diff --git a/CVE-2019/CVE-2019-158xx/CVE-2019-15870.json b/CVE-2019/CVE-2019-158xx/CVE-2019-15870.json index 9b1824398b3..164ead6e1bb 100644 --- a/CVE-2019/CVE-2019-158xx/CVE-2019-15870.json +++ b/CVE-2019/CVE-2019-158xx/CVE-2019-15870.json @@ -2,7 +2,7 @@ "id": "CVE-2019-15870", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-03T12:15:11.467", - "lastModified": "2024-11-21T04:29:38.710", + "lastModified": "2025-03-20T13:25:43.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:carspot_project:carspot:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:scriptsbundle:carspot:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.1.7", - "matchCriteriaId": "8DDCC65B-9B88-4FE7-959C-98A3AD0CDA03" + "matchCriteriaId": "E9D6FAB6-A527-4D1A-B3E7-6A88E278ED6E" } ] } diff --git a/CVE-2019/CVE-2019-162xx/CVE-2019-16261.json b/CVE-2019/CVE-2019-162xx/CVE-2019-16261.json index 4f9127742f5..ee3e4afecb4 100644 --- a/CVE-2019/CVE-2019-162xx/CVE-2019-16261.json +++ b/CVE-2019/CVE-2019-162xx/CVE-2019-16261.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16261", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-12T15:15:11.157", - "lastModified": "2024-11-21T04:30:24.660", + "lastModified": "2025-03-20T14:15:12.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,6 +114,10 @@ "Third Party Advisory" ] }, + { + "url": "http://seclists.org/fulldisclosure/2025/Mar/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://blog.korelogic.com/blog/2019/08/19/unpatched_fringe_infrastructure_bits", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2020/CVE-2020-211xx/CVE-2020-21119.json b/CVE-2020/CVE-2020-211xx/CVE-2020-21119.json index 56781449ee8..f3ef5c55287 100644 --- a/CVE-2020/CVE-2020-211xx/CVE-2020-21119.json +++ b/CVE-2020/CVE-2020-211xx/CVE-2020-21119.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21119", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:10.927", - "lastModified": "2024-11-21T05:12:25.910", + "lastModified": "2025-03-20T14:15:13.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-211xx/CVE-2020-21120.json b/CVE-2020/CVE-2020-211xx/CVE-2020-21120.json index d02a16fb088..67e5016f717 100644 --- a/CVE-2020/CVE-2020-211xx/CVE-2020-21120.json +++ b/CVE-2020/CVE-2020-211xx/CVE-2020-21120.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21120", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:10.983", - "lastModified": "2024-11-21T05:12:26.050", + "lastModified": "2025-03-20T14:15:13.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33304.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33304.json index 8f521ef78a0..d89e44af3db 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33304.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33304.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33304", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.063", - "lastModified": "2024-11-21T06:08:40.107", + "lastModified": "2025-03-20T14:15:13.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33396.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33396.json index 60c498db8de..b5f6c123a5c 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33396.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33396.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33396", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.123", - "lastModified": "2024-11-21T06:08:47.997", + "lastModified": "2025-03-20T14:15:14.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33925.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33925.json index 1912264caf7..cd3c12257e9 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33925.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33925.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33925", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.180", - "lastModified": "2024-11-21T06:09:46.610", + "lastModified": "2025-03-20T14:15:14.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-341xx/CVE-2021-34117.json b/CVE-2021/CVE-2021-341xx/CVE-2021-34117.json index c4e4ea2a0e0..77c11d2851c 100644 --- a/CVE-2021/CVE-2021-341xx/CVE-2021-34117.json +++ b/CVE-2021/CVE-2021-341xx/CVE-2021-34117.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34117", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.250", - "lastModified": "2024-11-21T06:09:55.043", + "lastModified": "2025-03-20T14:15:14.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-382xx/CVE-2021-38239.json b/CVE-2021/CVE-2021-382xx/CVE-2021-38239.json index 1b1ba5487a7..c0e72b7c739 100644 --- a/CVE-2021/CVE-2021-382xx/CVE-2021-38239.json +++ b/CVE-2021/CVE-2021-382xx/CVE-2021-38239.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38239", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.310", - "lastModified": "2024-11-21T06:16:40.743", + "lastModified": "2025-03-20T14:15:14.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47208.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47208.json index 13e46ec3014..8e498092f72 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47208.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47208.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47208", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T00:15:07.920", - "lastModified": "2024-11-21T06:35:37.923", + "lastModified": "2025-03-20T14:15:14.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c", diff --git a/CVE-2022/CVE-2022-324xx/CVE-2022-32473.json b/CVE-2022/CVE-2022-324xx/CVE-2022-32473.json index 525e7ab8f7b..63c255d1af4 100644 --- a/CVE-2022/CVE-2022-324xx/CVE-2022-32473.json +++ b/CVE-2022/CVE-2022-324xx/CVE-2022-32473.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32473", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T03:15:10.097", - "lastModified": "2024-11-21T07:06:24.023", + "lastModified": "2025-03-20T14:15:15.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-324xx/CVE-2022-32474.json b/CVE-2022/CVE-2022-324xx/CVE-2022-32474.json index c273d72e67d..c5b0c17dd90 100644 --- a/CVE-2022/CVE-2022-324xx/CVE-2022-32474.json +++ b/CVE-2022/CVE-2022-324xx/CVE-2022-32474.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32474", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T02:15:09.737", - "lastModified": "2024-11-21T07:06:24.160", + "lastModified": "2025-03-20T14:15:15.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-324xx/CVE-2022-32476.json b/CVE-2022/CVE-2022-324xx/CVE-2022-32476.json index b149e138281..134d28958ac 100644 --- a/CVE-2022/CVE-2022-324xx/CVE-2022-32476.json +++ b/CVE-2022/CVE-2022-324xx/CVE-2022-32476.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32476", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T03:15:10.177", - "lastModified": "2024-11-21T07:06:24.440", + "lastModified": "2025-03-20T14:15:15.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32954.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32954.json index 47d3348549f..7e6bc588de6 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32954.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32954.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32954", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T02:15:09.883", - "lastModified": "2024-11-21T07:07:18.293", + "lastModified": "2025-03-20T14:15:15.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json index 280402a8f36..1f5b01a701f 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22689", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.097", - "lastModified": "2024-11-21T07:45:13.570", + "lastModified": "2025-03-20T13:40:53.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "6.3", - "matchCriteriaId": "093D2021-C336-443D-A9FE-2DF41D948C93" + "matchCriteriaId": "D515857D-FD43-4EE0-A6FE-2A42C99ED21B" } ] } diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25973.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25973.json index dbec56e55dd..11bccf86650 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25973.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25973.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25973", "sourceIdentifier": "audit@patchstack.com", "published": "2023-03-13T15:15:12.447", - "lastModified": "2024-11-21T07:50:32.697", + "lastModified": "2025-03-20T13:40:53.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "6.3.0.3", - "matchCriteriaId": "BFB369CE-2855-4841-89F5-8CB709D3B36F" + "matchCriteriaId": "74C5735F-9B57-4476-B04B-A18673AF2D7D" } ] } diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json index 3ee03064819..cfb2e05b825 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37033", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.580", - "lastModified": "2025-02-18T21:15:18.477", + "lastModified": "2025-03-20T14:15:15.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47652.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47652.json index af2fb7777b4..4c15b4c0215 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47652.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47652.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47652", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-13T04:15:08.497", - "lastModified": "2024-11-21T08:30:36.437", + "lastModified": "2025-03-20T13:40:53.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "6.4.2.5", - "matchCriteriaId": "962D4F05-9E3F-4836-B8F7-CC8BC9654900" + "matchCriteriaId": "3979DDD3-A9ED-418D-B786-41CB0A5EAA8A" } ] } diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json index ea6bc6b7b07..99099b016d4 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48986", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T09:15:36.130", - "lastModified": "2024-11-21T08:32:40.900", + "lastModified": "2025-03-20T14:15:16.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52340.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52340.json index f395b931167..138a0d64667 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52340.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52340.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52340", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T02:15:09.747", - "lastModified": "2024-11-21T08:39:35.620", + "lastModified": "2025-03-20T14:15:16.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0762.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0762.json index 1407a1923b6..3b362904896 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0762.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0762.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0762", "sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "published": "2024-05-14T16:15:53.287", - "lastModified": "2025-02-13T18:16:15.227", + "lastModified": "2025-03-20T14:15:16.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/", diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json index 3148fe7b230..005d2a431e4 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10650.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10650", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:18.150", - "lastModified": "2025-03-20T10:15:18.150", + "lastModified": "2025-03-20T13:15:35.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json index f310159967a..ee66f5d8187 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10721.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10721", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:19.020", - "lastModified": "2025-03-20T10:15:19.020", + "lastModified": "2025-03-20T14:15:16.777", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/a440a003-84c9-47b5-bfbd-675564abe3d8", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/a440a003-84c9-47b5-bfbd-675564abe3d8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json index d1dddfccc1a..5fa7b2b3268 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10948.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10948", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:21.977", - "lastModified": "2025-03-20T10:15:21.977", + "lastModified": "2025-03-20T14:15:16.890", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/290a379d-8441-4292-a553-3587e8c5c729", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/290a379d-8441-4292-a553-3587e8c5c729", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json index 350f9958053..85df48cd25d 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11030.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11030", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:22.707", - "lastModified": "2025-03-20T10:15:22.707", + "lastModified": "2025-03-20T14:15:17.473", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json index fc6f568d9bc..a032b51caff 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11043", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:23.647", - "lastModified": "2025-03-20T10:15:23.647", + "lastModified": "2025-03-20T14:15:17.980", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/9270900a-b8b7-402f-aee5-432d891e5648", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/9270900a-b8b7-402f-aee5-432d891e5648", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json index e061ff66b7c..9e5150b5935 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11822.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11822", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:25.677", - "lastModified": "2025-03-20T10:15:25.677", + "lastModified": "2025-03-20T14:15:18.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12048.