15:20.357000 +CVE-2024-57428,0,1,e0169033f613e35f231693e2a1697e2420f5895d248e9f0db6358d748665ae3b,2025-02-06T22:15:39.223000 +CVE-2024-57429,0,1,297eba09be9a31d8bb32c44b886b7969c1338623d7293e3f2a83e9f444bf07f5,2025-02-06T22:15:39.360000 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 -CVE-2024-57430,0,0,8871f3d6dd4ec83e38996c2946fc234a50c011742e2cee924fdff68f298d24a7,2025-02-06T22:15:39.493000 +CVE-2024-57430,0,1,63a6a1ac0822bad0ab26c02299c744fb745170f033551fdbc088f42c0259357b,2025-02-06T22:15:39.493000 CVE-2024-57432,0,0,919d02e0a1b59673a162a8bd045a890978b7d93d202a67f79b5bbe75f3b09109,2025-02-03T17:15:21.883000 CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd3c8,2025-02-03T17:15:22.020000 CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 @@ -274672,9 +274672,9 @@ CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44 CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000 CVE-2024-57514,0,0,dcad93c7b1ee740d3cfee690d5bf9ebaac5164de17811f6d5f3bf41b99f89a33,2025-01-29T16:15:43.533000 CVE-2024-57519,0,0,f6dcaa2139e878d99c2f1ee25c0738631af5afa261e3598c7b8dd197ab7d57b0,2025-02-05T17:15:22.157000 -CVE-2024-57520,0,0,8bbae23e7762cd227ca8e5301b6d653dba1991f6d1d7d76c7dea92b784a46e73,2025-02-06T16:15:40.833000 +CVE-2024-57520,0,1,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,62cedd71e9c9f7f62ab7d3e3c8e02a30720af0bc647326dc6c3b6825f9619efd,2025-02-03T19:15:13.513000 -CVE-2024-57523,0,0,2a6917a7ca761a5f2cef98e7ecd5bcfa228089f7941011cfb50a016558db1d1f,2025-02-06T20:15:40.050000 +CVE-2024-57523,0,1,615ffadf055b52575a680920654952dd549aa197eebd1c2436b69dcdb60984f4,2025-02-06T20:15:40.050000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 @@ -274708,18 +274708,18 @@ CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e5d7,2025-01-27T16:15:31.613000 -CVE-2024-57598,0,0,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 -CVE-2024-57599,0,0,3650e5d13310a5a98241782486c3741155577b25d34fc344734cf7f8392b2a8d,2025-02-06T21:15:21.760000 +CVE-2024-57598,0,1,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f307,2025-02-06T16:15:41 +CVE-2024-57599,0,1,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-57601,0,0,225d456013d678778684db06cb161f7f5c515f35ff78e3b517f00f5aea3bb837,2025-02-14T17:15:16.787000 -CVE-2024-57602,0,0,d53d2cf1c3fe8bff2fe33eb66efb3a4f78f0dd54e65783449a2283dd476a8227,2025-02-12T22:15:40.867000 +CVE-2024-57602,0,1,30a807cf755b082304a2db55922b034781821e0a335455c3ab2e69496b686678,2025-02-12T22:15:40.867000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 CVE-2024-57604,0,0,812052693403195ae32632155ab1a6e433d42d109209f6d9c0707dbaee159068,2025-02-14T17:15:17.003000 CVE-2024-57605,0,0,3602350f2d72f258fdf223214f07e17bb8aee6c913748b67a0da0958b6965164,2025-02-14T17:15:17.230000 -CVE-2024-57606,0,0,9480535946f02c15350aecd5bbd6e6ae6034246858257c08d866403ff66c1f1b,2025-02-08T03:15:12.010000 +CVE-2024-57606,0,1,e47ef892be105a3c660cb028f0906466f58d43467e431eca3220e3249f568439,2025-02-08T03:15:12.010000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-57610,0,0,1d63f9ca24b4959f72c95484764360a7937ab076865ba32522a1b688e197daa4,2025-02-07T16:15:38.303000 +CVE-2024-57610,0,1,fb8a513d5a0e34ee3275d17e53b163d875527cc466c4bde851405005eb787883,2025-02-07T16:15:38.303000 CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000 CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000 CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000 @@ -274777,11 +274777,11 @@ CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaea CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18 CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 -CVE-2024-57668,0,0,6df8745d3452230c8b201e8e8279e344c1d72620081b521d26c24c8386f13e71,2025-02-07T16:15:38.487000 +CVE-2024-57668,0,1,f4472b929eb83e6fea6c6342ba5a12786a7fb732278987dbbd659822b52d23e0,2025-02-07T16:15:38.487000 CVE-2024-57669,0,0,6bd10bbf91cdcd56c4203123470fc7a934ba1644d36243028508a60d3cc7fa53,2025-02-04T16:15:40.503000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 -CVE-2024-57672,0,0,b935ac11a0b1617e3dd413e68d295aaa17fbeab3c75853a0bf01b1e853d2aa5d,2025-02-07T16:15:38.670000 -CVE-2024-57673,0,0,ade2895fb8e30968b81769ef9baeb74760752c9c76d4eda15e632addfa72f2d8,2025-02-07T16:15:38.830000 +CVE-2024-57672,0,1,3a8f991776d6421e0e845be1bdebb993ada9058cf13afc97f07fc0cfc158a33d,2025-02-07T16:15:38.670000 +CVE-2024-57673,0,1,40014fb082b8b99cb28048070e5c51087d90e704926381e9162dbad23134e123,2025-02-07T16:15:38.830000 CVE-2024-57676,0,0,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000 CVE-2024-57677,0,0,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000 CVE-2024-57678,0,0,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000 @@ -274795,11 +274795,11 @@ CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca CVE-2024-57686,0,0,b3e63d1143d51418c4b781604a7d8057cd24cd176983b575e43942d597c27148,2025-02-11T22:15:29.520000 CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 -CVE-2024-57699,0,0,95aa0271d79d169e14100b0846c65938487183ab57f8ac667ec6badc2623e05c,2025-02-06T16:15:41.170000 +CVE-2024-57699,0,1,9810302493558cd2aa388d92a46812487319c834736468c7ce96e6ee43329a39,2025-02-06T16:15:41.170000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 CVE-2024-57703,0,0,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093660,2025-02-04T15:15:18.763000 CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000 -CVE-2024-57707,0,0,b26a32fa236ce1296e02721aa5bd4ddde0da4527096d1bbc8526d1b2544cd034,2025-02-10T17:15:18.353000 +CVE-2024-57707,0,1,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 CVE-2024-57719,0,0,643301859a6cc77c578653132f0918510423f22a025f08c288f4c8d7e8730d3b,2025-01-23T15:15:11.920000 CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000 @@ -274911,22 +274911,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685 CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000 CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000 -CVE-2024-57905,0,0,eaedf2e013c5b9eb4c722f559718a760736fa52ce79c32231cba28fe363a5ba8,2025-01-19T12:15:24.710000 -CVE-2024-57906,0,0,10f4c4a51c4c95b4b70eb8d079b9153965f2abc1c26909d7502ac2f40a056585,2025-02-02T11:15:12.710000 -CVE-2024-57907,0,0,5c2ea095f232c69c7c12886f1f388fe794a9a0374ba46030989a606b4fcd1c6d,2025-02-02T11:15:12.887000 -CVE-2024-57908,0,0,a6e69175fc6568336ca2705f1a2065a838c7de0d0aa111e2b34f781a4bb3477d,2025-02-02T11:15:13.003000 -CVE-2024-57909,0,0,20beca3b55e8ba8e1792a65aa4f8efba94e31f5b40d511d1b8cdf5c3c80696ac,2025-01-19T12:15:25.083000 +CVE-2024-57905,0,1,5e024729d9663e05b8d838553a39e64f4fdb461909e95216d52b10d2b1616dfd,2025-01-19T12:15:24.710000 +CVE-2024-57906,0,1,e24c60843962d8e4a1862e99f92081f350cbdcaa6bcd2463c5d63481bd29331e,2025-02-02T11:15:12.710000 +CVE-2024-57907,0,1,4f3a58345855b99d521f31233fad0f3fdb094fcc8e7c017ee3db22a1196059d4,2025-02-02T11:15:12.887000 +CVE-2024-57908,0,1,b2ccd594c2600b9fa0f2c4123bd91fa737883ad64c9536ea76cb151c6932eec8,2025-02-02T11:15:13.003000 +CVE-2024-57909,0,1,ae18a7f484593d9d8f60ee64eea22f35aef4d7728fe0680162e49c2c9c950cdb,2025-01-19T12:15:25.083000 CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 -CVE-2024-57912,0,0,44f7160a1a37bbda2c5c7fa8c6d77c8a6a0382eb187adc2a3d7d300f4cdcdf70,2025-02-02T11:15:13.627000 +CVE-2024-57912,0,1,be11335be8bfa68d409a4f4804aa8268272390f1c397b2c8c2e88ef78a024412,2025-02-02T11:15:13.627000 CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000 CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000 CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000 -CVE-2024-57916,0,0,0f652372cdc52048530c608b55b545395f7986fa64d076a529ff1e83fb34d711,2025-01-19T12:15:25.763000 +CVE-2024-57916,0,1,12a7bb608455922a6d14fb69d97d993b787974fabfa7435658a4922fe0472e61,2025-01-19T12:15:25.763000 CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000 CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000 -CVE-2024-57919,0,0,a919ba0f56bd6285ec7e7e9a0b4772bdadbb38e74f76504867054bdc580ce0b5,2025-01-19T12:15:26.053000 +CVE-2024-57919,0,1,5cbc59745d82fa4b3927b517294029f28a0b98501aaf7d89670e0f14c928e2bc,2025-01-19T12:15:26.053000 CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000 CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000 CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000 @@ -274960,19 +274960,19 @@ CVE-2024-57947,0,0,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be331,2025-02-02T11:15:14.713000 CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000 CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000 -CVE-2024-57950,0,0,97b43429de158865b5b0286f6bf81d91a6114b665bd3df28d16fd4e130eec8f0,2025-02-10T16:15:37.913000 +CVE-2024-57950,0,1,8976e1976e0a71df576e500a1de0e0351cd7a1a21c3ded276f7b712939de2444,2025-02-10T16:15:37.913000 CVE-2024-57951,0,0,f76b42abdfb86704a9c0f0688028e52627d4292026dcbe9e66fcb6fdcc25a743,2025-02-14T15:57:18.047000 CVE-2024-57952,0,0,4a13802904b48d770e3732d2a4be26769b2ca0854368681c7bafc9fb5cc58fc2,2025-02-14T15:52:04.957000 -CVE-2024-57954,0,0,91758d48648129248ea9805d5372fb353727b8abbefe2abe7e8495cf9dc66f5f,2025-02-06T13:15:39.467000 -CVE-2024-57955,0,0,c9d2b1ffe54f7f5776391ee1ea15de6075933d1092f6712e436603a1d67aa02c,2025-02-06T13:15:39.590000 -CVE-2024-57956,0,0,48560cb5ca493c2bb63e0d975b9dbbbb9d769306dd7be72806e60e0facf4e8fd,2025-02-06T13:15:39.723000 -CVE-2024-57957,0,0,a91ee1228f1c47138b9b005e987b02ccb8bedb0237a90eab7474b4232583dd54,2025-02-06T13:15:39.867000 -CVE-2024-57958,0,0,a6781cf39378ad3b5a88cc27e5dfcbde782ac63d7e7ed25c6767de3b195259ad,2025-02-06T13:15:40 -CVE-2024-57959,0,0,dab2dbdd9b10ee4179211b7c9b2106df29fb76c74622c3a733c93c13bfe87a7b,2025-02-06T13:15:40.133000 +CVE-2024-57954,0,1,9470f77aeb1fbbfe941de0105e102e20083ecada6b6ee53e11c0487d84f43bb0,2025-02-06T13:15:39.467000 +CVE-2024-57955,0,1,6d252a9b6de2efee165d1985f096541c7d0571a6e67aa34bfe5bd14090450593,2025-02-06T13:15:39.590000 +CVE-2024-57956,0,1,d4e87fa2428da403c60e267f832e99b114c1b9bf9958784b42db3295433520a0,2025-02-06T13:15:39.723000 +CVE-2024-57957,0,1,e35f406ddb5cee4a624e821bb37c4ab998c526ea0d1d6e14627cc2c256b2dd1c,2025-02-06T13:15:39.867000 +CVE-2024-57958,0,1,f491b3ff7995e666523a76517ce37750b9aa0fbe5d80269a902be78c77d7e19e,2025-02-06T13:15:40 +CVE-2024-57959,0,1,2a21fddf59db21be5aa4dfbfc03551a26c95ee754374260683eb8e5f433ff8e2,2025-02-06T13:15:40.133000 CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022afe,2024-11-21T09:48:20.910000 -CVE-2024-57960,0,0,615613f4380654acdf770af8e932b07007c41c20f705a33f5b5a786c8d2df270,2025-02-06T13:15:40.270000 -CVE-2024-57961,0,0,c474380d60f449ae11d292b0426c707b2b591e8c8778c5bb7f17d5297d050136,2025-02-06T13:15:40.417000 -CVE-2024-57962,0,0,f3585e4d41a97b886b7fb87352dbe611c938938f30ff0860bfaa1f6426496d32,2025-02-06T13:15:40.600000 +CVE-2024-57960,0,1,773b522c706cbc49414ca08e8ce62c9b452c14ceb463659dc8cf301c1c68526d,2025-02-06T13:15:40.270000 +CVE-2024-57961,0,1,70e7b1214aba97db422e1a3b3f233758ab9ca724b4d145bac1ebcb3fd7fbccf1,2025-02-06T13:15:40.417000 +CVE-2024-57962,0,1,54a498ba952c380e086f823bc80eb1c13badd26229709ca796a347944d7ffac6,2025-02-06T13:15:40.600000 CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 @@ -275257,7 +275257,7 @@ CVE-2024-6093,0,0,6dbc67443e4b04e1510a9f434106f20f0d4b21fa7954dab14d70346cb63c7a CVE-2024-6094,0,0,c0063848c5678cbe8875c1cd2d611558ef1b2bedd1d3f0daf0312a05b3c23485,2024-11-21T09:48:56.847000 CVE-2024-6095,0,0,72a84856c6dc84e022fee2d83bf212c06138ba071d956716ea4585f1eb431808,2024-11-21T09:48:57.030000 CVE-2024-6096,0,0,30c8a6f3f48a49dc00c2209e174c85d15aa3ca6b541dfd14b186d9c5e032413b,2024-11-21T09:48:57.163000 -CVE-2024-6097,0,0,da72dddbd7e35c660cf7aa1ea84cef517a2557497f04531ae6b0cb8558ab7ba1,2025-02-12T18:15:21.977000 +CVE-2024-6097,0,1,114308e2b0b634c2df93a17b77e08a324fb25aa49c1a509924c652b21c2ba817,2025-02-12T18:15:21.977000 CVE-2024-6098,0,0,d4c7adc44731702753d0124808854f5b98a81b60c6056d91c26330342372c46a,2024-08-19T13:00:23.117000 CVE-2024-6099,0,0,cc17f7e0786c81cc119e330d3b84e782c19ad0a2a5948fa53f7dc08469c5b91e,2024-11-21T09:48:57.357000 CVE-2024-6100,0,0,a8d8275ad94c76a149682c08fbe2bb7dcf585addf21c98ff178e4f2a3ac8b9a4,2024-11-21T09:48:57.493000 @@ -275505,7 +275505,7 @@ CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b9 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000 -CVE-2024-6356,0,0,e1823ed5cd01f16998622c1c70002fddc0051edb0c3716f9152b39a405968938,2025-02-05T10:15:22.523000 +CVE-2024-6356,0,1,391f80ddd9c80912d68ca7cb34a9ed8abc87902780460bba886ae0d7ec0ded03,2025-02-05T10:15:22.523000 CVE-2024-6357,0,0,ac68351f8f2ae9df9a3fd8303856280c67b015f60c2dc9118a8436cb09ca3676,2024-08-19T17:23:16.973000 CVE-2024-6358,0,0,e61fa5c6fbb10561730cd743b6df4f90fc4417770ff91c90a40c5289a736df71,2024-08-19T17:31:29.647000 CVE-2024-6359,0,0,21d5ec976dd99892a0e1700223a2784bfcc27ad5435c76bb01fbb3fe398f81fe,2024-08-19T17:30:31.880000 @@ -275599,7 +275599,7 @@ CVE-2024-6453,0,0,57a9df5f41ae7388668d8ec6040750362fe611e9b50665bc5d80f3861222e5 CVE-2024-6455,0,0,ee8244df84a11847eb1bf1028e566aa28523bbaf30c0278a51b37678378b4bf9,2025-01-16T15:06:56.973000 CVE-2024-6456,0,0,b01715bddc5940978540d9848d20c3e52a2d359587b604967ff013be610ed6e1,2024-08-19T13:00:23.117000 CVE-2024-6457,0,0,9fd7207180c09f39d2da8b48b95fa822cfa4ef21e4a0f2e04ef9fa9c667cf66b,2024-11-21T09:49:41.470000 -CVE-2024-6458,0,0,858f6ace8391e1cf19a4a6a250b02f5c9589f8ce11554d6251524a25fae04099,2024-11-21T09:49:41.607000 +CVE-2024-6458,0,1,f80166fb500b5c662512a813b28a88f7629f6910f20d85606ff8fc4f9f842d22,2024-11-21T09:49:41.607000 CVE-2024-6459,0,0,cb27c4eea4018b8b04b2fde4bc91aba6c1054949f5b07e05557b1533c2ff9cd3,2024-09-06T17:35:18.880000 CVE-2024-6460,0,0,63861aecadef5cdffd3766d8f1f2c1741328b3e12a69d4364f017e469adf9a4c,2024-08-29T21:35:12.753000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 @@ -276147,7 +276147,7 @@ CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd81 CVE-2024-7099,0,0,bda544dd9e76b13f20607b0db9189f48ec9b784ebdc1cb4c7f2f85bee57631ea,2024-10-15T12:57:46.880000 CVE-2024-7100,0,0,99b418bd0fa2b35d671dd7874a6f6d5de7ddcdf351d66e487703289243d154d4,2025-02-06T17:45:05.493000 CVE-2024-7101,0,0,9cff880016a5f9e0ed8231c55bcfaaf90d7d1f0c57ac153566c6db7e59555606,2024-11-21T09:50:52.813000 -CVE-2024-7102,0,0,9602969b17bb93e0ceb8995d6b9b7af37a2b017cb121ea9517ad5f5429cd0165,2025-02-13T01:15:24.980000 +CVE-2024-7102,0,1,11c6269a55387d66a3031fc1d96c10a5e1b1c07d0f20282836b6cd3ad2afd620,2025-02-13T01:15:24.980000 CVE-2024-7104,0,0,d151c6e16e88a5882a2b03171a169ade8cff74d82ddb88ba3882405b7b893113,2024-09-20T14:44:18.010000 CVE-2024-7105,0,0,fffd7ab0d02896c184458c588856c1c84d9793c8f1ac9f8069eda1b041dde46a,2024-11-21T09:50:53.067000 CVE-2024-7106,0,0,238f09a3d98139ce6f7a23b50b557b4ceb2040c286b331b6d8405fb866214b85,2024-11-21T09:50:53.217000 @@ -277049,7 +277049,7 @@ CVE-2024-8120,0,0,ab5a9389217b72b3251a5d5c31931d5dc72d892482d48a90705c66529519f9 CVE-2024-8121,0,0,644a945586be736acc369a7d79e8e9d32b0d2b94a2d42b5d5c019b0dbe0f6f75,2024-09-06T16:20:59.767000 CVE-2024-8123,0,0,cd1e1ea48cefe1d98412957db51410e30efc2a73d1692a9327717f67ea466ed2,2024-09-06T17:20:28.600000 CVE-2024-8124,0,0,3894541721dd1bc8525e07b50e5d2eb3d86ce6760a9e7d68ff6e690331a9dd18,2024-11-21T09:52:42.190000 -CVE-2024-8125,0,0,2924617658471d574ef0aed6ac4dee3c3b637b4ac751fd575c967f5929b44ca1,2025-02-04T22:15:41.573000 +CVE-2024-8125,0,1,951ec368eeac61f890041e5f7667cdbd241a25f7efac34a9b5a0531bfece9615,2025-02-04T22:15:41.573000 CVE-2024-8126,0,0,3abecdca9daabb378bdf63264deefffb7949f50ee2bc8032bb4710683ebb2b12,2024-10-01T14:14:25.020000 CVE-2024-8127,0,0,d6170f0c034bf509d8137dfa3cdb362a54790aca1ab4b752f9eab8c0627f9d87,2024-08-27T14:53:45.257000 CVE-2024-8128,0,0,f1b01f834a58aad65ace41bf95dedbd79f4c4809a63d64785acf2d6d3a51f10b,2024-08-27T15:32:47.997000 @@ -277166,7 +277166,7 @@ CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f9 CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000 CVE-2024-8263,0,0,02859751230be0f2362a72baf7f14e3ca8afcc9ef6f11a007d2edecd96369c0f,2024-09-30T15:57:26.213000 CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000 -CVE-2024-8266,0,0,17386ec955fd508fac3fba41dc40258ded1e5757749436f694e037a788a63797,2025-02-13T01:15:25.137000 +CVE-2024-8266,0,1,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000 CVE-2024-8267,0,0,70e974da9da5d568e67a0a6e8c7364a267159b07c9024aefdb5c572b50a6a357,2024-09-26T13:32:02.803000 CVE-2024-8268,0,0,667bbb0a564872efad28005d51b7df0ba4f94a2bb52f2009f9be8e9b89ea509d,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,3a69bbb4a680b32b440288852bc11b13bca8a647993f102997182838c5072492,2024-09-18T15:20:44.553000 @@ -277408,7 +277408,7 @@ CVE-2024-8546,0,0,f93ed1ff4a37b717c58ca72d093af81f5b1a4bb5386b6a5aa1e29e09ebc531 CVE-2024-8547,0,0,5507c5bc9e2a9a528a5460a1f4aec471f22d6289bc0158012b4647417c0610a6,2024-10-01T14:32:43.330000 CVE-2024-8548,0,0,e790eb3e2ee2949ee465e2600f4ac965b709eb7db2707e2432c78ef11f873f2a,2025-02-10T16:02:02.883000 CVE-2024-8549,0,0,9b241b2e318dd0d969e39e62b8546f0ea207dfa2f54cc5c666f1bba9b12975e5,2024-10-02T16:04:41.970000 -CVE-2024-8550,0,0,7049cd84d1a39747f8c11bcf33a344300e5d56afcd859093f9d624be0ca3e225,2025-02-11T00:15:29.010000 +CVE-2024-8550,0,1,48ce1674ae363ff171adb5737540a91e9036ee92b18bd2e4d3c13a700de299a7,2025-02-11T00:15:29.010000 CVE-2024-8552,0,0,70425fcd76e2369e4f564ff13922902378a4810d60a83152b70c4e59b4a95b68,2024-10-02T17:00:45.083000 CVE-2024-8553,0,0,26561801580e04aa21c5000b17dc07cb325ac8eca0511de872259669245de7db,2024-11-06T09:15:04.370000 CVE-2024-8554,0,0,f02821a50113f94287508dae9b6f969ed90f5287e9597e8a87c49c69203bc0ff,2024-09-10T13:52:23.250000 @@ -277526,8 +277526,8 @@ CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea1 CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000 CVE-2024-8680,0,0,d26d5eba91e9e07ee9b59e08affa3d4d4587baedebb8830ed04ba5321bbb1f0e,2024-09-27T13:53:47.910000 CVE-2024-8681,0,0,cc400ecaa32dd9e4f3bd8a7ca6c51e9d6c2c86f98de06f0d89656986f17c2119,2024-10-04T19:04:49.490000 -CVE-2024-8684,0,0,701e770cecde72e565c87550317939bffddf776b571808d4400f1c387ecd49fd,2025-02-10T13:15:26.103000 -CVE-2024-8685,0,0,7574195642546e1af60e9c6896a6d78a12295fb903faf0b4a8ff3ff45c1982d4,2025-02-10T13:15:26.270000 +CVE-2024-8684,0,1,654446cab325131fc0e44f97b13320fdc554516047e5f89a6437f77c3112522f,2025-02-10T13:15:26.103000 +CVE-2024-8685,0,1,f81829db7e24f10a279a46bb1f2309fba8584ad62cd972b00bc9c625257a6f1f,2025-02-10T13:15:26.270000 CVE-2024-8686,0,0,99b57754583b480afe81f1d5c1ec1b59c2c922575075820e2483b58297524f89,2024-10-03T01:35:10.317000 CVE-2024-8687,0,0,546008ff89dcd54c5eea775146bbb07b45067323940abf1d031b12c123ce78d7,2024-10-03T00:26:56.110000 CVE-2024-8688,0,0,5305cc9b622cca6738a217c33437bc230e7a55c4d675b0977e30a7a9ae41e3a6,2024-10-03T00:19:32.047000 @@ -277728,7 +277728,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972 CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000 CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000 -CVE-2024-8911,0,0,c75b9bd4dcd02262855fd49d843fb06a7771237fe1013ffc411c6dcd276819c4,2024-10-10T12:56:30.817000 +CVE-2024-8911,0,1,1c055f3e09829fb21c04c14ae3a8152042ba8c9ae34aa262827c4d7c5665eb14,2024-10-10T12:56:30.817000 CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000 CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000 CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000 @@ -277757,7 +277757,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3 CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000 CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000 -CVE-2024-8943,0,0,dbc40b44090c99e1a914fae031853edd15c6c0fb13cbeecd75c26f35a41a22fe,2024-10-10T12:56:30.817000 +CVE-2024-8943,0,1,e3f9879d74432198676a63296f791a6faa12885ac8bf7bd31eea59cb73160181,2024-10-10T12:56:30.817000 CVE-2024-8944,0,0,4d54f1a0baaf503429d63b0c7baf27b829b5af54b4fe40f08a44318e73509207,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,49fe08fa5001a52fcc4b693eea0010b97a8789b0d8d21b7f4e3e0328bdefe156,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d94a,2024-09-24T13:11:17.417000 @@ -277879,7 +277879,7 @@ CVE-2024-9091,0,0,9421eea08c58f4de513109911bbe9853b023e7b4ea8ad4e63050a11dad4ce6 CVE-2024-9092,0,0,6379751e1087929fe578fcc016fd8228ef68f77aece65ece28437d6dced0f045,2024-09-27T16:23:56.710000 CVE-2024-9093,0,0,1493b614914735d95fbf32dde0a735a3d3c11c89a8289bb8180b4aae2b8e9b40,2024-09-27T16:26:27.163000 CVE-2024-9094,0,0,88d2e32f26a5490c0327569b4a1e535a8d101ca5046b7d11e41b4bf6ab481342,2024-09-27T15:54:09.463000 -CVE-2024-9097,0,0,351916c04450f778c9e9b3c407f0dac01781fb76cc39e683518698a9a6ff5e0c,2025-02-05T13:15:23.237000 +CVE-2024-9097,0,1,2e88472ef3a11f13a877d42f0790b7b539a4e1e55e149b5b182cec4a98bc4e78,2025-02-05T13:15:23.237000 CVE-2024-9100,0,0,e58afa1cb97571d6bb26bb26cbb4a088cc8bda6f2bd9320274e7188c14487c93,2024-10-04T13:50:43.727000 CVE-2024-9101,0,0,fb0394968eeb8ad1dd5a60ebb2ff2976175e57660ca879336d13611c4fee4946,2024-12-19T14:15:06.147000 CVE-2024-9102,0,0,d6688a36bf30419366e4d23947d3d42cc854c0d76eb43abce9278c39f9d720ec,2024-12-19T14:15:06.327000 @@ -278317,7 +278317,7 @@ CVE-2024-9627,0,0,bbd2150f084c7938e6b0ce316fceb9870286e9cb9ca4f5a3efb37d7b055e03 CVE-2024-9628,0,0,379a0ee64af50eb2e6716feea87eed622bba704469c3d96a0f120705cdd189d2,2025-01-23T21:17:43.533000 CVE-2024-9629,0,0,ccb2809be6fc0297c8318e4c1f923a6148830a550a06f81de03fb80d95b6e694,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,c5bfebdfc374c6829acf4f216485f47c7193dffe76ae06b5710261faf3a923c2,2025-01-24T14:07:11.977000 -CVE-2024-9631,0,0,a65769e75ada6ea487331561ef09be06ab22dd9702b7fb79b14c0286768a5763,2025-02-05T20:15:45.210000 +CVE-2024-9631,0,1,8b9648c02ba078f0734a6594b2ae5a0daf10ff539344382557488d0ca821b44f,2025-02-05T20:15:45.210000 CVE-2024-9632,0,0,239a4c189d3eed560921482fe12c18bb19732b61a1100ff2b6e56460beb86ea5,2024-11-21T19:15:14.210000 CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe304606828160b,2024-12-12T21:43:44.480000 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 @@ -278341,7 +278341,7 @@ CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000 CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000 CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000 -CVE-2024-9661,0,0,3bd8759e54a726b90facd7b9350f40aa4a2a09ad30d696e24f65446935cfb81a,2025-02-07T16:15:39.263000 +CVE-2024-9661,0,1,85c00555555a37e7c432b1ac5ff45090ab45504e0bc8138ee64853b41ba4fe66,2025-02-07T16:15:39.263000 CVE-2024-9664,0,0,cca416c6e05cdc02ab0dfa569ffcb7c71120f14b2ea83ac160e44e144d656b18,2025-02-11T19:16:44.527000 CVE-2024-9665,0,0,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000 CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000 @@ -278525,7 +278525,7 @@ CVE-2024-9866,0,0,a0ba39e4ebba7a797233c2839de60b66f2e325e113630d15fc927dabf744cb CVE-2024-9867,0,0,af8c04cf7fe39d8c9c939bd4960d3e5a1bae720dbdabcedf4d767e596e9cc6a2,2024-11-08T16:00:04.640000 CVE-2024-9868,0,0,8b03b248bb9c12232453fd15a6ded978c56b8620d35965eebe04c58e726ecdaf,2024-11-04T13:44:51.370000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 -CVE-2024-9870,0,0,6eab47920613cf24cddb6cce684d0b1b28db401f9fd9cc882f2ef4e1d8c7f6de,2025-02-12T16:15:42.563000 +CVE-2024-9870,0,1,e7f1369d05bbee0f24e6f2a9fb9c73e2fc0883c9fd3992ff3d2860073ca8b439,2025-02-12T16:15:42.563000 CVE-2024-9872,0,0,0e7d68583c29c66a5270292b98ec23a33c9fb82f2b56b0d5c54817e06e66bdd5,2024-12-06T09:15:09.040000 CVE-2024-9873,0,0,33bc81d0177b9feda09bc4924ad1b908e4d83e088ea8b1403a6d411bd77364fe,2024-10-16T16:38:14.557000 CVE-2024-9874,0,0,2c854e5be476fde52ee3df7991e955456b213438a6a861fb37fed209f8a3d727,2024-11-12T13:56:24.513000 @@ -278642,7 +278642,7 @@ CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2a CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 -CVE-2025-0054,0,0,d3ada4694dda7f4802d37d5910d4e1c41815b1e1281f65fa90235b5c9d3323d1,2025-02-11T06:15:19.863000 +CVE-2025-0054,0,1,22a967176aaf42249dc9b67293cdaa2b5c3cbf9a9dce95abf2b5e51fe83ab402,2025-02-11T06:15:19.863000 CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 CVE-2025-0056,0,0,be034bcd972f419ff8782984466cba082295f005cb1c5e6f9c99f15962645479,2025-01-14T01:15:15.730000 CVE-2025-0057,0,0,1ac61283bb0c2cbc4087604b5df17a16843aa1606269b81805952e9e259afc2a,2025-01-14T01:15:15.883000 @@ -278651,7 +278651,7 @@ CVE-2025-0059,0,0,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef53916 CVE-2025-0060,0,0,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000 CVE-2025-0061,0,0,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000 CVE-2025-0063,0,0,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000 -CVE-2025-0064,0,0,6da57f08c25f47cf67c63a79ef8b9a8456791764f428166270d2cdfce32d6bde,2025-02-11T15:15:19.070000 +CVE-2025-0064,0,1,edc6327f37e69b3f8c23bfa1053adffcc4692f14209e502e377c2d1617204178,2025-02-11T15:15:19.070000 CVE-2025-0065,0,0,70f469a84981289145ddab7e496e3ce6a2882a8618ec61a008685ed9d3ced71c,2025-01-28T11:15:07.413000 CVE-2025-0066,0,0,41773dd06eda78c1806c873ae42cd1b5433608a0fe1510b7dc5de4c2fa1f4080,2025-01-14T01:15:16.783000 CVE-2025-0067,0,0,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969e8,2025-01-14T01:15:16.950000 @@ -278663,11 +278663,11 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 -CVE-2025-0108,0,0,a98d521f6fc9815204a056a78c9140e8092ecd21a6bcd001c7853096139e3701,2025-02-12T21:15:16.290000 -CVE-2025-0109,0,0,8caad76d7819ec0b5a47e19b1ce8cfdb3c9152de9e16478c769300ecdcec8e09,2025-02-12T21:15:16.470000 -CVE-2025-0110,0,0,a5a85cc7dd76c25934da2148b2087b6f27ff9864879f33e74ecc0c60a8122be1,2025-02-12T21:15:16.630000 -CVE-2025-0111,0,0,2de04ba88c7fcc8a561411c0e867c1d1d2051d9c20764ea5714502330e66d77e,2025-02-12T21:15:16.793000 -CVE-2025-0113,0,0,8ce02cd2cdc039781a571f0925aba9d355070f046b78d2508b53e6375fd7f1e4,2025-02-12T21:15:16.950000 +CVE-2025-0108,0,1,00274592986205c6ad43614425baa116d11a253f878966ea5c2ab772d032a552,2025-02-12T21:15:16.290000 +CVE-2025-0109,0,1,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000 +CVE-2025-0110,0,1,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000 +CVE-2025-0111,0,1,aa2258940e699552d6ad0522d6bc535ee5e05cc6ed6d0935f57d5a6bf309cd74,2025-02-12T21:15:16.793000 +CVE-2025-0113,0,1,3478c732e987ffac3f9b17ecd011e78e159149f51d0641ffa2e937f895e713a5,2025-02-12T21:15:16.950000 CVE-2025-0142,0,0,79348507832bccb3dfb1eba9563d5795fbadbc3e9e1a05cb5ea2a751abd30411,2025-01-30T20:15:33.853000 CVE-2025-0143,0,0,09ad13005701a80a3a5816ecb54ffa484521fbf4e695c8cfa61de5a2bf3b5e04,2025-01-30T20:15:34.050000 CVE-2025-0144,0,0,b469d06026fa315960ae1810bc5062e8f3147e0d9b9578adc31dd388525d8f25,2025-01-30T20:15:34.210000 @@ -278675,8 +278675,8 @@ CVE-2025-0145,0,0,fa1cca7a3820491168930060335690235606867b1573b086001c6a9b0b6497 CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0ed,2025-01-30T20:15:34.907000 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 -CVE-2025-0158,0,0,dbe81061615242cd18ca601dc5e454a1c2d3de9840a1b4ff938e577ce0177a59,2025-02-06T21:15:21.923000 -CVE-2025-0167,0,0,a6303bec4538ef2c2f9e58c8919322ba1c91dc5c035d64dbb738451450264ab2,2025-02-06T15:15:16.967000 +CVE-2025-0158,0,1,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000 +CVE-2025-0167,0,1,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 @@ -278687,8 +278687,8 @@ CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a7 CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000 CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000 CVE-2025-0178,0,0,89e50502ff0cbfc26ba7cea81071ad18d04e59873702eed17df9408444fc6db7,2025-02-14T14:15:32.403000 -CVE-2025-0180,0,0,d23e79794a27499d2ca7856c7255e70a0a6d2001f8368e427f2ed51e460621b8,2025-02-11T07:15:29.277000 -CVE-2025-0181,0,0,523757fd4c0362d87219a00d7fc1ddf2914c70e9cd834f97c0eaa4b34cb80ea0,2025-02-11T07:15:29.827000 +CVE-2025-0180,0,1,45564097f8949edeaed9ca9ee45d4b95a2a515d148fe7f516835a6a631636cf0,2025-02-11T07:15:29.277000 +CVE-2025-0181,0,1,3daa095a8ef29b155e27eb528b6494dc885d5fb57d0193f8fe2a690199fb3ae3,2025-02-11T07:15:29.827000 CVE-2025-0193,0,0,4b495b56d409bb2765dbaf3314ca8b3a799ee7c0066963e20e79ccdf36f04c1e,2025-01-15T11:15:09.280000 CVE-2025-0194,0,0,ea5b846283dddc32441a679fd768e96aa19b3c1d104aaa33d0e1c65fbeb54de6,2025-01-09T07:15:27.667000 CVE-2025-0195,0,0,4a31363a70a4527ce2e7dcee4bd65277485625f8cdc86358a3b4c344e22b0b11,2025-01-03T18:15:17.317000 @@ -278758,13 +278758,13 @@ CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da3 CVE-2025-0308,0,0,20b4c30a137b0aa706dc02a1057e58a96a971a6dabc5b03c8f76206a7f24265f,2025-01-18T06:15:27.880000 CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000 CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000 -CVE-2025-0316,0,0,b24085e4ca96191934212ec625030cd85da98d75bf417ace1e4b59318eea0a59,2025-02-08T22:15:28.477000 +CVE-2025-0316,0,1,3b21ddc15a8fdffe484273e0c9b65bb4522e9e69d90628e5bee1998b9c1011ef,2025-02-08T22:15:28.477000 CVE-2025-0318,0,0,43ba6204cbaa4c110e5bf9b669f9a8b449a31e92da6e4bc8237af066e2eac204,2025-01-18T06:15:28.017000 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 -CVE-2025-0327,0,0,7ee09031972d8214383deb1747344c04929f997a05265755c7df1c1a74b4dfd6,2025-02-13T07:15:10.570000 +CVE-2025-0327,0,1,078b628fa1779e106aa5151c11b6499af01eb5757d477e1454204158f66a288c,2025-02-13T07:15:10.570000 CVE-2025-0328,0,0,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000 CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000 -CVE-2025-0332,0,0,b835c5b45376db1eaf12cf3c2ebf45121eb88483211e6713c18695181a471bf1,2025-02-12T16:15:42.703000 +CVE-2025-0332,0,1,63367ff8c5f76ed71f6300ddc4a3cdc98d972c2e691233316297063a372815aa,2025-02-12T16:15:42.703000 CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000 @@ -278786,16 +278786,16 @@ CVE-2025-0354,0,0,428d38f2781814173c07276c3123b7894bf18887b24de42981453e8b9fe91f CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 CVE-2025-0356,0,0,00c4e703b995e5d2c2e4f165848b6efa20e85198e0b810bdb74efa5802e75a40,2025-01-21T04:15:07.980000 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 -CVE-2025-0364,0,0,ce06515fb51cec6b72719b1c951cb08be49d5a9179c7058bf295ec3045d36535,2025-02-04T18:15:35.067000 -CVE-2025-0365,0,0,0d0673c46f2b15cc7284b2f94d9962c730d70f21fe4ece9691ab711f39831e0e,2025-02-01T06:15:31.213000 -CVE-2025-0366,0,0,c944cd2030754ac6542b93d3f6449ee319987a580d2d5b1bd48ef36580fc3b49,2025-02-01T06:15:31.367000 +CVE-2025-0364,0,1,2423f698b570bf74da97e05ed992c1dc720ce0cd77b54afdd0e3b50ba4f8a276,2025-02-04T18:15:35.067000 +CVE-2025-0365,0,1,68c9fa607d9af008f74f0910ed30a33940a0fb9c7f83018a7eca1ddc882dffeb,2025-02-01T06:15:31.213000 +CVE-2025-0366,0,1,4f36c784a2e700d5ea30070d1404adcc6cf22626684fa097fd0339fa63ca490c,2025-02-01T06:15:31.367000 CVE-2025-0367,0,0,ab3acf71ca0537fe4a7d80088a2aafb5561d6238415269bf152b7ed9b1300383,2025-01-30T17:15:18.097000 CVE-2025-0368,0,0,a3cd88f6c2e32d5753c4cc60666c98ec19ead45f71b261b7ea54f7fb575f967d,2025-02-04T19:15:32.070000 CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000 CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000 CVE-2025-0373,0,0,c896e2039f1868b25d47604a1b505a94cc3030671c646849df8ad1a697ac14ca,2025-02-07T17:15:30.760000 CVE-2025-0374,0,0,8869dd713bc48baec5d2bd3f0b3f9adaccbc12e420edf3f19dd609cc3be6ee1a,2025-02-07T17:15:30.903000 -CVE-2025-0376,0,0,451d07b494536b6facb8189af2373cdf4fd8368ab1d06f95e2f95eed47d1ce5d,2025-02-12T15:15:15.477000 +CVE-2025-0376,0,1,671e8afc427330d43cf7ac7a36e4edb26f3c63b83ea317a215d4d95d2a25853b,2025-02-12T15:15:15.477000 CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000 CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000 CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000 @@ -278820,8 +278820,8 @@ CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796 CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 -CVE-2025-0413,0,0,93800ba82ed487e2324b7ceece686cde9ee28fb29053c0e6e34c1a22e09e9631,2025-02-05T00:15:28.173000 -CVE-2025-0426,0,0,2425c4fa41d5e36a1ced9087bb78a0a6dd28e5724a4d0331dbec7b7925d84863,2025-02-13T17:17:19.863000 +CVE-2025-0413,0,1,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000 +CVE-2025-0426,0,1,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d2688218,2025-02-13T17:17:19.863000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000 @@ -278836,13 +278836,13 @@ CVE-2025-0440,0,0,f9b771ae4043bf8cf99eeaad5bdb101bbcdc5b7cce3f6409b0beeb87f15a5e CVE-2025-0441,0,0,26332060114c4068ecbb96a794dcaaa6135de1fa3dd0e37a1538f57f411fec18,2025-01-15T15:15:15.457000 CVE-2025-0442,0,0,442cfc3bdecde4480914197c1dc65a4d90e7086d405c2afa64185312f18ab466,2025-01-15T15:15:15.620000 CVE-2025-0443,0,0,c1909e796cb00e8de6a9a5854d80254cec51da86d4853de7e67dd141d381210f,2025-01-15T15:15:15.787000 -CVE-2025-0444,0,0,5b365bb7965d141a3d0f48b7f358d33cb5ac4c59f0319a9c5140218c17a5b22c,2025-02-07T22:15:13.807000 -CVE-2025-0445,0,0,92bd06028565ccf2d4ee1c99d2226a9a109dc9a11298cfe078a9df0ab4202e3e,2025-02-07T22:15:13.980000 +CVE-2025-0444,0,1,b57406504b58c76909f2c14a128c362cf7e0f5ed01cd46bcebd537920650043d,2025-02-07T22:15:13.807000 +CVE-2025-0445,0,1,757acb8a0cefc693cbaf9e83fdad6cd24630be0355ff9a4060422c2852425aa3,2025-02-07T22:15:13.980000 CVE-2025-0446,0,0,94e6a4f8238ac08191b1b1193dfc6ed660ba2c81f2654a86993face2b3a1da98,2025-01-15T15:15:15.960000 CVE-2025-0447,0,0,3557744a211333232e7804efa6ea8142b021fe0e2643e57c3966ef0e6eae106e,2025-01-15T15:15:16.123000 CVE-2025-0448,0,0,fd891759faceb30544c1e8bca8f73da87c02e801462e8b0ca59fcc1cdae9bb12,2025-01-15T15:15:16.277000 CVE-2025-0450,0,0,b38cc1b8bbfcc6d3647330d9f8e0167854327a3c3ad51d1f3e314ec78717ad4d,2025-01-21T11:15:10.593000 -CVE-2025-0451,0,0,aa18b6629c8749b212989785caf2efd1f34a88205a9d2286f065324cb7255491,2025-02-07T22:15:14.130000 +CVE-2025-0451,0,1,db4561898a7688dcdda2a1ca729c77eb37f2f44c57b9474f78cbce6bdceedaa2,2025-02-07T22:15:14.130000 CVE-2025-0455,0,0,0788a35b7031b1503942329db48de69d2dae6db6b33ff6b776c7fa5eff813a90,2025-01-16T02:15:27.203000 CVE-2025-0456,0,0,c3118eb6282d0d2d5cf0b0b18ba4321a7c4ee4642eefb293f75da78a6b102328,2025-01-16T02:15:27.387000 CVE-2025-0457,0,0,6c68c67055a4f977d01fcaec54af3a741663b7ba3a654f25dcda2d901b15c7c0,2025-01-16T02:15:27.553000 @@ -278884,19 +278884,19 @@ CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed2 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 CVE-2025-0503,0,0,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000 -CVE-2025-0506,0,0,4a6852805f36f30ad94ceceb0f4a0d31ff4937d2fd2fd233631287ffb7576ed3,2025-02-12T15:15:15.613000 +CVE-2025-0506,0,1,d8bf3b78c733c50b3df0cd3f3a0a496f3fa631b02113fa5dfd90f4e97b958815,2025-02-12T15:15:15.613000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 -CVE-2025-0509,0,0,5c3664ffdd7f56763bb1b43873c2b214da02799f3bd4d544bc23e17ac3c97665,2025-02-04T20:15:49.763000 +CVE-2025-0509,0,1,a0073ec6d57214f2c4a11fc16247c3f01dd9524e1a7678c20945c0a176374afe,2025-02-04T20:15:49.763000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 -CVE-2025-0511,0,0,bea8aba2d4058a594c2d6768a3ab9a2a20bcf3b8345b874df9ed98ad0444eb2e,2025-02-12T12:15:29.210000 -CVE-2025-0513,0,0,d77995424ca84a8cb2f2fcb871053560789e57471ec763f3bc051ef53db6bd07,2025-02-11T15:15:19.257000 +CVE-2025-0511,0,1,70427fe57d14290a9393d17b066a31efedf5e9736021ed70160ea0cf3f988366,2025-02-12T12:15:29.210000 +CVE-2025-0513,0,1,2c6d18638fe4b5977a94377d0acce3877b36fd4ccb075c7fc03b46347719c66e,2025-02-11T15:15:19.257000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 -CVE-2025-0516,0,0,ea1922d06ac031903617831b38ffa32fc472c31e237d305ac2a29a182dfc3a66,2025-02-12T16:15:42.883000 +CVE-2025-0516,0,1,54ab7a64b43a5bfec8dcc0561006b4b6d888b05cbf982c088d6e719e3d73b992,2025-02-12T16:15:42.883000 CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 -CVE-2025-0522,0,0,7e3a5d181cd4b32ab493cc2c6b5d2e91736d8261a7e3c0e2dba5b00274469570,2025-02-06T15:15:17.127000 -CVE-2025-0525,0,0,91e0bf035fe0ea48ccc5bd1220374678c60b600909c143ca0964341bc22e0573,2025-02-11T15:15:19.370000 -CVE-2025-0526,0,0,1520b31e2d9f33c7601d6169ec6e68e5e941d34cd0b12f18fd45ef011b7455c2,2025-02-11T15:15:19.520000 +CVE-2025-0522,0,1,c8a0deca91ab7a70ac2596d161948276f43ea6a4ed62efff36cb1682db433422,2025-02-06T15:15:17.127000 +CVE-2025-0525,0,1,babf1a33188acdd067666dc0ba0175c8755fd69045eceebc9e557709ce71228e,2025-02-11T15:15:19.370000 +CVE-2025-0526,0,1,53dec4a6dd32d10587365e0ad07600d979649e21e792ed7853f6469f9e22a090,2025-02-11T15:15:19.520000 CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000 CVE-2025-0528,0,0,e3f7a40f975e109bf5214cfef482edb88f65284729988309787cc2f9ee957859,2025-01-17T15:15:12.430000 CVE-2025-0529,0,0,b7599e714e3df556905823f6cbc3ee4b0615bbfc883d87e213cfa26e9ecdbabb,2025-01-17T15:15:12.670000 @@ -278914,7 +278914,7 @@ CVE-2025-0541,0,0,2bcf4b49dafe0ca8072dca95d533896ed37e1521635c2f052072b52c75beca CVE-2025-0542,0,0,20d694a09804286361feeafaf90a4c3710af9ee4f076a4817f46453b45a4bf83,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,97c8d3fe60003fabb6ebf6a84fa27757230cb958341ec2b8d0886e83538320e0,2025-01-25T17:15:21.720000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 -CVE-2025-0556,0,0,33665ab93cb53f2cfc4237aee22aab9954624502d0563735fde8bf6568ff3e83,2025-02-12T16:15:43.030000 +CVE-2025-0556,0,1,b2f2fcf8341ec0a8f21777571c6b9e0c8d8509bcb6a9183c56b44e22150f6553,2025-02-12T16:15:43.030000 CVE-2025-0557,0,0,e808bac35fe14e1bd365beea3de65d9f8e7338d7448163ead06636689058d369,2025-01-18T09:15:07.710000 CVE-2025-0558,0,0,27ffe131a6321b0cb805cae5fc680fb74b1dcbc47a4ad8efbfdf40a5f678d3c5,2025-01-18T13:15:20.417000 CVE-2025-0559,0,0,0a800171c944689ff17e82031a900e5ceea035631c8364601a835471cdd72821,2025-01-18T14:15:25.420000 @@ -278926,13 +278926,13 @@ CVE-2025-0564,0,0,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec95 CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000 CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000 CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000 -CVE-2025-0568,0,0,cf11fc21b2500c1ad2175bb1e31e98f9d80e77bfe9fabf331eb1b83c43559822,2025-01-30T21:15:13.587000 -CVE-2025-0569,0,0,00e1d43339bd3e436c039a8d5b71d76b21bca7b93742b09576ebd73980c81207,2025-01-30T21:15:13.710000 -CVE-2025-0570,0,0,85660e46891e211caae2a3a5f13b6c8cfefde00c91904a76076a89250bdd5447,2025-01-30T21:15:13.830000 -CVE-2025-0571,0,0,de08b547cbacd1ef06cb99821257f87dc557ff17ef7259799019cf8c028ed517,2025-01-30T21:15:13.960000 -CVE-2025-0572,0,0,2eb742dae8dbec5f3c4f509c3a48dff4fbf6a5d48b802a55f73d81c43e50c012,2025-01-30T21:15:14.093000 -CVE-2025-0573,0,0,c99c519c2e30c9105be275e9f487071636eb110b7929b7efdeebbaf8ad7e0761,2025-01-30T21:15:14.227000 -CVE-2025-0574,0,0,588ef6eeeb8bf9e07fbd28a5bba7c14824d782bb1fafabb3453b7f425a31fcc8,2025-01-30T21:15:14.357000 +CVE-2025-0568,0,1,c1ebc70e5a258a26f701d842d6869b0bebfe17235f5f98518e9be8300fb87dce,2025-01-30T21:15:13.587000 +CVE-2025-0569,0,1,92808b86a1da8388d4f868ddd170031ba43b94e59e2b349780b01e9c1727c528,2025-01-30T21:15:13.710000 +CVE-2025-0570,0,1,fe753a0d957cf0995d3a65d3aad7d7601314c0f78c0a3448a2ffff97cd132111,2025-01-30T21:15:13.830000 +CVE-2025-0571,0,1,eacc0ba33466cbb2fe1ef73d9cf7436f93a8077f462984320306969584d7c031,2025-01-30T21:15:13.960000 +CVE-2025-0572,0,1,ef415c987e0cb9e2c14a215f1293e9ca271670d6a8a88d7ce1c714d551ff05da,2025-01-30T21:15:14.093000 +CVE-2025-0573,0,1,bcb33b78ed90b92624fb7c3c7ddbe1a444547b838fc90f63e4b8dbba0f7c037d,2025-01-30T21:15:14.227000 +CVE-2025-0574,0,1,a3c669b98a1433de41604c4f11abfb69e405307e120c52e3e64457193131e909,2025-01-30T21:15:14.357000 CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000 CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000 CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000 @@ -278944,8 +278944,8 @@ CVE-2025-0583,0,0,3309be0bd9417030616155e70103c52eaa78dc57edd605475e0a342fdeb599 CVE-2025-0584,0,0,b6ebfcb7703542335a8173fc5a4ab8c33a7e3e0c6c92bba5dc58412b0c892d56,2025-01-20T03:15:09.120000 CVE-2025-0585,0,0,119134bf231d480ab92b157699965013bafbfc56920a2e232ae3b58aecfc3ffd,2025-01-20T03:15:09.283000 CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b437,2025-01-20T03:15:09.433000 -CVE-2025-0588,0,0,ae93308ac801b4fff02c01d5e084013b52edd74e4556327403850499272f5450,2025-02-11T15:15:19.673000 -CVE-2025-0589,0,0,0d0e5ed827817a3a32f5090c86f3f7f7825478b4483698543737dd604ee439d6,2025-02-11T16:15:49.667000 +CVE-2025-0588,0,1,d2fa85707b0a520f26e49cd106b0316ac9358a5318ae8c21637a975b482ec3aa,2025-02-11T15:15:19.673000 +CVE-2025-0589,0,1,011f5314ba330effc1b70ac831c8799f8f01d30011f03d50ea7f87b83c919e4c,2025-02-11T16:15:49.667000 CVE-2025-0590,0,0,95827083638699773bc7292ef6b29aa078951517d7ac26deb9bb9819d19a8b52,2025-01-21T15:15:14.117000 CVE-2025-0592,0,0,9c3e5d0ff9cc82391565af486c296ae6493bbd4a2a7ae16e355a2a28eaf964e2,2025-02-14T21:15:16.543000 CVE-2025-0593,0,0,c6a547b5cc74d50c18b27627e5aae76ed907e58cd955b960e2bc11cb240d5378,2025-02-14T21:15:16.680000 @@ -278959,7 +278959,7 @@ CVE-2025-0619,0,0,4df0f1bd81c8d5a23d2b8c9afb7f80cd01c44a5decabbf0e0132f5e604f5fb CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 CVE-2025-0626,0,0,0077dccae97439405bab713571a124bd093984b1ee0c361ef3ff1afd6c248462,2025-01-31T17:15:16.323000 -CVE-2025-0630,0,0,31a3086be0b6ba0322482c578d5fee96c27be57d19872966b2812a91d265a3f1,2025-02-04T20:15:49.940000 +CVE-2025-0630,0,1,a203846e431374935835f3b6e314fad6940377ee142abf426ce77275aa7cba26,2025-02-04T20:15:49.940000 CVE-2025-0631,0,0,a91b2711b77974f80919f9c5b372be80fd124e74c35c8b96965898a857e3e98a,2025-01-28T19:15:14.270000 CVE-2025-0635,0,0,70c8222d27016e17aff5c1d526075d61ce18278ab51b947a8b84bf01759f271d,2025-01-23T11:15:10.890000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 @@ -278968,16 +278968,16 @@ CVE-2025-0648,0,0,68eabd2b56f106d85ee311cb88acb9454c36ad22876158edf0a9e6c065792a CVE-2025-0650,0,0,a9fc324c64dd82aee521d1bffa9b7782cf03bd2f6e410628d7018de6f1170f96,2025-02-06T09:15:11.697000 CVE-2025-0651,0,0,e2215d27193b6db6cba4dbdda5349954e60373a439e45e60be4d39bd216d0a6b,2025-01-22T18:15:20.363000 CVE-2025-0659,0,0,a231e421d524771ecef4ddd421dffcbb4d37f1c0838cd9830fba22194e88f80c,2025-01-28T16:15:40.360000 -CVE-2025-0661,0,0,670af77a88c078039977a5ce9403b47bf9afa4056aef93a7c45660f8fed8be18,2025-02-13T07:15:10.777000 +CVE-2025-0661,0,1,1488953c9d052d9b3dcd07c15f13d4509a4725e978d62cbb7fafe333277017dc,2025-02-13T07:15:10.777000 CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000 -CVE-2025-0665,0,0,f52175426669dd959476671837f9a37455d0cf9836a7370a4a51a922d5e8f2d1,2025-02-05T20:15:45.310000 -CVE-2025-0674,0,0,c78e368d6f397c3a42a2609206002d346e8f536c0848f6490983eaa6d6876696,2025-02-07T00:15:27.017000 -CVE-2025-0675,0,0,20e735775d95145b3a287f38e68831165beab853f5f575bded65e313befd062b,2025-02-07T00:15:28.030000 +CVE-2025-0665,0,1,9c1b8c6f4fe12e53e2e22a1160fdb03422e9d473bcd546af3f5e567dc2feb346,2025-02-05T20:15:45.310000 +CVE-2025-0674,0,1,f9a5b719b45bd5bb8c1b4e4a7f4ed3325700578bc985184c525f090e2005e85a,2025-02-07T00:15:27.017000 +CVE-2025-0675,0,1,c83ba7f801d9e9425c42312877c598809734ea9e1738367b5911dd154e894a10,2025-02-07T00:15:28.030000 CVE-2025-0680,0,0,12c78670909e60210afb321c5c55c759452f5848b71a1a0162a282c763d5033b,2025-01-30T19:15:14.147000 CVE-2025-0681,0,0,938db0e5190e161ed989ccb4c84d5297432f7561de8078fdf9969ec60d4620a5,2025-01-30T19:15:14.300000 CVE-2025-0682,0,0,82dc327006a11cf9eb8ed15c2db6bd7a0cc541bc0cc289fa88e6bc57635c989b,2025-01-25T06:15:28.740000 CVE-2025-0683,0,0,205e229f4e62e374b1f661149af1c3e061009820d5bfef3aa4d78ef37a506574,2025-01-31T18:15:37.750000 -CVE-2025-0692,0,0,56cc96f6d7be1971917744ac7d249038148425fc5b20ff08420cb0a91079ae90,2025-02-13T06:15:21.353000 +CVE-2025-0692,0,1,c76c6ee7b2070817920b8897770df0e246e5b23fc11301ddd9a1947ae66ea4ca,2025-02-13T06:15:21.353000 CVE-2025-0693,0,0,8bef81ffbc69ad8fade82b6e724a9e7fb69f78f00b1731c577419f05b6dfd9c0,2025-01-23T22:15:15.397000 CVE-2025-0695,0,0,5a6f397a6b64075e37b58670bef347904c3201da024fb297d91e9e2cec2630c8,2025-01-27T11:15:11.087000 CVE-2025-0696,0,0,8bb1aa81d5469057848d400dac8fd3ed60fd05dfdf66155ab4dbeb5d35fb6ddc,2025-01-27T11:15:11.267000 @@ -278998,7 +278998,7 @@ CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000 CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000 -CVE-2025-0725,0,0,523b773d5d9764e97e2768b4b8193792b383788aa0715eb339060768034cb57b,2025-02-06T19:15:19.733000 +CVE-2025-0725,0,1,933a9ff65143c6df56b3e49502ce5d61c7538865f62de87a7e6b7da33078c72d,2025-02-06T19:15:19.733000 CVE-2025-0729,0,0,47f7aa1143af5ff386851185d07322b33da91a6c70254019e675c66f6b698c27,2025-01-27T17:15:16.917000 CVE-2025-0730,0,0,2af04aa386ac678a6fc944dd8f7ba46d52548cae0bde338f3a493a49b6512319,2025-01-27T17:15:17.133000 CVE-2025-0732,0,0,1ce675ab3efd6ec96092631e523be68cbc1c9a729d4a9ad32dfbaf47ed4ee068,2025-01-27T18:15:40.550000 @@ -279036,22 +279036,22 @@ CVE-2025-0794,0,0,d0f8610657a801d90303b5fa19f71a1cc9d8ef6c1284239115ffdbbe58a9a7 CVE-2025-0795,0,0,78c31d616d37a01317d5bb724bd6c565c80d9cf22aaf5d4fae4283f153b591de,2025-01-29T02:15:26.830000 CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cbf9,2025-01-29T02:15:27.010000 CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000 -CVE-2025-0799,0,0,ba96909e976d367873b6661d0539d51402fda8580d9dd1f82e73b851f2ce6daf,2025-02-06T01:15:09.580000 +CVE-2025-0799,0,1,af43bf4a5768ce0bfb94d428736daaedcdfb3eccbac5f00bb0b5a7f9f2fd815b,2025-02-06T01:15:09.580000 CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224bc,2025-02-10T14:11:58.423000 CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000 CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000 CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000 CVE-2025-0806,0,0,a209d9e787c8d84edf5bd62206346babb48d1b53bd04304b3ccb35e3e13950e3,2025-02-11T19:46:22.923000 -CVE-2025-0808,0,0,637dbd48261618e1808102ff3b4dbb069375514bc6259f22e577bb05373a4858,2025-02-12T04:15:09.950000 +CVE-2025-0808,0,1,428483e8e66f55834849f1a517bd4a05acd223bb58e42750cf8cf49bc8e92e73,2025-02-12T04:15:09.950000 CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000 -CVE-2025-0814,0,0,bfe2f7915210b62a55466da59b48e0bda396f9dfcd76c355bd6412d0b7107396,2025-02-13T07:15:10.973000 -CVE-2025-0815,0,0,056c1ef757b2472b9fcd0969895cef9bf85847763cf4a093e3c2d6a037ca855e,2025-02-13T07:15:11.160000 -CVE-2025-0816,0,0,533bc9602517837c7cfc50eaffd15d88f401c009bd48fd94c44340c6f53905a3,2025-02-13T07:15:11.353000 +CVE-2025-0814,0,1,6e84b81253656a1d32a82ba911740347214b0ddf70b532a879c2dbfdc544f5dd,2025-02-13T07:15:10.973000 +CVE-2025-0815,0,1,7de889e4d3bd0a2a91237ff690c09d713b31f9d5f2a51b5b2591129d680ff441,2025-02-13T07:15:11.160000 +CVE-2025-0816,0,1,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c34291,2025-02-13T07:15:11.353000 CVE-2025-0821,0,0,eef623ecbc4f931b67c977737dbf8b956ec963ba6d7dfab149142eb36bc3e525,2025-02-14T11:15:10.230000 CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d92,2025-02-15T13:15:28.847000 CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 -CVE-2025-0837,0,0,2dd7973af6fce81a46dfa76902f2b5db7d3debf86d7a4a86f2d7e2515d71ea0b,2025-02-13T05:15:14.623000 +CVE-2025-0837,0,1,01e74bd6a538b225c25e0ddb96358a3be7f6e922db9f297c9866ebad58b8fb7d,2025-02-13T05:15:14.623000 CVE-2025-0840,0,0,dcc73de0595740e9bb877d1b68b6e13f7a74ad4d50a26f82e22ce56d8c04db6b,2025-01-29T20:15:35.007000 CVE-2025-0841,0,0,d34ffb164e9f6e4e065c3a7bf9858f8af34d279265f630e92f70d22138303c3f,2025-01-29T21:15:20.973000 CVE-2025-0842,0,0,817f7fca87e6acf8de7da5acb91e6b0b68dcf3f7c69a8b83dc023ca38974b3a1,2025-01-29T22:15:30.283000 @@ -279062,11 +279062,11 @@ CVE-2025-0847,0,0,357f990478a3d7a8ac7a511b3154afa55f39759c26f4e404e4495abf6ec132 CVE-2025-0848,0,0,1be1cf225ad3e11696c8f9251d0da5fb412c25fa88c35ca58c2e9b025805269a,2025-01-30T02:15:25.597000 CVE-2025-0849,0,0,833f144c8aa23bc8c8df5da04fd7335d4895c3b610f7c0585df5dcb790ae97b4,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,435fcc4ab7e1bfd70fcbff76e65d61ad8d0007cf5a0673869c2005ddf674e5cb,2025-01-29T22:15:30.463000 -CVE-2025-0858,0,0,06c6e7376e01e611fe4360e88fb014cf055961a8ae01137af820d2e64180c843,2025-02-05T15:15:21.580000 -CVE-2025-0859,0,0,d5d7cfd98911271f93b72cab1986200848fdf4840d5542f259cc1294249ed59e,2025-02-06T10:15:08.340000 +CVE-2025-0858,0,1,e5f6cf8ed97d0b4ccfe46d6ca426ee1cc01f98577c36b7ef849fb8314b0e3d22,2025-02-05T15:15:21.580000 +CVE-2025-0859,0,1,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692e5,2025-02-06T10:15:08.340000 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 -CVE-2025-0862,0,0,a5fe9c4239dbfbabfee2c843def5706fb21f702bead2e81960ac451e733aab91,2025-02-11T11:15:16.043000 +CVE-2025-0862,0,1,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000 CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000 CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000 CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000 @@ -279078,7 +279078,7 @@ CVE-2025-0880,0,0,c12e2a46de37af2c312b8e3728a724b2552e715b0e742ce54a8ac8366d35c8 CVE-2025-0881,0,0,c0b87ae49840b2495e4993b7143628de7aaa51e127538c05ffa700ec31c486f2,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,f8cdd5be4a5ead42b24a22ef4df5e88faf0b516030bc2a511e27ba50d819cc7f,2025-01-30T21:15:14.820000 CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000 -CVE-2025-0896,0,0,ab05f2e011bd3e420121b2aa16c19941d57d08417cf94ee36efdd1de1a0f76c3,2025-02-13T02:15:29.470000 +CVE-2025-0896,0,1,ecb21883de9b1361a3658cc48f44fdef2f626a3624bc2d70212f10094545a767,2025-02-13T02:15:29.470000 CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 CVE-2025-0901,0,0,8576e90f3f88086e5daf580b6c523f255280985c9bdf2649941334bc2c0fff8f,2025-02-12T19:00:52.577000 CVE-2025-0902,0,0,d3b3b12c4b0c7e57e30c3d4cf431b37a3914287ec889acdcd9941b6c82bdf01c,2025-02-12T19:00:34.533000 @@ -279095,11 +279095,11 @@ CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 -CVE-2025-0934,0,0,7e8683a58aa69f3607600fa24f0df4be73434b45019b29527732747368e49539,2025-01-31T20:15:32.893000 +CVE-2025-0934,0,1,cb11041269a8589b970c0f89604fb5209d62ec1164e7a0c44283787310af58bf,2025-01-31T20:15:32.893000 CVE-2025-0935,0,0,4892b6ddf9de8c08a2def271507f8b9a6082ba4602bb2223678f98953998cf06,2025-02-15T09:15:10.583000 -CVE-2025-0937,0,0,c2febc39ba7039d7446b8084aab3d9ac16dd1d6ec21592225a9effa018bef79a,2025-02-12T19:15:09.687000 +CVE-2025-0937,0,1,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000 CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000 -CVE-2025-0939,0,0,28d2406d605622b3fbc49fa6171276fa25760e3bd2ac1d84f70bc76790a21a34,2025-02-01T07:15:08.097000 +CVE-2025-0939,0,1,8d10dab5882fb93b631ce40096045c46d9c91757409565eff34cfd631c5ea2e3,2025-02-01T07:15:08.097000 CVE-2025-0943,0,0,812d30b4c0a4e8e8699f3b3fb871a6a6493f30967e63a2f74a7571847c91c34d,2025-02-07T14:03:39.237000 CVE-2025-0944,0,0,cdd675de7ca01f9e1244cd84900251a7dc3afbeb2151f5098fb67f204d1a23c5,2025-02-07T14:02:27.067000 CVE-2025-0945,0,0,626a8bb0e1e3d33d2410c60e4622d35d1cc8f4aaecba827352e38bd8bc8d062e,2025-02-07T14:00:06.057000 @@ -279108,7 +279108,7 @@ CVE-2025-0947,0,0,d86087faf15d7e6a63109e47bfca07163762fc534d74ac472b8031d14a77e7 CVE-2025-0948,0,0,8aa6a50c200d1920de9f20b6b39e518a0d142377f946f24ca23afa086a6a6c5e,2025-02-03T18:15:41.580000 CVE-2025-0949,0,0,039d871602cd9428128821cc37027e6e8dee60ecee8ac64dcd53b31ffe11da3d,2025-02-03T18:15:41.727000 CVE-2025-0950,0,0,b7bfb032b40dfc48cfc3ea52c5e6e62b743bd5cc010ad44bc8604664ed295438,2025-02-03T18:15:41.847000 -CVE-2025-0960,0,0,424dc7a895192e70d87beebdb78da31b29ae6b546ed4652d1efa56513147593b,2025-02-04T20:15:50.103000 +CVE-2025-0960,0,1,7d99f6e3510e94dddcebd5fc3388664132c2f2132e2b612ed8279ce23b89027f,2025-02-04T20:15:50.103000 CVE-2025-0961,0,0,51398360322c1646c196e54ab1a92e1f37267b5b266c9b18c4da19ec7b68c1a4,2025-02-10T13:15:26.413000 CVE-2025-0967,0,0,48a999283e5df37f2ad381f76667fdb4991732db2f436607d24ac0a470ce1d15,2025-02-02T16:15:27.693000 CVE-2025-0970,0,0,2a27a49496d76d3df2d4a989b2fa9a3dba48fa46483104ac0df4144daa8a058e,2025-02-02T23:15:19.027000 @@ -279116,16 +279116,16 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000 CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000 -CVE-2025-0982,0,0,be714403c41df1b58b29dfa08b8493679736da0364fe42e9c8be69cf302eee77,2025-02-06T12:15:27.267000 +CVE-2025-0982,0,1,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 CVE-2025-0995,0,0,65f06ca130a3abe03847c386ea55408245854e6c067108d80344baed35cdcb26,2025-02-15T02:15:09.127000 CVE-2025-0996,0,0,5b0a07b0d90d57d9bc561e351f489210344c394553b0fcf774d0705d327a77bb,2025-02-15T02:15:09.260000 CVE-2025-0997,0,0,92f4300ab0b1dd2584703389348f08dd2990545781c3bc321ca3e65f0f04b84e,2025-02-15T02:15:09.377000 CVE-2025-0998,0,0,575b3041b63ab2292e4b6d5546af25bd1e53bc58d5c0e25607366e3e0534074d,2025-02-15T02:15:09.483000 -CVE-2025-1002,0,0,097b693cf6e6da4f2efcfda18e249d6b1ec6f434d7395ccdf77c9535d2f5380a,2025-02-10T21:15:21.830000 +CVE-2025-1002,0,1,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f595,2025-02-10T21:15:21.830000 CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000 -CVE-2025-1004,0,0,6f061b895500ed91cec90db1af15e345ede4eb7fac7c03b984a9a8579e8bc1ab,2025-02-06T21:15:22.247000 +CVE-2025-1004,0,1,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000 CVE-2025-1005,0,0,97e80c2f89c5e160cce39e83fa7ef13a9325fdfdb9706abd6a322ead72dbefb2,2025-02-15T10:15:08.740000 CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000 CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000 @@ -279139,155 +279139,156 @@ CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced1981825 CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000 CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17b0,2025-02-06T19:40:29.267000 CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000 -CVE-2025-1022,0,0,3584ff46175d68101a45d5993906f4257360866bbe28a87215bbd752fc41d758,2025-02-05T20:15:45.470000 -CVE-2025-1025,0,0,169d790f70af0dd93c224d268df788909eaff4f4264ab0847532881b40bea08d,2025-02-05T20:15:45.593000 -CVE-2025-1026,0,0,4962716a888aff2530344f294a2ddb1ab75b4c1e13e8d22f2bf72465d4df20aa,2025-02-05T05:15:10.687000 -CVE-2025-1028,0,0,e6b466122e3fc2d0ee27df4e2f7cd7a187e72415f42ddc27a98c68b86b7822c0,2025-02-05T04:15:06.543000 -CVE-2025-1042,0,0,727597b2df8c6e5925af064d1c047222ac7870d4fb0653bc96def494163afd0b,2025-02-12T15:15:16.230000 -CVE-2025-1044,0,0,f2d901015fc0e6049437a84a32809b8c4712e1d9cd344db9b24ed666ed368479,2025-02-11T20:15:35.913000 -CVE-2025-1052,0,0,2558dc5aa326f4b5ba9a0b42415250f88c10a360fd02b001eec15ae5cce74dea,2025-02-11T20:15:36.070000 +CVE-2025-1022,0,1,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000 +CVE-2025-1025,0,1,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000 +CVE-2025-1026,0,1,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000 +CVE-2025-1028,0,1,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000 +CVE-2025-1042,0,1,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000 +CVE-2025-1044,0,1,c0ae396acdc4cb805f7c247ba80e9ae0bf74adcc41c3f7c47e03b883299d9f0b,2025-02-11T20:15:35.913000 +CVE-2025-1052,0,1,aec20324a2d34b4ccc027cb34c73e0a932e87739ed38f2c72735848089a66235,2025-02-11T20:15:36.070000 CVE-2025-1053,0,0,029ef95d4ca404a127f35d558b999def9d0d35c7fe97a6a586ce48f5dbe97960,2025-02-14T04:15:08.903000 -CVE-2025-1058,0,0,68758fb3a7edcb4555679953ceea098802b07f6f694869dafe8f70b9e50ad23b,2025-02-13T06:15:21.480000 -CVE-2025-1059,0,0,f04f4e4845d9d9b34b7552b5f3678626ad00807a01ed09615ed24204eba0ec4d,2025-02-13T06:15:21.680000 -CVE-2025-1060,0,0,65f5a7e67223a9c734992ce3a8f5501f5cc1436daa7785c3e5772dccca05e33c,2025-02-13T06:15:22.213000 -CVE-2025-1061,0,0,6a23092bda6a59b35939be3869c0d77fbfb36191dc775a19d3c3e005aa053667,2025-02-07T02:15:29.587000 -CVE-2025-1066,0,0,468d6b911c82b607d62a348c0acd3c70b696eb364bff12a91f2702b314026e69,2025-02-06T15:15:17.330000 -CVE-2025-1070,0,0,2f9cdd6a4f5d17a43d22ee25968a30c3e37f403e9f09199c813f09be5217859b,2025-02-13T06:15:22.463000 +CVE-2025-1058,0,1,f0fad2f3f49afeee020cd5166bcf442481ddfb4558eb17fc96aa811a077ae5a1,2025-02-13T06:15:21.480000 +CVE-2025-1059,0,1,0ab1d4e680647fc777b1f82262b0090b83c24b4ef86b71d82e6bf1295dac9761,2025-02-13T06:15:21.680000 +CVE-2025-1060,0,1,a3af803539184a670e8a1150c8d0a2bc56d4cd2cc859a7263777d630bbc1a271,2025-02-13T06:15:22.213000 +CVE-2025-1061,0,1,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000 +CVE-2025-1066,0,1,469efe498f688107fab14d77353921ef9f187463b515daa556f21ceee4091ec2,2025-02-06T15:15:17.330000 +CVE-2025-1070,0,1,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd1432016151,2025-02-13T06:15:22.463000 CVE-2025-1071,0,0,7cf48f5c0704f7102ee404aa34c514af5ccf3668a768a5efc6948bb3495dcf52,2025-02-14T14:15:32.560000 -CVE-2025-1072,0,0,825d30ddf601b7987739e0edd519e9e1729cc73a5fe77174507a50eb4652101c,2025-02-07T04:15:07.737000 -CVE-2025-1074,0,0,bff74005338669ff7836b30084d755fdd0cbda1678d758cad83a696ca60ee659,2025-02-06T14:15:30.050000 -CVE-2025-1076,0,0,288f626100e57e18963e248da4aed1530482da98080d17f699af6ed450ee83ac,2025-02-06T14:15:30.287000 -CVE-2025-1077,0,0,45d64f64938b59f56d0d34d28abb43a6ba0d9df6430ab208e5a9638f04029b7f,2025-02-07T09:15:08.380000 -CVE-2025-1078,0,0,da0054992b830d2190e6c24b1a54504c00d89046571aa426956eef83858e862e,2025-02-06T17:15:21.040000 -CVE-2025-1081,0,0,78c7473ced7f3aff8921ca864fd1c2d178c8bd55c84a33cc04f9527cf21445b6,2025-02-06T21:15:23.120000 -CVE-2025-1082,0,0,57d8ce3d4dd415126bf419d200b0dbb7e9e7241c1622e2f7e7cbda0da4c9e53e,2025-02-06T23:15:08.140000 -CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd40,2025-02-06T23:15:08.350000 -CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000 -CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000 -CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000 -CVE-2025-1094,0,0,1f35385685029241a25445869883c4349971e28c47ea61140019459a47b4eb93,2025-02-13T22:15:11.300000 +CVE-2025-1072,0,1,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000 +CVE-2025-1074,0,1,1377d1b0ab3296a33846cd316ab7610f3b7b42a12867cb031730fad4726b7a65,2025-02-06T14:15:30.050000 +CVE-2025-1076,0,1,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000 +CVE-2025-1077,0,1,735be86b3f6fc3d707f047f96e1dd513fa1d8afd61d55b887dfbb34478c5ed44,2025-02-07T09:15:08.380000 +CVE-2025-1078,0,1,45cc25c666904d6c96dae20f5f19955cbc17db65c9b5b7f07b6396203ce702c3,2025-02-06T17:15:21.040000 +CVE-2025-1081,0,1,2bb5b438f6451b4ca443fbe795caa9bc8649286a58b044b833d683168b47d31e,2025-02-06T21:15:23.120000 +CVE-2025-1082,0,1,393ddd71488337cc0b0f824b1677cfba7460f13872b3a837482ba5d12cbbbaff,2025-02-06T23:15:08.140000 +CVE-2025-1083,0,1,16064cc59146b17006d53d67046a65a9c0b364257a94b2b373fa99c27da34175,2025-02-06T23:15:08.350000 +CVE-2025-1084,0,1,93fee3949ec546a58cb9da1c1619fb657dbde041632da87d4ac6e93d0d865098,2025-02-07T00:15:28.180000 +CVE-2025-1085,0,1,1ad67fc3dcecff349f45b0918fd96e4db08dcd56b6d0ad12a44043dc90d21f08,2025-02-07T01:15:07.930000 +CVE-2025-1086,0,1,224643d9b2f43f102432df09cca95386bdc4432ae24da6e421d85411b67c24c6,2025-02-07T02:15:30.523000 +CVE-2025-1094,0,1,9683dfd46989464f0232d36ebebd9a02d27fe6142df4d24d670676374bdb19a7,2025-02-13T22:15:11.300000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1099,0,0,866ea005495998eedc94be57a64f094566d9af9b611a4dc7ae3f41bc7a1f4d42,2025-02-14T12:15:29.460000 -CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 -CVE-2025-1101,0,0,653e4d8789e0a603dce8525fccddc1e58d3d170b62e552fa0e2e737799b6826d,2025-02-12T14:15:31.800000 -CVE-2025-1102,0,0,408734b1a794fa84fcebab8fbc58cb4a13567ed174ecb909d1caac1022991826,2025-02-12T14:15:31.943000 -CVE-2025-1103,0,0,0da522d14deeaf45148b501a367ab749f077dad47c4b30f829bee85624296edf,2025-02-07T16:15:39.973000 -CVE-2025-1104,0,0,f27d338b8e2511acc1acbe6516171263568f132d7b220ca31da3272b87396332,2025-02-07T17:15:31.477000 -CVE-2025-1105,0,0,aa7b6cd0c83a86d735235deb6c7a0772ed1014df82b1e052f59dde14d6f5ec93,2025-02-07T18:15:28.433000 -CVE-2025-1106,0,0,6eceac84409719eb1baf58080c116fec4ae62e90735211affbc9b59a77dd6238,2025-02-07T19:15:24.613000 -CVE-2025-1107,0,0,e67ad0f5ba78504a0ac31a2be01eef971f5e5eb30afc3bf509ccaa0a487796f2,2025-02-07T14:15:48.343000 -CVE-2025-1108,0,0,115f007080f27ec0f16d8f5b9911647f581c47a1417f59af0189e0655d48b5bf,2025-02-07T14:15:48.530000 -CVE-2025-1113,0,0,cbb39d60791cdb6e74a47b754a72730eb381f8f6873eef3529aa2c84fa97f8ab,2025-02-07T23:15:14.727000 -CVE-2025-1114,0,0,76ae9d4be46d969537d2e9e21696ba125dd93ac6d14059c2e47cdb72f36a473f,2025-02-10T18:15:33.877000 -CVE-2025-1115,0,0,7d2a5577fd63c12bfcdd813dd582901e407d646ad808b76558585d3d83e30528,2025-02-08T10:15:20.997000 -CVE-2025-1116,0,0,68a4be907a1ae1f91d9c9257a850f153ce85e4ab5820f0a3b5ef23a3c112cbd6,2025-02-08T12:15:39.660000 -CVE-2025-1117,0,0,e825ae68d5f59169ff861393fa1afa9092aee3bfc00ea89e5482ccd8e8385ad9,2025-02-08T13:15:07.843000 -CVE-2025-1126,0,0,ac34739323025c4c7f854301a59aeb7a01e0044b8a614b1eb6ca04a3bf3e52c6,2025-02-11T17:15:23.537000 -CVE-2025-1127,0,0,4abf7edc40c28beb0bb4dd708c1806d991e8855ca0d6dd5a3d0156c45a1b8e32,2025-02-13T19:15:14.153000 -CVE-2025-1143,0,0,cf6829feb10345ea71b62432401971d49126684b4610feaa78056b6c8cd225ba,2025-02-11T06:15:20.100000 -CVE-2025-1144,0,0,4ecaa810d4fd510349bbf6a68a8246e614640b7f5ecf5c631efab346c1784c83,2025-02-11T06:15:20.310000 -CVE-2025-1145,0,0,291947fade0cffb129bd8c95706eb4204650daf54e10f06564bcad68383f4891,2025-02-11T06:15:20.510000 -CVE-2025-1146,0,0,e4906d3337db28bc1a8ae129536de37647cf6eaaacf09a8eed8d0f6cb4086a7d,2025-02-12T19:15:09.840000 -CVE-2025-1147,0,0,ac657af6dc6d253e9c6167f189e29837fb9d62d7a90238af71fb6d10e6bd5f18,2025-02-10T14:15:29.643000 -CVE-2025-1148,0,0,090ea5122508cf63d924d66bccd727c583a85a801badd8a7175e0402840f7b59,2025-02-10T14:15:29.927000 -CVE-2025-1149,0,0,26deaf1be61074c40ebd710b10a86f6e43cf48fb43cf9a56fb9546cd2180bbd0,2025-02-10T15:15:13.093000 -CVE-2025-1150,0,0,7b9336f798ee18cea110c9d63d0e1967789e78b567daf7c794a8c6bd3be0b5f8,2025-02-10T17:15:18.517000 -CVE-2025-1151,0,0,114dd377a4496dce5ebe16e259d4fec5a0bb5c8b01c885e394d8196837a23f48,2025-02-10T17:15:18.713000 -CVE-2025-1152,0,0,79dd79f03f54da6e0c61956606e93d9a3114dd601dbfb0bf399b3c5ece434476,2025-02-10T18:15:34.043000 -CVE-2025-1153,0,0,3a9dc93d547d7dd842a4590b2ed145720fa695358e20d57212cfa9262859851b,2025-02-10T19:15:39.900000 -CVE-2025-1154,0,0,0457363e351ec27b40a2a13ecef5f2a5fda7722db2751e039949e53da782730f,2025-02-10T20:15:42.173000 -CVE-2025-1155,0,0,72416730f392c9072e6cadd04c21b7333bbea2899705cfb1959aed0fcf22c527,2025-02-10T21:15:22.020000 -CVE-2025-1156,0,0,c63ec3ed2080a5105b1eb561b4f997951a730db887fcecff50a4d596d842582b,2025-02-10T21:15:22.133000 -CVE-2025-1157,0,0,d3d1e14669608533552b1cef7609c2603134f1b9dbeb91d6a1d01f8a0be9db3e,2025-02-10T21:15:22.300000 -CVE-2025-1158,0,0,73654543a7dfe012aa729f518f7602fdf5796857a09d50bfd8eeed8b31c41721,2025-02-10T22:15:37.080000 -CVE-2025-1159,0,0,9d864fd4ca5bc9678e7af381cc9fcb6878ef34eb658335f3e3c002f12b9cbe31,2025-02-11T16:15:49.820000 -CVE-2025-1160,0,0,503eb47ad23a7b6ce7c39b425623e53ff5f43dc983102bff001aa1afc9aef075,2025-02-11T15:15:19.790000 -CVE-2025-1162,0,0,5b1ad0e22a08478cb3aedfd2e93c65e6a4c1b73e5d4a4055a17d87574e5f7be7,2025-02-11T15:15:20.047000 -CVE-2025-1163,0,0,fd5f0a0364e73c64923c5d616d0ab08e3c3320002f5f365b5d90f0c32f4d56df,2025-02-11T16:15:49.973000 -CVE-2025-1164,0,0,b962bec1f059009c07fcf16c588f4a1844bd82bd9c5b491734b8a51b34715a8c,2025-02-11T16:15:50.100000 -CVE-2025-1165,0,0,254a8c0e19e3e05c99afd801cf1b1aec36be50024ed56eac44fa9018835a3e9e,2025-02-11T06:15:20.700000 -CVE-2025-1166,0,0,0e2920f48bd8671dcb45206d71b940bffc75692df93842a5be054266f75fc228,2025-02-11T06:15:20.937000 -CVE-2025-1167,0,0,00345b7b7197186cd49620643ddf0c272ccd338a00c5075f9f1fb6e658938031,2025-02-11T06:15:21.153000 -CVE-2025-1168,0,0,b92168140bea5cfd8757becc1ee1cf494e63dcad51c80a3e161c81eb2630ac40,2025-02-11T06:15:21.367000 -CVE-2025-1169,0,0,8ba03144c71f561c81c81399cc26e29131acf71a9e1ee1387810ceeab60216bb,2025-02-11T06:15:21.570000 -CVE-2025-1170,0,0,dd59f00ebc37d00236639f55949bfc02f6f174af28e973f24113a1c20cca0edd,2025-02-11T06:15:21.800000 -CVE-2025-1171,0,0,a101a4bfe36a46baf5431cdb667f44f9a6c4a2365e81bede2b5f55792b69ffc1,2025-02-11T06:15:22.010000 -CVE-2025-1172,0,0,7ab5681c73add1a31e335e5968860fb0a705fd3c642007fbb3b647be1e0b144d,2025-02-11T06:15:22.230000 -CVE-2025-1173,0,0,cb316a0e84f09a46e844132e084af5d905f4e14097cd12636916b2368677b2ee,2025-02-11T05:15:13.530000 -CVE-2025-1174,0,0,af1b4f7515e39bfe7bbc49f7a8ade7103cc9d15e48a1e44e600c5b9f7fbf109d,2025-02-11T05:15:13.810000 -CVE-2025-1175,0,0,ec18904b23aa0baeb756b19290d380e7a322ed36141d32754640204a8a5c273a,2025-02-10T13:15:26.593000 -CVE-2025-1176,0,0,bfac543efb94947f6615f3eba420af0d2456415421df8159d6613a70247c4233,2025-02-11T06:15:22.433000 -CVE-2025-1177,0,0,2998334015442bd1ea78b1c486fc58e0c550ec43e69c4c10d8bd3e37e7dd79e9,2025-02-11T06:15:22.623000 -CVE-2025-1178,0,0,ce9fe244e0d9d59f101eb4d5d7cd2a6911eabbcb8440f5db014555fda5477a1b,2025-02-11T16:15:50.410000 -CVE-2025-1179,0,0,0ad6d408a4c217fcd2f0909da4acda484e872fa130d8cbaf0a20fe64a3a0138a,2025-02-11T07:15:30.230000 -CVE-2025-1180,0,0,d1d8d021051706334ac9a6030ae7ee53a7be8dad213687a1d844e003d2aa2979,2025-02-11T15:15:20.260000 -CVE-2025-1181,0,0,5744a84c9cc40c25fd0c78ba42e9c10937962bb69eac9a569d4d076d61e43914,2025-02-11T15:15:20.393000 -CVE-2025-1182,0,0,813fe4ea4720937754bba6fc4a1d1e3d64c610460d89e01f2f7be5cbad40fd72,2025-02-11T15:15:20.523000 -CVE-2025-1183,0,0,774bc5a8ee17c16ab02429df24e868edd2457f975924e971035ffcaf542b17ef,2025-02-12T15:15:16.520000 -CVE-2025-1184,0,0,a80fcc54a11609a5a903676e90c3038371980beaec234244c6e4d5dcbd7f3db1,2025-02-12T15:15:16.723000 -CVE-2025-1185,0,0,c83e5452fff0328a1e8da8da2083316337f86f3a81adf0b7358081e7c7fcd81c,2025-02-12T15:15:16.917000 -CVE-2025-1186,0,0,9576b7d4ea8b3cccc8eb9e8b907ade221983acd6c5734f425f9ff4db24f2feb3,2025-02-12T15:15:17.140000 -CVE-2025-1187,0,0,43f3ee88fa37af31ad67e166fbe6ad94a2bfae0a2b2c2cfaf9fc12673460f41b,2025-02-12T09:15:08.613000 -CVE-2025-1188,0,0,1efd87eb623a2ea1602b65efb7de507f9509c349aa55c87850be5d94618279ae,2025-02-12T15:15:17.407000 -CVE-2025-1189,0,0,1e88f29d1eddbfa7a88b6fffffc75999f3d987abafd9713fdca1605bf31701ac,2025-02-12T10:15:14.540000 -CVE-2025-1190,0,0,da811d3d30f112190fe172c4b017c4318948c541b09c054d804548ae31d5325a,2025-02-12T10:15:14.740000 -CVE-2025-1191,0,0,5aa818843f7a22909fc3a5a1705ae5196aa4ef915cc6666902591e7b2650aa60,2025-02-12T11:15:08.480000 -CVE-2025-1192,0,0,6662abddb119a1bb2c91cccf7b709a688f2700556834ad9992fdbf2fe1f52acb,2025-02-12T11:15:10.727000 -CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3eca,2025-02-10T18:15:34.273000 -CVE-2025-1195,0,0,1d5f3753255234f81d63fc32e8cbd40738b3a19f44c9909eb40a82bf5fa2574d,2025-02-12T12:15:29.397000 -CVE-2025-1196,0,0,bdc527bc42a2927bc910f55434082c1c0a1ed3e2c45952ca78ca5e2ee1724965,2025-02-12T12:15:29.640000 -CVE-2025-1197,0,0,5354355ae236a276a3f65e5eda2738c028cb5c94e47feecf12db2011e1245866,2025-02-12T15:15:17.670000 -CVE-2025-1198,0,0,8814943c1c01582d403b26246de2bc8c2dfc7c89aef20d79eba382257d9f02f7,2025-02-13T02:15:29.627000 -CVE-2025-1199,0,0,40308126959111aa48c274698df5d37756e819953db27b036d6fb4be271f3515,2025-02-12T13:15:09.537000 -CVE-2025-1200,0,0,ec3c8cc9571e223ae9867f7c93ea0eec88d8b939a6541467854106d434eb6669,2025-02-12T14:15:32.090000 -CVE-2025-1201,0,0,24e3bd420cbcfaff5a7e819062f5cc675cd65d98fded880a84770beffbe4b0cf,2025-02-12T14:15:32.297000 -CVE-2025-1202,0,0,68ea7b6e33aa360ea653c2269e7bd31276265b58ef1ad4588d5cc5c63f0fd0d4,2025-02-12T15:15:17.920000 -CVE-2025-1206,0,0,1b63ab94a407914f1000aacda050b0a8aace04a77122bccf98ade88f280850b4,2025-02-12T15:15:18.093000 -CVE-2025-1207,0,0,7bb162a11374602cabef0a58114bb5e7ffacc992738e1b786794f1ef79474809,2025-02-12T16:15:44.393000 -CVE-2025-1208,0,0,4e2425a56d9b8fcaf9e973fed5e1d7aa050e90c0b8188ddb2cd5342cc89a1147,2025-02-12T16:15:44.613000 -CVE-2025-1209,0,0,39df1f532a2d9d9573c21f211dd0313ad2d568b2202c0f4ce39c4b23cf181dda,2025-02-12T17:15:23.497000 -CVE-2025-1210,0,0,2e292c0723726264658fe8f8f32c69df9a1b75b6c58f1e3892f3ec6ccd53e9e0,2025-02-12T17:15:23.673000 -CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000 -CVE-2025-1212,0,0,98d80cb73dedae96f8bcc23c42b9fd82cdc0bbfed669e845fdc4caee22b5a462,2025-02-12T15:15:18.290000 -CVE-2025-1213,0,0,68b0c9e37f46f9aec77275fa9abd0f6d730345a74d8832c46c0ff993ad281706,2025-02-12T18:15:22.180000 -CVE-2025-1214,0,0,d0dbf99c9d9079cfaedc03a146be5c033e583b05a5f5b5fb2e92a87431b49ac7,2025-02-12T20:15:39.200000 -CVE-2025-1215,0,0,84e403de23fb78c292061d6d436701f1a64eb200dbdbacdce627acd10765a8a5,2025-02-12T20:15:39.773000 -CVE-2025-1216,0,0,ea57dc514d69c23027ab2d968b2a1ca1d678c815cd32b6da97cf70f00e696c73,2025-02-12T20:15:39.907000 +CVE-2025-1100,0,1,006211606093ec28f1ff8daf942d69911ef4c534c65359a0897a00ee27f87cf6,2025-02-12T14:15:31.647000 +CVE-2025-1101,0,1,f3feb0000f5a304a8ede309e3c27762c6d3885491c965a79a153f12767cbb812,2025-02-12T14:15:31.800000 +CVE-2025-1102,0,1,0a58fac809cb082841f9122cd183bbcaae0c3230347602227d2b0c09eb06daa2,2025-02-12T14:15:31.943000 +CVE-2025-1103,0,1,994970183c4a089a67ca783f172eb8c322735b9c09b8d8c6324fba8c5f90812d,2025-02-07T16:15:39.973000 +CVE-2025-1104,0,1,a15e60254e5469ca55675d3189bfcc6556516fd56af1f711c3508c2946a56352,2025-02-07T17:15:31.477000 +CVE-2025-1105,0,1,c08f049f2bc446682540ffe22cbf59a9b927f730bbd83bedd207991d7dcfa4cd,2025-02-07T18:15:28.433000 +CVE-2025-1106,0,1,17a6d031b85bd4ec401c3b189ef8dad1280938453bfa9a5120a02c8532dbbfc0,2025-02-07T19:15:24.613000 +CVE-2025-1107,0,1,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000 +CVE-2025-1108,0,1,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 +CVE-2025-1113,0,1,cac5bea27dd30c10d0eb1785409700bc014da3946e77c6ad0cb2611e25e69ecf,2025-02-07T23:15:14.727000 +CVE-2025-1114,0,1,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0d8,2025-02-10T18:15:33.877000 +CVE-2025-1115,0,1,bba7944893cb5bc261b1df2cb755b8651ef45b33e7a808ef1ba8b382d022ea71,2025-02-08T10:15:20.997000 +CVE-2025-1116,0,1,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000 +CVE-2025-1117,0,1,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 +CVE-2025-1126,0,1,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 +CVE-2025-1127,0,1,964bb8e082be5f4c3ffe02b7d66d3573c4a806865108fd7e7f64bea0f60eef31,2025-02-13T19:15:14.153000 +CVE-2025-1143,0,1,1d7b441bbdfdd91679a61928377ffa3cf4aef29dcb7e2164736cdfa974c3af71,2025-02-11T06:15:20.100000 +CVE-2025-1144,0,1,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000 +CVE-2025-1145,0,1,702251c5c63add87dbb46d5a591b20595aeaf2811a2cf7744564b88f69498bc3,2025-02-11T06:15:20.510000 +CVE-2025-1146,0,1,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000 +CVE-2025-1147,0,1,cd9e20ef3a1b45941682300e8f3499e39e83ddecaefe96ac0b5e9f1a60ce94a8,2025-02-10T14:15:29.643000 +CVE-2025-1148,0,1,0ede2590a76c3dcb7ca8715c635203c5957bbaeec1072dc0fb5812c309157412,2025-02-10T14:15:29.927000 +CVE-2025-1149,0,1,e705e1008129e0c194561e46e5298ef0c34c4a33dacc7bd14c919c1fc6503999,2025-02-10T15:15:13.093000 +CVE-2025-1150,0,1,5f18b712f48358887604099e8bd2ce89808f2e41864c67e3fdcbdb111be2ca54,2025-02-10T17:15:18.517000 +CVE-2025-1151,0,1,d63fbf63f9cd3b9bfa6cee82f9db2e267a032e6b9c79dbc4435a9c49032d7396,2025-02-10T17:15:18.713000 +CVE-2025-1152,0,1,a03a8ee30fa0a8e0f559eee2ef7dda4b7ba0f9af90b84b77f784b8b1efb54db8,2025-02-10T18:15:34.043000 +CVE-2025-1153,0,1,c5ebf42f5a99beb658fa6de488bd47f5b9b7b750ca2d396972a609d17fa38d13,2025-02-10T19:15:39.900000 +CVE-2025-1154,0,1,1921d51a93d2ae2e4ebaa09917cf0c69ecc4ff9f94914ed635da126c61c70f36,2025-02-10T20:15:42.173000 +CVE-2025-1155,0,1,954497148487871dd0ee4c793527ac8c222409e2b6563b0256ac7d5ba7f8f2f4,2025-02-10T21:15:22.020000 +CVE-2025-1156,0,1,63f659c664780669befb323dbfaf50336d4de536f23cedf7903aa737a21aa0a8,2025-02-10T21:15:22.133000 +CVE-2025-1157,0,1,a206788cb4fbbf65e1bb0cec173b38841b013b053694d19ca76247067cf723b2,2025-02-10T21:15:22.300000 +CVE-2025-1158,0,1,62773d64730482cf69afc1e9bff0a11243764d0c298b1a874d7ef2a6b32319fa,2025-02-10T22:15:37.080000 +CVE-2025-1159,0,1,19a0036bd88070e1e95d8ee26c655747cb8510ac9a9b4838822239ae43731b9d,2025-02-11T16:15:49.820000 +CVE-2025-1160,0,1,81300ab746d688ef30c38c139dc45cf7b27f9d2459b2a483663422f08d79149e,2025-02-11T15:15:19.790000 +CVE-2025-1162,0,1,6fc6d17a544a211e5238fc3e98c99b23aea8c1ef3a4735c45eef263490a825ef,2025-02-11T15:15:20.047000 +CVE-2025-1163,0,1,0bfc52e8c2d65c1c7189d51828a8bfbb7aa129666e27c922aa7ae87c824a1049,2025-02-11T16:15:49.973000 +CVE-2025-1164,0,1,547ef17bbcc7e2e002cdaf360903d023f2da7f36e6b67ddd9cb8b2f85ea02033,2025-02-11T16:15:50.100000 +CVE-2025-1165,0,1,f0aa9c1988b800a9e62729a1594a28872c082e2e2fecbdc830e28263a6a0e0d6,2025-02-11T06:15:20.700000 +CVE-2025-1166,0,1,317888de8b721bc501117cfe4c033c072f9549f2eaee452ae14bbfa0b2f71f85,2025-02-11T06:15:20.937000 +CVE-2025-1167,0,1,e7daea1dd2d4f65ca2c394a7c9a52f37df354f3dd13adeb93e168d726ece3d64,2025-02-11T06:15:21.153000 +CVE-2025-1168,0,1,ddf17b2f04e933c8345200e2a24720c3d683ab487bd6dc6a79c48f8419664077,2025-02-11T06:15:21.367000 +CVE-2025-1169,0,1,149a68c904b59c7ef4c244404ac9c3033faa0090151641d8c4f94dd2d395bdd5,2025-02-11T06:15:21.570000 +CVE-2025-1170,0,1,a47e1a0650e646091ec3057014ee2800de51b75fd317e5d66dc8b5b55c9a07c8,2025-02-11T06:15:21.800000 +CVE-2025-1171,0,1,2833ebbbde3be384d9a3e0adae043c787dbe930e752e0c1a2df8ebcf4ed77523,2025-02-11T06:15:22.010000 +CVE-2025-1172,0,1,4b8526a3f31eb0e151b1c4b5718c2c9e8f36a3f311ddeeb53f26476bf34faae4,2025-02-11T06:15:22.230000 +CVE-2025-1173,0,1,250afdac8344bd2fb519306f8cb736da9f89042acd64975e11de152d0dc8b435,2025-02-11T05:15:13.530000 +CVE-2025-1174,0,1,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000 +CVE-2025-1175,0,1,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000 +CVE-2025-1176,0,1,3ce63005f2d6955454d119dc789ba0c338f09f10e1ca69523a11a4e76ebec2d2,2025-02-11T06:15:22.433000 +CVE-2025-1177,0,1,5d479a05ee98fce9bd1df94de6d3bb9d103629ca41a0e69997601547f088af7c,2025-02-11T06:15:22.623000 +CVE-2025-1178,0,1,6e9bc15abee46095fa45b59249884a86b08db54b5b6bfb3dfcc9175f57316032,2025-02-11T16:15:50.410000 +CVE-2025-1179,0,1,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112f5,2025-02-11T07:15:30.230000 +CVE-2025-1180,0,1,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000 +CVE-2025-1181,0,1,ca3c1011601b0fae06b99a2c26a8cd106fa387c5be46410c165b6082b079962d,2025-02-11T15:15:20.393000 +CVE-2025-1182,0,1,8e271e74e78bb304bae883d9033bfab3d4bd2205d8549a0b17477d8e591b3926,2025-02-11T15:15:20.523000 +CVE-2025-1183,0,1,4f76f1aad34d8f448f8d28132c4592112d8e7338246e678563c85000b0066cb8,2025-02-12T15:15:16.520000 +CVE-2025-1184,0,1,d0f4a01d3468a862af9e88ce8e6bad84fd70b755e39203a74df013c2065cdb0d,2025-02-12T15:15:16.723000 +CVE-2025-1185,0,1,3c5feb3c94641e4255687d0fd87b00fecaabc367d6cb130f8441b42d4da9db80,2025-02-12T15:15:16.917000 +CVE-2025-1186,0,1,4b90530119561286dc68d769efa10800b869d56d765cb8b3f319f9ef6308351f,2025-02-12T15:15:17.140000 +CVE-2025-1187,0,1,24cc041d67c097311e1ec560145519db78d79e2087641eb51be332607e30534d,2025-02-12T09:15:08.613000 +CVE-2025-1188,0,1,198d013d96f709dbef8f83516eed068d72a144493472f3d2961015d039cb325f,2025-02-12T15:15:17.407000 +CVE-2025-1189,0,1,9d048b706e0c633092d2636c584e408a87b9bacdb8dd7e3545dee61fb5f96c9c,2025-02-12T10:15:14.540000 +CVE-2025-1190,0,1,20930ff322a51b9b3d3ffa9071d6fd0e84461c7006f2bffb1ff463b64f53dc36,2025-02-12T10:15:14.740000 +CVE-2025-1191,0,1,a9443451c80e7e8f60c9625659585c30e981d1cf45549b4cb91185c07237bb4f,2025-02-12T11:15:08.480000 +CVE-2025-1192,0,1,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000 +CVE-2025-1193,0,1,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 +CVE-2025-1195,0,1,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000 +CVE-2025-1196,0,1,276f4d719785571ad93558e9354f0f7bf07fb4e2f380c7fbd2137d99c51b8be0,2025-02-12T12:15:29.640000 +CVE-2025-1197,0,1,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000 +CVE-2025-1198,0,1,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 +CVE-2025-1199,0,1,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000 +CVE-2025-1200,0,1,96b433ad7e26edb6f2f9acbb0eb46fcf07f61e221c5bf356eca3408db2bb3def,2025-02-12T14:15:32.090000 +CVE-2025-1201,0,1,a5065e27b37926d38fdfed5b240cbc7757f67e4ae3c1833a26362532b946f2b4,2025-02-12T14:15:32.297000 +CVE-2025-1202,0,1,5267a36acca62c6f3f1f2bf36ac105f93bb86abed5aafd377b82fbcaf82fdc5e,2025-02-12T15:15:17.920000 +CVE-2025-1206,0,1,37cd2d6546fdf449b1a62f8210a336962e7bf0596932f3b0d053a8aadabaa84e,2025-02-12T15:15:18.093000 +CVE-2025-1207,0,1,518ea976e835e5d2e9daf8b69c95e3e72206f7bb3a8162c7be7b93925d62ba41,2025-02-12T16:15:44.393000 +CVE-2025-1208,0,1,944ef3909d00298a5468923e8ae65e2d99c50759f8df888a5fac58ccad7ae971,2025-02-12T16:15:44.613000 +CVE-2025-1209,0,1,cfb5742dff2cc81312b49bf284f180ee8647aa2a8aa703587519147754716174,2025-02-12T17:15:23.497000 +CVE-2025-1210,0,1,8338d565468698987ff151b770c493579e634b55830f0c29b704b52d889f62ee,2025-02-12T17:15:23.673000 +CVE-2025-1211,0,1,38ce788c374a72bbc1ba3c8209de97adc3b8b37f2859b77797e85b3a9273ddba,2025-02-11T16:15:50.660000 +CVE-2025-1212,0,1,4775d3c7abc8db0222566d77a07a3b283456acd669d779aebc898ec54ad5eb25,2025-02-12T15:15:18.290000 +CVE-2025-1213,0,1,2b7e70e47f8a65f033caad3807af6c64741ecb841fb41a9781c263ed91f0ab5f,2025-02-12T18:15:22.180000 +CVE-2025-1214,0,1,570b6de5ce068661fd900040490763a6a2aff52883cdffee187d7e67c3f71c23,2025-02-12T20:15:39.200000 +CVE-2025-1215,0,1,8ed64c4cea73bec1cddd1a2a6008416951076fc76020e0d97ec001cf6bd35d72,2025-02-12T20:15:39.773000 +CVE-2025-1216,0,1,164f15453cadee8b1ef141164e20a61cdb9617e764303cd0a4fe4230725306e1,2025-02-12T20:15:39.907000 CVE-2025-1224,0,0,dbf9ca25612f3b15663509f5a8c0ad24581ded6705dd4635bcfc69168f7d2196,2025-02-13T15:15:20.500000 -CVE-2025-1225,0,0,09d7de95f59443fefca73bfef618153faa9192255b899bb38153abdbf4ab6d78,2025-02-12T20:15:40.203000 -CVE-2025-1226,0,0,6edf890439ca8443e37a6729af1ec322de0291abbd98bfd27e0f84c1db629762,2025-02-12T21:15:20.470000 -CVE-2025-1227,0,0,d3e1f70aa5ee09789935127068557d0d5efb43c517c0ad3cde41799b5688d9c9,2025-02-12T22:15:41.383000 -CVE-2025-1228,0,0,43a57e2306865443f0b8d3988d5208d10ad617b0dd70270672e7929f9fbcdad8,2025-02-12T22:15:41.493000 -CVE-2025-1229,0,0,5c65c46d85a4f9f71b77d266af370dabe4b2571fa85e455a46c4eae0ca016f5d,2025-02-12T22:15:41.667000 -CVE-2025-1230,0,0,f5f2c5099eb280f9d04dd16fe504952a8bf38601f6c57755a8e738275e60ce0c,2025-02-12T11:15:11.230000 -CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000 +CVE-2025-1225,0,1,b84393f2cecfe0f2937bfc6c2d96d8aecba40fa1e0b4eaa3e5689fd294d1fdb2,2025-02-12T20:15:40.203000 +CVE-2025-1226,0,1,4474226f547c434d76495d8a78597f2407b4a7ecd22a98eb405419ef19e7c568,2025-02-12T21:15:20.470000 +CVE-2025-1227,0,1,0a8abada182e610266355a674ee7f84e95ff4221b3eceb3180b08026ef5d1b50,2025-02-12T22:15:41.383000 +CVE-2025-1228,0,1,124ebf8819c0dbf913466ed64d287a05caa1dddc24a54a22964b4c02dc5d729f,2025-02-12T22:15:41.493000 +CVE-2025-1229,0,1,630ee2eae5a84b1160c556fac526b8f774c86604564d0cc69caec674365bdcdc,2025-02-12T22:15:41.667000 +CVE-2025-1230,0,1,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000 +CVE-2025-1231,0,1,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef33383e,2025-02-11T15:15:20.643000 CVE-2025-1239,0,0,c03f227179bbef01c78d8a3eb8a6031a3df07089f04e6aee8231b8da6bdd3a94,2025-02-14T14:15:32.687000 -CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 -CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 -CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 -CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000 -CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000 -CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000 -CVE-2025-1283,0,0,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000 +CVE-2025-1240,0,1,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000 +CVE-2025-1243,0,1,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000 +CVE-2025-1244,0,1,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000 +CVE-2025-1247,0,1,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000 +CVE-2025-1270,0,1,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 +CVE-2025-1271,0,1,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 +CVE-2025-1283,0,1,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000 CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 +CVE-2025-1332,1,1,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 -CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 +CVE-2025-20029,0,1,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 -CVE-2025-20045,0,0,49d8ba25e04988f8e48fab8c8b3cc55f43a8899c24c32cb323bed31afe1ca141,2025-02-05T18:15:29.760000 +CVE-2025-20045,0,1,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 -CVE-2025-20058,0,0,f4f6f304b5363948faa1aad1553a153ef0736fd18eede6e3ebb3eedbe59a4533,2025-02-05T18:15:29.943000 +CVE-2025-20058,0,1,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000 CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 -CVE-2025-20094,0,0,e204a57f0b42357a3efdbbd9c78b2d6f4d02a510cb736699d3adac3b0a05dc60,2025-02-06T08:15:29.837000 -CVE-2025-20097,0,0,fd9eed4577e183674abbdfa5c9c0f05686f1fd64de63e8bcd2ea55d2a30d52ad,2025-02-12T22:15:41.850000 +CVE-2025-20094,0,1,cc9826181bf1f83e2cac160833fefdc5cca091c7fe9a0c6abd476a3468c0bc65,2025-02-06T08:15:29.837000 +CVE-2025-20097,0,1,10ee92b2a8367ecee48bd849953c308a1471e87e1ba2af2224c41b7443f37328,2025-02-12T22:15:41.850000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 -CVE-2025-20124,0,0,c61be0600f9e75108d3058bd1baef93ee81e32f210f69479421489ea572c85f7,2025-02-05T17:15:22.457000 -CVE-2025-20125,0,0,ed33092cfcef37dd0a157b5b9a9884d097795a37602ec9090176987ad141fb4e,2025-02-05T17:15:22.610000 +CVE-2025-20124,0,1,3b222e4debebf19647313be14570cd157d1c9b474f2f1fb6db3f2d02720f9909,2025-02-05T17:15:22.457000 +CVE-2025-20125,0,1,4c965c93b17f55e1ee6990c432e90b6f767d7217d5ca1f99810949fadd043cf7,2025-02-05T17:15:22.610000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,69b8a1ea9824221503fa6a71569d21b0d39774ff921ddd83b335f2c9476a6b9a,2025-01-22T17:15:12.583000 CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 @@ -279295,23 +279296,23 @@ CVE-2025-20165,0,0,1cba2a1f774df193829681605bcd14dbd7ded593dce4753a3b8e142301e38 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 CVE-2025-20168,0,0,24fc772dc3ea5c2e7c84ac7fd0e2daf2c33d11c28d47f590a8d9933ab82b49d9,2025-01-08T17:15:17.323000 -CVE-2025-20169,0,0,78a3161574cb23252e63ca7ae8371485531bb8617d98b3a2aa25a6e51aa42ad9,2025-02-05T17:15:22.777000 -CVE-2025-20170,0,0,ace354d770d7471daeb02e281d75e530bc09ccd785596f9323e2768917265259,2025-02-05T17:15:23.283000 -CVE-2025-20171,0,0,d05f9e01bebf71e825542c6f36111eb2d1ec4b6e498d02d19d253650289666b3,2025-02-05T17:15:23.753000 -CVE-2025-20172,0,0,60d9f6f5908ce9634abc746c3fc5dbdf431dec5d8f61fd5a7ac23cf0a4fbf355,2025-02-05T17:15:24.020000 -CVE-2025-20173,0,0,25b6a9f82fcbfb5381a0f397f1fabfcc5426b03179e3af1181496ba085bb5b51,2025-02-05T17:15:24.263000 -CVE-2025-20174,0,0,b79df95fc6c12f083f29b35c7cf48904267e1e0e7667c8590d78b38b4cdbe619,2025-02-05T17:15:24.513000 -CVE-2025-20175,0,0,fd6617d7c6e3d95f0dbbacee6bd1c6a87944b172ae93a4ef8dd0f9b11bc6198d,2025-02-05T17:15:24.720000 -CVE-2025-20176,0,0,ed376501b557676febd78e2f54d9035b39939130b27e5c69ddf9b333623d0ff3,2025-02-05T17:15:24.997000 -CVE-2025-20179,0,0,f3f42e42090980361e2eefedfdc1c54bbe53b842f3c5cc4f4a755d213f876a95,2025-02-05T17:15:25.210000 -CVE-2025-20180,0,0,369dfbec25a45421a411438484b56dce487d5392ae5b84585bd42039bf984c4e,2025-02-05T17:15:25.370000 -CVE-2025-20183,0,0,f29e700e6bd3b2a518e4d9daa5959b75b9ab1d30b830fb262f09814f65af3c29,2025-02-05T17:15:25.527000 -CVE-2025-20184,0,0,ec19ea1fef66541eff9b0e2067f5fc4f526fa2ab3fda9bff6a72d99eb8d4d1a0,2025-02-05T17:15:25.697000 -CVE-2025-20185,0,0,491fde53e83dcec798e13e2d9a67fb94569c05a8d72f92415306e757631fd2e1,2025-02-05T17:15:25.883000 -CVE-2025-20204,0,0,ff147e6ad933304bf983a313f5a9204649ab468e5d74d3bafd7e71cfd1556e46,2025-02-05T17:15:26.077000 -CVE-2025-20205,0,0,1b69fdf9f7e74393787a2750d8687a735cb03e08811413756b75aeaf71635da5,2025-02-05T17:15:26.243000 -CVE-2025-20207,0,0,a5546524bd462a4b1c071578f9c02045541f6e2568f015c12b4f48db03f810aa,2025-02-05T17:15:26.410000 -CVE-2025-20615,0,0,6a75b2784e00d2f0092410fd2c8fee687111dbb32ed4616e80f66b6bfc8c4f66,2025-02-13T22:15:11.590000 +CVE-2025-20169,0,1,534f30a6eb8c1dd6e91b1a6a3ececce0dd1f22483262242e1127ac6548d5b03b,2025-02-05T17:15:22.777000 +CVE-2025-20170,0,1,3f0fabed2a9cfe87bd805e3465421e0bb31e057a3867652ccb067ce00a6f79cf,2025-02-05T17:15:23.283000 +CVE-2025-20171,0,1,0ee2fc94cdcdcc9fa9d0c27efebf569e57e192b7aeb9e94b591b467076a5c421,2025-02-05T17:15:23.753000 +CVE-2025-20172,0,1,0806f4100a8aba0f09e4a061c54bd74b06ab3d6ebe9dd8398ac48c14f8351552,2025-02-05T17:15:24.020000 +CVE-2025-20173,0,1,18a55c025a624f2745f4b486f2820d7a1d941e18184959f53aa3c1b4d9253569,2025-02-05T17:15:24.263000 +CVE-2025-20174,0,1,9c2faf89fb30323fcadcc335c194ab7b928be534d0c1521a8fd636ae0c7d33ce,2025-02-05T17:15:24.513000 +CVE-2025-20175,0,1,d262bd7148a5fa3d37c356b0b033b1ce0b6ebb7963aa480d8fd784ab319f903f,2025-02-05T17:15:24.720000 +CVE-2025-20176,0,1,a2fa419d9ebc99b5ee2146314171d240a66f6d208faa37e0b22398f258f842d6,2025-02-05T17:15:24.997000 +CVE-2025-20179,0,1,0aec4ef246f2c607f83340c522f87121c03b5603860b31d10cb764e695295cde,2025-02-05T17:15:25.210000 +CVE-2025-20180,0,1,1c51177af8fde6cc46fd65823e7718911259930ed284d21cd48c5394bd2be23d,2025-02-05T17:15:25.370000 +CVE-2025-20183,0,1,fed865c5e8721a13cfa2786aa8ab84413bfcd1b44177e9c3db29addd8c3be250,2025-02-05T17:15:25.527000 +CVE-2025-20184,0,1,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38163,2025-02-05T17:15:25.697000 +CVE-2025-20185,0,1,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 +CVE-2025-20204,0,1,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000 +CVE-2025-20205,0,1,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000 +CVE-2025-20207,0,1,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 +CVE-2025-20615,0,1,7bf2f14d71ca066d1f71371dd6af37fe50ec1afd8739580fa516ac8ff703a51f,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000 @@ -279356,20 +279357,20 @@ CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8 CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000 CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 -CVE-2025-21087,0,0,33fb1ec06a861dcf74a4d61156f86fd896fc8a89287560b58160ed063ae8e130,2025-02-05T18:15:30.430000 +CVE-2025-21087,0,1,1b1499f33c0be54fd767e4fe080f8dee82c37e2021ffc7907cab333dc177b4aa,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 -CVE-2025-21091,0,0,b00e626da2918eff66f54d913fdb7a91d14dfde96249fc770e123ab2c3710503,2025-02-05T18:15:30.613000 +CVE-2025-21091,0,1,14a5f94bd4155cb401565e2a5aae76cc90c7a8d9e7b6e7f408f118d52738b6aa,2025-02-05T18:15:30.613000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 -CVE-2025-21117,0,0,79d8e662f467286cce3725e76fcbcc3c026d3c43d5deb1672743a8023ba2875e,2025-02-05T14:15:27.417000 -CVE-2025-21121,0,0,e1bba1bdff0f9d09b8abecdf048bf4e0feaae2bb47bd050c5ad96665d452372f,2025-02-11T17:15:23.673000 +CVE-2025-21117,0,1,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000 +CVE-2025-21121,0,1,0fd47cf3f1da87666e75ab19a44f95581ff71ca6db63bf75c7eb3bb6002e928a,2025-02-11T17:15:23.673000 CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000 -CVE-2025-21123,0,0,855684d870ba914e4617ed2147692361781bd2250b76802ee20cdc9860be559b,2025-02-11T17:15:23.817000 -CVE-2025-21124,0,0,8a2966ab58aab45914a04303cd587657c4cf5e079f4b34eb85f1da380e4132a0,2025-02-11T17:15:23.950000 -CVE-2025-21125,0,0,a692e7fd011421628c33cac9a4d20e0c8009a6b4132c96d4ba3f8ecbd414ca83,2025-02-11T17:15:24.083000 -CVE-2025-21126,0,0,423b71e52ef952692896faa663205a287aea874b12605f7a4eeb780634b9afe4,2025-02-11T17:15:24.220000 +CVE-2025-21123,0,1,c10334e02bc10724a6b3ac911789b3ed6c223a1d772a9a7634e207d5e0c840b9,2025-02-11T17:15:23.817000 +CVE-2025-21124,0,1,142bf5bcf7d7f58fa264a6d21f377774bbec50278cf888877b6badf63af943d8,2025-02-11T17:15:23.950000 +CVE-2025-21125,0,1,c6747c681d4d45c7a0c1eb785b2a8aa5224658c198dfb4e47a9e2bad1bf99232,2025-02-11T17:15:24.083000 +CVE-2025-21126,0,1,5a23defc53aebe07f4a8069bc1046e77850226267cebc1ae9d7427fbd578b3d6,2025-02-11T17:15:24.220000 CVE-2025-21127,0,0,6ca3d8cc02cdac3fbe512e4c8a13fe7008821b139ef240ca0adb0f0fb4680f8f,2025-02-11T14:55:09.333000 CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000 @@ -279383,48 +279384,48 @@ CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875a CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000 CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000 -CVE-2025-21155,0,0,890ad0f81d3b0a99a063743c66f69fadb8af5d897147e24066c06a66cca2b4db,2025-02-11T18:15:27.583000 -CVE-2025-21156,0,0,06950f1390cef4afa24aeeddc1730e36cea5e82133c82b8ed71a5d08d63697f4,2025-02-11T18:15:27.787000 -CVE-2025-21157,0,0,5c615e21f4de177a12a17b317462371eb49321788292fade156ae560efe13ebc,2025-02-11T17:15:24.353000 -CVE-2025-21158,0,0,90186e3d4be2fa4cf31bfebe4e40df094a4ff948dcabe7cb35ec8e3e1356a019,2025-02-11T17:15:24.487000 -CVE-2025-21159,0,0,164370d86d5565edc4d782ec631cf8f63d08483509682d10f3a81089889d8fbe,2025-02-11T18:15:27.977000 -CVE-2025-21160,0,0,0f7186cb8c3d38ec36051c3438c939e9a211157e56055c7a19d1307ef033520e,2025-02-11T18:15:28.163000 -CVE-2025-21161,0,0,bdee08213ad2c19536fbd5f11e820d7708fe2ef88081f23e11bbddb125d6ad94,2025-02-11T18:15:28.347000 -CVE-2025-21162,0,0,5d46baeb0379984b6e1c97b10bd169b3aeb6b2a1db9f7813b3d775c283fa0fd5,2025-02-11T18:15:28.567000 -CVE-2025-21163,0,0,2e88d0a43231f9adc3f636dcc01233972347c533fbc8a62c6cb6724a3859fa0a,2025-02-11T18:15:28.747000 +CVE-2025-21155,0,1,d61fdc656cd96a945fd7b9af2ee9252f6430df0e0dd253980f49fb5bdf069ec3,2025-02-11T18:15:27.583000 +CVE-2025-21156,0,1,f7e5756ac01ea682f9bd1c548f18df3c6bce1e9d9a66aa25d33e5bdb8df36343,2025-02-11T18:15:27.787000 +CVE-2025-21157,0,1,04d80e0b8e19a2dff097acf5fb55024efe8d9eda9c1a5f1f72ba1cd57a2dd41d,2025-02-11T17:15:24.353000 +CVE-2025-21158,0,1,4e1dd4d606a00549db5c70d9381cddaa7991b2ab0df43b4187cb4c170c343e2b,2025-02-11T17:15:24.487000 +CVE-2025-21159,0,1,39f949a60f051798b6eb4983ee36ef9900d379850f2ce060cdd35794e287fdd8,2025-02-11T18:15:27.977000 +CVE-2025-21160,0,1,9994a4952a9e9afc62f746c15aa6f20f23635dfdfc899516b4fe7c52f199bb7e,2025-02-11T18:15:28.163000 +CVE-2025-21161,0,1,ba90da9d0cbc60acec84e1d77e27aa2d753d3d0fa919584c0c1fde75f16e275e,2025-02-11T18:15:28.347000 +CVE-2025-21162,0,1,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 +CVE-2025-21163,0,1,ed3ba58c555afae11b9f7776f959ad83d274a64ae1ca8ee7ba7a4047c0117bce,2025-02-11T18:15:28.747000 CVE-2025-21171,0,0,3c9f6942085918a90e9231b06b07eff9b6bf5a4b6913504e83e61dbac7d978ef,2025-02-05T20:07:01.797000 -CVE-2025-21172,0,0,a16b5aa4bf1bed75762ad83041277b58c0e61aede3f38addb5adc297e17ded34,2025-02-05T20:03:33.053000 +CVE-2025-21172,0,1,c4b86213875e6603d2ee53fd6b46e908496cb95e2ca90c3d8db30a098c51eef2,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,ad7a0687adbbd12bea1660d0b0ef666d021874e57d663931aea070a6cab1470b,2025-02-05T18:56:08.103000 -CVE-2025-21176,0,0,45b47787b4d49daaded12395e3d448e8127b599195846900e9b1b348a614f6da,2025-02-05T19:12:24.030000 +CVE-2025-21176,0,1,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd896c8,2025-02-05T19:12:24.030000 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 -CVE-2025-21178,0,0,d71a896e79150386932074c64e9b8c5ec60fa5f01f13fe9fd459435a63d7fcd0,2025-01-27T18:42:39.560000 -CVE-2025-21179,0,0,718ed5d35c8ff9ac90c64b90e0bad75e94d4a2f59e519bacab520f58409422ac,2025-02-11T18:15:29.343000 -CVE-2025-21181,0,0,f41b3f0913d82f972e0e115f3b8189eb9e3e4aa99e495462e348239bbaae6619,2025-02-11T18:15:29.553000 -CVE-2025-21182,0,0,397755fcdda5e6fb34dab783127877b0db8c42d016a0a380f7e497c18082f90a,2025-02-11T18:15:29.797000 -CVE-2025-21183,0,0,86fcdb1068280bc62c500cb85db4fb2dfc0159ed70e0e218c4617ab3c7533e53,2025-02-11T18:15:29.993000 -CVE-2025-21184,0,0,b5b9ea8188129d05e1f4ac116c6d7e81b113a7196d247676b19eafcec488a526,2025-02-11T18:15:30.180000 +CVE-2025-21178,0,1,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000 +CVE-2025-21179,0,1,98130596ecb887b2f43457342b97cdfaeaa31d5a819985f7b57e172826db13bc,2025-02-11T18:15:29.343000 +CVE-2025-21181,0,1,31d266ae82a6b21d1e39f8852327b06350fa729bca4acb9f9fafc188340fb33f,2025-02-11T18:15:29.553000 +CVE-2025-21182,0,1,62e2964b5e368fa2c0f803888a254a159c3d03d891739e70c7d556ed13d704e3,2025-02-11T18:15:29.797000 +CVE-2025-21183,0,1,7c48b36496bdb7b131316cd62b6463a8e8493401202fe4a5eba5e47afa7048c9,2025-02-11T18:15:29.993000 +CVE-2025-21184,0,1,176160e0714d2f36cd4fbe06ebd53804dcc2c0a32ceb6ff9aa34164d56b4a8be,2025-02-11T18:15:30.180000 CVE-2025-21185,0,0,382559bc0e85e942334285c772283cee8d0ca5a4b02a81c52925c66dc4c27526,2025-02-07T21:06:14.873000 CVE-2025-21186,0,0,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000 CVE-2025-21187,0,0,05994f278acb907e9de51acc1037aa859f6c5afa8dace166ad321c325a389481,2025-02-05T19:14:06.093000 -CVE-2025-21188,0,0,e6a332d6cbbb5506dc18837972b1459ea3c3c55449c6076d1c3b4026891daac6,2025-02-11T18:15:30.403000 +CVE-2025-21188,0,1,d7b111ff774208de399abaa7106629ded0401669785b4e7d276976a329fcb4c6,2025-02-11T18:15:30.403000 CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000 -CVE-2025-21190,0,0,7fdccede96beb02414772b09c0973070db464fc4398029a14831743699f67932,2025-02-11T18:15:30.610000 +CVE-2025-21190,0,1,07646213243484771acd05c18315f79affbd3ab1f88425845bb63026f32e5249,2025-02-11T18:15:30.610000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 -CVE-2025-21194,0,0,920e0c541dc07a461150a86728a959e37471cacf67873463837202156c028b10,2025-02-11T18:15:30.820000 -CVE-2025-21198,0,0,c20343743aed744384e0d89814ea66d3a222d468121f803aeb82a7ab80482e11,2025-02-11T18:15:31.020000 -CVE-2025-21200,0,0,ed40ccb59959eab6e554536575eab660a3b4dec9d0edf2d0bb99a2e1408e7f18,2025-02-11T18:15:31.203000 -CVE-2025-21201,0,0,96a18492fc2a832c7aa33f3789e26da034546b82723f465906adc7c67141988c,2025-02-11T18:15:31.407000 +CVE-2025-21194,0,1,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 +CVE-2025-21198,0,1,30ced4bcee2342c009365afe74226ad51767dba5f3716858f2213f4790dc210c,2025-02-11T18:15:31.020000 +CVE-2025-21200,0,1,6ab25dc0f13c1b559fcf2fc559f0570c61cd1162be881ce79b488a4181e69ae1,2025-02-11T18:15:31.203000 +CVE-2025-21201,0,1,d2413a74168a0176b2012cd098348307d5637137afb19e0de2733c18dfa6d511,2025-02-11T18:15:31.407000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 -CVE-2025-21206,0,0,e8f95487f702013558b3cb15d5eaa442c0d9d8567ec718aeb1c8134d95c16aa3,2025-02-11T18:15:31.610000 +CVE-2025-21206,0,1,a02355978bda2794140bd082fd4bb1ad68e34b4630d7bec026a9c3c3f9e70073,2025-02-11T18:15:31.610000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 -CVE-2025-21208,0,0,f7b69f415b8c312c03858525feaa05192763d8325259ef101dd50dfa9e0ae0b8,2025-02-11T18:15:31.793000 +CVE-2025-21208,0,1,b0a53ebd1070215b1bcd39c99be1f27e3e7b9ead96e6fc3a22f33f6cf9aad8ba,2025-02-11T18:15:31.793000 CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000 CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000 -CVE-2025-21212,0,0,b8d52f20c35ab56667f3a518391fa56e605720e86dfaa0e3331544ab25869e1c,2025-02-11T18:15:31.980000 +CVE-2025-21212,0,1,aacb1bf84eb558b2bb4a198390eb40b2a485f936654ed11ea4df089503cbb313,2025-02-11T18:15:31.980000 CVE-2025-21213,0,0,528a66554547e026ef0c9b0b0fa09fbf1c8980822bfea86508e8a2b2b44cab58,2025-01-27T18:40:41.820000 CVE-2025-21214,0,0,b4b935621385a9108dcb42d4939dc75aba798e00e57001b21bdc03438f9edeb9,2025-01-27T18:40:22.427000 CVE-2025-21215,0,0,d2a7a3bab7c47b0d09e64e875649c7b8760c68d5eb2f91a478aa121dc7ec1b54,2025-01-27T18:38:36.757000 -CVE-2025-21216,0,0,04b91d7e9da05f3531469246fdc0218bc308a2d153f1d5fc935bcab22da591ca,2025-02-11T18:15:32.177000 +CVE-2025-21216,0,1,0cbb9ca36d7650fef5802048880f5ab67aa53da9ffbd219a6bd893857b2720e2,2025-02-11T18:15:32.177000 CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000 CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000 CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 @@ -279459,12 +279460,12 @@ CVE-2025-21250,0,0,4e89a566438f1e28e8838350c59192f7c8bae0fa09d47d1f5f0f32355a4e8 CVE-2025-21251,0,0,5440266405ae4f5a1eea13ba92fdc75258561cea9d4f2a0de5b103c45023d533,2025-01-24T21:54:57.333000 CVE-2025-21252,0,0,6055e1c3e54e765508a0901e6591be173ca3b23ac49a425f1555d0244d559b99,2025-01-24T21:55:05.360000 CVE-2025-21253,0,0,998ca5933add3987f50ef40acf3b400fadb9546f5a2e9bc579c9e6ccaab029f6,2025-02-11T22:18:40.563000 -CVE-2025-21254,0,0,f72a5d5961b3a1b4667fde5df57af72e997f0a97796cf1640b81d8b7994d01a9,2025-02-11T18:15:32.450000 +CVE-2025-21254,0,1,4bea76efb0bf23622a0abec3d73b3f9e14acca1cd80277710ecd589ef6304774,2025-02-11T18:15:32.450000 CVE-2025-21255,0,0,8f8621218daa5ece83eff9b164b167c141187b12e766fb110978adaf1f9c2e14,2025-01-27T18:48:06.630000 CVE-2025-21256,0,0,046fe33676648d49ab958cea06795409b133ff67b2e397e47021fff2b0522138,2025-01-27T18:48:24.467000 CVE-2025-21257,0,0,a4aa8eb764428591988a4a9138451d22d056f236bcba642d77cd9ec1175f53f8,2025-01-27T18:48:34.057000 CVE-2025-21258,0,0,1f595e4730f0a0101ec7c6ff9cdba409af8fa944714e620a4a15245fbce00d59,2025-01-27T18:48:41.780000 -CVE-2025-21259,0,0,3b5767165d625cb7c56dff993f05acfa765f5e0a1bac6342c487f152e4fd588d,2025-02-11T18:15:32.643000 +CVE-2025-21259,0,1,d7b0093a133cb996a3cdc94dbca5e662a9f75469a51e68e8653813fca7fcf142,2025-02-11T18:15:32.643000 CVE-2025-21260,0,0,0a7c1f91b0bf465a1abd98448dde131c6cb51ed7e169790e660636d55e49b3fd,2025-01-27T18:48:49.733000 CVE-2025-21261,0,0,4959e566283cea5c3896dc096def632c73bb2ea004186a297dc44c88399b27c3,2025-01-27T18:49:17.243000 CVE-2025-21262,0,0,53158e77111cde0b4bd12b84c347b79f0eb1bff1360ae5aad148e2597a850e89,2025-02-07T15:18:05.707000 @@ -279526,7 +279527,7 @@ CVE-2025-21318,0,0,5ff3710adc6b941daeb26737ee7866486d9c863941517d982a3a97a2f0786 CVE-2025-21319,0,0,f438a23881d0da34e77dbbeb756804186ca74b144b3c3080f26cf29fa51052e5,2025-01-22T14:44:50.860000 CVE-2025-21320,0,0,2bf5b9d6da8e13f0983ed08dc9cf0a61539e484ef9e6c51d78636785e0ee89e5,2025-01-22T14:45:53.317000 CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7df1d,2025-01-22T14:46:12.787000 -CVE-2025-21322,0,0,50a107a333bf0b2167dcd9e5ac7209ff61679398b15f125b9e370ba7ad2b69f8,2025-02-11T18:15:33.027000 +CVE-2025-21322,0,1,36afae68f9b6dac0a27406f76009dfe495c605cb1fe6c331fac0678ef1b2abae,2025-02-11T18:15:33.027000 CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000 CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000 CVE-2025-21325,0,0,adc6051fb96c54b0fdba83aa37ed2ebc8b7e0ef6be77c8748e4973fce8d78fb4,2025-02-07T15:21:31.407000 @@ -279541,7 +279542,7 @@ CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000 -CVE-2025-21337,0,0,3c5fb1a87b44169a96c8d9b9706d1059f42006d9d3d80b17f90518db183259cf,2025-02-11T18:15:33.217000 +CVE-2025-21337,0,1,3c3423720bfe0d3d5072f95cc233449f86d4cbb35a1665fae8eb0916093a452f,2025-02-11T18:15:33.217000 CVE-2025-21338,0,0,ab086dfca1b49b499ba269066d1300889796e4ccce139b627f3e11f636e5ba00,2025-01-21T20:08:44.550000 CVE-2025-21339,0,0,442e09cebfc2b51a14d5657fd8bad9e56aae7d3e9ea789a26fb84dd1f483d156,2025-01-21T20:11:14.430000 CVE-2025-21340,0,0,47a95b98bc1be24a98506d39df5e3299bee8f816a1a17f7db6df116c0f66f94c,2025-01-21T19:46:40.997000 @@ -279551,17 +279552,17 @@ CVE-2025-21343,0,0,0e6138632cbd4475bd4cf71380d93c68f5d11ac4e740335bf785ce7eae137 CVE-2025-21344,0,0,77d0aae01883902f81c0082b1fd6e206aef82974cb0e1c18fa53c6191a390b22,2025-01-21T19:51:39.647000 CVE-2025-21345,0,0,ac230bebff6a1de687bcf2e0076c3320e327f5480e428ca1278d4856df31bf4d,2025-01-21T19:52:00.833000 CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b9d8,2025-01-21T19:29:19.320000 -CVE-2025-21347,0,0,3c87c5747ba1208473c6c7dfddedc5958216b35518c0719cde3bd53dd57f5844,2025-02-11T18:15:33.497000 +CVE-2025-21347,0,1,7d247979bf64f9ac010be1587545cceb03684f90571ae4a0b943cddb699e58dc,2025-02-11T18:15:33.497000 CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000 -CVE-2025-21349,0,0,93b32807d71902489ba549b4eb1e8f1decbab2f048e8fd58d8f80f79dd530c3e,2025-02-11T18:15:33.697000 -CVE-2025-21350,0,0,05cf39719fb5fe49c466c64c2d12abf5b64fdc4682c1b8bcf44781f5a2515353,2025-02-11T18:15:33.903000 -CVE-2025-21351,0,0,2646d0abf4a80e4c0a9160e2de1f10f0cc9b7e0d01b4e1aa63b102fea63db094,2025-02-11T18:15:34.113000 -CVE-2025-21352,0,0,faf7659f5f6b70d625b7118f3e010d6fb4625ecb1ccfe71009838dec925b4995,2025-02-11T18:15:34.310000 +CVE-2025-21349,0,1,6d368976201e52b2580e8a9496c7d5c8b2e92a3335a67efb6eb9f1e83d33b8cc,2025-02-11T18:15:33.697000 +CVE-2025-21350,0,1,afdf915978914de12ddb47f8080382e5c3b27b9e602062b6fd9ccfc1c9cd23c8,2025-02-11T18:15:33.903000 +CVE-2025-21351,0,1,48fcf1f43b1c92276907ee87c085abb066108b8d3a5f6a626a70e01ac00f8d1a,2025-02-11T18:15:34.113000 +CVE-2025-21352,0,1,a81d34aef4d981cd5666fd3fb8eca70146e26df755619e866a1140df31ff66cc,2025-02-11T18:15:34.310000 CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000 CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0b95,2025-01-21T19:37:28.987000 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 -CVE-2025-21358,0,0,35262200a1550a86354950b3e6b7c23a5588e7087d21ca18ddcde65365465f14,2025-02-11T18:15:34.550000 -CVE-2025-21359,0,0,3e9e77b87d9c193283cf9a0f24cb74c3b56cbd7bdd83157a8a946112f44fab02,2025-02-11T18:15:34.743000 +CVE-2025-21358,0,1,6b3b006fde15330f98a3679d6649f7d69255f6979eb0e6604e227fb2cdf13add,2025-02-11T18:15:34.550000 +CVE-2025-21359,0,1,30bf3669f4850cca319f61453306f38e871ec0b4e26d8863059027383dc47e38,2025-02-11T18:15:34.743000 CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 @@ -279569,33 +279570,33 @@ CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61 CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000 CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000 CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000 -CVE-2025-21367,0,0,3c35773f96acb1eb8ddb958666822650d14fe3cab89a6847994d0620c7ea06d4,2025-02-11T18:15:34.943000 -CVE-2025-21368,0,0,1eab4fff32f5517e683f64cc41e4ee39ff0fd646a8ebcd748c516fabe39ee36f,2025-02-11T18:15:35.123000 -CVE-2025-21369,0,0,9243df584d3a291b1f0e95f0a53b03ac7368863148fab3c79a0ebd2dc850f505,2025-02-11T18:15:35.340000 +CVE-2025-21367,0,1,49ec4a253f62e50c1975f7e6358b6d4209c1734cc30bd89ef7f69cfe7c5a053b,2025-02-11T18:15:34.943000 +CVE-2025-21368,0,1,b4e4a393d004ce2a6c1b8ec6bbd812fb9e072d4944c9c700c29f673af125c1a9,2025-02-11T18:15:35.123000 +CVE-2025-21369,0,1,5643d58940a49a0ef151cb4654a4dc204b6567836d79e34c9b23cdce35dfc628,2025-02-11T18:15:35.340000 CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 -CVE-2025-21371,0,0,4a896a7aff89dd4b266ce27190e788c160c50bbfea63ccb884f944f6eaca4ad5,2025-02-11T18:15:35.540000 +CVE-2025-21371,0,1,06bde9d095fab9666efe445ebe157ecd487ee91a0d84ceeca7c22586e795a53e,2025-02-11T18:15:35.540000 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 -CVE-2025-21373,0,0,03c6df1ed1296ff00bda73b29a73a70d88e5343798916142764a5992e49fb88a,2025-02-11T18:15:35.740000 +CVE-2025-21373,0,1,f92044c0f50d14d062112742cac40edff39de72ceda56bf0f262b26256d83298,2025-02-11T18:15:35.740000 CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000 -CVE-2025-21375,0,0,d2ce3bda3a812b4670fa200ce28df08f33c6caa5149ed00ccb1a1934fedf5756,2025-02-11T18:15:35.947000 -CVE-2025-21376,0,0,72fb0261d9dc3c6575ee00f5528bb48512c9d865220612ddf90b246a5104801c,2025-02-11T18:15:36.167000 +CVE-2025-21375,0,1,452a377d8e00ad8f78ad8f228226b63701a1e63a06095b32fe68d6e1cf90c4e9,2025-02-11T18:15:35.947000 +CVE-2025-21376,0,1,8878f80a0ae83f8322be0dcbc21e9c67d35d45daf5e0d68b1522b7e0d173189a,2025-02-11T18:15:36.167000 CVE-2025-21377,0,0,f263670feaf2f0af19a32be3eb2437e5c8f30daf73c37789631918d6b9d79d16,2025-02-14T17:40:52.127000 CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000 CVE-2025-21379,0,0,7ec8aede7c8424716a30381f57c5c6c2e0103505fb7149b55274dedfc8d7261c,2025-02-14T17:39:51.510000 CVE-2025-21380,0,0,e643fd8c94c7b45625a0b2a2c6180cbad608f386b8797cac9a8273096b1f65ed,2025-02-05T19:29:52.457000 -CVE-2025-21381,0,0,e49c09663686043be847f977dabf9b6965b23793e33ce52ea7defaabc50f252f,2025-02-11T18:15:36.773000 +CVE-2025-21381,0,1,34e7c077c422b179dabcad98ae6724ffbdd69c50b529ca92ec01b1f6bd867bda,2025-02-11T18:15:36.773000 CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 -CVE-2025-21383,0,0,f239af1870c6403ab59790da7b64e1dad16f85377871dc0c64b1388a9e862a44,2025-02-11T18:15:36.963000 +CVE-2025-21383,0,1,cef86fb722a492bba5999008e077ba4e0bcdfdca7e1c12402fd24cbb02258e01,2025-02-11T18:15:36.963000 CVE-2025-21385,0,0,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000 -CVE-2025-21386,0,0,587925b9f51c6f3c61d2c5fdab169ea945b83965a4922958f2a0d4035a4867cf,2025-02-11T18:15:37.157000 -CVE-2025-21387,0,0,45b75cfa0e3c3024e9e9758b140c1e6a57941eb5f03adacfbe13ff717267ca19,2025-02-11T18:15:37.337000 +CVE-2025-21386,0,1,17d9bcb239f3cd33e8926d95f51da996d32a15ff3f987258e6a581e2809828dd,2025-02-11T18:15:37.157000 +CVE-2025-21387,0,1,e0c0537c2c15c9eeb7f31b7c7db3b844be344ae09d1dd05923da281b0dee4a82,2025-02-11T18:15:37.337000 CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 -CVE-2025-21390,0,0,14697f02c8baf4b55b17c007d56cdc55e364c61db4a64d4a3dca6609d3016329,2025-02-11T18:15:37.523000 +CVE-2025-21390,0,1,14783ca48d3efbfc9fb20859f570ff47925c810fcc0ff83e83d54b15c4d81bf4,2025-02-11T18:15:37.523000 CVE-2025-21391,0,0,83d419fda69ced06d53cbd61e13158fe3e31c56b8681059f3bb731201858f5f1,2025-02-12T18:14:53.363000 -CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d4548d,2025-02-11T18:15:37.907000 +CVE-2025-21392,0,1,14a73a4f0a24905292abff23c95b2f5d5a919f2e1e23458525e547a704400c0a,2025-02-11T18:15:37.907000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 -CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000 -CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 +CVE-2025-21394,0,1,35e16dcc3b9521e2b7856f1385e22a03a15e9053b31212d28c63f320eb903ebb,2025-02-11T18:15:38.100000 +CVE-2025-21395,0,1,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 @@ -279778,27 +279779,27 @@ CVE-2025-21677,0,0,aee79bcda6ce5184f23bc0dd5a0019eff6afcdacb0d17d6f4e33d3cff1406 CVE-2025-21678,0,0,9cb21e99665adcd569ac2adfbdf98ef6f92d8c1c4c0a5b5709324da1e0646d05,2025-02-02T11:15:16.117000 CVE-2025-21679,0,0,009d8fd88ff602d149cf09ea780bd027b79138cc9787bf079d7e8b5eae764ff3,2025-01-31T12:15:29.070000 CVE-2025-21680,0,0,ab176bb9040b4730f514a36acb954e8ef4736becce0eddc54061e7998d46f0ed,2025-02-04T15:28:08.510000 -CVE-2025-21681,0,0,9e9509683b66e78d225a9c8bdb52e1c3341add5c0d97b10f58b98660105a4cbd,2025-01-31T12:15:29.260000 +CVE-2025-21681,0,1,c762e0dffab812bde06604541722b1d7f7e956444bb5630804b957a593fcf627,2025-01-31T12:15:29.260000 CVE-2025-21682,0,0,462d4deac5e2e59ee2d3e31f4dfc91555e87d58a1e47d6fecad84acad53c8a69,2025-02-04T15:25:48.707000 CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000 -CVE-2025-21684,0,0,ccf473d35e3f4f06616cbbd96aa871588257fbf07c3b7d21b6ac78888609c8f0,2025-02-11T16:12:41.533000 -CVE-2025-21685,0,0,bced84b385abcfacfcf40a5eba2cb6ecc8b64358a60d47bf98894a03f5116174,2025-02-11T16:11:19.543000 -CVE-2025-21686,0,0,1186070476608bfde4e8ad5b786fbd6e2fbb80ab6f74e7599014d16cd3516df5,2025-02-10T16:15:38.100000 -CVE-2025-21687,0,0,4218a1fe097be7ff48f7f00b1a58a0c77832c67e40eabc0f15619f349373167d,2025-02-10T16:15:38.207000 -CVE-2025-21688,0,0,d25c2b3b1b1ae8e7958bade33b2de0e085aecd925db27ef68f9d1e524c0f242a,2025-02-10T16:15:38.323000 -CVE-2025-21689,0,0,26b4b6f59e610ae3d86f310f4c4eb64332db988cc3825a031fda04607cb089ce,2025-02-10T16:15:38.447000 -CVE-2025-21690,0,0,409184d515a8ba278a78e3182a62947193916d8738de3b3f3b5bc8e7c7527e07,2025-02-10T16:15:38.553000 -CVE-2025-21691,0,0,7b442008fae99134657976bf7535055e277309d3aaae2c6d48207dd41283a97d,2025-02-10T16:15:38.660000 -CVE-2025-21692,0,0,1555d9a0f484c79fb0521445824e128614c8ef002d6f5d06ed98703295d0b013,2025-02-10T16:15:38.763000 -CVE-2025-21693,0,0,7a6b4aca501bc98d818a39748ab53f772cb8c2c6c63fb05bf7b85e749e32488e,2025-02-10T18:15:35.367000 +CVE-2025-21684,0,1,2f956d860130e6337d0fabc47d6eb0a3769264253b41d76d2b8bb060797c168a,2025-02-11T16:12:41.533000 +CVE-2025-21685,0,1,ddcc9f74d2788921662827130d064ca08f136819e30b8929e36a7dc983d8aa08,2025-02-11T16:11:19.543000 +CVE-2025-21686,0,1,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b4db,2025-02-10T16:15:38.100000 +CVE-2025-21687,0,1,731e06dc41eb1826a82f0b150e469653af4058d6fae9edcc298267a2b69d1f58,2025-02-10T16:15:38.207000 +CVE-2025-21688,0,1,630d962152a5ef8c0af287b3cac9b1b0d8ac4e898b90cadc37f867db1dac2020,2025-02-10T16:15:38.323000 +CVE-2025-21689,0,1,af95d512c25672f1182cbdc285afa556f5984fc59f0b9ac3275c3c40288f0d7b,2025-02-10T16:15:38.447000 +CVE-2025-21690,0,1,af1632176e641a0691e2d0045bd50a0fd357491868cdeecd328ada4c2ffbcdee,2025-02-10T16:15:38.553000 +CVE-2025-21691,0,1,0be10dae2960ce4184af79c8851fe271b17975e4a70fbd2fd5e02d9fceba956d,2025-02-10T16:15:38.660000 +CVE-2025-21692,0,1,2a56036ec984cd90437da8fcc1a7677342465bb3ac22539d9e0c2fee06cfc581,2025-02-10T16:15:38.763000 +CVE-2025-21693,0,1,48af54d2ad51fc33b163ee78589c7ffe2bb45cfe36de093cbf657150eff1c50b,2025-02-10T18:15:35.367000 CVE-2025-21694,0,0,4d66a5057f1d2e8907f5e975a4f0fe5e549c1e634550338b1bfb73de2ad5699c,2025-02-14T15:46:40.857000 CVE-2025-21695,0,0,4438167eeca6bd858c177d9ae492872f06b6184828f1c921782c8da088e8c482,2025-02-14T15:44:28.450000 CVE-2025-21696,0,0,1975fb41b3a7a51147bd9e4268307cc5da44b8ee25ffeb96d8fe52b1da77a048,2025-02-14T15:42:55.663000 CVE-2025-21697,0,0,a47524e2be039422746187d433904ec2c7edd2dfdfd45557e9bc03e82a52aef3,2025-02-14T14:13:39.943000 CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1314,2025-02-13T16:16:48.690000 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 -CVE-2025-21700,0,0,16c660ef83be8e3692860c63459d5cb91dde6789514ef1272a7fe490e5043738,2025-02-13T14:16:18.803000 -CVE-2025-21701,0,0,70fa5c5a644cffdee1e47bda2e8a9cefcd9b38d30da33f817c3957d14b5ffc75,2025-02-13T15:15:20.867000 +CVE-2025-21700,0,1,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000 +CVE-2025-21701,0,1,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 @@ -279925,14 +279926,14 @@ CVE-2025-22389,0,0,f5a2f7f9283125a8370911c1c718c426c94812dc145d49e53a3e924c9ce26 CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6ad14,2025-01-06T17:15:48.170000 CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000 CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 -CVE-2025-22399,0,0,6728945988e1865771393fdef9b9401a49cb9adc3afc7f205508b2c1141634ae,2025-02-11T17:15:34.453000 -CVE-2025-22402,0,0,460e31531e9d40e80875d9d0ceeb455b2a6aca33615b89581f76ca80461b8683,2025-02-07T03:15:12.287000 +CVE-2025-22399,0,1,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000 +CVE-2025-22402,0,1,3d05349369555f44f15217004f13f07d59bb4bf46759f4c867640d0bca502e56,2025-02-07T03:15:12.287000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 -CVE-2025-22467,0,0,f07763becd8cf6c1da915862c7207621a97fbd9224763d1eb78f9ab507e8cf5e,2025-02-11T16:15:50.840000 +CVE-2025-22467,0,1,79f72ccd5b3a974b689712a969e184ac73efee9466b0950e634b839d4d74346a,2025-02-11T16:15:50.840000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 -CVE-2025-22480,0,0,492780f2091ea0845caa2301b60734bc68ad40d5de0c97f0980b686b91af6c34,2025-02-13T16:16:48.777000 +CVE-2025-22480,0,1,d352d649cac413952f1f4eb9638eb28296f997471467d40df4990802ee33aafe,2025-02-13T16:16:48.777000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 @@ -280029,8 +280030,8 @@ CVE-2025-22597,0,0,42b7f0ad3f97eec140e81e3432e0004fde0e857d31ddfb4970711f713c779 CVE-2025-22598,0,0,71a9628cd5b8a378efc6a4f0fbba9bc5be356eced51ee0c58585106238174184,2025-01-10T16:15:30.540000 CVE-2025-22599,0,0,b57c2c3eae861ece051af1f1ef69acd0bb3a29c0b52e5a721d4d190a6e483927,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f0b1,2025-01-10T16:15:30.940000 -CVE-2025-22601,0,0,eb33b295c7925d9de67aa78365624ffedf34f716edf949e60c9dae9f481c2b40,2025-02-04T21:15:27.800000 -CVE-2025-22602,0,0,7239db83a80899bbf1888b800a771515015b7eb1675152773578e7586b441b09,2025-02-04T21:15:27.950000 +CVE-2025-22601,0,1,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 +CVE-2025-22602,0,1,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 CVE-2025-22604,0,0,042556ae32422fcb7d133c1e161bd26c3364b2546a97664bc6515d4ad52096bc,2025-01-27T17:15:17.307000 CVE-2025-22605,0,0,ae07a11cd3516f39cddf0c9e1372e8a8f853a7dc3ae56f5d8ed5d41d369f18ba,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,c79fcfe9f2d6ae4447e7ef15062de81aa80ba5b60a7a84db0c1c294b193c9bcd,2025-01-24T16:15:38.307000 @@ -280183,15 +280184,15 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 -CVE-2025-22846,0,0,aaf4f5499b852452451b865121a5e1ee1255fd6b02a451c983c44f52a2265f4b,2025-02-05T18:15:31 +CVE-2025-22846,0,1,76c8291b8e60796d4d231c4f9e93fb703f0a242f7c8e1a0b68b5fb28dc77455b,2025-02-05T18:15:31 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,fc628e612226994670042c6a80d861aab3b14ae86f86a5f49a1359b3e287ae21,2025-02-11T15:15:20.870000 -CVE-2025-22867,0,0,1fc353a465f28d94e8ab90e8da5158664f8cec19ffe5e76129e7581d1c20443f,2025-02-06T22:15:40.393000 -CVE-2025-22880,0,0,cf4835bedc790305bfcac8a1a1a919d45f11f6a6f0ec4b92baca3d41dfc38c2f,2025-02-07T08:15:28.737000 -CVE-2025-22890,0,0,db1d7eabf24b7e7d8b1b42d9869917c9793a935b6519f68f4ac1886abeb24e6f,2025-02-06T07:15:17.113000 -CVE-2025-22891,0,0,b6f8f5a3cdd97b175e2aad8e0e81733236d6c7ca889113c44c583bb0210e6ae2,2025-02-05T18:15:31.190000 -CVE-2025-22894,0,0,ac034cee2489b93651779dfcdd1d9a53e653fd8ed132b5fec5e2ed1fcc8856c1,2025-02-06T08:15:30.027000 -CVE-2025-22896,0,0,be4a55f33e527166c5f10efba2723b4fac6834eff35e9f31b028132ab4b137e8,2025-02-13T22:15:11.737000 +CVE-2025-22867,0,1,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 +CVE-2025-22880,0,1,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 +CVE-2025-22890,0,1,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000 +CVE-2025-22891,0,1,34a57f6019ba9072a9a6b4c9f86ff3b9d6f2414d47e8b5c13c1861a56f0b44ab,2025-02-05T18:15:31.190000 +CVE-2025-22894,0,1,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000 +CVE-2025-22896,0,1,b1737ac63f0fd395244b11635df083b39c1c84c68e35d0e357be7d9c2a2e3b8d,2025-02-13T22:15:11.737000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000 @@ -280216,7 +280217,7 @@ CVE-2025-22978,0,0,6be2fb193ba25eb252c1a958b0de2d1d9f8029d13358fd699d94e6d2260df CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 -CVE-2025-22992,0,0,1e57c12b2040f8249cfbe1628d840699bd71e8bea58774004f996b6b39b47bc2,2025-02-06T21:15:23.317000 +CVE-2025-22992,0,1,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000 CVE-2025-22994,0,0,410466b4be1b0d93079f1b91b60b108ad905855e3e14526dfb886653e8c3c7bc,2025-02-03T17:15:26.813000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 @@ -280231,7 +280232,7 @@ CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e12 CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000 CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e82d,2025-01-29T18:02:06.240000 CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000 -CVE-2025-23023,0,0,845e06f589fb5c5aa0ed683cf6ae3a031b3aa410b86d3c7cd854c5298a3128b9,2025-02-04T21:15:28.083000 +CVE-2025-23023,0,1,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000 CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 CVE-2025-23027,0,0,21e7f0bf367301f9d9767775ff2fd1e8d057729c5ff745babdc630ff49bcccd7,2025-01-13T20:15:30.150000 @@ -280259,9 +280260,9 @@ CVE-2025-23054,0,0,4ad1bc8a395076e2722534dd40e6c114eec7d3ab44fba52425f5c2473f865 CVE-2025-23055,0,0,8cf64278eb625138e527baeb731cdce36e8001a1130c66d9eef610c57797feee,2025-01-28T18:15:39.317000 CVE-2025-23056,0,0,fdefdc9727c78303b09916f8e50ff947c8ce2105bd8be2c88d4f06f1ef6f0509,2025-01-28T18:15:39.500000 CVE-2025-23057,0,0,e19b6da83f13fcadc74ea784ddfd7fc6ac4c2c2ef0901d2f4efda697b1cc5149,2025-01-28T18:15:39.677000 -CVE-2025-23058,0,0,438d6a6da36f19b927e145580c8532fc774c54fc4e550d4b9e69d149b3a653e4,2025-02-04T18:15:35.423000 -CVE-2025-23059,0,0,32cb5e334f95e22eb4e25b3940b24286034d374b7aee42faa3bfee384f283ebe,2025-02-04T18:15:35.570000 -CVE-2025-23060,0,0,dc5a22cd0ef1ec35e8698986f0b66e3e85c2409dcbb4d95802d4fe9617740490,2025-02-04T18:15:35.717000 +CVE-2025-23058,0,1,36af0ac95dee91401a3e645fac90fd1e6d044a9c3e97ab4de4bc5d53eec3dc56,2025-02-04T18:15:35.423000 +CVE-2025-23059,0,1,62c48859924e2a74dd8d68ad18d0b45e8640e18a18bfab2b40516811dd608c50,2025-02-04T18:15:35.570000 +CVE-2025-23060,0,1,f3a25c6dc0c673d16e994d2eecf92aca1ad01915642bd0ed0fe6f52cfc7795cf,2025-02-04T18:15:35.717000 CVE-2025-23061,0,0,b4f49d5cfe4a6ddd334224104c930dfc4f06696fe9671dfd7fb46829caa69bfb,2025-01-15T05:15:10.517000 CVE-2025-23072,0,0,f803acd8ba8ed1daeb7212104bb06cc237ee13347918da6bd6a4010b2c78db92,2025-01-14T19:15:45.007000 CVE-2025-23073,0,0,919c2159cca192a599346a01159f6f9879379d5338b3e8363de60edaf9608e71,2025-02-03T17:15:27.090000 @@ -280273,7 +280274,7 @@ CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 CVE-2025-23083,0,0,6a501c0dcff9af34582fe35c519636d37da8f27378c2381b47781c6cb71c5067,2025-02-06T15:15:17.597000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 -CVE-2025-23085,0,0,0922e80f8fd4038e1418cbe3d5c50610f94149391da9aa3f4e563b6f82b1414f,2025-02-07T16:15:40.523000 +CVE-2025-23085,0,1,7388d1ecc490560f7a4cfa013bea1a1237f94395262c7826acb4096c6cab352c,2025-02-07T16:15:40.523000 CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000 CVE-2025-23087,0,0,d2dfad6178ffd77613c0f9b5845bbb16e26962f52773db9d0e6ebd817b0d46a0,2025-02-10T23:15:15.717000 CVE-2025-23088,0,0,845d9312418bf4c13a6587b45a3978c9579f09ecb2202802a6894efed1c83ca0,2025-02-10T23:15:15.853000 @@ -280288,18 +280289,18 @@ CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b07 CVE-2025-23111,0,0,d3dc6414a9d0db9ed3cb07471714e79beac7db7fd4adde1f55f9ce769eca585e,2025-01-10T22:15:27.723000 CVE-2025-23112,0,0,15db9896b5b2ea6c9a640fa45af2c0a8239e079375c847ac6ebc4eb1f4c0822a,2025-01-10T22:15:27.863000 CVE-2025-23113,0,0,1f4b2afdfc961e6cff47003c2a8a61938611b1820102bae5e7ebdff42c0ff218,2025-01-10T23:15:08.810000 -CVE-2025-23114,0,0,6ea77ff143d76484638997bdf268dd3514160ae539684872f422a8cc53767b60,2025-02-05T02:15:28.610000 +CVE-2025-23114,0,1,76dcd1ec6e101307de60d1efade8dc8b1885e30638a84718a1a37bbecd49b630,2025-02-05T02:15:28.610000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 -CVE-2025-23187,0,0,e73322c4d4ce87ee9940ee7b6cb53d0a97781f1fb3cd1375c97c7b725323ea28,2025-02-11T15:15:21.037000 -CVE-2025-23189,0,0,6f1ee4db8b814be0d03765681227606671a61aa356e548bb3b38ac87e0714012,2025-02-11T01:15:10.263000 -CVE-2025-23190,0,0,13bfdfc8cc8137846679bcfec71ff1332eaf62c035a8c78450ddc38665e9cee4,2025-02-11T01:15:10.413000 -CVE-2025-23191,0,0,1dc4f06e17ce35b10424d817a9acb8e40e23956016b7c381124ed0b915486c82,2025-02-11T01:15:10.557000 -CVE-2025-23193,0,0,7e1aeb2cbc6e7bbd8aa1fcd9e88e8df1c9eb7b3eef5ff7acbd28e74349cef0b7,2025-02-11T01:15:10.700000 +CVE-2025-23187,0,1,e54128cf2f6e17867d87517f5215114c1b362de34f57463733be67c37ae934fe,2025-02-11T15:15:21.037000 +CVE-2025-23189,0,1,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e263e,2025-02-11T01:15:10.263000 +CVE-2025-23190,0,1,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000 +CVE-2025-23191,0,1,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 +CVE-2025-23193,0,1,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 CVE-2025-23197,0,0,099217d7c50fa4e567446b5ed24de5a49493412d57096b7a33e5ff39354836a3,2025-01-27T18:15:41.037000 @@ -280320,32 +280321,32 @@ CVE-2025-23213,0,0,2bf873f3e92d2859935b5ef9b9525b2aa9b31b0a41c4fb971f8db8fa50fc9 CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000 CVE-2025-23215,0,0,a5897cf119c937b7794d23dda77d817ac625eaf2083863a584978702663a3b0d,2025-01-31T17:15:16.957000 CVE-2025-23216,0,0,59f4f775f33e0ca9bd5247a87df3d43f61057b75f0cde53093fcb610ce66cc2a,2025-01-30T16:15:31.473000 -CVE-2025-23217,0,0,c878929d044b895766a9df13f0ac4e460ce79af0368a73b2c66ecd8da93dc894,2025-02-06T18:15:32.667000 +CVE-2025-23217,0,1,8ad80aabb137afd5cbf04933a9b557f141436094decd8f90b5ff624bdff63b50,2025-02-06T18:15:32.667000 CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000 CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000 CVE-2025-23220,0,0,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000 CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000 CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 -CVE-2025-23236,0,0,9ed63f7bfbe943272f760ab493d54bc59838c975bd594d259d2bee944c4c3a3d,2025-02-06T08:15:30.170000 +CVE-2025-23236,0,1,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 -CVE-2025-23239,0,0,7a585763d6c168ccfac8bf02954dc56c5ae9d7a095f70655a5a1ee00b3dbe979,2025-02-05T18:15:31.373000 -CVE-2025-23359,0,0,ca000ea1c09e6d84d7ca20124740a5199de0048ccb1fcc97aaaa4891bafa68b3,2025-02-12T01:15:09.230000 +CVE-2025-23239,0,1,fe1d8ae0d9caf0f78568cbd26166a6f171d6e8ce82c65a4b18d828f2821d561a,2025-02-05T18:15:31.373000 +CVE-2025-23359,0,1,078a2b254b9542e7cfbdc0b2539045b6c597acb96680d65380627cec160e1602,2025-02-12T01:15:09.230000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 -CVE-2025-23363,0,0,0a9aef70d0345148f50c8be1d50129f0d5255e87312c25a23579bd06a0945ffc,2025-02-11T11:15:16.250000 +CVE-2025-23363,0,1,640ecd78f2750ac87f839575d42d1c8fc08cea8b640f983605224ba460988908,2025-02-11T11:15:16.250000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a5a8,2025-02-05T19:15:45.747000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 -CVE-2025-23403,0,0,6d407c3e99373ae4903bfa5d6d7fa08d06d40485486c2ac644fbc1bd23d41148,2025-02-11T11:15:16.420000 +CVE-2025-23403,0,1,82b06e110d3ccd8c4d0bfc3742d0bc8ea53cc32814babb7763c06a537adabd76,2025-02-11T11:15:16.420000 CVE-2025-23406,0,0,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000 -CVE-2025-23411,0,0,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000 -CVE-2025-23412,0,0,ff772db46e84a8229b30da8226c3ba3ad9fc7920b08b4af19acab47bd1c2d2d6,2025-02-05T18:15:31.580000 -CVE-2025-23413,0,0,0d307b1166a05846ecd25a2b94e745105afb47dc17ea7dedca05f511b414c7de,2025-02-05T18:15:31.930000 -CVE-2025-23415,0,0,4c0256f2397ff6f22f96f8778d52ee55813f2a1944a2056311990c8aab282c58,2025-02-05T18:15:32.573000 -CVE-2025-23419,0,0,9931bce39336c9647788aebceaf6072233b0cffc8035c7bc13a0c7205e0176f9,2025-02-05T20:15:45.717000 -CVE-2025-23421,0,0,31d9e0bf02f259a27176eee791d237316c18e99df700a64323c30ab77b514d24,2025-02-13T22:15:12.073000 +CVE-2025-23411,0,1,d5f7bb7224f39d14b2dbf54b46dff651a924fc4bc3c91dc75a0e3dbbbbf2e5db,2025-02-13T22:15:11.913000 +CVE-2025-23412,0,1,3faa269bcd3c90e82676b0efb29c0ad0e841370c3bd284f2de04616b2954d5d8,2025-02-05T18:15:31.580000 +CVE-2025-23413,0,1,7fb7f2975e478cd02eba1010c27b44fc375b6470dc15322ce018425eae06f806,2025-02-05T18:15:31.930000 +CVE-2025-23415,0,1,b567ab15867f954464cf8fc839772a381bff8f510b9ab379a11a7783c40b1e5a,2025-02-05T18:15:32.573000 +CVE-2025-23419,0,1,b1955881fd2aa091213b5b8e7c24e19f9f168dfafeac2809b583d7fda0b0ec88,2025-02-05T20:15:45.717000 +CVE-2025-23421,0,1,28f863c7b17776f5eaf0630603f01259b9f3a5e922ef47697d864f6e1950302f,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 @@ -280770,11 +280771,11 @@ CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000 CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000 CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000 -CVE-2025-24011,0,0,2164441650cce646420f00734bed063734f0b91471bedb4613983ebc219bdaf8,2025-01-21T16:15:14.760000 -CVE-2025-24012,0,0,51d1bc735a0825f2ee50236d91326ab7fbbbe63482c27f6fb0b2900bc52602b6,2025-01-21T16:15:14.923000 +CVE-2025-24011,0,1,f293290e6460b1cd8914f5613f3369d3446787903b23580aebaaaa42416d5ed4,2025-01-21T16:15:14.760000 +CVE-2025-24012,0,1,9d2250800d70ae062590b777d53f5900dbc9b4bfdd2d45d866c2ca6c753985af,2025-01-21T16:15:14.923000 CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000 CVE-2025-24014,0,0,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000 -CVE-2025-24016,0,0,32893199e4edb70c366a5972a994ae7965564b380466ad00fc6bb95f34a2a34b,2025-02-10T20:15:42.540000 +CVE-2025-24016,0,1,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000 CVE-2025-24017,0,0,4127b8a7fb48204ccdedd278270e1a824a4426e6472255b67fd4d2229bebbdd7,2025-01-21T18:15:17.683000 CVE-2025-24018,0,0,e4baea09df10b36d105667a7249c05293515d725374ccb74ed2a1fb48a8a06d4,2025-01-21T18:15:17.803000 CVE-2025-24019,0,0,2a3a6a9851c247290336c704932309ffb09f759a478660ebcaeee5a66d59a10f,2025-01-21T18:15:17.933000 @@ -280782,16 +280783,16 @@ CVE-2025-24020,0,0,b819f060fc5608f6af47ba9808e3b1cb2a9b66b3796b13eff1eebc985d20d CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000 CVE-2025-24025,0,0,885fa93b91cb05950c454f2aadaf52d1f352b1182df36408b41064f36b0a3c88,2025-01-24T21:15:11.600000 CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000 -CVE-2025-24028,0,0,c9ebdecccf083ed0f8736c51a62bb3e3804c78943e3cee977d37861f10a2b559,2025-02-10T18:15:35.563000 +CVE-2025-24028,0,1,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22c8e,2025-02-10T18:15:35.563000 CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000 CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000 -CVE-2025-24031,0,0,bdd88efb43225a0aa37131fbb1aadfb6a5c49be655c92779f82ebfaee15ee730,2025-02-10T16:15:38.990000 -CVE-2025-24032,0,0,dda62e5756df304171fa34002718f4838312b9f6c7aadfe598f5ccb84d1164a5,2025-02-10T16:15:39.153000 +CVE-2025-24031,0,1,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000 +CVE-2025-24032,0,1,7b65a1bdbe0761250b9026d009c67b62fd4a97ffbb0e14891aabfd53a479ecd8,2025-02-10T16:15:39.153000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 -CVE-2025-24039,0,0,d84a6be52ea21ec5f6c453675ceb31a83a6cfad7f11cd2b92aef28a67b8c0730,2025-02-11T18:15:40.927000 -CVE-2025-24042,0,0,3b9cb2f33310ff2d28bfb80ebb5f313fc59c2c80920d4229599868839f8bde0f,2025-02-11T18:15:41.117000 +CVE-2025-24039,0,1,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000 +CVE-2025-24042,0,1,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000 CVE-2025-24085,0,0,f7bcfbaa1ee9096d902e4f6dc6ef822d9cf28d4da7694ddbc06842049b1b433d,2025-01-30T02:00:02.057000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 @@ -280857,10 +280858,10 @@ CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24200,0,0,588e3756d714d1d90f30dee3f03ff2b3409a47afa861c30d00639a07ad4fd729,2025-02-13T16:24:24.953000 -CVE-2025-24312,0,0,d9dba6cbaa92cade0cbc2a2b5591f51977e538972a45e5f514c66bfc9410e16f,2025-02-05T18:15:34.060000 -CVE-2025-24319,0,0,7a322f9d886642cbfd3a0aeade86ac46db1ba4d93cf8564f520afb93b15cdbbf,2025-02-05T18:15:34.557000 -CVE-2025-24320,0,0,86be1bb21fc907492f8803646e8f561ec0d7fdcafc5be57216cfc1eb40244044,2025-02-05T18:15:34.960000 -CVE-2025-24326,0,0,f19951845ce52fe9b7a00fca6edfa3b5fcc5417e1e24ae504db3514a9546616f,2025-02-05T18:15:35.420000 +CVE-2025-24312,0,1,035e309179990714bfc5a224383cb635d168f3d299c79f966057bc59a555a04b,2025-02-05T18:15:34.060000 +CVE-2025-24319,0,1,adedd82905f17d94cd1618fe5c2333851373ebf3ef16127d104e641044be5e8f,2025-02-05T18:15:34.557000 +CVE-2025-24320,0,1,2bad44d619fa596716ab7f544e528f9635ccdb2ac03fd982c2e4cc08e1be7d7e,2025-02-05T18:15:34.960000 +CVE-2025-24326,0,1,e51dca79648e490d9fe8d840236f57a0bccda997f460d4addfb7847c850101d8,2025-02-05T18:15:35.420000 CVE-2025-24336,0,0,0c1fb43f965e1337be57c1e176a52234211acbdc43cd0f3b53a81b279dc7a08b,2025-01-31T00:15:20.607000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 @@ -280875,14 +280876,14 @@ CVE-2025-24362,0,0,92a72963da4ed99b9f5218bcde960752e38da802b6e8de566d4881bd5d54d CVE-2025-24363,0,0,e5280365e8798c3d50dec901fd082ab2d29cb61ba3ca73c44ff38bee5500b546,2025-01-24T19:15:13.633000 CVE-2025-24364,0,0,a66718071611b4c5bae8243cb0fb69ff42bed53bfb4d9e391dd0ea1f1905ca71,2025-01-27T18:15:41.690000 CVE-2025-24365,0,0,bb71464e8d0a0e412e7a77dc3188cffac46c5287ce4a03629456d8e9fa3bb7a8,2025-01-27T18:15:41.847000 -CVE-2025-24366,0,0,6dbed5c25e447288b2986602533dddd40d14122d59cc936679bb48e44633197b,2025-02-07T22:15:14.463000 +CVE-2025-24366,0,1,a88cb92e03d021067fd1839391fed795387671856d75f4ac962c9c9d5f9dab0f,2025-02-07T22:15:14.463000 CVE-2025-24367,0,0,0519da00464691193e6161cca54d34f74e93b28b2087f7c83a26c6e3b8f04cba,2025-01-27T19:15:29.440000 CVE-2025-24368,0,0,af7736525efcb0b21a0f340be92a27528f7606ab1a8aa5d024adf94625d201ad,2025-01-27T19:15:29.540000 CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b686c,2025-01-27T23:15:11.310000 CVE-2025-24370,0,0,bfc70a6cc31e8bb3d1e99a32a23a1f93aacee805ef386dd0b2c9d04752b7618b,2025-02-03T21:15:15.547000 CVE-2025-24371,0,0,27fe2f9aa1259e46cd957d482d07885017354097cad992d94597eb6d6d5d9942,2025-02-03T22:15:28.460000 -CVE-2025-24372,0,0,299268084a74a8ce42c8a5a04fdd755563f78102e85a0603962e540883a28264,2025-02-05T19:15:46.010000 -CVE-2025-24373,0,0,d074446419bda11ff082ba7b48059f0e1ed179dc9667b150406ee1a78b97c2a9,2025-02-04T19:15:33.680000 +CVE-2025-24372,0,1,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc94e0,2025-02-05T19:15:46.010000 +CVE-2025-24373,0,1,9ac2e97f9f1868bee0945286027bcfea993d6a9d78eb61c55b164577479bbb11,2025-02-04T19:15:33.680000 CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000 CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 @@ -280894,53 +280895,53 @@ CVE-2025-24400,0,0,c4014177ad1303f078cb632c916ab083f9b9d20707098b24fc3e700fc25d2 CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 -CVE-2025-24406,0,0,bb8c33c77d46e2df5820c6d5401b73f54efbb45d7627e96f2e13c07253b48c4e,2025-02-11T18:15:41.300000 -CVE-2025-24407,0,0,8126921f16a0e3698819d80674a30c2d2c30a909bac405c9df1b1fbfe8bb4305,2025-02-11T18:15:41.497000 -CVE-2025-24408,0,0,64f9192ec69d526afa5d446bc8221db4b50517919546b7058c46b060ba852c7a,2025-02-11T18:15:41.677000 -CVE-2025-24409,0,0,8423e766e97807b2387145772208539f3ef5891e44329f2ddde1dacba29b36ef,2025-02-11T18:15:41.860000 -CVE-2025-24410,0,0,5ee562c6c4d41bca7eec46cb93954dc96f18cd97fc765a14ebff24033b9dd7c1,2025-02-11T18:15:42.057000 -CVE-2025-24411,0,0,3b3a4fb57b411db5a1cc0d68412bcb0f2d920a6e72278d9203923c748b0c93d0,2025-02-11T18:15:42.243000 -CVE-2025-24412,0,0,9ffa0551ac5384e36e9977d043e356223632a7ea3315634150956af08782d14e,2025-02-11T18:15:42.433000 -CVE-2025-24413,0,0,8fa2f9ae1d8b280d38b697602d863b196e5a78e0787119ac0f2ff26e30dd2c1f,2025-02-11T18:15:42.623000 -CVE-2025-24414,0,0,6569286e8777391a39c676b2804bd86cc3025271793c26203161ea2ab3885df0,2025-02-11T18:15:42.803000 -CVE-2025-24415,0,0,fc204d9e3432fb496814d46a40a002467018c3624954edebba84aa149dcd0dcc,2025-02-11T18:15:42.983000 -CVE-2025-24416,0,0,abd98fcd85fd5bb3165f543b9f550ddb0871679896c0ad4f425705cc77167a9d,2025-02-11T18:15:43.160000 -CVE-2025-24417,0,0,049d847c95ac0c00fa9543d752a0c029f7d38ab6af730d86caefc951f06dc5a5,2025-02-11T18:15:43.347000 -CVE-2025-24418,0,0,b6f2ed0896843dc1b6fd836b72c3c7ea8babc43e8c184e4eaf37d0566fb28e11,2025-02-11T18:15:43.527000 -CVE-2025-24419,0,0,70f8d2b6bebe51d543e14c8546eb9caeb94ee4c60db287b305e1f77a0cd8f710,2025-02-11T18:15:43.713000 -CVE-2025-24420,0,0,37cf7ca3eba19828e27bda05b15230b581a359bfd81c1660fbdc33c453155eac,2025-02-11T18:15:43.893000 -CVE-2025-24421,0,0,06ef8f61707864638901396ce83cc65370d6bda66403d0cfdf74526e8ce4f625,2025-02-11T18:15:44.077000 -CVE-2025-24422,0,0,c8b4158e2c125a717bef95a8450870b975082e8c97f0e15a6124bb75d7bf71f3,2025-02-11T18:15:44.270000 -CVE-2025-24423,0,0,ee00dd0784400b8bf0b0c075c6ccc7b778cfe8ac328b3f722b7774f0d6ce1107,2025-02-11T18:15:44.457000 -CVE-2025-24424,0,0,96f361b5ad8f9939b0413788befd8a50bfbec68f6149646b31ae60cd10d08391,2025-02-11T18:15:44.660000 -CVE-2025-24425,0,0,ceac120321abe84371e5028d388bba5fa8a2259ec4a3edd6b60368f4d338eb04,2025-02-11T18:15:44.857000 -CVE-2025-24426,0,0,6574c3807d0a34c253180d5fb05a245637c187b3cf448376a2451a8faf9523a4,2025-02-11T18:15:45.030000 -CVE-2025-24427,0,0,f465d1b4118a3be7d24b5f4214ff4374dcde9fe5b8e598a55877101a024719ae,2025-02-11T18:15:45.223000 -CVE-2025-24428,0,0,5001f5691aaef2f0738119b40cc628a0edfb1d1fbc9687aaac6c03739323d9fa,2025-02-11T18:15:45.423000 -CVE-2025-24429,0,0,9a978663abe4025d3090f1cdcbe8657ed95091c35793610f4b5814b2198aef1f,2025-02-11T18:15:45.610000 -CVE-2025-24430,0,0,2e3a6ca76cb55aae3939e6a93f62f6847aa4e13a50d0d8e9cfdfe9f12948ef73,2025-02-11T18:15:45.787000 -CVE-2025-24432,0,0,ed4d6539b41f2efa7d13bb2144df239ec1352f561825600be290d5d095d7df1e,2025-02-11T18:15:45.960000 -CVE-2025-24434,0,0,1cd5e4c1727ad45421631536f28d8da82b616f7bb5a16fc3f8e78cd8a87f9a92,2025-02-11T18:15:46.157000 -CVE-2025-24435,0,0,8cd50a0a683582144e5f4741bc6e0fa3d88bab138e9417df08c1b293ca4ca05e,2025-02-11T18:15:46.347000 -CVE-2025-24436,0,0,e208192a5aa08c69e6a3975456d160342764beef1cac071c481bc68b3168089b,2025-02-11T18:15:46.537000 -CVE-2025-24437,0,0,a191b29f2595243121e53d09e3c51f18896355c460c692994639b1f89f0a7354,2025-02-11T18:15:46.717000 -CVE-2025-24438,0,0,ca0d086cf06120b7acea46ef3a7a9e11fe521911eaf24d958eef21c5c08908de,2025-02-11T18:15:46.893000 +CVE-2025-24406,0,1,bbea76f9e0a377bb16e6124c0ca74a6e8b01c54c1c02a33abcb51f6487f06738,2025-02-11T18:15:41.300000 +CVE-2025-24407,0,1,cb0342d069e0a50af8bb4fee74f715e09841d37101d7b1a219ff580902452820,2025-02-11T18:15:41.497000 +CVE-2025-24408,0,1,ecf8b2fa3238f755897db08ea45e1803efb045709caba455d61de9278b5b480e,2025-02-11T18:15:41.677000 +CVE-2025-24409,0,1,f4173349d32a19800196ad54477c0cc05286ee273d22683d6a5fabdc686bc9d0,2025-02-11T18:15:41.860000 +CVE-2025-24410,0,1,383dab7fbb71139609c7672a90c5c063e67ff22ae0d3f0675d3279cc5c98c761,2025-02-11T18:15:42.057000 +CVE-2025-24411,0,1,69801dbb6dd060a03ab06e779b16e12683879dbbc2ac337d615be9533c614e05,2025-02-11T18:15:42.243000 +CVE-2025-24412,0,1,780b1734df9b693613b260afe256c749a9bd541a6e060635fbb5949b4b855fd7,2025-02-11T18:15:42.433000 +CVE-2025-24413,0,1,c359f0e8ba43fbd7692d049b9645e07daff55ae8235a5f3dc24061bbeeba0665,2025-02-11T18:15:42.623000 +CVE-2025-24414,0,1,2e294f95441e9fdf8a3c0548e703a104db5e600a5f4343d1de30fde2929590a6,2025-02-11T18:15:42.803000 +CVE-2025-24415,0,1,01288ea2e54e55b3fbe393a9df3547408b9ae0c5970c6fe4ccaa55587f8d427c,2025-02-11T18:15:42.983000 +CVE-2025-24416,0,1,ddc4ffb5675e88fe61deb1e1133379e885e162d2551f7a5f1af2d65536e77873,2025-02-11T18:15:43.160000 +CVE-2025-24417,0,1,bca7484dd0cf40236de7f142cb726a299c535f42d64f891e0abc74c3964bd085,2025-02-11T18:15:43.347000 +CVE-2025-24418,0,1,e03f205522948adf0f07b0861ffedfc1d409b8d84a89076e210ff1083d352064,2025-02-11T18:15:43.527000 +CVE-2025-24419,0,1,2535f7c4125103436489f3073c7e12e96eb97189364cc2bc1757f5ad63d0fe23,2025-02-11T18:15:43.713000 +CVE-2025-24420,0,1,eea5bb7a5ea5bc961b56199d2e2333237d5ccaa5dcc83c28b05c27524d962747,2025-02-11T18:15:43.893000 +CVE-2025-24421,0,1,3b401879e607ddf4d6f5e4600991b8cc235741c4009d6b84980930802325a20d,2025-02-11T18:15:44.077000 +CVE-2025-24422,0,1,575f315e0f8a53197d1de1d6e3a76e3c8c4e82244dde08eba50caa34409c811e,2025-02-11T18:15:44.270000 +CVE-2025-24423,0,1,114a0e5fa239b616fea7512d9b815a4186b92652d484f6d617f0126667dbe4bf,2025-02-11T18:15:44.457000 +CVE-2025-24424,0,1,c5abc72376edac8f7c67eefafd0d58b875921f6fe132df2d8e3d4c9d47a1ddf2,2025-02-11T18:15:44.660000 +CVE-2025-24425,0,1,52d0bf2e4e9f66000e6b8c60eb916f82cd3f5aba11c48437ea751db1a798a420,2025-02-11T18:15:44.857000 +CVE-2025-24426,0,1,dee11a3e568835d40e2fb0eac6da501941dd5061e9e08b93558a504a869cc05b,2025-02-11T18:15:45.030000 +CVE-2025-24427,0,1,eeac0189f8b657f164a95439cb3c5de9e3ebb65646668244cb622c1889d1d86d,2025-02-11T18:15:45.223000 +CVE-2025-24428,0,1,15109c35a202dd26e69de787714765857ae2b362ddb23ffdd949cd01af2a1ea5,2025-02-11T18:15:45.423000 +CVE-2025-24429,0,1,d183c9f5ed8987cb91fcaed74cae30af3c865b33e009f748f716bc57a33d9a15,2025-02-11T18:15:45.610000 +CVE-2025-24430,0,1,ead65953e7a7516eeaf9001088746c40d7478716cb82029bda91e89d47ecba7f,2025-02-11T18:15:45.787000 +CVE-2025-24432,0,1,5ddf3a506d82d3087ab8186221dd7705178d578bdecc7b38a0b8aa20639caada,2025-02-11T18:15:45.960000 +CVE-2025-24434,0,1,a0315ce67f92d0de4fb6c0b14d95b24dbd5a55cabee0ce1650bc4c6d2e696335,2025-02-11T18:15:46.157000 +CVE-2025-24435,0,1,57cf4192eb4dcaff2f4b67f500eb233fc21acb8f6c88e4aa0041c2394382ce4c,2025-02-11T18:15:46.347000 +CVE-2025-24436,0,1,2cd6c67fd272db18951a04c19f8d0a2e4e793f8617fdab29a340478c36b803ba,2025-02-11T18:15:46.537000 +CVE-2025-24437,0,1,894d9708ec58d7623c452244184d1ab6ce66efc48bacfc66b7d15bff57126e86,2025-02-11T18:15:46.717000 +CVE-2025-24438,0,1,fb398be24864f28853112a2a498807ace1b223509d3bb74cefdd07959025e38c,2025-02-11T18:15:46.893000 CVE-2025-24456,0,0,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 CVE-2025-24457,0,0,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 CVE-2025-24458,0,0,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 CVE-2025-24459,0,0,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87c39,2025-01-30T21:22:22.917000 CVE-2025-24460,0,0,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000 CVE-2025-24461,0,0,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000 -CVE-2025-24470,0,0,25c4b0faefa918598fc1391353fdc03089647319b0322ab5482f958ca67c8b3c,2025-02-11T17:15:34.730000 -CVE-2025-24472,0,0,81fa9267c2c5fa45ef4d1f9530c6b452516926d1b527cfc5d0555ca1917bc550,2025-02-11T17:15:34.867000 +CVE-2025-24470,0,1,b97a6fef4b5505dee945d637a8774d8a3a426e3a9c38ffd15f57405368d61eb7,2025-02-11T17:15:34.730000 +CVE-2025-24472,0,1,b964400fad4aced19c823786e9a9e422f23714df046dbf585e9dd286503b6396,2025-02-11T17:15:34.867000 CVE-2025-24478,0,0,bd32512097236194cfc8de9db7684b3c26e1d6257490b77fd02e967bfd049340,2025-01-28T19:15:14.777000 CVE-2025-24479,0,0,6dc947eedb60aefcff7cb5ef3fc8105a1316689294e50e487313a66e64f5f854,2025-01-28T19:15:14.910000 CVE-2025-24480,0,0,f194395e093893bf534fd53e3f9d08422d26fc0ec5fe0b8037c9f443b45789b9,2025-01-28T19:15:15.033000 CVE-2025-24481,0,0,248f0fc1f0e4fa01f0a1eb87585c6cf01beafe99384243a2a64a68cb7f4e1e5e,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,00425808b56129831c7125537f97c949cdcfe33d9810f0a8f23846948667112e,2025-01-28T21:15:18.687000 -CVE-2025-24483,0,0,b1b1326aae83bdd1246427bb3d0f8e55c301966725ca72f687edb610d6b06b7f,2025-02-06T08:15:30.327000 -CVE-2025-24497,0,0,a74b873ba41caf60d39444281d3f20f6afab1ac71a37a967e375bda0f341d340,2025-02-05T18:15:35.613000 -CVE-2025-24499,0,0,3a64ccb92160551c6e7d99f7a4676b7e91dffe20989c57ec80f36e67ece84d61,2025-02-11T11:15:16.583000 +CVE-2025-24483,0,1,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 +CVE-2025-24497,0,1,2971229301fd4595eff7d4b4d8ba9f02cef984ebbf49463c1f16374afa5c30cc,2025-02-05T18:15:35.613000 +CVE-2025-24499,0,1,3774aeea8956cee1e29bddc90f66187d0e3316a5cc4f4c34ae9acc935369ae3e,2025-02-11T11:15:16.583000 CVE-2025-24500,0,0,fdbdf2f14d536afe020d6ff1d8fac6ffbf21a657fef4dcee4ece37016132aa52,2025-02-05T05:15:11.067000 CVE-2025-24501,0,0,0557529ddb29206e4e04e9fa3f9634328e04d422d7ce7dd8b05257955e166f58,2025-02-05T05:15:11.197000 CVE-2025-24502,0,0,bb2f663e201d5533539ec3e6966f60216f067393fa49cbfaab34227e3e6a8ab9,2025-02-05T05:15:11.300000 @@ -280952,7 +280953,7 @@ CVE-2025-24507,0,0,9309c21556922b2fdc9563d6d18cb15340eb8061f841411e12ba390f54d65 CVE-2025-24527,0,0,c24cc3419025a9e62f1231b139bbd3545754b2e98e75afe153338170e207c3c0,2025-02-06T08:15:30.500000 CVE-2025-24529,0,0,bc0b161a595e000cd783abe643c1f26152f3142c15687c9c73e18c43346dadb9,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,3811bbd67cbab8ca9968b0768c7eca6cb2811300b6d619aac191afa45bc7a556,2025-01-23T06:15:27.893000 -CVE-2025-24532,0,0,9652ddc7f1f295c6013ac6d56e98b567c91be78743259257f2dc849d8b5e2c11,2025-02-11T11:15:16.740000 +CVE-2025-24532,0,1,9a58da3aa376c31d618205a09419e1a54e6d6262728972d98819c5e148008fa5,2025-02-11T11:15:16.740000 CVE-2025-24533,0,0,87e74642737caf1700663b4c750603fff22782c9e0d5f28f143a04d00f49096c,2025-01-27T14:15:28.653000 CVE-2025-24534,0,0,be927909713e46562e3022fd38617bb630061bd1c492540c75508439a156b9af,2025-01-31T09:15:09.720000 CVE-2025-24535,0,0,8413f0f6501de25a4ea76a1029f3db27442b81948ea285c9b214dd8685020a0d,2025-01-31T09:15:09.870000 @@ -281156,8 +281157,8 @@ CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35 CVE-2025-24782,0,0,17788acb91d6c67508456b6c6bdb11b91003536a6622098710e8b2b3540b27e3,2025-01-27T15:15:17.450000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 CVE-2025-24784,0,0,1e3d900223348a54f70c5afa85da5a9110aa159dd48bbc6ea1610b6320412748,2025-01-30T16:15:31.780000 -CVE-2025-24786,0,0,6fe573adc7035502ed1a31e2157023a502de830a03ad19372b3a4a78825400e5,2025-02-06T20:15:40.720000 -CVE-2025-24787,0,0,2497a738b5c598f044c4b5d08305b6abebf7b6178e2fbf6be918b39f33d900ae,2025-02-06T20:15:40.840000 +CVE-2025-24786,0,1,77ab7857e7df965a91018da6faa2da651f03edbb1f269937c349ededa9d423f5,2025-02-06T20:15:40.720000 +CVE-2025-24787,0,1,e02153150cbd3db9e7d5009c4adf836d0e562c18ddf7fe6b6e9bc18dadeb11d4,2025-02-06T20:15:40.840000 CVE-2025-24788,0,0,692078e7d8a90cb76be73f872a0791bca35086d5144a5c501380237ff9693d88,2025-01-29T21:15:21.140000 CVE-2025-24789,0,0,2903e8d3640baba1cea7168189fb34346b805911ec3309248f883ad5d96f0bee,2025-01-29T18:15:47.030000 CVE-2025-24790,0,0,62665cdf922334a94c8e505b94140708d06dec51f68ef9ecb4628035d75320a4,2025-01-29T18:15:47.207000 @@ -281168,13 +281169,13 @@ CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7 CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000 CVE-2025-24800,0,0,deeb00d4d3290f088e126f9fcfcb43179a677a2104fb3c2377b529f967882f9f,2025-01-28T16:15:45.063000 CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320ad5,2025-01-30T20:15:51.010000 -CVE-2025-24803,0,0,0e911edb361ec4f844d1cd1248d2b23d8b748f76170e135c423c80d4b2d66631,2025-02-05T19:15:46.207000 -CVE-2025-24804,0,0,f2e568a1821e31d0534a3b0b5d5222a62da6e5af6ae7212981f1c2c957d94d44,2025-02-05T19:15:46.350000 -CVE-2025-24805,0,0,8e122786b8c3094f23d90a4eb675737afa1b9ae254d3beae90adcd8874318890,2025-02-05T19:15:46.487000 -CVE-2025-24807,0,0,0cc84ba8760f24cb171d220f0a9163c6383a784f590256f03ea1dfeac72fad7d,2025-02-11T16:15:51.190000 +CVE-2025-24803,0,1,fe008de1670d752b88603be7275331d65ec4b62f8fa4ecdcde55edf7b911384e,2025-02-05T19:15:46.207000 +CVE-2025-24804,0,1,02d18037eaeb1381e664f001332da6db5511dc7ada5361921f722c1c2db334f2,2025-02-05T19:15:46.350000 +CVE-2025-24805,0,1,d4af857e51dcf82a508fb39999b1c3ef58f60bf41c569739cac4b4e9ff451531,2025-02-05T19:15:46.487000 +CVE-2025-24807,0,1,bb2ad68cfbf534a508943d28acf94b74f643f752153f7382a9f1c3344359d705,2025-02-11T16:15:51.190000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 -CVE-2025-24811,0,0,bb562a099b0680cbdefe53e07cc6b5e970993af520695908301ff5bfc311c73b,2025-02-11T11:15:16.907000 -CVE-2025-24812,0,0,22a9c9e42a311aada4dd0dd6cbd1d26a8214ffea55854cd6db42661b9acf45ba,2025-02-11T11:15:17.080000 +CVE-2025-24811,0,1,ffb489ebd0b78eee2cb2623897d29c3c6f63b8d9575fa93eac16db339b1da16f,2025-02-11T11:15:16.907000 +CVE-2025-24812,0,1,4df5af9a6492be99a429ed0818190022be21ded8f5dd8f61d775491997406b73,2025-02-11T11:15:17.080000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,134ea32a0aa38fced65df5c1c7dace57e52f668a9d658c808ff6175b6b1b94d5,2025-01-31T15:15:14.390000 @@ -281182,158 +281183,158 @@ CVE-2025-24828,0,0,d6c7252c68dc48223ad23e8fe02a63238ede39167f9cb9fd8d861384db181 CVE-2025-24829,0,0,ca820c15f81c2d9533d0e35b5e9ae251c4458d25ef994b8ce2c2028dfde11883,2025-01-31T16:15:36.170000 CVE-2025-24830,0,0,e5e3ddd057bd01ca95f7c00a7286edb5ae4fbf2a7516a5daaf16a92524651ed9,2025-01-31T16:15:36.327000 CVE-2025-24831,0,0,76c0f53ba7a5b958c42589ba4ec89e6cdb3f20971cbf64204b6a1a874d34c8a2,2025-01-31T16:15:36.487000 -CVE-2025-24836,0,0,7d6640e53d488e4a8518eb9a7696c5007d9b1a60158b80a832071b3c2565c39b,2025-02-13T22:15:12.270000 -CVE-2025-24845,0,0,c191a19dd89d489cf004f2053d6318da393b69a73424e805527f0cb35d2f088a,2025-02-06T08:15:30.673000 +CVE-2025-24836,0,1,da95ab8528e6c549bba778d1d67c04ab75f1d50ed423e85181f04464f9165463,2025-02-13T22:15:12.270000 +CVE-2025-24845,0,1,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 -CVE-2025-24861,0,0,12379dfddeeb91a24bd31cefa119eb737ed33ae5f489ea9055a6373e1ed282bf,2025-02-13T22:15:12.457000 -CVE-2025-24865,0,0,7664de25ca85bc77d9188866eb96c66df0fda1d700c24f6808889946717d1511,2025-02-13T22:15:12.613000 -CVE-2025-24867,0,0,c4fd6e246160d29aa382cef3499dbaf6fc81e12e3c74418ac63da8711ee9ec32,2025-02-11T01:15:10.847000 -CVE-2025-24868,0,0,8ee24a9a34fad703f89f3defa2904d51acc20ad10ef817b45da7bfa8a7f5e321,2025-02-11T01:15:10.990000 -CVE-2025-24869,0,0,b6cd80e5bae1c894e0e6b555b0b2146ceab5fc28716a5af55b9f3bc5b2028f1e,2025-02-11T06:15:22.913000 -CVE-2025-24870,0,0,da4c880d8806781fd3dd3bb073e05bc3484ec28f6cf8ca6692ab5daf783ff3dd,2025-02-11T06:15:23.113000 -CVE-2025-24872,0,0,0ffc5c509ef62699a176edbdbe72349123a1381d817418d2767cc8146c544fd3,2025-02-11T06:15:23.310000 -CVE-2025-24874,0,0,4ad00ca98cd4d4e3c4753ca5a05ba65171bbe64afd9e12d02d493b40a34dd133,2025-02-11T06:15:23.523000 -CVE-2025-24875,0,0,35703f9256eb499a6a0b6f62284f6df90b2ddd23e26489e7ff4e7fd63374c6c5,2025-02-11T06:15:23.720000 -CVE-2025-24876,0,0,ff5a3e546d29f6afad46b2f9d887c467664bea0c7c9edd2abd2aa10f728b8b48,2025-02-11T06:15:23.923000 +CVE-2025-24861,0,1,113c002b02cdb53ae24f8b567132904b940b96dc6020c422cd77e3b2b0aa61d4,2025-02-13T22:15:12.457000 +CVE-2025-24865,0,1,103cbc3a75159253842395591696e600d2b3933ff35693d3d496ee2406f910bd,2025-02-13T22:15:12.613000 +CVE-2025-24867,0,1,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000 +CVE-2025-24868,0,1,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000 +CVE-2025-24869,0,1,0b763b5da0f999cd707366430c75d571b97245abd870573fc7099dc9cf50e020,2025-02-11T06:15:22.913000 +CVE-2025-24870,0,1,a2db71b3bb4577b88c7f2609982e7661a916b5066ecbdfd03d2ede2fdedbffc5,2025-02-11T06:15:23.113000 +CVE-2025-24872,0,1,4efed8d389f2228ee72f20addc5e1bc7db0658747712926c4ebbd14619c57822,2025-02-11T06:15:23.310000 +CVE-2025-24874,0,1,28d3746e6ddf175532c71697c54b525c3bccb5e9a012dbf5c4833e9b341fccbc,2025-02-11T06:15:23.523000 +CVE-2025-24875,0,1,269c263fe7bb9f36182c9045e439fe76d1c283cfc2235364ae540ff6e842ae58,2025-02-11T06:15:23.720000 +CVE-2025-24876,0,1,a2f302edccf62982439c8019d0485600c779cc8c62d596c84896ce92f691d579,2025-02-11T06:15:23.923000 CVE-2025-24882,0,0,d69ee6af8ebbf2c66afc252a0f60aa0a605fa36df9c8e25940d30b6e36104ffe,2025-01-29T18:15:47.570000 CVE-2025-24883,0,0,5af6779d4ec23837d1def10d0a5a87236bf4a151f86bdc15bf65b07a54534073,2025-01-30T16:15:31.947000 CVE-2025-24884,0,0,bade910c39f8ffb60e0f0b75bcf02649bde3ff244d61b23496f8d55a3d96123b,2025-01-29T21:15:21.667000 CVE-2025-24885,0,0,809790028ca7e0dfec81701f262fd0f27740a460115b7bfa09e52c5dd0783610,2025-01-30T23:15:07.993000 CVE-2025-24886,0,0,324d35c8722e17c18be480ab82b55101915c4949700cace26a13a2f1b626ed6b,2025-01-30T23:15:08.990000 -CVE-2025-24888,0,0,20dd98868e013f5ccdf9e6b9fad0b645d26f0272c624345bc48313dae2b74df2,2025-02-13T18:18:23.047000 -CVE-2025-24889,0,0,a8bea01f9b9f86d6da51f375adc71808d469ef18a53d984f779383c283dbbca0,2025-02-13T18:18:23.240000 +CVE-2025-24888,0,1,88a407e927dc54a1fbca6e78f49dc62a6a444494ae6c9d366d149eb7f508c828,2025-02-13T18:18:23.047000 +CVE-2025-24889,0,1,9c6be5085f8e6de4771b302221f40c225eb02c032451d7a56239458ff1a7a96d,2025-02-13T18:18:23.240000 CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34ba85,2025-01-31T23:15:08.457000 -CVE-2025-24892,0,0,8068f53313fae54adeac0cf9fc2dbf842e030f68d33f63bfffd4fb268d0ec4d4,2025-02-10T16:15:39.310000 -CVE-2025-24896,0,0,6d5e4672254ff99067444389ba050283a52f70b1f003690c2b3744b773a8bb6c,2025-02-11T16:15:51.477000 -CVE-2025-24897,0,0,4f720f1d12b8ccfa9545a8a52372c681c172f42ff5484594ab48a89bd78abf3f,2025-02-11T16:15:51.610000 +CVE-2025-24892,0,1,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000 +CVE-2025-24896,0,1,aec136f16d507a4ff319c0cbf4875cbc3a2af117b9ba5311873360f82c290541,2025-02-11T16:15:51.477000 +CVE-2025-24897,0,1,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000 CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b344,2025-02-03T21:15:15.703000 -CVE-2025-24900,0,0,bf4a005f4b9e99ea173925e04bf839096bb71e9873debb6d572ac36637b966d8,2025-02-11T16:15:51.763000 +CVE-2025-24900,0,1,12a09249a507b6d9fb85eedd73a9e64a950411d75e49fdadf829b0cc45e6b210,2025-02-11T16:15:51.763000 CVE-2025-24901,0,0,7892902277ec6d4ad07877c3218232e140264b2ae43e5f2aa5c531961fa4f86f,2025-02-13T19:01:24.310000 CVE-2025-24902,0,0,f760e2a632f7f1cc72fc927960f4114c6f42227d057eb5317a00277b3d9cfe2a,2025-02-13T19:00:59.777000 -CVE-2025-24903,0,0,9946609862987fe21035b3925ad303e9f801517f4e155ef7c26588a515dee410,2025-02-13T16:16:48.913000 -CVE-2025-24904,0,0,85d68bcf0832ede08c31c9bcc64cb6a1a9030340bb998c97335035215898ea67,2025-02-13T16:16:49.053000 +CVE-2025-24903,0,1,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff375,2025-02-13T16:16:48.913000 +CVE-2025-24904,0,1,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,ecc12daf91d871ae88d04f98498257679fd02d46bd8922b3f82316cc94d8878c,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,13b689df14524878d89525acaf7cfd0d975a63297d29c07d6d881d3b3e914d54,2025-02-13T18:59:59.940000 -CVE-2025-24956,0,0,0ba7d9cd9cd655d10b2fdd86b1c2c5ed03aa701cb5cc5236c73a95258a61d7a3,2025-02-11T11:15:17.273000 +CVE-2025-24956,0,1,60f62dbd8ca3ec9022b0bbf689d92a9416e8938202e5bdb77bb2e05ca0ed67f7,2025-02-11T11:15:17.273000 CVE-2025-24957,0,0,4c6009fdcebadcde59c81c994d42af877595682fdef18bb7378b4f2679eaf5d8,2025-02-13T18:59:32.867000 CVE-2025-24958,0,0,83843e5baca1cb66509cb1b7cb198ebfd9f486662ffcb2ce9c260edca5373dcd,2025-02-13T18:58:56.320000 CVE-2025-24959,0,0,7607b142d8337fa0aaa95134a5f678b41f061c1f734715e034b266d088419735,2025-02-03T21:15:15.853000 CVE-2025-24960,0,0,46fee619b683ed92da669f75d14549891da252b8bb2536b9cd7c3ffa3067f9ea,2025-02-03T21:15:16.020000 CVE-2025-24961,0,0,f935f426e2c890c717917b3299502472feb84f5c3c1d148ab34a569e142f9333,2025-02-03T21:15:16.170000 CVE-2025-24962,0,0,cc843bcce4cb3b0c42f4503d47a6431333faceba61f147c50271dd76b36a41bf,2025-02-03T21:15:16.317000 -CVE-2025-24963,0,0,954c9347a3249268faa8974d1f3ddefdc876f0296beff30594a73b1a5b1dac0b,2025-02-04T20:15:50.330000 -CVE-2025-24964,0,0,5f2dc2ffaedc3c835064f2b5964902b486d69ee08f293aaaaea79fe06ff184b9,2025-02-04T20:15:50.483000 -CVE-2025-24966,0,0,949a8f08cf83ccbdf75f0022e3296c9f109dd298d309758054527ff1e39a484a,2025-02-04T20:15:50.627000 -CVE-2025-24967,0,0,7a21888f2c4fe660628768b0b7ef2038855ef7ec5faf5596fb5f75a838126a59,2025-02-04T20:15:50.813000 -CVE-2025-24968,0,0,5255648f2d96fbb82a62a5a5177cdf89c6946b7ca3586b3ba400bc7a5deabd56,2025-02-04T20:15:50.997000 -CVE-2025-24970,0,0,865beb3dc725599ddc6ddcb426f248ee9d9769be21e16a4d03cb90e152d86695,2025-02-11T16:15:51.920000 -CVE-2025-24971,0,0,b6076fefaa49ceff813a9be9e0daf630c4c726a850fd1f53082a26892d54d648,2025-02-04T20:15:51.150000 -CVE-2025-24973,0,0,0f97fba75e7ad4cbbc44ad88c61120394ed0d63415325cc5951b6391cbb63812,2025-02-11T16:15:52.020000 -CVE-2025-24976,0,0,327731f1c7a71831f1d952f7769ca7a54558ca32a952e24cbf3a1b2f937dd62b,2025-02-11T16:15:52.163000 -CVE-2025-24980,0,0,0572003421b5fa529e8e965fa9767d24c7f7cc57d037b066b32a9967aec2f73c,2025-02-07T22:15:14.617000 -CVE-2025-24981,0,0,193469fd1209868291153a4ba12265e69f36b02fb430f4889f9547f5b7e02e89,2025-02-06T18:15:32.847000 +CVE-2025-24963,0,1,478e4a6467a614a3af3794eee0f832b58524f79616b3826d703193d24b875794,2025-02-04T20:15:50.330000 +CVE-2025-24964,0,1,8043a515d4157142205acc93e5fd1b4f05e5b625974159584faf2c70c560c257,2025-02-04T20:15:50.483000 +CVE-2025-24966,0,1,b80836066f16ef60a21a0a7b9508ce5a1c7fd944d74b490ee39c70017ee4f012,2025-02-04T20:15:50.627000 +CVE-2025-24967,0,1,4e055c98bc0e7b8b0c7152c15ae500f83c57d83dd2d7c88e7592a2fe0a4c5eca,2025-02-04T20:15:50.813000 +CVE-2025-24968,0,1,e07f901cf7b356f85243eb69a8d49d189b396867f0cba0e1d10bbb82d5ac61c1,2025-02-04T20:15:50.997000 +CVE-2025-24970,0,1,0e83d01cc62fa2a3b33f8519a11d8a80d944db867b8df42ca0423db69356caa1,2025-02-11T16:15:51.920000 +CVE-2025-24971,0,1,86b807652e33ff44dd3b142b2761514007dc81b34e3a1e7b26dd65d9b5964489,2025-02-04T20:15:51.150000 +CVE-2025-24973,0,1,4e0ec487b13ad29adffd9e40afc6f86ee9194b71c6b3a7da9dc820821aed9598,2025-02-11T16:15:52.020000 +CVE-2025-24976,0,1,edf3d8769237d54851dd3a3135d0c605355b9e2500561e211400c75569bec9ec,2025-02-11T16:15:52.163000 +CVE-2025-24980,0,1,93f5736ad811fe47d31660fba8d04da062656820cb9c23ad70329bc04caee348,2025-02-07T22:15:14.617000 +CVE-2025-24981,0,1,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 -CVE-2025-25039,0,0,cee384119ae4fd10de4aaf7ea5d648dea8173ae311902be58ee7fa699f064211,2025-02-04T19:15:33.977000 +CVE-2025-25039,0,1,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000 CVE-2025-25064,0,0,6dceec11fd59119aed7d408b3f6402c7bd962bb609f5c09b6f193840bd49f8e7,2025-02-06T20:15:41.190000 CVE-2025-25065,0,0,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000 CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000 -CVE-2025-25067,0,0,48635577f720f65b54e59fdfccc15d6041cb2f427d01df6df84ce3f8ccecae2e,2025-02-13T22:15:12.780000 +CVE-2025-25067,0,1,b328caaea8c2b56abfad0e8e7dfa281a40a13c6084477036805d88baabfb24a6,2025-02-13T22:15:12.780000 CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000 -CVE-2025-25071,0,0,213b8fc33b3d471865d580a8fd827347f8efe6be1aa881cce0010783c682aa92,2025-02-07T10:15:11.840000 -CVE-2025-25072,0,0,02b74129718b0754e0f05cc9644f74acaf0742f3dcba59563afca00f32b5a1da,2025-02-07T10:15:12.023000 -CVE-2025-25073,0,0,848202a502252b3ee0d62d6fc1336dd4e0a1f103511c0d674c97b7dcb10ddc3d,2025-02-07T10:15:12.197000 -CVE-2025-25074,0,0,64e083d84cf089cc9e63bbd6adc0dbe0ca4e8a278e6d53cc6f3095942317c8b3,2025-02-07T10:15:12.370000 -CVE-2025-25075,0,0,2b63bc5dc25a987263c3cdc2edacbc4e7619bcf25691f2124f37b1c1ede0a1eb,2025-02-07T10:15:12.530000 -CVE-2025-25076,0,0,40bc1ea577af5363ae03fcad4aeb634073c65418f56dedaec4433d0d790a8cc0,2025-02-07T10:15:12.697000 -CVE-2025-25077,0,0,220709a6fc54c08238585fde279ba7a3112aa2a822732f2c4ea82943323dce3f,2025-02-07T10:15:12.883000 -CVE-2025-25078,0,0,d6738905f760b8aa5f5890d04c7c287f24cd2b02e097ca96d2fb209a2807f552,2025-02-07T10:15:13.080000 -CVE-2025-25079,0,0,f76302dbe180f307b84a60a64874b5f1286b44dd79b433a363632c571ac67f64,2025-02-07T10:15:13.250000 -CVE-2025-25080,0,0,054f87c7b0a52511acb4fbc22438e8dc6bb627d1fc4e9960427747e0fbcd909b,2025-02-07T10:15:13.440000 -CVE-2025-25081,0,0,b8f65ef2d60ebb8d1b70ded67e236ce3aff83c38f4026e013b918cde146ba53c,2025-02-07T10:15:13.613000 -CVE-2025-25082,0,0,daba4af0bd845513883acf9d4e0bad59ebffbadf7fdcc69287d2ca24ea071c0e,2025-02-07T10:15:13.793000 -CVE-2025-25085,0,0,c9bc3418f64fab58e687ce81862f90a57f523c4062059d7229eb1313d59e2713,2025-02-07T10:15:13.980000 -CVE-2025-25088,0,0,f100de8c3ca93e90978c260f73dc7a5525953dc9b0c9c69ada9bc933b183cc17,2025-02-07T10:15:14.260000 -CVE-2025-25091,0,0,6959982c0e88e40275403d60a2fd337e958c10197a909524faf1ab882484d981,2025-02-07T10:15:14.440000 -CVE-2025-25093,0,0,179d65e28c8acd9b29adeff705f5ffaa76d8a5fab9bdc1f996297011ab598a8f,2025-02-07T10:15:14.623000 -CVE-2025-25094,0,0,b096097450e7c6b55b6373f9ed1fa01e20aaef85933b44e3347562095c4b12c9,2025-02-07T10:15:14.797000 -CVE-2025-25095,0,0,a466a380efe06459621d928583e6928c7bade38135b9ae481ba9b8de126c37d3,2025-02-07T10:15:14.977000 -CVE-2025-25096,0,0,205166fda972e70515196be4793a1233107a3845345f0abb23ed9801c138997a,2025-02-07T10:15:15.143000 -CVE-2025-25097,0,0,60ed63bd4fe8c5ca1c3f31592a5f492229e69eafdf334c4a3abfa49ace510b9f,2025-02-07T10:15:15.327000 -CVE-2025-25098,0,0,718dff2de57c29163d0715d0c1ad996cd970f529e7ddfa40021506400dac8145,2025-02-07T10:15:15.500000 -CVE-2025-25101,0,0,9dabf7e9543bc35d588347f0d06e18b6207d774796b156baf81c321cfc307211,2025-02-07T10:15:15.670000 -CVE-2025-25103,0,0,e26873bc82effbf11234032059fec358542e6a4ae5b2706484f5fb3c5f0b018e,2025-02-07T10:15:15.850000 -CVE-2025-25104,0,0,ea3d246657485cb8760f8c9508cbc3e7b24332c8b85cc1baadf9fd6befc91b69,2025-02-07T10:15:16.027000 -CVE-2025-25105,0,0,a10ebc4a4c2aa170cac4eed7ea8d555d1cd9357b14b708dae2a769204bd5fc01,2025-02-07T10:15:16.217000 -CVE-2025-25106,0,0,ad8ce6679bbe1389f0fcc064cf3b108e6b94c87f9098dbfdf7bac12526a8e11b,2025-02-07T10:15:16.397000 -CVE-2025-25107,0,0,46f21f48959f3e73a969be1bc351374523b4d961841c47e0c71158dcb9294662,2025-02-07T10:15:16.570000 -CVE-2025-25110,0,0,84e8853f0362f1ebcf879844d372d388ca8ba81016e8f1bc421a4b81b200952c,2025-02-07T10:15:16.747000 -CVE-2025-25111,0,0,43ea0ad945c0057b422e0c33997a1569ab9a45627ed868cf564a313b3e88ca93,2025-02-07T10:15:16.910000 -CVE-2025-25116,0,0,14400c71c5e29f22b821e4e3daa1498a2229eb93f22fbb15300bd1204bc97c08,2025-02-07T10:15:17.083000 -CVE-2025-25117,0,0,f63f929a0d5b133a1d566b457b34eb4ec1506f064f120c0380bd2d88d16194dc,2025-02-07T10:15:17.267000 -CVE-2025-25120,0,0,a349c68c518a2ba059660ff825c00268f6b39ca57e998ff89715176406772711,2025-02-07T10:15:17.453000 -CVE-2025-25123,0,0,1ceffd6bd17414222e1572aec53ba083f5d0fc44dec1888e6b1d0bfa0e9922c4,2025-02-07T10:15:17.640000 -CVE-2025-25125,0,0,ff4e868baf9e40eef64ac6c40a7255a63e0a4d3626ee0b64d0080100e0d4741c,2025-02-07T10:15:17.813000 -CVE-2025-25126,0,0,00bd914d230d30be19ce021c0ada42ee393911d868a620d9c425844083cb9328,2025-02-07T10:15:17.980000 -CVE-2025-25128,0,0,641b5a1aadb3909c56833e95f7bddddad56a8bacd347a5002a2151bc0d3cc6fe,2025-02-07T10:15:18.140000 -CVE-2025-25135,0,0,cb2b4fcd4d73976fba3e9e216b739e36bbda62399120d61ee132a98da5234017,2025-02-07T10:15:18.320000 -CVE-2025-25136,0,0,0eb9449f496d6518b8e3b2cc489861c926fcdadd5e3cac401c59ad905d0a3641,2025-02-07T10:15:18.497000 -CVE-2025-25138,0,0,2e48ca0e58c2875c91e4021cce014d5cbc05902a071c7e46d075f8748d70337d,2025-02-07T10:15:18.663000 -CVE-2025-25139,0,0,11472416c7098ff6307e00065b95b23dfb957538153c62da8be49a79ed02f384,2025-02-07T10:15:18.837000 -CVE-2025-25140,0,0,bced4fa824863b2c75605c285152241f103beed09f6b36095232d39ec2c23d68,2025-02-07T10:15:19.020000 -CVE-2025-25141,0,0,160ed232be3be6d4391cec8ca5d91e753b80f05a0d1e168e6228e67e9cf6ebd1,2025-02-07T10:15:19.200000 -CVE-2025-25143,0,0,08aaf5805338d9d3c52dec1888a13f7ec4c7d81c828ab4cb64dec074597ad665,2025-02-07T10:15:19.383000 -CVE-2025-25144,0,0,101a8d4b6b6b7721da5bfedbeb5e452f9a0fe0583074018b73c0327498b54faf,2025-02-07T10:15:19.553000 -CVE-2025-25145,0,0,79b21500e2858e31aa48b1234b4d4581e3b4c75e4cbaaf358f6a91008c82a038,2025-02-07T10:15:19.730000 -CVE-2025-25146,0,0,0cfa272cd37703cd7f4202b964270af7a284ed3e32fb81a40f70148610bee334,2025-02-07T10:15:19.887000 -CVE-2025-25147,0,0,a24c3e50521e35a0d10ea70f4e097ca554af24264c13ca42aef02777a7f3662e,2025-02-07T10:15:20.063000 -CVE-2025-25148,0,0,95abfb8c0dfa875241e87a4d8be32ce00aa5b5619f0198d74752f33bf8505274,2025-02-07T10:15:20.233000 -CVE-2025-25149,0,0,d9167c3c27d4ed8bc9b89e77f07eec148be0dcade81d153f306fd6cb837538e2,2025-02-07T10:15:20.420000 -CVE-2025-25151,0,0,cfc389b2bc380b505226fbaa14359eddcf20e4d83b6486afbceb268c01294599,2025-02-07T10:15:20.593000 -CVE-2025-25152,0,0,8fd0b13cc5b53234a47814bc9760d81dadaa7be6d938314309278486f4bf7355,2025-02-07T10:15:20.770000 -CVE-2025-25153,0,0,343a677a510e63f3bd7bd1a3505a593eb218451c88ce67bee09e2f7cae6d5ba0,2025-02-07T10:15:20.953000 -CVE-2025-25154,0,0,a3ffe82800e71ade25e9831e0c38dc1faaaf4cf386b2048a97c48c70f02e672c,2025-02-07T10:15:21.120000 -CVE-2025-25155,0,0,d1e85e3ca5890e454b1c6d84153e8045f8470c6baa4df0188ade12a281f7ad64,2025-02-07T10:15:21.287000 -CVE-2025-25156,0,0,b0776b0f5813fecf13613eb7cccbc7fdf3198a5f10213fcb3b3f8d7f76debea5,2025-02-07T10:15:21.457000 -CVE-2025-25159,0,0,754396d2c9081174961a60556b40ae9aaf28674dc08cfff2bee0a4038083173e,2025-02-07T10:15:21.627000 +CVE-2025-25071,0,1,1629f669e71655c3fde13bbe5cdd27b1092b6fb208e43d4e7d5ad171118f64db,2025-02-07T10:15:11.840000 +CVE-2025-25072,0,1,b2f1001fba6b0792cc732077ea2e226df66672da745a56dd97c913a535040448,2025-02-07T10:15:12.023000 +CVE-2025-25073,0,1,ae247888df9b0a0f02c26fb56226f6f772bcd6d701eac54b2e26221f7762b06a,2025-02-07T10:15:12.197000 +CVE-2025-25074,0,1,f86b1aec4d46b49495bcbd17ac4cb0dcd0e692fbf1fae777ab5864011e9e1d26,2025-02-07T10:15:12.370000 +CVE-2025-25075,0,1,269931891c09dfae3fee19f8c2f39cc7287493780967c24a2accbc4410743021,2025-02-07T10:15:12.530000 +CVE-2025-25076,0,1,98723a16168252734a0478011709f05fade6e7e4b27892857e6bc88ff61c7df5,2025-02-07T10:15:12.697000 +CVE-2025-25077,0,1,1c4fbe5e9505d8b81abc74a73af1cb3db38a9e2b2fdbffa7ab67e1ff79d85a28,2025-02-07T10:15:12.883000 +CVE-2025-25078,0,1,e6d5f48b380b3700f634df869f0428e3247818196c631624a03b20d6c449c1dc,2025-02-07T10:15:13.080000 +CVE-2025-25079,0,1,43fc907c6f7f8abacf15501eee12dd84e65f7bf34c2b4b035c7998a7325a8e25,2025-02-07T10:15:13.250000 +CVE-2025-25080,0,1,861ac78288703f786a1258aee4ebc09899b5ccd5f4cd1e0d5d938308ab9cee21,2025-02-07T10:15:13.440000 +CVE-2025-25081,0,1,a942a5f18339f333bcf99d8684bd359dbcef14580612543671b3d6d082e9fd47,2025-02-07T10:15:13.613000 +CVE-2025-25082,0,1,8fbcb284df10f74ea677343321a609e9989fdcc51f391e47c600626a4578b446,2025-02-07T10:15:13.793000 +CVE-2025-25085,0,1,48e8d3fd3144ff3e43021324e6671af7f1230fba8a05033bc5b135fd7d20d9ce,2025-02-07T10:15:13.980000 +CVE-2025-25088,0,1,19b513c75a563bafc3fa8ff6ccee8059f648de42a915840688d58d3b8fa92301,2025-02-07T10:15:14.260000 +CVE-2025-25091,0,1,a542fd0c75799894cefcaf1b68ae91e64f2b423e9db55a3bbe6c17b8ea764d64,2025-02-07T10:15:14.440000 +CVE-2025-25093,0,1,47e022609a66eb732cb5607ad69dacadc0e3206330883066d0fbd2217b126818,2025-02-07T10:15:14.623000 +CVE-2025-25094,0,1,46628609542d4456cffd07ed0405aedfb34ecda58a73ab49cd592d59afb4d089,2025-02-07T10:15:14.797000 +CVE-2025-25095,0,1,3aa0fcd4e44ffa77e526aaa9572752fe51307ed32741a755783c3ce59d4acf78,2025-02-07T10:15:14.977000 +CVE-2025-25096,0,1,236222022f87a86e77bd8ba463e844df698349f963210d6765a3437ea99cd5f4,2025-02-07T10:15:15.143000 +CVE-2025-25097,0,1,e516102cedda1395b6abdb8786b776f94af95ec136f76e62dc90cc8ba092528b,2025-02-07T10:15:15.327000 +CVE-2025-25098,0,1,d51cf54051461684fbfbca4232445e97f072cd7fa5f46b19018d123dcd09d044,2025-02-07T10:15:15.500000 +CVE-2025-25101,0,1,b55978e51ad28a269a135a73512b84912bf7da148b6e45135907e1256d3b35de,2025-02-07T10:15:15.670000 +CVE-2025-25103,0,1,8f0bbbc68659bdd6583cb7a4bc5992aad3b30e946386462de20a44c10a02c12a,2025-02-07T10:15:15.850000 +CVE-2025-25104,0,1,e4c9d78af0197f942e0524c34497df5047d8f0a28faa9fd982f2bf0c823696ea,2025-02-07T10:15:16.027000 +CVE-2025-25105,0,1,87183f79828bf4be3e65d98936975061f302492ba9a4f03a8503cd4599e018bd,2025-02-07T10:15:16.217000 +CVE-2025-25106,0,1,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073237,2025-02-07T10:15:16.397000 +CVE-2025-25107,0,1,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000 +CVE-2025-25110,0,1,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000 +CVE-2025-25111,0,1,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000 +CVE-2025-25116,0,1,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b7981803189350d2,2025-02-07T10:15:17.083000 +CVE-2025-25117,0,1,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000 +CVE-2025-25120,0,1,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000 +CVE-2025-25123,0,1,39da03858edd407e6c09775c068b65e8a6da718955d1af67b46f995b12dfb1ab,2025-02-07T10:15:17.640000 +CVE-2025-25125,0,1,d72d623d3ad39f3c37d3909bb3698bc55eee1f38ede5a07ce403181faa4e4d78,2025-02-07T10:15:17.813000 +CVE-2025-25126,0,1,8d61804086754e48af89e8567f3989101452037c2ce395ff80341319a100b21c,2025-02-07T10:15:17.980000 +CVE-2025-25128,0,1,a1be1b60af41d9f59ae264bf030c7f9da67afc0036052f5ee24681007473a137,2025-02-07T10:15:18.140000 +CVE-2025-25135,0,1,238a7464065012476597d7378a7ce292977f12606cd0a077568b6ceec8b00845,2025-02-07T10:15:18.320000 +CVE-2025-25136,0,1,42c0c261cf9eb8be4dc24ad7ec4abc766f8d93d01752ada40296d4ffa1184d99,2025-02-07T10:15:18.497000 +CVE-2025-25138,0,1,62d82d9fa013175354f3ea0d4e19c0285c2715dd0fa111fd44954532b1adf0e3,2025-02-07T10:15:18.663000 +CVE-2025-25139,0,1,fa14652e102be794a3e0af0bb9d14992eed595fc0a3190cdce8b043807376320,2025-02-07T10:15:18.837000 +CVE-2025-25140,0,1,374227d3c660510b64513d59d78c8f882ca05a4da83388b27738f7367599633c,2025-02-07T10:15:19.020000 +CVE-2025-25141,0,1,f1bd5fae1f027e6426c8a2568cea6792a0d4eed24199068cede2f66a267de8df,2025-02-07T10:15:19.200000 +CVE-2025-25143,0,1,e4f64a7000db26d7295c554498abb3a0e8d7d93ab88d323d72f7d817a03c369d,2025-02-07T10:15:19.383000 +CVE-2025-25144,0,1,c23f429ee74bdac005324112ac24332b4076e14b539deab35919f49edda6ad4e,2025-02-07T10:15:19.553000 +CVE-2025-25145,0,1,b4a198401379fa6c111f7dbbc979899498f276925009d0e624b600a5d321077c,2025-02-07T10:15:19.730000 +CVE-2025-25146,0,1,8cf6209a46b44b06b2ccd5c1c7e8ebdc3f8ffea4dd4aac4b546297068385f7a5,2025-02-07T10:15:19.887000 +CVE-2025-25147,0,1,8becf73efc80f713db1dcf90c9a60e246e06cd5106d3c39388577437a75c73ec,2025-02-07T10:15:20.063000 +CVE-2025-25148,0,1,e75aa4aa374ce5c3506ec0aec90e7c3883709d635a4ed1bf876603c867ae1a92,2025-02-07T10:15:20.233000 +CVE-2025-25149,0,1,c6ae2b5481fb286fc9000fcaba20092f415781ddd5932a3ec3a446ade703e6e3,2025-02-07T10:15:20.420000 +CVE-2025-25151,0,1,07d995688df73514690b1246cc5f82518185dd07fded4938b2d6c2df7cd3a2e6,2025-02-07T10:15:20.593000 +CVE-2025-25152,0,1,937b6e0bc1ed0d26ac1442a1ab58b7bbfe5cda83c6da9168e1aca6e3fe25b8c2,2025-02-07T10:15:20.770000 +CVE-2025-25153,0,1,e897fcce67b06244f49678e3dfb381a0213ac0f5cbd95b07c1760d0dcf84f71d,2025-02-07T10:15:20.953000 +CVE-2025-25154,0,1,e0fe38d9547026402a61df8e4d235a791a658ca2456347f94c0c76d661f9d9b5,2025-02-07T10:15:21.120000 +CVE-2025-25155,0,1,25463116677bb5b1e5eede9e10b405a5bfaefa58e87937c57e4c507fe21ceaac,2025-02-07T10:15:21.287000 +CVE-2025-25156,0,1,392795b0610ac1fd5d03e67dde364abfeac5df7cd4b13d93620eb6cc4404df15,2025-02-07T10:15:21.457000 +CVE-2025-25159,0,1,025a2bd3e6b558bdfff1d7d43ed8378b0ae9f5037837ff20f11b16e15e74370a,2025-02-07T10:15:21.627000 CVE-2025-25160,0,0,c867ea52ba2964998bd24138dfba1ca85a51e3af0334809fe322a505256dec50,2025-02-11T19:28:40.520000 CVE-2025-25163,0,0,df7178d297cc829e76e2bf99edce3f1cbda6db4f0013a6f708bca9205b7f3698,2025-02-11T18:42:09.117000 CVE-2025-25166,0,0,f5428199d8b191f5ec9fa7a05ec98d82647ebea96576afd260370950cb5142c0,2025-02-11T18:25:01.633000 CVE-2025-25167,0,0,e14b9eb6e466e19d148bb81d5cb2df8f805c1241e9a9e8cd6260db11c719e980,2025-02-11T18:22:46.253000 CVE-2025-25168,0,0,93fb1477ac0fd147322a0beee26e3b74949bd1187f727ff11033ff5c839391ea,2025-02-11T18:21:01.407000 CVE-2025-25181,0,0,4d67ec539e847fe84660f43fd38b8d53f4b38c60fadbe4831b0e67bce31509f3,2025-02-06T18:15:33.030000 -CVE-2025-25182,0,0,64280d7db04109963693dbc8015e92170c0284dbb6fcfe83001673344b00fbca,2025-02-12T17:15:23.857000 -CVE-2025-25183,0,0,a47fca60ce37f6e1f3d8c94fd73efeedc3b0f25b6d56a99cb911f6f7e296e3c6,2025-02-07T20:15:34.083000 +CVE-2025-25182,0,1,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 +CVE-2025-25183,0,1,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 CVE-2025-25184,0,0,a90970c349444a88099e97d93a9a2dcfc7bd3a9c2c19897de650bcf260c011d9,2025-02-14T20:15:34.350000 -CVE-2025-25186,0,0,0205c857b4612f901b3cb92f8e70791e0cbe09c1a93a7c537cdaad0cfd7899a7,2025-02-10T16:15:39.457000 -CVE-2025-25187,0,0,2b81c5f951bb7e07fb63bf54d1bd2aed0ca277e6f07fbddfbea8ce9282b1b7f5,2025-02-10T18:15:35.703000 -CVE-2025-25188,0,0,c9450c0ac62ca2c2003d4bcce62b087763421ef3d868f3e4422e47bb0dd652e8,2025-02-10T18:15:35.827000 -CVE-2025-25189,0,0,d83847fe96d00072b7a8190c91ae5b2afdfef2e676164ac0785259c0f2731c75,2025-02-11T16:15:52.313000 -CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06ba52,2025-02-11T16:15:52.420000 -CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000 -CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000 -CVE-2025-25195,0,0,4eaa19fc37095ed0b6f6b72a1aad3914027d6a3ba6d1818c903f884ae192c5c8,2025-02-13T22:15:13.100000 -CVE-2025-25198,0,0,d4f423b8575a2b0e0c47d1cd874c15fb2da6a6a46ceaec62c0bfc272e6cf57b7,2025-02-12T18:15:27.757000 -CVE-2025-25199,0,0,55e40815cd021635d25d7610751f977ce7b772f67293cccb8c9a688735660385,2025-02-12T18:15:27.933000 -CVE-2025-25200,0,0,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1be52,2025-02-12T18:15:28.110000 -CVE-2025-25201,0,0,ede8016b22c20a5da1c3168daf6048debc3bf82c814cff603e6090c3dcc1680e,2025-02-12T19:15:21.570000 -CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000 -CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 +CVE-2025-25186,0,1,c422218bc2b3a51bb7e35622bef2d3f79367445faa61fc891c243b951694bb43,2025-02-10T16:15:39.457000 +CVE-2025-25187,0,1,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef2a2,2025-02-10T18:15:35.703000 +CVE-2025-25188,0,1,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000 +CVE-2025-25189,0,1,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000 +CVE-2025-25190,0,1,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000 +CVE-2025-25193,0,1,9558fa41c42a9fe022dbb8b56e9a742f8cc51b4e80cd395542625bebe245b7b4,2025-02-11T16:15:52.523000 +CVE-2025-25194,0,1,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 +CVE-2025-25195,0,1,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000 +CVE-2025-25198,0,1,dba1938f205829e248418b009d8da17ce793befa8842802d286cefa151f40ef8,2025-02-12T18:15:27.757000 +CVE-2025-25199,0,1,cef47ad8035ccc7763ac731a7bbc3b7e25e483ba8b3abe7752d565785afdd38f,2025-02-12T18:15:27.933000 +CVE-2025-25200,0,1,1479ab0c65efeaeb900431cde363e5ab64f7b29aea690cd1ab2ec84712d3c3ae,2025-02-12T18:15:28.110000 +CVE-2025-25201,0,1,5060a1ecdb4ea214ef23481f7cb8bb8004054fb5be3291bd4a87c9c0b9e3a3b3,2025-02-12T19:15:21.570000 +CVE-2025-25202,0,1,16301d264929e3b1e68379cd4037f3dba012c80d52d69a31d3a3f1fa01489caf,2025-02-11T19:15:18.690000 +CVE-2025-25203,0,1,040b03b28fff3f91466e7eaa5a2d6143cc21f99e3d967437d45c81f30cd9ca3f,2025-02-11T23:15:09.450000 CVE-2025-25204,0,0,08e898f00cdd4836e5416642a3da9e96b59613851a80bcbfd14158c90e610a8f,2025-02-14T17:15:19.140000 -CVE-2025-25205,0,0,e11d363a7c34c04aeb358dd5ff34494ef66003966c6cc6b33481bd348b2d737c,2025-02-12T19:15:21.717000 +CVE-2025-25205,0,1,53d346539ec5bb58856ce63a9d1fdca5438e2c859c2047a9cb707ece5a8bcbe8,2025-02-12T19:15:21.717000 CVE-2025-25206,0,0,e9846eb9edb5a629adfeda97812105c1d9509aaf2c4838d333e92f590466aefc,2025-02-14T17:15:19.327000 -CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000 -CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 -CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 -CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 -CVE-2025-25281,0,0,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24cfe4,2025-02-13T22:15:13.263000 -CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 +CVE-2025-25241,0,1,685093741c4cbeb4c7e856690722e80ea121ecc2a87182689308551a55f65cb8,2025-02-11T06:15:24.120000 +CVE-2025-25243,0,1,899b55762ee14dd98936d3ff86efc1dbe88fe1088da4c8c1779e82f64331f15e,2025-02-11T06:15:24.330000 +CVE-2025-25246,0,1,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 +CVE-2025-25247,0,1,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 +CVE-2025-25281,0,1,167d81b42fb33b6f42e7962fec83a5221902600725fdaf7aff6080b6098df223,2025-02-13T22:15:13.263000 +CVE-2025-25283,0,1,d1ae07356b8742828976d536d141109b35ac143686ab7de25f652850c0ca2fe0,2025-02-12T19:15:21.863000 CVE-2025-25285,0,0,477e58c659dade2cfb210e3ba46670b820bd403cbce503dea94880c378af5190,2025-02-14T20:15:34.487000 -CVE-2025-25286,0,0,d02a516e334a3f6a031f551547a6cf5db3f84dd4e0c98c8429bacf5acc75be44,2025-02-13T01:15:25.280000 -CVE-2025-25287,0,0,990f1bef848f5cb0ec832e1dc9fa9d35b18b0435a224d0f576726f1fa2e52a18,2025-02-13T16:16:49.187000 +CVE-2025-25286,0,1,3fe0a9ce379ac6ea437932cc4fd9ad45d9a9c45f2f50606f8108c4f80c009ace,2025-02-13T01:15:25.280000 +CVE-2025-25287,0,1,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a45f3,2025-02-13T16:16:49.187000 CVE-2025-25288,0,0,c847d67204aa530b3cbb2896ec1bafab113f7f8d98341657679776488f5414bf,2025-02-14T20:15:34.737000 CVE-2025-25289,0,0,d3830159ded9a5e61026eacf7ae121d63575a87fd8ff3fc5d9859e2549e2ec1a,2025-02-14T20:15:35.100000 CVE-2025-25290,0,0,078fdc5e33afe2c4a38c199064e0140ffef88c9c06a22a120a13d1a72823c21c,2025-02-14T20:15:35.593000 @@ -281341,7 +281342,7 @@ CVE-2025-25295,0,0,9304b327aa84ad0a6b5813eb481063f58dfc11525062cc326fa01528a5938 CVE-2025-25296,0,0,608cd76d7d764b74d80c1c4bfff13ca0380bfd78ca4bfaf90902e07d73a24a9a,2025-02-14T20:15:36.103000 CVE-2025-25297,0,0,0d275b3712a3a3d33cc2cdc3c558a7d071e515bf3e49f1dc29a4a93b576fa4d9,2025-02-14T20:15:36.627000 CVE-2025-25304,0,0,faa0dc15a1534f91421e09ef7387795b56219ff6441c76442b60578f585efb63,2025-02-14T20:15:36.903000 -CVE-2025-25343,0,0,165ee3c898301f2db8f607c24a899fe7668a5762e7942c4695c7dfe0dda59857,2025-02-12T19:15:22.003000 +CVE-2025-25343,0,1,209700127e109f6eaf7535ced2a5a67f22d1ec3dd91c12407f85d8d5702206ac,2025-02-12T19:15:22.003000 CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000 @@ -281360,19 +281361,19 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673 CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 -CVE-2025-25530,0,0,b297970422a9009f3519f09d12d391c8a089497e9f856b7f5a138869935d03dd,2025-02-11T20:15:39.327000 +CVE-2025-25530,0,1,80f36605b63569036b66acb5263c199af5b962300f8a88d6532226521bf2cf87,2025-02-11T20:15:39.327000 CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 -CVE-2025-25741,0,0,22c247f082a192b17144b46680a5eeb4753c15967349cf8359d498374cba430c,2025-02-12T18:15:28.293000 -CVE-2025-25742,0,0,7436abbf9896837a8de9002dbff5d07a1a7a57435c6244cea579f542c949c30d,2025-02-12T17:15:24.150000 -CVE-2025-25743,0,0,b33e96b73fe5d43e977fc05d5d723c6f65971127b3785cb42153a064e7d1dfa8,2025-02-12T17:15:24.270000 -CVE-2025-25744,0,0,628a606d8113015dc92f83451c33b7ec9f2d546fbac6214e1a09b8ec06580c92,2025-02-12T17:15:24.390000 +CVE-2025-25741,0,1,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 +CVE-2025-25742,0,1,44a73b49255ee9adcf82a52f384eb5c222198ebf34b2a31793c5bb7b83755521,2025-02-12T17:15:24.150000 +CVE-2025-25743,0,1,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a8bd,2025-02-12T17:15:24.270000 +CVE-2025-25744,0,1,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000 CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 -CVE-2025-25746,0,0,c4b5e6feeed888e613a77cde223f386a53a94e2f5f7e2eda511c12e6c183117d,2025-02-12T17:15:24.500000 -CVE-2025-25897,0,0,2ea1460474639a1fdf3df677fc835c28578c1be17f5c3694f6f8c8d08e5b7f8a,2025-02-13T16:16:49.790000 +CVE-2025-25746,0,1,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 +CVE-2025-25897,0,1,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000 CVE-2025-25898,0,0,ce3f5d0179ed4ddc6d491c3be6fbda7289ce3638f8b82677f1620f1da2e7683b,2025-02-14T17:15:20.917000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 -CVE-2025-25900,0,0,a0ccc8806ccf3a3c8c76a012f89ca9bd9b6e8f621ab07786472d57d1b5f5925d,2025-02-13T16:16:50.037000 -CVE-2025-25901,0,0,7c00c4f6a65482a8973906804aa663453cc2407407b6bc523ef9411ad464c9cf,2025-02-13T16:16:50.180000 +CVE-2025-25900,0,1,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 +CVE-2025-25901,0,1,4bb3318a426075afea20e3cd7e6ccc008d1508d9384b2eedc4349a3b069c9099,2025-02-13T16:16:50.180000 CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000 CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000 @@ -281383,91 +281384,91 @@ CVE-2025-25997,0,0,76f87d459e5781a855c01da7ce8c838760a817361c8faf2da21d279ede1a1 CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000 -CVE-2025-26339,0,0,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 -CVE-2025-26340,0,0,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 -CVE-2025-26341,0,0,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 -CVE-2025-26342,0,0,ec590c8f9a9ed71815ba8dc7d1d5274f9fb3cdbb158dcafc881d5c3e868b5bcc,2025-02-12T14:15:33.990000 -CVE-2025-26343,0,0,960dad3fa07bb87cc9332137716edb3330260b7ab45b51fcec9fea40519bf486,2025-02-12T14:15:34.130000 -CVE-2025-26344,0,0,4ef803a2f81991b5d659cb2827cea363defd6bba023204f95b005089922a982e,2025-02-12T15:15:18.757000 -CVE-2025-26345,0,0,5c179481c8be0ec34986e1d99bcd057b8698cdc095e04bcfaf1d5c623e6c83ab,2025-02-12T15:15:18.930000 -CVE-2025-26346,0,0,ff46d94f3110b344929b215ebaf0199f7406977b937594b1a9a41e51235b705e,2025-02-12T14:15:34.547000 -CVE-2025-26347,0,0,07d9e939484eaa1ff4cdabd23cc3e3b64f9cc51758eba62a62b4576177e93bd5,2025-02-12T14:15:34.687000 -CVE-2025-26348,0,0,2549e0690fe0b2289debff5715a31c0858579e4a52666873108e808e7a1391f3,2025-02-12T14:15:34.827000 -CVE-2025-26349,0,0,46a525249bae5677e34a3cc216ff60b562c5d1674c059f1c87b7c79adcfead31,2025-02-12T14:15:34.960000 -CVE-2025-26350,0,0,5ad07ddbfed394ae8b9f2194e4302f5f2cc532cea5b1ff67dec8c790c44d60c9,2025-02-12T14:15:35.107000 -CVE-2025-26351,0,0,a3798fe6605bc205865f8ad5e14fad913689aa161a5ddd2629354f847951765f,2025-02-12T14:15:35.270000 -CVE-2025-26352,0,0,661aaebbc8ab7034cb67a928c30416395b30d5b732209e4a2530793600191851,2025-02-12T14:15:35.430000 -CVE-2025-26353,0,0,47a9a9154aefb0537f7a97104d1455dfb6443de7d94899a2bd861405a87c9536,2025-02-12T14:15:35.587000 -CVE-2025-26354,0,0,b5c32253cc9cdd28ca6819bda06c053aee121e243d1691c0d87075e3815527b5,2025-02-12T14:15:35.727000 -CVE-2025-26355,0,0,2acfa9c3428cb3ae2856fe3df3c8974e1ae17361024d5f15c3bdb0724aa3eb48,2025-02-12T14:15:35.870000 -CVE-2025-26356,0,0,d902fe85de7d86661a403d9bd748081501584575651a123a0d8756372a2119d1,2025-02-12T14:15:36.017000 -CVE-2025-26357,0,0,d12fffc6453131e19af18d2736d53e2c86beb87191f3e7dc9faab56ad1d14265,2025-02-12T14:15:36.160000 -CVE-2025-26358,0,0,62a9d58f329d1e5057566eb411cceff4edaea062699a5f8e61414984cd685026,2025-02-12T14:15:36.297000 -CVE-2025-26359,0,0,2823740aad1d2e1e54f39765f81d6af19ee1e6f98c1617bf3a6d1781a5db05e4,2025-02-12T14:15:36.437000 -CVE-2025-26360,0,0,74998f805d63e80b06e08c26f633b45a629d964a2866bc7a17f9a5b3da0a3763,2025-02-12T14:15:36.577000 -CVE-2025-26361,0,0,0547df7d0c4851fbd71d5f88c2f92994a0067b35048d6293f6771ddc21d7ab4f,2025-02-12T14:15:36.717000 -CVE-2025-26362,0,0,2265dbb13ea5c83e9b8e6af3e20d744ef23b59c9cb546f2fd2f391883ccdafa6,2025-02-12T14:15:36.847000 -CVE-2025-26363,0,0,46a47d90feee1eae4bf2681edb667146d94fe2cd2803a7e0eea659f5e7114099,2025-02-12T14:15:36.983000 -CVE-2025-26364,0,0,3eb8d5644d611e9680424d4296d7f72545cd75c2e0e0817f5ba409b5c7cdaf77,2025-02-12T14:15:37.123000 -CVE-2025-26365,0,0,7c36b8430a9a394cdbec12b10152a2ec09c33d11bfec6f968b5075e4b08ac9e5,2025-02-12T14:15:37.267000 -CVE-2025-26366,0,0,c8d57424dad392106e5a726746557532b665bcef15029b1f4b19de2ae7d8539e,2025-02-12T14:15:37.397000 -CVE-2025-26367,0,0,c2cf7bf136d773db89a151473940815ed9c639b0fb261d59ba174f6b3c49114d,2025-02-12T14:15:37.533000 -CVE-2025-26368,0,0,10f1bf75646d66a58ddb0aa5ef2dd6f2e600620131dd044a507d0ede2464798e,2025-02-12T14:15:37.660000 -CVE-2025-26369,0,0,9e63e141ef2c975cf81ca4f3d665055cd562f2546ff73eec1bf416a8d676ce8d,2025-02-12T14:15:37.800000 -CVE-2025-26370,0,0,c091180c9fb75c1bd5dd287c227c8d3c1c8d705067033938fe7624ff18defd88,2025-02-12T14:15:37.940000 -CVE-2025-26371,0,0,916e2eb100652646d6c83c2af9b479662965815d0db6129dc7876884ae2839fd,2025-02-12T14:15:38.077000 -CVE-2025-26372,0,0,854af7162d2787c5886a1dba65290cdd88c69dd72e904f78194314ecda91a0ca,2025-02-12T14:15:38.227000 -CVE-2025-26373,0,0,303af1779a32677b73ece8c6cb9abbfab9f0407a4e36f50c2fd46f36427081ba,2025-02-12T14:15:38.360000 -CVE-2025-26374,0,0,6b4cde6bdd21addaff9f9939eac886d337dc390ef4436213649dd204813f156d,2025-02-12T14:15:38.500000 -CVE-2025-26375,0,0,95c0e5603a6b8f4235685b120b43d32682014e85ba62c1ad13acdb904ebd74ef,2025-02-12T14:15:38.633000 -CVE-2025-26376,0,0,b9f0909bd3bcb0a1869e3cf0682583c1471937e6148f03a4c6b368746ac3494f,2025-02-12T14:15:38.777000 -CVE-2025-26377,0,0,e3e151b6bd619f3832bf374f51b634c26d759814a1259441eaebff3ee9909e72,2025-02-12T14:15:38.933000 -CVE-2025-26378,0,0,eae26e196029c3f2d8c112ec45f1721a88ef2ca9a01115a61cbc899a329140dd,2025-02-12T14:15:39.163000 -CVE-2025-26408,0,0,33b8ab1d964eed8374cf2895d0fb5039e22b031ca552fb49290499a2fa382a45,2025-02-11T15:15:21.377000 -CVE-2025-26409,0,0,ca13ca3a8e4796bfb9010cd7417af6b477b812c777fc3763439360034c7a9481,2025-02-11T15:15:21.537000 -CVE-2025-26410,0,0,7436cf38115e526a16ee35c34809d408cd39f53af45b718ca00b110673ee34d1,2025-02-11T15:15:21.700000 -CVE-2025-26411,0,0,9ef32a253b731b2ff18f782496eaf6c296b220e67d96855234ab4a5147a58482,2025-02-11T15:15:21.847000 -CVE-2025-26473,0,0,afdee1379c99d4f6b07907ea17580be8453e0aee18d47bd8de4ab55ed06e520b,2025-02-13T22:15:13.417000 +CVE-2025-26339,0,1,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 +CVE-2025-26340,0,1,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 +CVE-2025-26341,0,1,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 +CVE-2025-26342,0,1,b9c179c4c2c79543faf6bbe728c26448212bf8696a8f38636b220aeadb4224b0,2025-02-12T14:15:33.990000 +CVE-2025-26343,0,1,5c838610c13b64e30a1ec06552594589c568cb448bd4bd9770f91ac706661444,2025-02-12T14:15:34.130000 +CVE-2025-26344,0,1,1f0b2282290e2b15e2bbfeebfa60922eb47a8cb9b7917ae00d2ae277e831c35a,2025-02-12T15:15:18.757000 +CVE-2025-26345,0,1,27a494977bcdf1d4c3eb5e31e75c93211c21cfdc2b3aaeca41cc8ff74f7e1add,2025-02-12T15:15:18.930000 +CVE-2025-26346,0,1,be21a62ce61f2d55e2ee1237c267ca5c40463dafd81220bdef97f257cccd1bc4,2025-02-12T14:15:34.547000 +CVE-2025-26347,0,1,da5df29b91dc5eca83f7a6c3957a394103acb4ae7a841760c94a02881ddf6af6,2025-02-12T14:15:34.687000 +CVE-2025-26348,0,1,58fb90d30dca3d8a4c20eaaf3cd36fd2293f4ce01fe3997d760c693d5e908d9b,2025-02-12T14:15:34.827000 +CVE-2025-26349,0,1,12a2016c5e52ef6cce782d618f523cf7cef1cfe9e792d320af44534ba7f3734e,2025-02-12T14:15:34.960000 +CVE-2025-26350,0,1,afbfee825fdf77a6f15cd07ce25142fdc9efc0be3e606cb33c000483e401fe74,2025-02-12T14:15:35.107000 +CVE-2025-26351,0,1,607a4941da7c4232aed5e04718bd94d2cdc824014a06ec451aa2fdd8d2bb413d,2025-02-12T14:15:35.270000 +CVE-2025-26352,0,1,d97dbb0f143285ca7ed1b8832eb49e14976c1d64263e58848d3e2279556dd75a,2025-02-12T14:15:35.430000 +CVE-2025-26353,0,1,2b4a18d803e87314d66159af04d1111ee228ab430b4fb58bf7d51098e4df950c,2025-02-12T14:15:35.587000 +CVE-2025-26354,0,1,83c631e2671823a4bfdc0df87c38ae0db6f9ce5461063f78ccd348f0e69a9d27,2025-02-12T14:15:35.727000 +CVE-2025-26355,0,1,595200d556db54dfc720ac878dbee971f78091bd83e25a89099a1660ed433c80,2025-02-12T14:15:35.870000 +CVE-2025-26356,0,1,a20407d143e37fe5c51b4c6379adf05afcc1c151aca9dc891fee402ab40497f9,2025-02-12T14:15:36.017000 +CVE-2025-26357,0,1,299326568958356aaa260aca2749f13fc4457fae72782a12c908aed48531ffba,2025-02-12T14:15:36.160000 +CVE-2025-26358,0,1,83420a1e22f31cd31f2c84aa941bb984380be680e3cb9e15cfda83509effc79d,2025-02-12T14:15:36.297000 +CVE-2025-26359,0,1,5f59fb1823e88cda5cec69e49e3d35c67f1afcc3c84876bbc2a441ae9cc178dc,2025-02-12T14:15:36.437000 +CVE-2025-26360,0,1,d2cb7a269786ac9f3b5870f5faaa1a840798a5c44bed9d70e893fa4999aed6b6,2025-02-12T14:15:36.577000 +CVE-2025-26361,0,1,5030fc0069a0ace256928c38b9aece2d876e06760d6576de9cca3faf5d0b9449,2025-02-12T14:15:36.717000 +CVE-2025-26362,0,1,8fc41c39e5438752edf355df74a87e2aab3e5a8557cd797ba063b4a92e27f26a,2025-02-12T14:15:36.847000 +CVE-2025-26363,0,1,88de4b738054d81b50fbc63f019ba6c5ca3994c19879d01a6ec8b97a38a007fc,2025-02-12T14:15:36.983000 +CVE-2025-26364,0,1,cad3ad8549b1f8959c696141548488c58bf9c1bb1c933f0ca4bc69b1966f877c,2025-02-12T14:15:37.123000 +CVE-2025-26365,0,1,48652c3299634957c004062f087c5baa530f27f58870661c91c04d5d14c97015,2025-02-12T14:15:37.267000 +CVE-2025-26366,0,1,791459512be83b7fc0ade0a1c646586bc122ab878822f19fa4a4996b21043d24,2025-02-12T14:15:37.397000 +CVE-2025-26367,0,1,0db2fa42c92abdeeb8b6f53cb796651ba022abb1806d9d4781c141b92591ddc5,2025-02-12T14:15:37.533000 +CVE-2025-26368,0,1,a1a1c238639cdff8f5e44f2534ab2ca357edb50432de477306cddd37368073dc,2025-02-12T14:15:37.660000 +CVE-2025-26369,0,1,f84406f1acf656592558e5d9b47b0b9f3d72547a6dd3314df3ac76552f04ba77,2025-02-12T14:15:37.800000 +CVE-2025-26370,0,1,bbb2d9fb4c0649126ad0d0a3c98d217a6344733d746a48a9e3d9d92e5e0ecd29,2025-02-12T14:15:37.940000 +CVE-2025-26371,0,1,7ec1c9729a94b5be0bd04a04db55b9f67bb7970da8d10bcbe871c431291a3b8c,2025-02-12T14:15:38.077000 +CVE-2025-26372,0,1,6bbfdc80183d609b86ee398dc52831ff4f4767beeb4a7b0f8653b05ec43160fa,2025-02-12T14:15:38.227000 +CVE-2025-26373,0,1,c798810bbbd6dc67d70a50a3162c488c6729ffdcdc8131fa509dc6e1fec0fdbc,2025-02-12T14:15:38.360000 +CVE-2025-26374,0,1,fbfabd03ca80a51efefb621201de0a9e3801af7fbc6afb15a854c48301686ac1,2025-02-12T14:15:38.500000 +CVE-2025-26375,0,1,84821ae2a61f085659b0e84453533efd90e26d2715dcaed43a63af4d901a903e,2025-02-12T14:15:38.633000 +CVE-2025-26376,0,1,ae206e68a42a4d679f54837497ae12a86feed61ce6edfe0c3c3976f9bfd49395,2025-02-12T14:15:38.777000 +CVE-2025-26377,0,1,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000 +CVE-2025-26378,0,1,e51dbad96406eb456158bdbf1d717d786489f18ecfbd56f380fadc61ce2f3d12,2025-02-12T14:15:39.163000 +CVE-2025-26408,0,1,ae2a3c2bc051e55463c57bba58bbfe21d8c3480154d8ebe716d6d877fc664d41,2025-02-11T15:15:21.377000 +CVE-2025-26409,0,1,36cbb1ccd85f25d0ea04c73edb60748e2e967491c3744699e60abf2a1839850e,2025-02-11T15:15:21.537000 +CVE-2025-26410,0,1,c4910aebaed5466fe3cbd0d1e033569082b454170751f65e4158626f7cfe7248,2025-02-11T15:15:21.700000 +CVE-2025-26411,0,1,b078ed9b1e32dfaacfb84cc4302841e5e62c2772c236372d3c486d7da2ef8c93,2025-02-11T15:15:21.847000 +CVE-2025-26473,0,1,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000 -CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e86b,2025-02-11T14:15:31.260000 -CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000 -CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000 -CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000 +CVE-2025-26492,0,1,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10654,2025-02-11T14:15:31.260000 +CVE-2025-26493,0,1,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66bea3,2025-02-11T14:15:31.473000 +CVE-2025-26494,0,1,46537dbe5e8ce361673c45a66c0e6b81e96c8550df80b9520771a6fba53ec033,2025-02-11T18:15:47.060000 +CVE-2025-26495,0,1,9bd7f91393f57ac4b7e327a438c72992a19380bc8797fca3ba6b30269fbbf330,2025-02-11T18:15:47.237000 CVE-2025-26506,0,0,06472821ebfcd7953c4c4368f236121ddb39bc67c09573db59220c6ef53504c7,2025-02-14T17:15:22.747000 CVE-2025-26507,0,0,f323176124706f913b7e946f1930ef7686233000e26002e9c7f40f4fceb7a9e3,2025-02-14T17:15:22.863000 CVE-2025-26508,0,0,5016b90acce97ba3621833356645f05da34419daa8434a6376c336274d22232b,2025-02-14T17:15:22.983000 -CVE-2025-26511,0,0,f60d5b8ed6462b3636b1bec6d86421fa2447443d87dddccbff41a72a635be633,2025-02-14T00:15:07.667000 +CVE-2025-26511,0,1,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 CVE-2025-26519,0,0,b3fc9666a20002fa3306682f9ea04074909562cf70276b34a90b9ad244b51ded,2025-02-14T17:15:23.090000 -CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000 +CVE-2025-26520,0,1,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae3e7,2025-02-12T07:15:08.617000 CVE-2025-26522,0,0,d432a083d9fe16f2710db5ccca016a9c6993d2707a88672ed6bf48ef8fe32b59,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,167d4e5eb341df307a978429e54308c2f66bd92279a3ab3ead55f5415ee1e0de,2025-02-14T12:15:29.723000 CVE-2025-26524,0,0,8fdc604b39b44cd3a4dccd87cb46f4ceb90ecb89cb62e553a8809eb05758dcf7,2025-02-14T12:15:29.887000 -CVE-2025-26538,0,0,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000 -CVE-2025-26539,0,0,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000 -CVE-2025-26543,0,0,79534b5118a4ed770b16da331e48f5776ba13135c8971d726cc8e1e891178cf0,2025-02-13T15:15:21.080000 -CVE-2025-26545,0,0,86e6d73b316c567f92fafe24354abc1f6e5e58627f6331bfd9ac32870ef96d2e,2025-02-13T14:16:20.043000 -CVE-2025-26547,0,0,32512de25d98c31a3fb7d8dc154a7a890308ccf1c434f822a8fe2d1eff9a6a66,2025-02-13T14:16:20.347000 -CVE-2025-26549,0,0,c83d206011787aa939d7304c8834cb18339ef2b98da1d146dbbf9a541a444205,2025-02-13T14:16:20.663000 -CVE-2025-26550,0,0,883cb288bc4eea99ad912aba30c7fea818b98e6f73b285242c10d13a2acb06fd,2025-02-13T14:16:20.993000 -CVE-2025-26551,0,0,a029083bd25de057d4266e7a9ad85862168c3f408f38b9563e3ef7ec6ded376a,2025-02-13T14:16:21.450000 -CVE-2025-26552,0,0,8b7ec2369e4b0d92ec83bba01cf2fbfb75c6453ef7cb949f856810a061cc31f5,2025-02-13T14:16:21.787000 -CVE-2025-26558,0,0,efb5f704c336f3bcfd0d4d5ddc23ef57815fe3581c8f780dfc299ec13d06ee4f,2025-02-13T14:16:22.130000 -CVE-2025-26561,0,0,fa5fcfc1b5af387d2ba8d298e09268fe2f60a955e0f2a3d62ec520035eeddefb,2025-02-13T14:16:22.450000 -CVE-2025-26562,0,0,37af47f6874a6ee725f87bd58d1efb60fdaceff3bf562bc1f6f0cb5fdd5a4af0,2025-02-13T14:16:22.607000 -CVE-2025-26567,0,0,ad7353cdfa1615256245880358dfd51f302bf6cfa87401a28368c4850c9a5ab3,2025-02-13T14:16:22.763000 -CVE-2025-26568,0,0,396b9e537988f1e8ccb15cd4c2387cb39dc59312282cc0daae1e64b2f4b2c915,2025-02-13T14:16:22.910000 -CVE-2025-26569,0,0,b9d6e8fd04d3efb22666efdf216ef1ba6d52f11fde384e4b05ebc0501e2efb5b,2025-02-13T14:16:23.070000 -CVE-2025-26570,0,0,6d0c7fab6c543070ec379f24d33a7fed4cbf7dbb9af7209df28b890fa0e09c89,2025-02-13T14:16:23.223000 -CVE-2025-26571,0,0,a9e05e769efc9ed5cc1337a3f80b138ce504de11ef88d35e4441956c5f36d51d,2025-02-13T14:16:23.360000 -CVE-2025-26572,0,0,920a554f5bc2f7d587796ed0f8965fb97e1d50be8ae5583dafe7d4258ecfd010,2025-02-13T14:16:23.507000 -CVE-2025-26574,0,0,04b267df093c1e4aa7dbd35454f1702610f59fd7182a705455dea6367852d58b,2025-02-13T14:16:23.653000 -CVE-2025-26577,0,0,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbfae1,2025-02-13T14:16:23.797000 -CVE-2025-26578,0,0,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000 -CVE-2025-26580,0,0,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000 -CVE-2025-26582,0,0,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000 -CVE-2025-26788,0,1,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 +CVE-2025-26538,0,1,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 +CVE-2025-26539,0,1,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 +CVE-2025-26543,0,1,743dad0dd88a57034eaa8771218764f86d7996bf14c551af568bc6282593511d,2025-02-13T15:15:21.080000 +CVE-2025-26545,0,1,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000 +CVE-2025-26547,0,1,e08dcb76a1a156827a53523cfc389ec01817f240b8063496d38b458c276a6d4a,2025-02-13T14:16:20.347000 +CVE-2025-26549,0,1,a91c3170bbcc373aaf39cde5374b44949bf89c60e7eb9052278e26cc0b4c7b8c,2025-02-13T14:16:20.663000 +CVE-2025-26550,0,1,11ffa180d12636b1f76387bc0c94d3286af647f36111bf953b554aa472cf9302,2025-02-13T14:16:20.993000 +CVE-2025-26551,0,1,7dba4004c8c5ac4b8233012e2b2938b33f182bd977f21f4fcded6f08beb26471,2025-02-13T14:16:21.450000 +CVE-2025-26552,0,1,16d07aca1b11958070d4074738ec0200053b71a2d60f0b27a550d9209c196d6d,2025-02-13T14:16:21.787000 +CVE-2025-26558,0,1,a062ee3114c1fd8a9a3b12a23d155f52de34c21e7fb6b719fabc3bfc4229ad95,2025-02-13T14:16:22.130000 +CVE-2025-26561,0,1,9db6fc955870504ffcf58626e676807e01c595a1a1593cd3c1cecbb59b4da31a,2025-02-13T14:16:22.450000 +CVE-2025-26562,0,1,78c3ae54a6c695c17d29fde5c9737279cebca6b65324878f65a4af2921bdd7d5,2025-02-13T14:16:22.607000 +CVE-2025-26567,0,1,9c52f3fc1e49f60743513ba1ed12dcbfda98a9640ff0dad0a481c93829413d86,2025-02-13T14:16:22.763000 +CVE-2025-26568,0,1,6a192b29369c6b3335433454f2c2e808bd01940f79d2fba0874a491ae58acee8,2025-02-13T14:16:22.910000 +CVE-2025-26569,0,1,9a179d6db4962531369c0769d72d435114b34b89fbe8cbd8217294dfd6d060d0,2025-02-13T14:16:23.070000 +CVE-2025-26570,0,1,133b85e85f99f07d5ae5ecac4283b448b37499dc43ecdd79dc648a2455c0535b,2025-02-13T14:16:23.223000 +CVE-2025-26571,0,1,b105d2cdbd20e2d2ded790a7a4b9a9a9137ec6330f85d27581834a218d316787,2025-02-13T14:16:23.360000 +CVE-2025-26572,0,1,9140f77702f57a3238ad2beba036e4bc493e3ef2ab92220731d09a747095ca2b,2025-02-13T14:16:23.507000 +CVE-2025-26574,0,1,aee7747cfbd0c681f024ac4ed76ba08f83fb65ed9950f90b478784b8baf8c654,2025-02-13T14:16:23.653000 +CVE-2025-26577,0,1,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f9a6,2025-02-13T14:16:23.797000 +CVE-2025-26578,0,1,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 +CVE-2025-26580,0,1,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 +CVE-2025-26582,0,1,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 +CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000 CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000 -CVE-2025-26793,1,1,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6bf7f,2025-02-15T15:15:23.587000 +CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6bf7f,2025-02-15T15:15:23.587000 CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000