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12048.json index cf76260c80b..8c7eac9984d 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12048.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12048.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12048", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:26.503", - "lastModified": "2025-03-20T10:15:26.503", + "lastModified": "2025-03-20T13:15:35.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/6def3e3a-c443-44bb-b20e-3e69b48f37dc", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/6def3e3a-c443-44bb-b20e-3e69b48f37dc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12070.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12070.json index de82dfefb04..12d137716d5 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12070.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12070", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:27.110", - "lastModified": "2025-03-20T10:15:27.110", + "lastModified": "2025-03-20T14:15:18.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8adac028-21c5-41ba-b785-b03066c0b2a6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12387.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12387.json index 468c2cc7a16..f6a2c856f9f 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12387.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12387", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:28.010", - "lastModified": "2025-03-20T10:15:28.010", + "lastModified": "2025-03-20T13:15:35.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/02b4ab21-d29b-4cd7-ad80-f83081ce82a4", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/02b4ab21-d29b-4cd7-ad80-f83081ce82a4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12720.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12720.json index 257ca8ebd66..51e5719e50c 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12720.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12720.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12720", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:29.507", - "lastModified": "2025-03-20T10:15:29.507", + "lastModified": "2025-03-20T14:15:18.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json index 9bc971bcdf8..b3c7eb53ad8 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12766", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:30.000", - "lastModified": "2025-03-20T10:15:30.000", + "lastModified": "2025-03-20T14:15:18.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12777.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12777.json index dea5ec68bf4..1b7bd46b842 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12777.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12777.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12777", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:30.360", - "lastModified": "2025-03-20T10:15:30.360", + "lastModified": "2025-03-20T14:15:18.477", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/cdf8db79-c290-4fe5-9383-4c518bfba4a8", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/cdf8db79-c290-4fe5-9383-4c518bfba4a8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12779.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12779.json index 276ad8299df..92dbbd30f33 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12779.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12779", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:30.600", - "lastModified": "2025-03-20T10:15:30.600", + "lastModified": "2025-03-20T13:15:35.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/3cc748ba-2afb-4bfe-8553-10eb6d6dd4f0", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/3cc748ba-2afb-4bfe-8553-10eb6d6dd4f0", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12871.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12871.json index 3d4ce434cfc..6b828173e69 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12871.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12871.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12871", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:31.340", - "lastModified": "2025-03-20T10:15:31.340", + "lastModified": "2025-03-20T14:15:18.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12910.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12910.json index ea36fe29d1a..944b78812ea 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12910.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12910.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12910", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:31.960", - "lastModified": "2025-03-20T10:15:31.960", + "lastModified": "2025-03-20T14:15:18.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/27883f22-35ff-49df-aaa5-05031c7d6ad8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json index d394fbc45ff..835d900d389 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21028", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:18.350", - "lastModified": "2024-11-21T08:53:38.853", + "lastModified": "2025-03-20T14:15:19.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json index ed3e6c2f952..82a828ffeb2 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24421", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.147", - "lastModified": "2025-02-18T21:15:20.973", + "lastModified": "2025-03-20T14:15:19.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una confusi\u00f3n de tipos en la funci\u00f3n nas_message_decode de Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json index 5e3a1aaf987..2a6d6252ee8 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27362.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27362", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:09.573", - "lastModified": "2024-11-21T09:04:26.353", + "lastModified": "2025-03-20T14:15:19.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3637.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3637.json index 0e6feac1eb6..fe12160960f 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3637.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3637.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3637", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-03T06:15:14.367", - "lastModified": "2024-11-21T09:30:03.153", + "lastModified": "2025-03-20T14:15:19.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Responsive Contact Form Builder & Lead Generation Plugin WordPress hasta la versi\u00f3n 1.8.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json index e8db04b3486..d7e9c7dc8f0 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37392", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T21:15:07.253", - "lastModified": "2025-01-09T18:15:27.790", + "lastModified": "2025-03-20T14:15:19.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40843.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40843.json index aabe574e1a7..4e53c4cc23b 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40843.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40843", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:49.060", - "lastModified": "2024-09-24T15:02:53.987", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T14:15:19.813", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json index aea49e5f0a4..8807e403ee9 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41481", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:30.733", - "lastModified": "2024-08-13T14:51:33.017", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T14:15:19.977", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json index 06513f4a2ae..1e22f9d0b6e 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42639", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T18:15:10.067", - "lastModified": "2024-08-19T18:35:13.310", + "lastModified": "2025-03-20T14:15:20.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/H3C-GR1100-PV100R009-was-discovered-to-contain-a-hardcoded-824141daa44f4c52a914860c6e4a7684", diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json index 4836b4ed85b..24d2a16c17a 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42936", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T20:15:30.963", - "lastModified": "2025-02-18T21:15:21.830", + "lastModified": "2025-03-20T14:15:20.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El componente de servicio mqlink.elf en Ruijie RG-EW300N con firmware ReyeeOS 1.300.1422 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un mensaje de agente MQTT modificado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/smrx86/2008111b12ab47882b3928d0cbc9e415", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44139.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44139.json index 4a205580c22..142f535ab44 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44139.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44139.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44139", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:50.443", - "lastModified": "2024-09-24T18:30:34.863", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T14:15:20.510", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json index 97f362226e1..30328bf9a21 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46922", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.230", - "lastModified": "2025-02-18T18:15:23.653", + "lastModified": "2025-03-20T14:15:20.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La ausencia de una verificaci\u00f3n nula conduce a una denegaci\u00f3n de servicio en amdgpu_cs_parser_bos en Xclipse Driver." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48590.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48590.json new file mode 100644 index 00000000000..24daa321e16 --- /dev/null +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48590.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48590", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T14:15:20.830", + "lastModified": "2025-03-20T14:15:20.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inflectra SpiraTeam 7.2.00 is vulnerable to Server-Side Request Forgery (SSRF) via the NewsReaderService. This allows an attacker to escalate privileges and obtain sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GCatt-AS/CVE-2024-48590/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4990.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4990.json index a6251ddfdaa..27bbbae69d9 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4990.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4990", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:32.603", - "lastModified": "2025-03-20T10:15:32.603", + "lastModified": "2025-03-20T14:15:20.940", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/4fbdd965-02b6-42e4-b57b-f98f93415b8f", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/4fbdd965-02b6-42e4-b57b-f98f93415b8f", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json index 49dbf7ae195..55b4bdf4204 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50954", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:16.517", - "lastModified": "2025-02-18T22:15:12.327", + "lastModified": "2025-03-20T14:15:21.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en la gesti\u00f3n de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], "references": [ { "url": "https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XL5E-16T%20XD5E-24R%20Modbus/XINJE%20XL5E-16T%20XD5E-24R%20Modbus.md", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json index c89706a3cac..34af0e89304 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57483", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:09.060", - "lastModified": "2025-02-18T22:15:15.143", + "lastModified": "2025-03-20T14:15:21.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Tenda i24 V2.0.0.5 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n addWifiMacFilter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57660.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57660.json index 77777ce1f2a..7a16aefdf36 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57660.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57660.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57660", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.860", - "lastModified": "2025-02-18T22:15:15.830", + "lastModified": "2025-03-20T14:15:21.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema en el componente sqlo_expand_jts de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1221", diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7053.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7053.json index 3409edffa7f..be65d8781f8 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7053.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7053.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7053", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:36.217", - "lastModified": "2025-03-20T10:15:36.217", + "lastModified": "2025-03-20T14:15:21.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7767.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7767.json index 47a37faa6c6..b6c61f1b0ad 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7767.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7767.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7767", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:37.007", - "lastModified": "2025-03-20T10:15:37.007", + "lastModified": "2025-03-20T14:15:21.697", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/1425dada-72d8-4bd9-a3e7-2863bb3e1a6c", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/1425dada-72d8-4bd9-a3e7-2863bb3e1a6c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7773.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7773.json index 3deaa747b71..d2cb75ecfc3 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7773.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7773", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:37.393", - "lastModified": "2025-03-20T10:15:37.393", + "lastModified": "2025-03-20T14:15:21.793", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/aeb82e05-484f-4431-9ede-25a3478d8dbb", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/aeb82e05-484f-4431-9ede-25a3478d8dbb", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json index dbb9b6b1e1a..c91f87a90e3 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8021", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:39.260", - "lastModified": "2025-03-20T10:15:39.260", + "lastModified": "2025-03-20T14:15:21.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json index c4811bdfa23..589c4ddc9de 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8053", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:39.993", - "lastModified": "2025-03-20T10:15:39.993", + "lastModified": "2025-03-20T14:15:21.977", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8101.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8101.json index 2b578bbeddb..448de2cd3d4 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8101.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8101.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8101", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:41.130", - "lastModified": "2025-03-20T10:15:41.130", + "lastModified": "2025-03-20T13:15:36.007", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/60cf2b93-a9a2-435e-a222-3d6abde26adb", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8156.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8156.json index 24e38418529..4d37cf0bc7a 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8156.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8156.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8156", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:41.247", - "lastModified": "2025-03-20T10:15:41.247", + "lastModified": "2025-03-20T14:15:22.073", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8487.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8487.json index 0fdb712e0e0..41350d3aca9 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8487.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8487.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8487", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:42.360", - "lastModified": "2025-03-20T10:15:42.360", + "lastModified": "2025-03-20T13:15:36.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Origin Resource Sharing (CORS) vulnerability exists in modelscope/agentscope version v0.0.4. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make requests to the API. This can lead to unauthorized data access, information disclosure, and potential further exploitation, thereby compromising the integrity and confidentiality of the system." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Origin Resource Sharing (CORS) en modelscope/agentscope versi\u00f3n v0.0.4. La configuraci\u00f3n de CORS en el servidor de agentscope no restringe correctamente el acceso \u00fanicamente a or\u00edgenes de confianza, lo que permite que cualquier dominio externo realice solicitudes a la API. Esto puede provocar acceso no autorizado a datos, divulgaci\u00f3n de informaci\u00f3n y una posible explotaci\u00f3n posterior, comprometiendo as\u00ed la integridad y confidencialidad del sistema." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/7aca7507-a94e-4e63-83a2-15648e5c4067", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/7aca7507-a94e-4e63-83a2-15648e5c4067", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8556.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8556.json index d93f445ae35..9ac2cfb2a5f 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8556.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8556", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:43.230", - "lastModified": "2025-03-20T10:15:43.230", + "lastModified": "2025-03-20T13:15:36.213", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run ID) is appended and rendered as HTML. This allows an attacker to execute arbitrary JavaScript code in the context of the user's browser." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en modelscope/agentscope, a partir del \u00faltimo commit 21161fe en la rama principal. La vulnerabilidad se produce en la vista para inspeccionar informaci\u00f3n detallada de la ejecuci\u00f3n, donde se a\u00f1ade una cadena controlable por el usuario (ID de ejecuci\u00f3n) y se representa como HTML. Esto permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el contexto del navegador del usuario." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/8439f16b-5256-4466-bb7d-371572572a4b", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8439f16b-5256-4466-bb7d-371572572a4b", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8769.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8769.json index 2f1642fe05d..1baed7ebf6d 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8769.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8769.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8769", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:44.220", - "lastModified": "2025-03-20T10:15:44.220", + "lastModified": "2025-03-20T13:15:36.303", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n `LockManager.release_locks` de aimhubio/aim (commit bb76afe) permite la eliminaci\u00f3n arbitraria de archivos mediante un path traversal relativo. El par\u00e1metro `run_hash`, controlable por el usuario, se concatena sin normalizaci\u00f3n como parte de una ruta utilizada para especificar la eliminaci\u00f3n de archivos. Esta vulnerabilidad se expone mediante el m\u00e9todo `Repo._close_run()`, accesible mediante la API de instrucciones del servidor de seguimiento. Por lo tanto, un atacante puede explotarla para eliminar cualquier archivo arbitrario en la m\u00e1quina que ejecuta el servidor de seguimiento." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8958.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8958.json index 4bad27fb112..7acc8e341ec 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8958.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8958.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8958", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:45.220", - "lastModified": "2025-03-20T10:15:45.220", + "lastModified": "2025-03-20T14:15:22.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In composiohq/composio version 0.4.3, there is an unrestricted file write and read vulnerability in the filetools actions. Due to improper validation of file paths, an attacker can read and write files anywhere on the server, potentially leading to privilege escalation or remote code execution." + }, + { + "lang": "es", + "value": "En composiohq/composio versi\u00f3n 0.4.3, existe una vulnerabilidad de escritura y lectura de archivos sin restricciones en las acciones de filetools. Debido a la validaci\u00f3n incorrecta de las rutas de archivo, un atacante puede leer y escribir archivos en cualquier parte del servidor, lo que podr\u00eda provocar una escalada de privilegios o la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/e152b094-0593-428e-b813-068d2390ce68", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/e152b094-0593-428e-b813-068d2390ce68", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9612.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9612.json index 9071cb89e9b..49d90103646 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9612.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9612.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9612", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:49.560", - "lastModified": "2025-03-20T10:15:49.560", + "lastModified": "2025-03-20T14:15:22.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In danswer-ai/danswer v0.3.94, administrators can set the visibility of pages within a workspace, including the search page. When the search page is set to be invisible, regular users cannot view the search page or access its functionalities from the front-end interface. However, the back-end does not verify the visibility status of the search page. Consequently, attackers can directly call the API to access the functionalities provided by the search page, bypassing the visibility restriction set by the administrator." + }, + { + "lang": "es", + "value": "En danswer-ai/danswer v0.3.94, los administradores pueden configurar la visibilidad de las p\u00e1ginas dentro de un espacio de trabajo, incluida la p\u00e1gina de b\u00fasqueda. Cuando la p\u00e1gina de b\u00fasqueda est\u00e1 configurada como invisible, los usuarios no pueden verla ni acceder a sus funciones desde la interfaz del frontend. Sin embargo, el backend no verifica el estado de visibilidad de la p\u00e1gina de b\u00fasqueda. Por lo tanto, los atacantes pueden llamar directamente a la API para acceder a las funciones de la p\u00e1gina de b\u00fasqueda, eludiendo la restricci\u00f3n de visibilidad establecida por el administrador." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9900.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9900.json index d0be3a26973..40c3fdf4e1b 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9900.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9900.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9900", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:50.417", - "lastModified": "2025-03-20T10:15:50.417", + "lastModified": "2025-03-20T14:15:22.403", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mudler/localai version v2.21.1 contains a Cross-Site Scripting (XSS) vulnerability in its search functionality. The vulnerability arises due to improper sanitization of user input, allowing the injection and execution of arbitrary JavaScript code. This can lead to the execution of malicious scripts in the context of the victim's browser, potentially compromising user sessions, stealing session cookies, redirecting users to malicious websites, or manipulating the DOM." + }, + { + "lang": "es", + "value": "La versi\u00f3n 2.21.1 de mudler/localai contiene una vulnerabilidad de Cross-Site Scripting (XSS) en su funci\u00f3n de b\u00fasqueda. Esta vulnerabilidad surge debido a una depuraci\u00f3n inadecuada de la entrada del usuario, lo que permite la inyecci\u00f3n y ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario. Esto puede provocar la ejecuci\u00f3n de scripts maliciosos en el navegador de la v\u00edctima, lo que podr\u00eda comprometer las sesiones del usuario, robar cookies de sesi\u00f3n, redirigir a los usuarios a sitios web maliciosos o manipular el DOM." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0254.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0254.json new file mode 100644 index 00000000000..1e318929ea7 --- /dev/null +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0254.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-0254", + "sourceIdentifier": "psirt@hcl.com", + "published": "2025-03-20T14:15:22.493", + "lastModified": "2025-03-20T14:15:22.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL Digital Experience components Ring API and dxclient may be vulnerable to man-in-the-middle (MitM) attacks prior to 9.5 CF226. An attacker could intercept and potentially alter communication between two parties." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120000", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json index efdedd58190..790f9d22e3c 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0438", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.930", - "lastModified": "2025-02-18T22:15:16.743", + "lastModified": "2025-03-20T14:15:22.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El desbordamiento del b\u00fafer de pila en el rastreo de Google Chrome anterior a la versi\u00f3n 132.0.6834.83 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n de la pila a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-121" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json index a6f09f82ec3..3d82b5eaf9f 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1066.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1066", "sourceIdentifier": "cret@cert.org", "published": "2025-02-06T00:15:27.760", - "lastModified": "2025-02-18T19:15:24.243", + "lastModified": "2025-03-20T14:15:22.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "OpenPlc_V3 contiene una vulnerabilidad de carga arbitraria de archivo, que podr\u00eda aprovecharse para las campa\u00f1as de malvertimiento o phishing." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/thiagoralves/OpenPLC_v3/commit/d1b1a3b7e97f2b3fef0876056cf9d7879991744a", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1496.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1496.json new file mode 100644 index 00000000000..b8f9c5fb8a5 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1496.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1496", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-20T14:15:22.920", + "lastModified": "2025-03-20T14:15:22.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of Excessive Authentication Attempts vulnerability in BG-TEK Coslat Hotspot allows Password Brute Forcing, Authentication Abuse.This issue affects Coslat Hotspot: before 6.26.0.R.20250227." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://www.coslat.com/tr/blog/28-02-2025-guncelleme", + "source": "iletisim@usom.gov.tr" + }, + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0075", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1508.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1508.json index ee40fc9396b..cc42081c8d1 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1508.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1508.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1508", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-12T04:15:16.520", - "lastModified": "2025-03-12T04:15:16.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-20T13:57:41.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.13", + "matchCriteriaId": "C04CAA7D-BAD6-4A60-8AFD-601C6B40D092" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/wp-crowdfunding/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70a93afa-9801-41d2-8923-ca4ae6ae974f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json index e8612f371d9..20dd65be62e 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22904.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22904", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.313", - "lastModified": "2025-02-18T21:15:26.993", + "lastModified": "2025-03-20T14:15:23.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptpUserName en la funci\u00f3n setWAN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://re11s.com", diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json index 7fd1401ec56..116e7cac863 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22912", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.723", - "lastModified": "2025-02-18T21:15:27.630", + "lastModified": "2025-03-20T14:15:23.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que RE11S v1.11 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del componente /goform/formAccept." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://re11s.com", diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json index 22c205551cb..3266e7ddfef 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22913", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.850", - "lastModified": "2025-02-18T21:15:27.790", + "lastModified": "2025-03-20T14:15:23.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro rootAPmac en la funci\u00f3n formStaDrvSetup." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/xyqer1/RE11S_1.11-formStaDrvSetup-StackOverflow", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json index f8709f4b898..d4ce6e542ba 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23007", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-30T10:15:09.283", - "lastModified": "2025-02-18T19:15:27.263", + "lastModified": "2025-03-20T14:15:23.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,34 @@ "value": "Una vulnerabilidad en la funci\u00f3n de exportaci\u00f3n de registros del cliente Windows de NetExtender permite el acceso no autorizado a archivos confidenciales de Windows sistema, lo que podr\u00eda conducir a una escalada de privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json index 5c5f7208f5c..a35f11b794a 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24201", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-11T18:15:30.190", - "lastModified": "2025-03-14T20:35:27.923", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T14:15:23.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -155,6 +155,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Mar/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Mar/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Mar/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json index 48ca7b774bd..d1e8d829c6a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24400", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:13.943", - "lastModified": "2025-02-18T20:15:31.630", + "lastModified": "2025-03-20T14:15:23.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Jenkins Eiffel Broadcaster 2.8.0 a 2.10.2 (ambos incluidos) utiliza el ID de credencial como clave de cach\u00e9 durante las operaciones de firma, lo que permite a los atacantes crear una credencial con el mismo ID que una leg\u00edtima en un almac\u00e9n de credenciales diferente para firmar un evento publicado en RabbitMQ con las credenciales leg\u00edtimas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3485", diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25291.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25291.json index a7017397643..6d6f446bdde 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25291.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25291.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25291", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-12T21:15:42.000", - "lastModified": "2025-03-15T21:15:34.987", - "vulnStatus": "Received", + "lastModified": "2025-03-20T14:15:24.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,9 +22,9 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 8.8, - "baseSeverity": "HIGH", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -36,7 +36,7 @@ "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", - "exploitMaturity": "PROOF_OF_CONCEPT", + "exploitMaturity": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED", @@ -110,6 +110,10 @@ "url": "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv", "source": "security-advisories@github.com" }, + { + "url": "https://portswigger.net/research/saml-roulette-the-hacker-always-wins", + "source": "security-advisories@github.com" + }, { "url": "https://news.ycombinator.com/item?id=43374519", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25292.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25292.json index eafbc1945e7..d59ef05c3ad 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25292.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25292.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25292", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-12T21:15:42.177", - "lastModified": "2025-03-15T21:15:35.143", - "vulnStatus": "Received", + "lastModified": "2025-03-20T14:15:24.213", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,9 +22,9 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 8.8, - "baseSeverity": "HIGH", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -36,7 +36,7 @@ "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", - "exploitMaturity": "PROOF_OF_CONCEPT", + "exploitMaturity": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED", @@ -110,6 +110,10 @@ "url": "https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv", "source": "security-advisories@github.com" }, + { + "url": "https://portswigger.net/research/saml-roulette-the-hacker-always-wins", + "source": "security-advisories@github.com" + }, { "url": "https://news.ycombinator.com/item?id=43374519", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26318.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26318.json index c9f713003eb..54721e5f2a1 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26318.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26318.json @@ -2,13 +2,13 @@ "id": "CVE-2025-26318", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T21:15:13.897", - "lastModified": "2025-03-05T17:15:16.180", + "lastModified": "2025-03-20T14:15:24.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Insecure permissions in TSplus Remote Access v17.30 allow attackers to retrieve a list of all domain accounts currently connected to the application." + "value": "hb.exe in TSplus Remote Access before 17.30 2024-10-30 allows remote attackers to retrieve a list of all domain accounts currently connected to the application." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json new file mode 100644 index 00000000000..9435e8fd6fd --- /dev/null +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29101", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T13:15:36.467", + "lastModified": "2025-03-20T13:15:36.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC8V4.0 V16.03.34.06 was discovered to contain a stack overflow via the deviceid parameter in the get_parentControl_list_Info function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_get_parentControl_list_Info_overflow.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29410.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29410.json new file mode 100644 index 00000000000..541108715a6 --- /dev/null +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29410.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-29410", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T14:15:24.540", + "lastModified": "2025-03-20T14:15:24.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the component /contact.php of Hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the txtEmail parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/49", + "source": "cve@mitre.org" + }, + { + "url": "https://www.simonjuguna.com/cve-2025-29410-hospital-management-system-xss-vulnerability/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29412.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29412.json new file mode 100644 index 00000000000..c6507fee575 --- /dev/null +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29412.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-29412", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T14:15:24.653", + "lastModified": "2025-03-20T14:15:24.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the Client Profile Update section of Mart Developers iBanking v2.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MartMbithi/iBanking/issues/11", + "source": "cve@mitre.org" + }, + { + "url": "https://www.simonjuguna.com/cve-2025-29412-cross-site-scripting-xss-vulnerability-in-ibanking-v2-0-0/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f7e28ab9f15..95db0da6246 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-20T13:00:20.269254+00:00 +2025-03-20T15:00:20.106219+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-20T12:25:42+00:00 +2025-03-20T14:15:24.653000+00:00 ``` ### Last Data Feed Release @@ -33,36 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286077 +286083 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `6` -- [CVE-2024-13558](CVE-2024/CVE-2024-135xx/CVE-2024-13558.json) (`2025-03-20T12:15:13.193`) -- [CVE-2024-13920](CVE-2024/CVE-2024-139xx/CVE-2024-13920.json) (`2025-03-20T12:15:13.477`) -- [CVE-2024-13921](CVE-2024/CVE-2024-139xx/CVE-2024-13921.json) (`2025-03-20T12:15:13.633`) -- [CVE-2024-13922](CVE-2024/CVE-2024-139xx/CVE-2024-13922.json) (`2025-03-20T12:15:13.777`) -- [CVE-2024-13923](CVE-2024/CVE-2024-139xx/CVE-2024-13923.json) (`2025-03-20T12:15:13.933`) -- [CVE-2025-1802](CVE-2025/CVE-2025-18xx/CVE-2025-1802.json) (`2025-03-20T12:15:14.413`) -- [CVE-2025-2311](CVE-2025/CVE-2025-23xx/CVE-2025-2311.json) (`2025-03-20T12:15:14.750`) -- [CVE-2025-2539](CVE-2025/CVE-2025-25xx/CVE-2025-2539.json) (`2025-03-20T12:15:14.900`) -- [CVE-2025-27888](CVE-2025/CVE-2025-278xx/CVE-2025-27888.json) (`2025-03-20T12:15:14.563`) +- [CVE-2024-48590](CVE-2024/CVE-2024-485xx/CVE-2024-48590.json) (`2025-03-20T14:15:20.830`) +- [CVE-2025-0254](CVE-2025/CVE-2025-02xx/CVE-2025-0254.json) (`2025-03-20T14:15:22.493`) +- [CVE-2025-1496](CVE-2025/CVE-2025-14xx/CVE-2025-1496.json) (`2025-03-20T14:15:22.920`) +- [CVE-2025-29101](CVE-2025/CVE-2025-291xx/CVE-2025-29101.json) (`2025-03-20T13:15:36.467`) +- [CVE-2025-29410](CVE-2025/CVE-2025-294xx/CVE-2025-29410.json) (`2025-03-20T14:15:24.540`) +- [CVE-2025-29412](CVE-2025/CVE-2025-294xx/CVE-2025-29412.json) (`2025-03-20T14:15:24.653`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `76` -- [CVE-2024-1763](CVE-2024/CVE-2024-17xx/CVE-2024-1763.json) (`2025-03-20T11:05:42.940`) -- [CVE-2024-31296](CVE-2024/CVE-2024-312xx/CVE-2024-31296.json) (`2025-03-20T11:23:10.463`) -- [CVE-2024-34799](CVE-2024/CVE-2024-347xx/CVE-2024-34799.json) (`2025-03-20T11:11:29.417`) -- [CVE-2024-54444](CVE-2024/CVE-2024-544xx/CVE-2024-54444.json) (`2025-03-20T12:11:53.293`) -- [CVE-2024-56259](CVE-2024/CVE-2024-562xx/CVE-2024-56259.json) (`2025-03-20T11:30:46.587`) -- [CVE-2025-22806](CVE-2025/CVE-2025-228xx/CVE-2025-22806.json) (`2025-03-20T11:25:38.747`) -- [CVE-2025-26772](CVE-2025/CVE-2025-267xx/CVE-2025-26772.json) (`2025-03-20T12:20:45.623`) -- [CVE-2025-26917](CVE-2025/CVE-2025-269xx/CVE-2025-26917.json) (`2025-03-20T12:25:42.000`) +- [CVE-2024-7053](CVE-2024/CVE-2024-70xx/CVE-2024-7053.json) (`2025-03-20T14:15:21.553`) +- [CVE-2024-7767](CVE-2024/CVE-2024-77xx/CVE-2024-7767.json) (`2025-03-20T14:15:21.697`) +- [CVE-2024-7773](CVE-2024/CVE-2024-77xx/CVE-2024-7773.json) (`2025-03-20T14:15:21.793`) +- [CVE-2024-8021](CVE-2024/CVE-2024-80xx/CVE-2024-8021.json) (`2025-03-20T14:15:21.883`) +- [CVE-2024-8053](CVE-2024/CVE-2024-80xx/CVE-2024-8053.json) (`2025-03-20T14:15:21.977`) +- [CVE-2024-8101](CVE-2024/CVE-2024-81xx/CVE-2024-8101.json) (`2025-03-20T13:15:36.007`) +- [CVE-2024-8156](CVE-2024/CVE-2024-81xx/CVE-2024-8156.json) (`2025-03-20T14:15:22.073`) +- [CVE-2024-8487](CVE-2024/CVE-2024-84xx/CVE-2024-8487.json) (`2025-03-20T13:15:36.117`) +- [CVE-2024-8556](CVE-2024/CVE-2024-85xx/CVE-2024-8556.json) (`2025-03-20T13:15:36.213`) +- [CVE-2024-8769](CVE-2024/CVE-2024-87xx/CVE-2024-8769.json) (`2025-03-20T13:15:36.303`) +- [CVE-2024-8958](CVE-2024/CVE-2024-89xx/CVE-2024-8958.json) (`2025-03-20T14:15:22.220`) +- [CVE-2024-9612](CVE-2024/CVE-2024-96xx/CVE-2024-9612.json) (`2025-03-20T14:15:22.310`) +- [CVE-2024-9900](CVE-2024/CVE-2024-99xx/CVE-2024-9900.json) (`2025-03-20T14:15:22.403`) +- [CVE-2025-0438](CVE-2025/CVE-2025-04xx/CVE-2025-0438.json) (`2025-03-20T14:15:22.613`) +- [CVE-2025-1066](CVE-2025/CVE-2025-10xx/CVE-2025-1066.json) (`2025-03-20T14:15:22.783`) +- [CVE-2025-1508](CVE-2025/CVE-2025-15xx/CVE-2025-1508.json) (`2025-03-20T13:57:41.123`) +- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-03-20T14:15:23.117`) +- [CVE-2025-22912](CVE-2025/CVE-2025-229xx/CVE-2025-22912.json) (`2025-03-20T14:15:23.270`) +- [CVE-2025-22913](CVE-2025/CVE-2025-229xx/CVE-2025-22913.json) (`2025-03-20T14:15:23.423`) +- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-03-20T14:15:23.570`) +- [CVE-2025-24201](CVE-2025/CVE-2025-242xx/CVE-2025-24201.json) (`2025-03-20T14:15:23.733`) +- [CVE-2025-24400](CVE-2025/CVE-2025-244xx/CVE-2025-24400.json) (`2025-03-20T14:15:23.903`) +- [CVE-2025-25291](CVE-2025/CVE-2025-252xx/CVE-2025-25291.json) (`2025-03-20T14:15:24.050`) +- [CVE-2025-25292](CVE-2025/CVE-2025-252xx/CVE-2025-25292.json) (`2025-03-20T14:15:24.213`) +- [CVE-2025-26318](CVE-2025/CVE-2025-263xx/CVE-2025-26318.json) (`2025-03-20T14:15:24.353`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7e48bca9352..d2b2a17e90b 100644 --- a/_state.csv +++ b/_state.csv @@ -133872,7 +133872,7 @@ CVE-2019-15867,0,0,e2f893b6c12bb5c6f52df86e8c5d3e121a9761bae0c1a9e40415749f409b7 CVE-2019-15868,0,0,b4985bacf8258d5959dfe891c4078646851866fa53afe4859091247ebb3a5790,2024-11-21T04:29:38.430000 CVE-2019-15869,0,0,cb6c15040cd062f924782cbc26185f69b4a71b5bb10dce6b6076f4aac89cc278,2024-11-21T04:29:38.573000 CVE-2019-1587,0,0,0bbebc5cc86721970e8ed7983514880cd235caf37346d19e7941d110eaf0e0fa,2024-11-21T04:36:51.910000 -CVE-2019-15870,0,0,bd16a4d7d36913a24ffd14155f27f21e22879218444bdc8f84ac5105df3115ea,2024-11-21T04:29:38.710000 +CVE-2019-15870,0,1,27068818a7b8faae345aad41847941368f183508d413e9518f5de6b3223284c1,2025-03-20T13:25:43.420000 CVE-2019-15871,0,0,aa321dd91356707b1798ed1ba23d2660b1b764556be5079d38329ec76305fcb5,2024-11-21T04:29:38.847000 CVE-2019-15872,0,0,4b7aa7edad56fbec07628d36cce9e8923723f8502aeac2bbd99d6666039f9ded,2024-11-21T04:29:38.993000 CVE-2019-15873,0,0,4b0dae3a5cba7ead9b21d96207d918d8fea72c04628a1b1a5c6dd28cb6945a86,2024-11-21T04:29:39.140000 @@ -134228,7 +134228,7 @@ CVE-2019-16256,0,0,ebb97b4d7f8f0a3a34d08ece6515e76af72bbbf2a88dcdecc15ab725b2f7e CVE-2019-16257,0,0,658bbaed8ae9eef0b5653cb8c146b31cbd2a01045dc148866667df9b5c205bb7,2024-11-21T04:30:24.363000 CVE-2019-16258,0,0,ee2ee9e98fd1c470f1fce700131597f6e66006f164cd3aad4f32444cfb7d0e6e,2024-11-21T04:30:24.503000 CVE-2019-1626,0,0,fcd01ff021271eae6b11a40589c2f3a36ac97bd718574e8ce82e0d17b4881ba5,2024-11-21T04:36:57.660000 -CVE-2019-16261,0,0,67223b4da1143d22817d5c9751786d17010b70104805070177cb3b12237e89f7,2024-11-21T04:30:24.660000 +CVE-2019-16261,0,1,56f9734c27ed81d33d47abfdb77bff245c1fb710cb973ffab351d26b74b7cbf2,2025-03-20T14:15:12.780000 CVE-2019-16263,0,0,381c5aca433aa69b0cd64a4ff45a92479afd0edf4abeeee7602e0f0a60d52bf2,2024-11-21T04:30:24.800000 CVE-2019-16264,0,0,3dc97ec4d5f7b0bef578332d3d345d478c789a8507daebe5c05ec09aa9630615,2024-11-21T04:30:24.947000 CVE-2019-16265,0,0,e4a079d0ebf8137888491d559e0288a4f9eddb04cb3530a4a7b28f0dd770e29f,2024-11-21T04:30:25.090000 @@ -153041,9 +153041,9 @@ CVE-2020-2109,0,0,911b2a1a8b7cfdb07d0738a45eb45783b09d9eab91544184082afba31347c3 CVE-2020-2110,0,0,b935a970394fc609e51a69ca81098879503e4c960c482de9ba2609a7f243262a,2024-11-21T05:24:40.027000 CVE-2020-21101,0,0,d1e69a8dd958392783f066b96daf322fd5e296a335a0c4f8a7b539154fec86c6,2024-11-21T05:12:25.770000 CVE-2020-2111,0,0,dea356baf3f51a2ed9cd1ff8e65d2bc8838854d6e5ba3f65d0fbf2d24f6fd4c9,2024-11-21T05:24:40.257000 -CVE-2020-21119,0,0,e43dbba0537500c7a5349dde726b30eb85705eacb509f2669d743994ada5c9f0,2024-11-21T05:12:25.910000 +CVE-2020-21119,0,1,11f0d1ec7c72add8106b95f70712281f57372fa55f67c671b094728f054dc63b,2025-03-20T14:15:13.533000 CVE-2020-2112,0,0,1093e51f816a82fb256376815009a7d66348d7536f4ce33e000cd59451ff4141,2024-11-21T05:24:40.473000 -CVE-2020-21120,0,0,ed85e91e0f25c72ca2c60b35bc30c575eab0946d8909321e6d0632b8f2389c5e,2024-11-21T05:12:26.050000 +CVE-2020-21120,0,1,864ed203a4f22357ec5b4d2e771a4cbac28e2ce3b976210b085b2d5ca3217329,2025-03-20T14:15:13.800000 CVE-2020-21121,0,0,9e2fc364cb99c077f690f15cf46d364e9a02118b329d6904d1090f21dd6f599e,2024-11-21T05:12:26.190000 CVE-2020-21122,0,0,b2c5ee8172af01dafde9ea209b9382cd5b6d915b0a71190359434f3406b304bb,2024-11-21T05:12:26.327000 CVE-2020-21124,0,0,ee35515d5adeb5b0e8643015b0d8644264884082d037c2c0f44e30f63fb29b7b,2024-11-21T05:12:26.470000 @@ -177208,7 +177208,7 @@ CVE-2021-33293,0,0,cfbd5bd296f5fd5df8283a4caa638c2d1d2a07e14835bf77838509effc5bd CVE-2021-33294,0,0,8688c6bcd1f1461eadab43f53d7d7b6dc1277766bdaf61fce44c228a2b32b2f4,2024-11-21T06:08:39.810000 CVE-2021-33295,0,0,3a40b00545548ab3537c8fc6abeb1e24a53ff18ca3f20ab5973ce8ee577f0496,2024-11-21T06:08:39.953000 CVE-2021-3330,0,0,620bf446116b68cb1793cfdc9c27e9dc8a9a8ad3c66584a5be07953dc4b8b14d,2024-11-21T06:21:18.670000 -CVE-2021-33304,0,0,d8a0fc7e3be98ed8f3dfffbabad65d073d3c94d21b16d459d4f69f14514d707d,2024-11-21T06:08:40.107000 +CVE-2021-33304,0,1,e3ae22fe88c7b427891cb18cf949fded4730e6c10b7a45a2edd6905ce0bb435f,2025-03-20T14:15:13.983000 CVE-2021-3331,0,0,250284b64af0fda388656e09ee4789a4ad80a8008dec0f4e985185460514cd02,2024-11-21T06:21:18.807000 CVE-2021-33315,0,0,fa3a9219b8b4d034eb16204a1ff9559c5f386fe5825e04bf9cb6be1ca97cf857,2024-11-21T06:08:40.260000 CVE-2021-33316,0,0,8bd186aa82243d9229a860a3ddd9239d1852b4953e141bb64111174ba5888f88,2024-11-21T06:08:40.430000 @@ -177264,7 +177264,7 @@ CVE-2021-33390,0,0,9debe9cd8884108b647eb049f4fb7299548c130868eb233a2569410012185 CVE-2021-33391,0,0,f6b277d645b4fc48d0578a577390e64936b9f2b495f1308e66e32bd09d3dfe8d,2025-03-18T19:15:39.667000 CVE-2021-33393,0,0,2398a32e024043a67e8b4594658ebb58fb8ab1b6b1e4bdd1ce14c5cfd0d649cf,2024-11-21T06:08:47.673000 CVE-2021-33394,0,0,6587515c1ed1bbb42da475b143eaeb8fd140105c9052bee581eadc3f967a5950,2024-11-21T06:08:47.850000 -CVE-2021-33396,0,0,c0b8e5cdb15aa941d2c15a75d37be1e32b85badb00a4d50490f5fcb8cab81c8a,2024-11-21T06:08:47.997000 +CVE-2021-33396,0,1,8ffc6038b0063ebd4479714a5fdb7797ec8f5d9ed1e5ee00ead96e326e63e143,2025-03-20T14:15:14.160000 CVE-2021-3340,0,0,43fceaaf19c34788e87be50bb5e9b5e5231d8251cd07e30b0a4aa7d807d12cb1,2024-11-21T06:21:19.910000 CVE-2021-33403,0,0,a8721fb52205f1989b17faa319c5a3c85e1ee9ce9b7cb3c3aa5a0975794b18b8,2024-11-21T06:08:48.150000 CVE-2021-33408,0,0,f7053cd2105009507fd2bc29b1e8bfb13ee136bf10636f2943fc6ee23b813e30,2024-11-21T06:08:48.297000 @@ -177676,7 +177676,7 @@ CVE-2021-33913,0,0,a8db3fa1075732db6ad2a34ab37e425afc3e4b6fdcf539743ee3c062ccc8d CVE-2021-3392,0,0,39f56825c594ad5ef4e342ff77305b020f2290c4843747cc27200fa237a07c0b,2024-11-21T06:21:24.040000 CVE-2021-33923,0,0,67c51da5e479b0e5ba09ad14b8ada6891ff671adbc38df696fc7a406cbad9e4d,2024-11-21T06:09:46.297000 CVE-2021-33924,0,0,ac4cad509663cbab013ea9c074178cfb0a6134447a8a229eb13a5c06d6635e05,2024-11-21T06:09:46.463000 -CVE-2021-33925,0,0,801180f41f7af64053defd424416677863899033e102ee3a2c416d723ef17308,2024-11-21T06:09:46.610000 +CVE-2021-33925,0,1,a7e0eb210dc205cc3cfda2c41831335085ad1079255d666a96e5690cc04e5992,2025-03-20T14:15:14.337000 CVE-2021-33926,0,0,0aee84c844cc22c0e7d4860eeae0ac96ebc7b124b534fc5b091ee49eab0e890a,2025-03-19T15:15:36.160000 CVE-2021-33928,0,0,3e32495de4acd14fa1f18090d4f3b53e3fb6bf721f73f5d92d0a86ade82f254c,2024-11-21T06:09:46.943000 CVE-2021-33929,0,0,4d8d162d4f56e36032ada44f5d21f539a9536ae49554b4e1e75bc44753b17320,2024-11-21T06:09:47.090000 @@ -177744,7 +177744,7 @@ CVE-2021-3410,0,0,8dbb81e123ef7142eec41b85c29407647dc63005bccb29cfb7f5200c9c404e CVE-2021-3411,0,0,7f0765e85a9d4142b120b20ce89b2f3a36917a0c7bfcedd210a0622257afd387,2024-11-21T06:21:26.693000 CVE-2021-34110,0,0,8bfa5264584cd4ab64a2bd239cf004d062de6739233dbb312f9dd511db9c37f7,2024-11-21T06:09:54.710000 CVE-2021-34111,0,0,5e84a6ee7d8ca89e41fe696b4c3b19928857200e02f4762d22ad32baadb61e9a,2024-11-21T06:09:54.890000 -CVE-2021-34117,0,0,83fab81411d6b6d608fefea16bd2605366b56939482451b1210fc105f3551169,2024-11-21T06:09:55.043000 +CVE-2021-34117,0,1,989f8ebc7a358cf03495bceff6adec4f0e5735f019e15d478ee44f058eb12a36,2025-03-20T14:15:14.507000 CVE-2021-34119,0,0,6ae985f378a06975addd2ac6934afbadf6c1dfdf740b999590b85675579674fd,2024-11-21T06:09:55.203000 CVE-2021-3412,0,0,969aea9f7608ee2e680dd204564a144bea3f1efb6905996914633fe17dd48a53,2024-11-21T06:21:26.827000 CVE-2021-34121,0,0,b5867846d0acdb409b6dac5a79e0fb08f07abb2f06f8adeffd6242b203d43d82,2024-11-21T06:09:55.387000 @@ -180801,7 +180801,7 @@ CVE-2021-38217,0,0,5f92025d6664d9fac001b4f5c8e46c0c2b31e8a5f9a207db4851728cd8fcb CVE-2021-3822,0,0,2c1cea2a33f0b734bdacad419b58faa48c00be825df941b8eb356ddfcc6f4c5e,2024-11-21T06:22:32.387000 CVE-2021-38221,0,0,2c3a43c52098cba3ccb0b8190bb9af3457397d4f41343d0a1abaebc393dd2730,2024-11-21T06:16:40.570000 CVE-2021-3823,0,0,16fbc86bb4280b540541def3f36379d930837f7052199396a1f3021bbd6fcd9c,2024-11-21T06:22:32.543000 -CVE-2021-38239,0,0,98c20d6de4a3b8158323857d099cae61ec3394ea0468d33c0a8b64b03e4286e5,2024-11-21T06:16:40.743000 +CVE-2021-38239,0,1,fd7279ba4fda4e538326f39ad881be8b6b34a8100accb8f751f883d6af21f674,2025-03-20T14:15:14.690000 CVE-2021-3824,0,0,16cdcbf7456cc1de3e56f0ba38e8bb500104a78d859f82b3558e26d67527c60d,2024-11-21T06:22:32.693000 CVE-2021-38241,0,0,3f27086093c284bcc8fb9690b4ab556e440caad1bc441193cbd15c70a2a42742,2024-11-21T06:16:40.907000 CVE-2021-38243,0,0,f90cb7bdb308cddde282f7faea7065bd23e4a0c7cf99d49db85a2d11282e77f0,2024-11-21T06:16:41.073000 @@ -187498,7 +187498,7 @@ CVE-2021-47204,0,0,d855ea7a1c34fec98e08b6ec6fc4b87aa056a23800ca368fb608f86f4465f CVE-2021-47205,0,0,549c8ae254d28d7ac269df29364fd85d999eba14823bb753afbe9412e13374e4,2025-03-04T15:27:32.420000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000 -CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000 +CVE-2021-47208,0,1,1530409a9601a0907c9eb35e42d9ec9620e69106ced76ea9e3ebfe673f296458,2025-03-20T14:15:14.867000 CVE-2021-47209,0,0,1536c1bef2c14e12d373ca6bd92154342840694d5f784ecde3999106c390f9bf,2024-11-21T06:35:38.130000 CVE-2021-47210,0,0,6f92e3d2c3c1a5d96775ad98a3288fba55e822f3f6095cf6048826173f313db7,2024-11-21T06:35:38.243000 CVE-2021-47211,0,0,c3bfb66ece2fcfaecd7a9c09b11fb23218079e6a89ad9ae3b4e7290a749fa7ef,2025-01-14T14:43:27.637000 @@ -200622,10 +200622,10 @@ CVE-2022-3247,0,0,798be43c1df50489fffe791774c6316e02ce9b899b403a3ca2aa4cf8b4d32d CVE-2022-32470,0,0,fdf6dc97f1e2f6fc37f7f89d520eeac076b76b8a567b98d66b18d4ac8309039a,2024-11-21T07:06:23.723000 CVE-2022-32471,0,0,3d1ad8a0eda6ac3ff51e8f7b014ff1fa094f06a2f954babeb9f348bbcfa9e441,2024-11-21T07:06:23.867000 CVE-2022-32472,0,0,d44e1e699128958fcde2e446998f75a39b64b8ec564bad6a65299df28ad483d5,2023-11-07T03:47:48.977000 -CVE-2022-32473,0,0,d431ac4e9b9151b71aeb656ede00de7fdef95d6d42c57070107745ebe5348253,2024-11-21T07:06:24.023000 -CVE-2022-32474,0,0,8d455aa0c29194a413549d12877eb83fcec7e4343efa0aef295f29d8c5662f73,2024-11-21T07:06:24.160000 +CVE-2022-32473,0,1,e8b5705ff0cef9c3e9d1de69fcf6929ba81d5b69e063be424e163e459413e796,2025-03-20T14:15:15.110000 +CVE-2022-32474,0,1,1eb9e81134fd4ff84f193fd1e8144620a005cfade254b8d61135fec2dd6f49db,2025-03-20T14:15:15.290000 CVE-2022-32475,0,0,f347cbd24aedaedf7e5e97450c28482a05994447dac6e58fc9e721b827f19f22,2024-11-21T07:06:24.297000 -CVE-2022-32476,0,0,3af25dc3b2102c8c104dc3df29ca7a72e195bad746eeb73446397b5ee82f2702,2024-11-21T07:06:24.440000 +CVE-2022-32476,0,1,7733fed2ca72a00da85d4c4427e20f070da15445367355e4fe84148f951560df,2025-03-20T14:15:15.457000 CVE-2022-32477,0,0,26582c00ca030080289a837743c442fc7b082d9d1ae1beba6237a39c060639a0,2024-11-21T07:06:24.597000 CVE-2022-32478,0,0,2edc523937d4238ad6a7033de23edd0bc3edd1028bf8474b8a52e10133b25393,2025-03-19T20:15:16.767000 CVE-2022-32479,0,0,bc3ac35450c3f850d6754078b7ff1cde8053f41b1972c00559e5461f02215b17,2023-11-07T03:47:49.050000 @@ -201119,7 +201119,7 @@ CVE-2022-3295,0,0,b97e1ae160e5e6c4d12e7c64825d054c28a200bb0bc5c2fb1af1a735e1cd9d CVE-2022-32951,0,0,b96d61791b8207aaf07580a98b54dcd97a93e82ecebe71b19053d4f65d07fce8,2023-11-07T03:48:16.567000 CVE-2022-32952,0,0,4c65f44edddbaa0ec60369afda8c5dbb5ddac1da0a1d1cb299bd11c8899ef8ac,2023-11-07T03:48:16.603000 CVE-2022-32953,0,0,c62d3f56ff4ce118c5b18b3a469b79ce65ccee49a64a75ba1e5c875aa948aecc,2024-11-21T07:07:18.110000 -CVE-2022-32954,0,0,a8b806a7b1fa962e491484caa94f03dea177963b1fab003c2ed269138806210c,2024-11-21T07:07:18.293000 +CVE-2022-32954,0,1,e938d38e326df3737cb506ff3eb44451f90c7050d6b4d91b231b3ce99496880b,2025-03-20T14:15:15.620000 CVE-2022-32955,0,0,693c88d6807ab13b185285fe7d3b8e6e33b50d24efe71c4b44c01709554d1378,2025-03-19T19:15:38.053000 CVE-2022-32958,0,0,30b036a3c66fa5e660306ddc71576785c2e81d2ced310ce080bd26ed9b2a04d5,2024-11-21T07:07:18.650000 CVE-2022-32959,0,0,2dd9decbfaaeb3b2c4f44c2ff7a9ae87816fbc6481e6d0c22e0b463d32f2adc4,2024-11-21T07:07:18.783000 @@ -218286,7 +218286,7 @@ CVE-2023-22685,0,0,872ccca0a995fcbc9b6dbbf87810e17f5f81532bcf8234628f40a332f9626 CVE-2023-22686,0,0,7c9bf339bf7fc40f4c831a9ed1d17e389cbec2dc16f86171fe02873df21e717b,2024-11-21T07:45:13.160000 CVE-2023-22687,0,0,481cbe6c9b0605fead448c460fd46c38a58dc6fe3130c96ddf61521c09d6ba9b,2024-11-21T07:45:13.287000 CVE-2023-22688,0,0,4720f580d23e9d419d3fb86a17b61f9c43e7cc6572c25842500edd17e7c7def3,2024-11-21T07:45:13.417000 -CVE-2023-22689,0,0,3ff59f61eb029e7bd4a09f892c67b53b6c6051136f304c3b1ad55713dc58bfb7,2024-11-21T07:45:13.570000 +CVE-2023-22689,0,1,29b8a1f87cb9f79ba677ca25bbf169a87d855b6fc7bdcb850202db45024e3588,2025-03-20T13:40:53.910000 CVE-2023-2269,0,0,6ca8e1183b79cce7a84a5a2b205698fe6f39669423122d7d423e82771025e168,2024-11-21T07:58:16.757000 CVE-2023-22690,0,0,f5a98f075c8ec8ddcb94c0fcc4876644f7035641e7aad29d34ee4d7180049a46,2024-11-21T07:45:13.693000 CVE-2023-22691,0,0,a6c8807e24a32130a152a50313e40a65feca610572cd7d2c96862f03c2c322fc,2024-11-21T07:45:13.830000 @@ -220952,7 +220952,7 @@ CVE-2023-2597,0,0,303cc785566dc8801b26b54d7ade491ff996c6bc976f3b826f6eff26020c8f CVE-2023-25970,0,0,66a9b5160d597cae25abfa85015b5c46fb9880077debecb72756aa1603db4a18,2024-11-21T07:50:32.340000 CVE-2023-25971,0,0,7910cc6bfa020687fef42cd75fb4d114b8e7fad8b5dae120ce405a57ad72823c,2024-11-21T07:50:32.460000 CVE-2023-25972,0,0,205b8e854e216e06024630ebbb65d54b9102029592a6a8ec7be0a14c17d4f78b,2024-11-21T07:50:32.580000 -CVE-2023-25973,0,0,ec0f9b626f3821e4a44ecf324bd9f717ced1aee03075cfe1b8ab7fab1fefe7c9,2024-11-21T07:50:32.697000 +CVE-2023-25973,0,1,9a80b0494c036758b2f5dab3ea64f62fba360e078a51deace3377b2cda97f0ec,2025-03-20T13:40:53.910000 CVE-2023-25974,0,0,168fc4aa4bc93a9721d87ba6d2a9a66d3ece62fe4482f804491661e1edf26ea5,2024-11-21T07:50:32.813000 CVE-2023-25975,0,0,7c4a31e726261533f8c0d14cb17a6373ae394a0fdf228a164c5b94ffe6cd748d,2024-11-21T07:50:32.933000 CVE-2023-25976,0,0,cafa65c359e1391fb894a0c4e81f1b1bff303a3af6667d59c0f2c74fb3d3faba,2024-11-21T07:50:33.057000 @@ -229535,7 +229535,7 @@ CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531b CVE-2023-37030,0,0,ebdcd8b44b26b10615d4d1e02a10d45b81fef97c218d1a1e3ae11fd5af3bc011,2025-02-18T21:15:17.930000 CVE-2023-37031,0,0,eecae8436c125fb0507991527939e1452a167178a727a6215db684c9b09aaf64,2025-03-19T15:15:45.317000 CVE-2023-37032,0,0,f11742d5ae1a08ddfd444a3b3ee04f576db30c7522f8bb7a3002ad6d4bda7e7f,2025-03-13T15:15:38.560000 -CVE-2023-37033,0,0,4d19abd7a4b0679c963f8ae0666794b729ae8b36c669ea355e198e5d10e5d131,2025-02-18T21:15:18.477000 +CVE-2023-37033,0,1,2fd5f206e7c8f088db0d3fc2bc827aaccccf526fdc813bbfc30e1fdbc2c06cb2,2025-03-20T14:15:15.920000 CVE-2023-37034,0,0,fa5a5e09d8d78e10a9175b15b4767670b021a7f2fdabb4036e210e9d3e979a0d,2025-02-18T21:15:18.657000 CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000 CVE-2023-37036,0,0,9cb7eec923454cc934c4e4af05d1ed6354e2551d5bb10e0d0a66295f750bcabc,2025-03-18T21:15:23.263000 @@ -237569,7 +237569,7 @@ CVE-2023-47649,0,0,c7e7f5d23f04acb7bb0c8db6a070a50c654b6ed83b956e13cab0275ad6bd9 CVE-2023-4765,0,0,82de4b951e877ffe7754c475b16820a7975c6670692f96883ac367a32ac7d2e0,2025-02-11T02:15:32.333000 CVE-2023-47650,0,0,7721feed13fbafec3d98f106931e00bf3d20b125d30ffae4b9aab5026cd107f3,2024-11-21T08:30:36.170000 CVE-2023-47651,0,0,de674ae82fb6a8f5100c7c6af15e148c09dd930edc5e1b0d5a3257e845a858c9,2024-11-21T08:30:36.307000 -CVE-2023-47652,0,0,b432b17ca99883bc3a83adf664f57aeb7d3fc633a8f9f19675ed8e65d3795331,2024-11-21T08:30:36.437000 +CVE-2023-47652,0,1,b9cf8591e03a7a34286216df6003517e12f794b17a220e694765e80aa0a7487d,2025-03-20T13:40:53.910000 CVE-2023-47653,0,0,4bc3f5acb8f4810e71e1b67b4905e480b7a2fbd28307d497def6a1b6d10deff3,2024-11-21T08:30:36.580000 CVE-2023-47654,0,0,ca8cb44eb20061a81d7a62b29021e3974bb631603d9ae9c1f18c087ba86ab6db,2024-11-21T08:30:36.707000 CVE-2023-47655,0,0,d71909537a63f986168d6cdf6ef653287378eac8cbf9b85662b441cdc6f261f4,2024-11-21T08:30:36.840000 @@ -238616,7 +238616,7 @@ CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b694 CVE-2023-48974,0,0,8fd80981b6b21363b2c4bb0350b210e5fbf55f8e3bcfa62fc878d4564d44651a,2024-11-21T08:32:40.597000 CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000 CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000 -CVE-2023-48986,0,0,b6642d6a02bf7a36efe0c0d0964874e657d44228d14182cb9a09a950da3586de,2024-11-21T08:32:40.900000 +CVE-2023-48986,0,1,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000 CVE-2023-48987,0,0,9988be02e62a3cc4a20eafae255b02df819814a492d95e22f08a4a3ceac2efad,2024-11-21T08:32:41.043000 CVE-2023-4899,0,0,ede3b5079c9b4e13d28ee7fd1470b2c72985e07c6c2938b7732e6f2bee3794de,2024-11-21T08:36:13.090000 CVE-2023-4900,0,0,225291a89e15b2f07d8db07d435c2b51ee210c127585c386c11dc3032bdd8db8,2024-11-21T08:36:13.220000 @@ -240966,7 +240966,7 @@ CVE-2023-52337,0,0,5d30b2e795d30af25a7c2557afed1bcb45315c4a68f523353a17c18460ac4 CVE-2023-52338,0,0,a8379d6b9439ab072316828f426542121a26cdd77617df5ce049082cb5dd92bc,2024-11-21T08:39:35.220000 CVE-2023-52339,0,0,04761042913417f175a1a950ef091900c9ab04b11919416fb9f6dffff092dad0,2025-01-20T16:15:26.810000 CVE-2023-5234,0,0,34ae66ee7e63a40a6738f609f4441922874dea20b90ef26d372e887f99364913,2024-11-21T08:41:20.707000 -CVE-2023-52340,0,0,16eca95031fee7fde4bdad98ceb95fbda1723b4f4f2983c267308bdc0d0be681,2024-11-21T08:39:35.620000 +CVE-2023-52340,0,1,deff60fd9465872fca8415ca30597c56609c0ba54b1de7107753f9a60f5d550e,2025-03-20T14:15:16.297000 CVE-2023-52341,0,0,e7838a8d40adca16ce439d9d4cd7f7d9f467e44ba90e1764b762e3f00bcb077e,2024-11-21T08:39:35.793000 CVE-2023-52342,0,0,2b80762e19161f4631043894e7b978dc8ed7e80c1130c4208a06234b6c9f6c81,2025-03-13T18:15:36.080000 CVE-2023-52343,0,0,50fc46a3183b956d98ba63103ec255ffda4f0f179dfae31fd51d68f594a6ed6b,2024-11-21T08:39:36.153000 @@ -244130,7 +244130,7 @@ CVE-2024-0758,0,0,e2cbb6a743b0f38d8763d67905dd1888ec1c82e9f64e59374dd3f997e1e4d7 CVE-2024-0759,0,0,3291189ba10b6e31f6abb12e4b6b5344b2e6c89d09b1acc284f3852e5866c461,2025-03-04T14:34:52.510000 CVE-2024-0760,0,0,28b1688290a8429996cb15aa4a590dfc852aa2c256b386e9997c92991939332f,2024-11-21T08:47:18.850000 CVE-2024-0761,0,0,3880824002a244098dc4a9d203545fa3dda9ea94020902bbdff8af939e9833c7,2024-11-21T08:47:18.990000 -CVE-2024-0762,0,0,5a9bbb31c63619e68757e176832f3d110d2b2f096fdea8e0bdfb5fcf207ee1e8,2025-02-13T18:16:15.227000 +CVE-2024-0762,0,1,55ce0ccbbb179304c2f94ca58c87f5c89024696b56a67d10de02a4397359f1e2,2025-03-20T14:15:16.470000 CVE-2024-0763,0,0,957929b8ceeada74ee3df21edbba0614c080aaf40407f4c5d2f09db451c946d5,2025-03-04T14:33:46.043000 CVE-2024-0765,0,0,bd1e10ec0269235d1f805b41ab6a7621e35014767ca84eee6da95b2930039ff6,2025-01-08T14:32:04.447000 CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000 @@ -244966,7 +244966,7 @@ CVE-2024-10647,0,0,05b3aabb4778e43bb6f2ea80f3d833ac24d1ab3b06ce7337c8de9fe67f9f7 CVE-2024-10648,0,0,a05a6be89cd5db2c6ede471802599c3d634f5ff594efb32e61244c2e5b9c45ec,2025-03-20T10:15:18.010000 CVE-2024-10649,0,0,db16dd80e8448f6d889f81db31b520a6b745a5c4498a8d0f77b2517fc8d93990,2025-02-11T00:15:27.680000 CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d071921c,2024-11-21T08:49:42.970000 -CVE-2024-10650,0,0,c30c9c18bcaa36d607709f3a80d251fb20966bfb818732651634048085cce74d,2025-03-20T10:15:18.150000 +CVE-2024-10650,0,1,77bff52f21ca238d1f8f91b0d45143061d53ba53b01369ec7af36a0b22b002ca,2025-03-20T13:15:35.600000 CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000 CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000 CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000 @@ -245039,7 +245039,7 @@ CVE-2024-10718,0,0,471b4fa7cc1669e00316ed179dba9d8b8921603884a11bf6ae5c8c3b4cff7 CVE-2024-10719,0,0,c04fe810dc8b6dbc4ff8e085af60f5b095bd560727435ed51dd992dcf85670aa,2025-03-20T10:15:18.770000 CVE-2024-1072,0,0,072588b3ad9799dd1be77562cbf99842d770c415df8f6c79982601d36efe8be1,2024-11-21T08:49:44.053000 CVE-2024-10720,0,0,03957e3ae8f629c8b8a9fe1b882de295221e90f8be6d9a179a1c5c0fc4d274f6,2025-03-20T10:15:18.897000 -CVE-2024-10721,0,0,7513ebf7720c24a981ff91146c74faa6c208fa415465b8f98a8613aa9aed98f4,2025-03-20T10:15:19.020000 +CVE-2024-10721,0,1,73dafbbe3566bebf695355acbb63f3bf3c3fb0510d7e5b32873e00345ce9fb22,2025-03-20T14:15:16.777000 CVE-2024-10722,0,0,75d597dda4b619bec036412cfe8477654ca04807f11e9662ef3244ad9e9ad9e4,2025-03-20T10:15:19.140000 CVE-2024-10723,0,0,ecff2dc65a0f6afdaf2ea72c163ce019cee4c723a4230d26b8e5d67a3b135c94,2025-03-20T10:15:19.267000 CVE-2024-10724,0,0,05e42846a0ca7a29b96a4920596f6e84fd10807d888aa6bfb57f5b19ec5ac8b0,2025-03-20T10:15:19.390000 @@ -245271,7 +245271,7 @@ CVE-2024-10944,0,0,8a1f4f1607ad9d6e7b50d018d12daba2da0f99b7a46a7adc3175cffe9e914 CVE-2024-10945,0,0,4565a68d7b071de3f68b554bb0e3622ada92ff53d622e5bbe9a67361142f853d,2024-11-13T17:01:58.603000 CVE-2024-10946,0,0,53aaa4c2b70ab58f1f9d341ec26db4c320c92302ea6be8ed93f351ac560eec4e,2024-12-11T19:58:39.510000 CVE-2024-10947,0,0,2aae773bfbf60ac21159d9a05dedf7441ef54fc905f7b5caf5816c76b8e3b650,2024-12-11T19:58:55.657000 -CVE-2024-10948,0,0,5da1838054600415ddc45cf84fa10da6b3f0c19ecd75a3d31418ebc6299c31e8,2025-03-20T10:15:21.977000 +CVE-2024-10948,0,1,adb376624a7cf66fd05776fc724a26103986654bb75db4bcef6ded5ff6e66046,2025-03-20T14:15:16.890000 CVE-2024-1095,0,0,29b5dd0a49491661933e0a95304e4dbb1f8171cb3aa4fee685f9a9d003fadf18,2025-01-08T18:05:01.880000 CVE-2024-10950,0,0,a49330f469040470a2e68e7dca50ec016c06d85974baecccc3cfe478c6333288,2025-03-20T10:15:22.110000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 @@ -245349,7 +245349,7 @@ CVE-2024-11026,0,0,319f686d9e1816aec56a50d3ae71f2580939b84056c0eacccd7bc237a6bd6 CVE-2024-11028,0,0,be5701b1791efbf2de8ae4ea20b2a6d8d846ef340e5e6b5f9a4b779b0ccd543b,2024-11-19T15:38:19.023000 CVE-2024-11029,0,0,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62abd04,2025-01-15T14:15:27.683000 CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000 -CVE-2024-11030,0,0,2c08a0d77f3e6580b416ae36cdcba88aba35fa92609bf530cdfe3720da0ac526,2025-03-20T10:15:22.707000 +CVE-2024-11030,0,1,e22bde1bccf5ccf171d8d41d08527bdc5f4a1d8a2258749a18d2cf9693edbe13,2025-03-20T14:15:17.473000 CVE-2024-11031,0,0,1d6846e36ddf44552bfa6e382494bfbde76c74ba805427b0abaa7e8cbc9c358c,2025-03-20T10:15:22.820000 CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000 CVE-2024-11033,0,0,65e4e7043efc2676a8643f6070836596d2650f777700d01fc38fceb11e862284,2025-03-20T10:15:22.933000 @@ -245363,7 +245363,7 @@ CVE-2024-1104,0,0,1eae50c75d8d746ca0f746c7f8113a7b95b6cc5ee3b09f81f9dcc34a01c59d CVE-2024-11040,0,0,8b13cc9e47c81a96290f64b2c0309df8dbf9424da30e8bf7511077ca38e1505f,2025-03-20T10:15:23.293000 CVE-2024-11041,0,0,68a295fd23cab6723e3189d2e76114225e59f434d4539875d52585e934a8db5e,2025-03-20T10:15:23.420000 CVE-2024-11042,0,0,b88cd11b9ecaace4853df81a84789a1a711dd4cc5f393e37371e9cc85fda4502,2025-03-20T10:15:23.537000 -CVE-2024-11043,0,0,e90416adf78bf09b58ea912a0ae1dcdf8991edb07a19821d23a3ac3c72597995,2025-03-20T10:15:23.647000 +CVE-2024-11043,0,1,bfd559aea1d5c03a1a0f076104c04fc7c4b64debc74dfbefccd0f223a56b60de,2025-03-20T14:15:17.980000 CVE-2024-11044,0,0,a29377d36f2055bee88b0c5232b43dc6a73808da1a7a6f38b170179e8bd122ae,2025-03-20T10:15:23.760000 CVE-2024-11045,0,0,29d4730137acc780255ee0ee0ff1e2dc8e1d4b225a5bb25f23247bdd74a0e237,2025-03-20T10:15:23.873000 CVE-2024-11046,0,0,5c40c6f1651a9b03786d792eb7bb9f10db2b0751ebb511e24aebc51063c62960,2024-11-13T21:01:01.540000 @@ -246144,7 +246144,7 @@ CVE-2024-11819,0,0,dd67ccea77b2010a5d3d3bed5462831e3e8fec0490eb54f93b917418104ab CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d8572d,2024-11-21T08:49:58.813000 CVE-2024-11820,0,0,c9acd90582cf424c9a1b2cf3b88b21321cb2671879d30ced0b2d8e6eadbad791,2024-12-03T14:54:20.297000 CVE-2024-11821,0,0,d79dffda93e49a9a33febb11aa40df2aaa539c52fb76cf365663607e1927d4bb,2025-03-20T10:15:25.563000 -CVE-2024-11822,0,0,e4e56a4af27cbaa6f01e96915e401dcd006d0658b960d2f25ef467ac49762952,2025-03-20T10:15:25.677000 +CVE-2024-11822,0,1,f3a4368e15a0dafa3db36565b3175a7245d5a4d4570851eebc7954d5aeecae70,2025-03-20T14:15:18.070000 CVE-2024-11823,0,0,c06b322c55c56e39da841e24dcfc245d4bbf700dd82f0350363e4100fb063133,2024-12-06T09:15:07.463000 CVE-2024-11824,0,0,4aeb80b755dad854b25eb862e4da6daf10d0774bc7c9a780f61a15f345fa9419,2025-03-20T10:15:25.790000 CVE-2024-11825,0,0,3be30804a10b7dfb26944bae19d497d5419e7b2419af9e6f32f50fc204320423,2025-01-25T08:15:07.190000 @@ -246367,7 +246367,7 @@ CVE-2024-12044,0,0,1763d71d0ab0d1436bd63b72aeb76acc4421b3fb699671be87b9b46e8fbf8 CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 CVE-2024-12046,0,0,b1c5edbe1744b4677b76c567c6df32419a96f24a9c141c0fb388cffd7e9f48a8,2025-02-04T08:15:28.583000 CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000 -CVE-2024-12048,0,0,32c4671a4d44f51cde43ba6c73e7b0d1a67e63b5239f0c3c7f6e15c4197c5226,2025-03-20T10:15:26.503000 +CVE-2024-12048,0,1,4c94c1b74f74a69df937c57733fcebb1882f61c5c5423ac65d10e7d72d28df82,2025-03-20T13:15:35.717000 CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000 CVE-2024-1205,0,0,3af139dba35612113ff8da60cc03a47608ca20df5be305deccf880cb74bc0a7c,2024-11-21T08:50:02.210000 CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 @@ -246389,7 +246389,7 @@ CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61 CVE-2024-12068,0,0,6ee33f8fc5b7a5a6de0d0bc1e83b1b07cc946797fe443eca4c336654817ea14b,2025-03-20T10:15:27 CVE-2024-12069,0,0,f94a20479dd7fc27deb35539ef9ad19d1d5d3c28061855d7b2b325c5b3dd01a4,2025-02-19T08:15:13.470000 CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000 -CVE-2024-12070,0,0,d8edd582b2d81b026cff03b12b9714b99dd1fe901b729d4494083a9d50976673,2025-03-20T10:15:27.110000 +CVE-2024-12070,0,1,249e3a318cc7495f22af0e12aea95021a71aae8eb6d1ac8f58c927284c0fc895,2025-03-20T14:15:18.200000 CVE-2024-12071,0,0,6dff9450f26991acd5af96541be6b0bb32cb8aef7b4a9e76db555589dde6ae01,2025-02-25T22:17:41.733000 CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000 CVE-2024-12073,0,0,d6db2f0c4889187ac33654deef83fc5d0350b2e32b900f5fdab17885bff03ab5,2025-01-07T06:15:15.367000 @@ -246699,7 +246699,7 @@ CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 CVE-2024-12385,0,0,342a63349668411d87230687329448ecea14fcfd2e7b116a488b8380d0becc08,2025-02-25T22:01:07.893000 CVE-2024-12386,0,0,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000 -CVE-2024-12387,0,0,751f11e8683c39599f086fe88231ba9def583a79ab6c3b15893e492b057709d1,2025-03-20T10:15:28.010000 +CVE-2024-12387,0,1,559fc19803e6b1c11957758daac5902387dbe94f5a6a47b3aaa54f9f242d7daf,2025-03-20T13:15:35.803000 CVE-2024-12388,0,0,c416a78bbdce1ccf072ffecc249411d14bbc6fc43f4710f69a556520fb5039c8,2025-03-20T10:15:28.127000 CVE-2024-12389,0,0,7bfda5dd8bf178dfd9258187ab965f12fb98cd75efd5f9afc7931dd0b987abf7,2025-03-20T10:15:28.247000 CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000 @@ -247018,7 +247018,7 @@ CVE-2024-12715,0,0,c108391047bdc5cb3a30ab729c489c01e29510a155fea37302079b85e271c CVE-2024-12717,0,0,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275acd1,2025-01-09T15:15:14.493000 CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 -CVE-2024-12720,0,0,53f9b8af7483ba6c6de53c6d8046996136c7966551088d60063a392bcea587a5,2025-03-20T10:15:29.507000 +CVE-2024-12720,0,1,afcc6743f43da73c7e5bcea40a3b45c409f5b401c1620b5eefaedc4ac7d24bc5,2025-03-20T14:15:18.290000 CVE-2024-12721,0,0,571985a740d2928fc1a87564f0c06d43223a7710e7c693ff83d0481daf31f163,2025-03-01T01:19:03.923000 CVE-2024-12723,0,0,a363ae7e16743f7d59f6caa0400a8b56a1d7cad2c81899b31cbba1d46f30e521,2025-01-28T16:15:37.430000 CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000 @@ -247053,7 +247053,7 @@ CVE-2024-12761,0,0,c81748a3b23c8ecd59e75d1e60fcfd8c0ad9dc35e8aaa3c1a185d074f4b9c CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda161f,2025-02-11T02:15:33.770000 CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000 CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 -CVE-2024-12766,0,0,998fedba3b63bf35833f7a807e09dc95f13213431ff447040ac3053b529d7fd6,2025-03-20T10:15:30 +CVE-2024-12766,0,1,c2b2fcd06fe066782990daf99981cb5d47fca68e085099612d99d57a4caa3135,2025-03-20T14:15:18.387000 CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000 CVE-2024-1277,0,0,1a185a3e5546740a0eacb8b77e1cad6738d582479b658b08c14e8d4535b09c19,2025-03-04T12:34:06.490000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 @@ -247062,9 +247062,9 @@ CVE-2024-12773,0,0,4a158210ce8f04e63a0cc5644404dce0edf638a1d39d2ff2dbf8f403280ec CVE-2024-12774,0,0,a5018f9b8a1ed4e5ce72ea8a47b3a7028c7d128473c99e738a64f122822c050a,2025-01-27T15:15:09.803000 CVE-2024-12775,0,0,353eef92526ca7897538186dad37cf3e2c9371576897d9e3e65be91cfe054a05,2025-03-20T10:15:30.117000 CVE-2024-12776,0,0,335310c748d3c51ab78623da567c82ac049b4795c46a63042cd1ce31c6efba22,2025-03-20T10:15:30.233000 -CVE-2024-12777,0,0,9600c15f4787daf3d7e8d5b3bdae4d99afeeb72660544a068197fc5e62ee2af1,2025-03-20T10:15:30.360000 +CVE-2024-12777,0,1,2a75429bf1556da3d9bde0b6a7673fe4d81179906be2c68ecd81596d5117b3ab,2025-03-20T14:15:18.477000 CVE-2024-12778,0,0,97b301d0557555b8b29d6efcb16d63309627e08a8d926b4cd0e1322bb8b74edc,2025-03-20T10:15:30.480000 -CVE-2024-12779,0,0,dc2cd6614b64130e890c9d0da7610befd983e94baae69c31ab3e3e6ce4e31f17,2025-03-20T10:15:30.600000 +CVE-2024-12779,0,1,e73d36814eb850ede336368813209cabfd3b643e441d15ba7fb97cc81716e6b3,2025-03-20T13:15:35.893000 CVE-2024-1278,0,0,5fc68c762fc836b6c12a71eed788de7c0888610c449a9d12f31cc3647bf88af1,2025-01-29T16:26:48.717000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12782,0,0,d2e881814d729c9fad0c1c1a3b56268648b9ca7902e0e86e7f1cea35a422381d,2025-02-28T07:15:33.487000 @@ -247152,7 +247152,7 @@ CVE-2024-12868,0,0,2e8524ce0841a71c6f8373377e9f86198016031006174e683529a9875c929 CVE-2024-12869,0,0,aa8f4ee3bd46ae3afa4f0a4ac3aff84e433218a2993cf4412ad0147b1172e52f,2025-03-20T10:15:31.087000 CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-12870,0,0,3affaec53ee6e1a3ba719e479603aaf5325388bdfdab80e6d3cae266e421d442,2025-03-20T10:15:31.210000 -CVE-2024-12871,0,0,7e4226d4844e39200f11a6ae8f8c6a12a37a759f5120de48620eea7f60a2664e,2025-03-20T10:15:31.340000 +CVE-2024-12871,0,1,606489a75c81ea9701e0f209ad88ca508a7c6861f8d93010e1813d2dc1d64578,2025-03-20T14:15:18.563000 CVE-2024-12872,0,0,ef2adea83c4dcced92604feb28ab9bdd7144986700cdccc2c5054cc997ad5b7c,2025-01-31T17:15:12.103000 CVE-2024-12875,0,0,87b0956586183e5c613030d4ef29fd959e1646cc803bd99da499c5b331518d7b,2025-02-07T17:09:37.010000 CVE-2024-12876,0,0,df6c47419287a2c5f9f4bb7f039a7f40cceb279ba47f8e2dcabb382c988f8110,2025-03-13T17:55:17.550000 @@ -247188,7 +247188,7 @@ CVE-2024-12907,0,0,888eb59eb672b880a00352690cbd4fe68b3b4bda1cea5583ad3fabfdc05fe CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000 CVE-2024-12909,0,0,ad4fbd2e0fe9021f8d8fcc9a800c89cd27435db419cda5d58cdea799afd336e2,2025-03-20T10:15:31.833000 CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0eedf,2025-01-16T15:28:37.230000 -CVE-2024-12910,0,0,af7609d4b01760127697b41fa5814a8fcf024d73a2dee81f22b94ac886fdf2e3,2025-03-20T10:15:31.960000 +CVE-2024-12910,0,1,c8a26a020ff21d43e0b83b1f7da473e0f2b977d034cd265dc7a6e856377f6201,2025-03-20T14:15:18.657000 CVE-2024-12911,0,0,15d1ff1ec084bea49dbd26f2da3a2e838ec9a7e3686259b97d6544753fb97fa3,2025-03-20T10:15:32.083000 CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000 CVE-2024-12916,0,0,873646360c9afa8537809b46bfbaa012067b822ad3f15631982e23d8da02b918,2025-02-24T15:15:12.240000 @@ -247833,7 +247833,7 @@ CVE-2024-13552,0,0,727d2501f561c703e4b830bea73318d02ecb82132ce891ff47b177cb8690d CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000 CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 -CVE-2024-13558,1,1,198540feb6d32f5c06397e557b4130a53b6cd8d868bbd03ff37fb55030d5fbee,2025-03-20T12:15:13.193000 +CVE-2024-13558,0,0,198540feb6d32f5c06397e557b4130a53b6cd8d868bbd03ff37fb55030d5fbee,2025-03-20T12:15:13.193000 CVE-2024-13559,0,0,e4bc151d4fce3c77ee1ebfa44e64cd44d7e5d82c4b82e11f2aabe557304018a6,2025-03-01T05:15:14.700000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13560,0,0,bc3576a3348779a87640a25b38dfdb4ea2739f3634c8fab6266670a556723a3e,2025-02-26T13:15:36.800000 @@ -248151,10 +248151,10 @@ CVE-2024-13913,0,0,9abf24935e6c0a1b302d08befb2921c990a37653bdc7c4751e540fe6b4bbf CVE-2024-13918,0,0,aac9d206b672ba1aab6fed634936e376969cf60ac5105bcd290dee3cb04643fd,2025-03-10T17:15:34.383000 CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb057,2025-03-10T17:15:34.540000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 -CVE-2024-13920,1,1,11616b250a0f30e142f7f6dd1bcb47818a2a1f7a96d54e70f4bb75c39f492fd1,2025-03-20T12:15:13.477000 -CVE-2024-13921,1,1,fe798fc3319471437ac754a700e7becabbfd79bc945347b64d37df3b50938ac6,2025-03-20T12:15:13.633000 -CVE-2024-13922,1,1,d13ae7cb0a8bd7a7271b03758d5718ded9a48dbcbf84b58b15c5c14152041d07,2025-03-20T12:15:13.777000 -CVE-2024-13923,1,1,86938e28a189150cb3e62ee6b064aee85c8946f1d859cb61a37558fa18b92ba1,2025-03-20T12:15:13.933000 +CVE-2024-13920,0,0,11616b250a0f30e142f7f6dd1bcb47818a2a1f7a96d54e70f4bb75c39f492fd1,2025-03-20T12:15:13.477000 +CVE-2024-13921,0,0,fe798fc3319471437ac754a700e7becabbfd79bc945347b64d37df3b50938ac6,2025-03-20T12:15:13.633000 +CVE-2024-13922,0,0,d13ae7cb0a8bd7a7271b03758d5718ded9a48dbcbf84b58b15c5c14152041d07,2025-03-20T12:15:13.777000 +CVE-2024-13923,0,0,86938e28a189150cb3e62ee6b064aee85c8946f1d859cb61a37558fa18b92ba1,2025-03-20T12:15:13.933000 CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 CVE-2024-13933,0,0,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000 @@ -248503,7 +248503,7 @@ CVE-2024-1759,0,0,c8ba467071cf346ec745a9e5d8e8597a923cfb677c329e24e430d58ed7e0f0 CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000 CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000 CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000 -CVE-2024-1763,0,1,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000 +CVE-2024-1763,0,0,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000 CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000 CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04bf,2024-11-21T08:51:15.800000 CVE-2024-1766,0,0,d8ff872b7c733da8ac7e1c2957ad11b4600ff77b669728faaac2462853b27909,2024-11-21T08:51:15.920000 @@ -249609,7 +249609,7 @@ CVE-2024-21024,0,0,22798d4b68c52eb493cfe689aff459faaf8d179b78e934d2b2ef2680c2710 CVE-2024-21025,0,0,cb940b17b62838bae7c7173612add05e07812946f7f9845c549dee6f7e994c8c,2024-11-27T16:31:12.720000 CVE-2024-21026,0,0,499523ab9c42adbddcb9465d525bd64fdafa00b45a36fba8323a728fd7860532,2024-11-21T08:53:38.623000 CVE-2024-21027,0,0,a61ffe37c9f1d4a384893fde109de27008fa272fa0f6ae950bf7e6f33ee668bc,2024-11-21T08:53:38.737000 -CVE-2024-21028,0,0,6fac0a34dcfd7478c3d0533c7c1609e188895cb0192863cbded254d4f33ef117,2024-11-21T08:53:38.853000 +CVE-2024-21028,0,1,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bfaa1,2025-03-20T14:15:19 CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000 CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000 CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000 @@ -252266,7 +252266,7 @@ CVE-2024-24418,0,0,f85fecb180b6d307c07fe51a03eaefe0a799ecd1335016083acf800b061c0 CVE-2024-24419,0,0,6461e4afd495f91efaae96c55ee7f319576a8bc399f40f12fa7c06ee46c446bd,2025-03-18T21:15:23.910000 CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000 CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000 -CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000 +CVE-2024-24421,0,1,4e88dd82ad383565ba11e76981a0269bea9f13e2d5180a75bf3471976b15d75f,2025-03-20T14:15:19.150000 CVE-2024-24422,0,0,cc1fe911e5d9bb47992bcf93c1d25d6815fc8e41d6031807026099db7d254742,2025-03-19T14:15:36.380000 CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000 CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000 @@ -254643,7 +254643,7 @@ CVE-2024-27359,0,0,be475d000f5021d6959e65f4bafe704d89d8d833c8d9a5372f53a3261a6b0 CVE-2024-2736,0,0,42479b81c7b7bb1f0cc691ae9843f3a641e8308bbe69be2da07a921df442435c,2025-01-08T17:24:59.387000 CVE-2024-27360,0,0,77efb6dac120a74a11618c9e38ba64c067450192f4f4e7551dd0a979307a6c9d,2024-11-21T09:04:25.937000 CVE-2024-27361,0,0,77d90ea36f27bea18e74dba7c2e8422a0b7db46e4c92b699af7c71e56fcb3f57,2024-11-21T09:04:26.190000 -CVE-2024-27362,0,0,8fcbfe3c3547e93103323dff220f142e81361fc5323b166a8e70487632531ddc,2024-11-21T09:04:26.353000 +CVE-2024-27362,0,1,3cfa4859298354e800c227d27fcae704da703d96a129b5c2eb835d351d1004bd,2025-03-20T14:15:19.310000 CVE-2024-27363,0,0,000816135a5e0d34cea85b831dc31727f98550e96055ef57f0a1c37b792f2304,2024-11-21T09:04:26.527000 CVE-2024-27364,0,0,2b38d7b61761eb8fae8574705214eff11f6fa32157870ade9ec7bb3c14e790a7,2024-09-11T15:27:12.647000 CVE-2024-27365,0,0,5f8f510f6e0b2a91244e70e0993e7fb6e7757ce7481e4f49d2f55067f2792978,2025-03-14T17:15:43.023000 @@ -257549,7 +257549,7 @@ CVE-2024-31292,0,0,986b0ab4060b29cfcfee9fe97b6b0ff950c81bb21a038d80f5fc683b5e6c2 CVE-2024-31293,0,0,d8d6e6f78602b0ad0a4154e787b97348df673ad113624edda1a675b28218194b,2025-02-07T01:39:13.393000 CVE-2024-31294,0,0,5ed5372a360b624a446e22a07eb2be5cf527e32b35d5c2864187588206647b63,2024-11-21T09:13:12.927000 CVE-2024-31295,0,0,92ada23cfd6b9ecf1c9856a40c55ed02ad211edfe8a7aad41b745ec36391491c,2024-11-21T09:13:13.067000 -CVE-2024-31296,0,1,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000 +CVE-2024-31296,0,0,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000 CVE-2024-31297,0,0,2d029b4bdf26fe82a64b0a1aaccf74e271b6454d079b4835e5fa2ac47d2bde99,2024-11-21T09:13:13.333000 CVE-2024-31298,0,0,2958a144e3dc4e7d636f12ca52c8876629cdc355cb056d2115099db4cfd60ac6,2024-11-21T09:13:13.447000 CVE-2024-31299,0,0,ec5b4321e0a7ff9d16e5bf5531f41c6769ab3cd1532edef61e0876574b7dabcb,2024-11-21T09:13:13.567000 @@ -260256,7 +260256,7 @@ CVE-2024-34795,0,0,2980eb2b04f58009ca6933ac9c2bf39140881fed0d4ffa2acfa127fd3bb26 CVE-2024-34796,0,0,adf77aa5ae0b05b743ffb54f6e8071cbc89938c22f10224c355d78ba52b91d39,2024-11-21T09:19:24.990000 CVE-2024-34797,0,0,6f530aafb0c79dc6e1942bac34aca54d202e7a50e42a13f1b4f171aef5c26c91,2024-11-21T09:19:25.120000 CVE-2024-34798,0,0,d31a3d4fd1229237b83c5c7aa24a3b9da19c0978a5ec908f9d14385769b6cc2c,2024-11-21T09:19:25.243000 -CVE-2024-34799,0,1,3a804e7cf1bf1801cf92c2f65a7cef93e3d84eb614d9b73830c0b9b15e152bca,2025-03-20T11:11:29.417000 +CVE-2024-34799,0,0,3a804e7cf1bf1801cf92c2f65a7cef93e3d84eb614d9b73830c0b9b15e152bca,2025-03-20T11:11:29.417000 CVE-2024-3480,0,0,4386cb7c92d4ea0092f4f37d0eaf7cb53af2a8cb277ab46fd30ed1ba5a016e08,2024-11-21T09:29:41.613000 CVE-2024-34800,0,0,260e98247455ca4d7b68d5e5e5aa8394998a0ba07440b738afbc3bc365fd83af,2024-11-21T09:19:25.483000 CVE-2024-34801,0,0,627140b69a4f1b08cf615778bde031ce8ff206c76e21b02504465d28129ab9d1,2024-11-21T09:19:25.603000 @@ -261453,7 +261453,7 @@ CVE-2024-36366,0,0,1ad2bd86ee83972344f0b6d1bad7348c121df781e8bfb5e105b00680fac7e CVE-2024-36367,0,0,641557a81dbb2c7e627cce689572504d103545c194da9b835536d1ed1a22c9ed,2024-12-16T15:15:11.200000 CVE-2024-36368,0,0,db58c03bed12cd47c6e92371f3cee4963e9f815b9a39d4dd27c6c09d87c5337d,2024-12-16T15:14:56.433000 CVE-2024-36369,0,0,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3666,2024-12-16T15:14:39.120000 -CVE-2024-3637,0,0,21120798a280816ab7cf3ed70bbd1f108404954e011a1d26b78f2314da517882,2024-11-21T09:30:03.153000 +CVE-2024-3637,0,1,03aa85e73d93eb97b66e879231cf557ae036455ea78f110b4dd4c6bbfb3c2ad5,2025-03-20T14:15:19.667000 CVE-2024-36370,0,0,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000 CVE-2024-36371,0,0,8c67a57a561267db81a9d6dfe521c9fb10d023875446899a4b38782e30ce8c2a,2025-02-07T20:11:36.747000 CVE-2024-36372,0,0,372fbfef63703cf93d6911c25ac6a1b3dff36ab3730b92a722024f922c3e1785,2025-01-27T18:40:38.827000 @@ -262290,7 +262290,7 @@ CVE-2024-37388,0,0,57cf4af147a424250df7b46d4b3e45c17f1c85f1e3b7be38767484284423b CVE-2024-37389,0,0,1489604a1203f3e496edb5968007e7712bc53e8ecdd5d37a8fdbbb54a5a6e772,2024-11-21T09:23:46.127000 CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d791,2024-11-21T09:30:17.087000 CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000 -CVE-2024-37392,0,0,68322f4c961f1aabf72adbea5d801fad10c749a00a1f8ab2d2555d5ef58cceb8,2025-01-09T18:15:27.790000 +CVE-2024-37392,0,1,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000 CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000 CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000 @@ -264863,7 +264863,7 @@ CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 CVE-2024-40842,0,0,db2523caf221205dc10c3a414f106b2b11ae0a5ac1a11334c3597c355ad607ed,2025-03-18T20:15:22.593000 -CVE-2024-40843,0,0,8829e3a23cccba1ae50f91356127ff0b529c10fe5f02005e5dcf2ce88d5f4ad0,2024-09-24T15:02:53.987000 +CVE-2024-40843,0,1,8ea6be3efaec2c9e5133481462753fc84e21702aed9f7fdd4c3bfb05d4355cdb,2025-03-20T14:15:19.813000 CVE-2024-40844,0,0,913ad32f130ba48f710de944124bb663e932b9a1efef6f615196eef21a07dff4,2024-09-24T15:55:13.020000 CVE-2024-40845,0,0,ff022e47079c0e2640046a45a9238cfa77665c1eec1ab3ac2bfa695dbfb76ea1,2025-03-14T17:15:46.070000 CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0457,2025-03-17T16:15:22.280000 @@ -265338,7 +265338,7 @@ CVE-2024-41473,0,0,29d4e7b54fb4126a361ecc042f6a7b31e6afda88ff19b4c6fc756b4a5212f CVE-2024-41475,0,0,b8be933a7b93d0c1cf4b6c4176e5022fbe4f2cb5fba128f6278ff8ebfcb5d463,2024-09-18T18:51:25.513000 CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa3c3,2024-08-12T14:35:13.627000 CVE-2024-4148,0,0,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000 -CVE-2024-41481,0,0,6eb5de345a9525c442ab97a24184da0c8a5a6c01c4d00868ab2a9512a25cc800,2024-08-13T14:51:33.017000 +CVE-2024-41481,0,1,8208c7d3079ff59622479471ec534e219ab8ebf8f0a17d77e9eb69a949649acb,2025-03-20T14:15:19.977000 CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84172,2024-08-13T14:51:43.163000 CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000 CVE-2024-41492,0,0,d4569622d2ded7aa848fdcf6b8717deae380d497519daf4660cbe4b6bde4ae2b,2024-11-21T09:32:43.510000 @@ -266322,7 +266322,7 @@ CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05e CVE-2024-42636,0,0,22ddef02b2b67750bcb1bcbe76c7dedd5d6120870d17cf9424899ba2207db432,2024-08-23T18:35:04.560000 CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000 -CVE-2024-42639,0,0,ae37b1b7ad01c960465c980c3af4377ff9ccb779a7ecb0e0e91e2f8a45079104,2024-08-19T18:35:13.310000 +CVE-2024-42639,0,1,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000 CVE-2024-4264,0,0,a9295252e6ae8012e96f6ab16d3bdbd8ae0aa19058b71f0f60f84b3b14a65d86,2024-11-21T09:42:30.250000 CVE-2024-42640,0,0,e2483a866051d6ad5491e120ca1e63baafa96b595191cf3ff24d316cd3ae355b,2024-10-15T17:35:04.623000 CVE-2024-42642,0,0,8b9dbd65dd33a84fe9cea5686d35e4d710f2dc020d9e983ec9c75281204c9951,2024-10-24T17:35:08.450000 @@ -266458,7 +266458,7 @@ CVE-2024-4292,0,0,aadd195e174cdf2c4fac6389aaff8dc86b25c7743bd2be9bf1a6d13c5672b9 CVE-2024-4293,0,0,69c583a6cebc1663d985b0b5aab80748ed48988cde39273d49cc94d02a735243,2025-02-27T17:10:22.713000 CVE-2024-42930,0,0,fc971e94549728ba453549a80dd65aa5424c61cea7d4fdc47479a2cdf067adf9,2024-10-30T21:35:04.850000 CVE-2024-42934,0,0,1230de0d8b2dfa26c1ccbdc909ca39b36c856f70ea241827e7d7fc70ef4ace93,2024-10-31T20:35:05.250000 -CVE-2024-42936,0,0,ca47f93d6990a2ed2b66cc8e745a3b54d17ec522c5c7ef2a46ef719b194312c2,2025-02-18T21:15:21.830000 +CVE-2024-42936,0,1,db0d41b68cc2e69ed3676bbcc599462495bd3248682056610088b87d107575ec,2025-03-20T14:15:20.333000 CVE-2024-42939,0,0,4547b4b1e0943985622e8f34eff1a8bb854051e0a4587d88630db6433049cbb9,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,978c41a128903ef94c19265c7b92508697bb43ce92abd5e24991df929ea21ba7,2025-03-10T16:18:28.643000 CVE-2024-42940,0,0,b0d827c11b94f934185bd71744960303141938187c6d4d4091c6fd4d8544de72,2024-09-03T19:35:15.163000 @@ -267583,7 +267583,7 @@ CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0 CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000 CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 -CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 +CVE-2024-44139,0,1,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 CVE-2024-44142,0,0,4afd7ef53a2dfe128a5ff6336e36df1d2c0f052696b3178fde4b8df4c9c5a909,2025-03-18T16:06:18.150000 CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000 @@ -269346,7 +269346,7 @@ CVE-2024-46919,0,0,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b5538 CVE-2024-4692,0,0,f05887f354d4b5a1374a63331763ec3fab53a73a54d461bd27a99fbb622b007d,2024-10-21T16:10:14.873000 CVE-2024-46920,0,0,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000 CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fccc6,2025-01-31T17:15:14.113000 -CVE-2024-46922,0,0,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000 +CVE-2024-46922,0,1,e625a1ca27e7ce46289ec0a52bbb8a54160d642b79f4e4aa86349ef0bca78ae2,2025-03-20T14:15:20.660000 CVE-2024-46923,0,0,e734050db8ab7cc8ca637234ab5af2701e708c793b446c418723d1f652b62f80,2025-03-13T21:15:42.060000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46933,0,0,2ce9d989b382fc5bee082bb98227d9250a7b0964296c06eece80ce41c6d661cc,2025-03-13T14:15:31.887000 @@ -270565,6 +270565,7 @@ CVE-2024-48580,0,0,e540b5d156a186615d240d0f099de52f053b3a0dab4d95b774286d8b7357b CVE-2024-48581,0,0,d36eaf42a8c013f5398a1310ef6b2089c8383aae1cbd0f696279268a4ee67822,2024-10-28T13:58:09.230000 CVE-2024-48589,0,0,da15b9606dfd0e77f375ffad72377af01dd4bccbaa88f234dfa1d5b761376490,2025-02-11T15:15:17.637000 CVE-2024-4859,0,0,0aacc5a3cb0a14cb14387eee0566e83bcbb93f6f27bda5c3ac0cfa9bf2864566,2024-11-21T09:43:44.833000 +CVE-2024-48590,1,1,d60bdb7fb92ba62d6115d2ea3f7727429c51024d142f6c29ebd26d5e1f7049a7,2025-03-20T14:15:20.830000 CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a117,2024-10-30T17:35:14.010000 CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,731d4e23354be097812d72b15d7e6992968e209a4c37edc22419fab0e7ae3b67,2024-11-21T09:43:44.947000 @@ -271522,7 +271523,7 @@ CVE-2024-49896,0,0,4608f4ad6e42fc06461da5fe65db12307f9fbe5bfa7303d6f5fcef17c6b60 CVE-2024-49897,0,0,f21982453a3cc8fb19103718e352b342409eb035002c07e7f2b7106c2e90b1a9,2024-12-14T21:15:27.100000 CVE-2024-49898,0,0,22bc129ba8563c9e34b1b3fa5103ddc830b89baaba8bac6e23fc2d64c3db40a3,2024-12-14T21:15:27.313000 CVE-2024-49899,0,0,be6d440e13bc214f8fcb8c201e3d1de8a8e46f184cb3feb3671077af7da4cef7,2024-12-14T21:15:27.483000 -CVE-2024-4990,0,0,72b27b076f3f0b2f49a5bca9c191dd14ccc83f24df53f266a99a4492487ae48a,2025-03-20T10:15:32.603000 +CVE-2024-4990,0,1,ac500ecd8d67c819832ab19149b742d9b068d1a489f8cc4beaac6d11a7cd49ed,2025-03-20T14:15:20.940000 CVE-2024-49900,0,0,be46534a57a20d58cec505e48cd7d8142f6ce9dcfbd590e163062dad5e7a918e,2024-11-08T16:15:31.090000 CVE-2024-49901,0,0,449600b0174e94289f7aaeaf2eda13e5e7905c5d31ce1024a439b0b5127bb706,2024-10-25T14:05:16.967000 CVE-2024-49902,0,0,fcf302aa2f436b65d2da6d0a300010a8c5652bc11fcc195dad9599c58d20adcf,2024-11-13T13:47:16.923000 @@ -272421,7 +272422,7 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721 CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000 CVE-2024-5095,0,0,18b4308f836a45ef93eb8dd3e5b61ffc05eba17456c204bd53a6a5094eca36bd,2024-11-21T09:46:57.340000 CVE-2024-50953,0,0,0d9047013e59df5720140c1f66c4526adf1647380de84da3a699f682624c0d64,2025-02-18T22:15:12.210000 -CVE-2024-50954,0,0,a26f247eb8f3974e6b4ecd190acdb08702561c133b3592f87f0c7d35e39be60f,2025-02-18T22:15:12.327000 +CVE-2024-50954,0,1,02068458dd8d6a2ffb99f46bf4d0a02d5a8b6d37dbba06978db764a483c085a0,2025-03-20T14:15:21.033000 CVE-2024-50955,0,0,d286c5359e65ec4107e3297ae49fde58b3efeb0287b5581ad11b8684b68fae9a,2025-03-13T19:15:48.793000 CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000 CVE-2024-5096,0,0,158df124ac63cd0f2f1e57be7cd9d0373dc2a0ceea7bd2bb10f556aa3af44df8,2024-11-21T09:46:57.483000 @@ -274968,7 +274969,7 @@ CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697 CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000 CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000 CVE-2024-54443,0,0,a19735fa20af88aa6b80d25f5f3fba13bc36980cd33611fe0939754004239647,2024-12-16T15:15:23.420000 -CVE-2024-54444,0,1,c20d412e8c110d9c428cd585d8c937ebdddfb168d6b852db22d2e1df975e5eac,2025-03-20T12:11:53.293000 +CVE-2024-54444,0,0,c20d412e8c110d9c428cd585d8c937ebdddfb168d6b852db22d2e1df975e5eac,2025-03-20T12:11:53.293000 CVE-2024-54445,0,0,79d2b578bb9c47c0ec49e493d011f256b6b50e476de6283513b55937e31b5c96,2025-03-14T18:15:30.203000 CVE-2024-54446,0,0,f9e645000b4f39077e03afcc74a6e2d5d45571677851846e639616c10a139375,2025-03-14T18:15:30.343000 CVE-2024-54447,0,0,0a746a07e8bd291ded6eeafb47a5003c642b24654a250b379eadcd2adaa82746,2025-03-14T18:15:30.487000 @@ -275754,7 +275755,7 @@ CVE-2024-56255,0,0,e25a417498dee039f9b9bb01d0aa00b5e9649106ae99313547414bcf56b7b CVE-2024-56256,0,0,e02d1c8c5bc51a1b179a5bca398725aea9ad7a89db71f48878c2f5bce3510a46,2024-12-31T11:15:09.543000 CVE-2024-56257,0,0,e31ff6866c2c4c35beae38750d7442e6309a0a5186f5a5bb07d11dea1360b332,2025-01-02T13:15:07.963000 CVE-2024-56258,0,0,bb3d522bfb9ec7084071bd1458c20c85e22eedc9d1860d39a552090ae935d658,2025-01-02T12:15:27.510000 -CVE-2024-56259,0,1,e0c8412cdeea2f98f8cc31ff1f731125fd8e9f5cd79097d0d7d07cb01ec086af,2025-03-20T11:30:46.587000 +CVE-2024-56259,0,0,e0c8412cdeea2f98f8cc31ff1f731125fd8e9f5cd79097d0d7d07cb01ec086af,2025-03-20T11:30:46.587000 CVE-2024-5626,0,0,93ceb7b86ba8ddeb56f02be4839062ac9cafc2abafa79ca42f7d116eca5e4c5a,2024-11-21T09:48:02.503000 CVE-2024-56260,0,0,77782cf1bcec62863b0b7099afb29f72582a9c0dac2b55d67631c27108ab1e8e,2025-01-02T12:15:27.780000 CVE-2024-56261,0,0,b8a50327124e69054396fe0d6d8b0b9034f14ca027569c69a311832fb342e769,2025-01-02T12:15:27.920000 @@ -276503,7 +276504,7 @@ CVE-2024-57473,0,0,d4deaefeb6fcbba59b8ce003fdeaebe59c96858a04f801a87a31eff516a54 CVE-2024-57479,0,0,a4fc4c04a4d0cd0e22b8fe1e9d84faf33bcfbb80c5a2b55e9ddb9daa820188a9,2025-03-18T15:15:58.493000 CVE-2024-57480,0,0,8afd2f2509d24fb5fcd6d83f3abd7082d4bc0ce361a4921ced1cc67aa295a249,2025-03-18T18:15:28.130000 CVE-2024-57482,0,0,859c1ed6b53c872a2c976c747abee784c7f6cb88ac30b945b593d0bb4868f5bb,2025-01-23T17:15:17.677000 -CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531697,2025-02-18T22:15:15.143000 +CVE-2024-57483,0,1,718c2397b7ee766ae1581a06e6b5ee3a31d1472fb49ca307826c60720c946e7b,2025-03-20T14:15:21.193000 CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000 CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 @@ -276617,7 +276618,7 @@ CVE-2024-57657,0,0,b09c438a14c3db4fe411704529d496d2bb6233f86346a91943c98c21994b6 CVE-2024-57658,0,0,e12e2e5c80101e7e7b06d323b6720ff3675db1a8a27ec11343898fca21b6fc03,2025-02-18T22:15:15.713000 CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000 CVE-2024-5766,0,0,67725e17649b0f8972fafe3ef5c9865eb73f6e4c38e03fd4908cab0e675ef8cc,2024-11-21T09:48:18.263000 -CVE-2024-57660,0,0,88c987ba4540341aa705a587cfdfec7c3f00e6285f6c4d6b5a9ea3f6268a91f9,2025-02-18T22:15:15.830000 +CVE-2024-57660,0,1,767487331585534693906d19eed16dd08ba791ffd30c9ff7fb412ad7be1e1f37,2025-03-20T14:15:21.353000 CVE-2024-57661,0,0,6d08cb67e58ae875891d256b6bd08dc049d206ee925b20ca33928959aac61174,2025-01-14T16:15:34.240000 CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaead1f,2025-01-23T17:15:17.830000 CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18 @@ -278103,7 +278104,7 @@ CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cab CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809ad8,2024-11-21T09:50:48.257000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000 -CVE-2024-7053,0,0,42619b2d75ecff17bb72d6b297e35d5aae26bf8bcf32c3513b1851cc7979e694,2025-03-20T10:15:36.217000 +CVE-2024-7053,0,1,780c9d848134601253f66f22e1bd2bcc1d9dd0cda906ee21b6c0278b9f69c330,2025-03-20T14:15:21.553000 CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000 CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000 @@ -278759,12 +278760,12 @@ CVE-2024-7763,0,0,2bb0069c10c49c394434577c411e688ec0e38c5bfa827add12427bf96ca994 CVE-2024-7764,0,0,aba7fa791b67ddee6e91c320b0f5308cad7c95f9bf24520207cbc2678388b56c,2025-03-20T10:15:36.717000 CVE-2024-7765,0,0,e0986466b0016ec6db480b569653a5a0d523298e015f452fa2aed13b6f463e0c,2025-03-20T10:15:36.867000 CVE-2024-7766,0,0,d14979bbb21be0f1e33dd13bb8ac8aa192112b4d26281d207dd0af825983d02c,2024-09-26T20:37:18.900000 -CVE-2024-7767,0,0,5432b646d52b4454c9cae989871999b6dfa811078b5eb2716cca5af4b4895232,2025-03-20T10:15:37.007000 +CVE-2024-7767,0,1,ec3b13e0afad40a1603c117f67f1b3ca45fdfc5b7a0bc0d95cf6790f7b4f659e,2025-03-20T14:15:21.697000 CVE-2024-7768,0,0,adbbef945e5100a59e354a28d1c822816b13fc184f7cc36a6a5a4cd065a0e6cc,2025-03-20T10:15:37.133000 CVE-2024-7770,0,0,d144948d53cf7a2fe1e80e41ba3f0d8bcd5e6e660c76cee450b8106e9deb27fb,2024-09-26T17:49:17.457000 CVE-2024-7771,0,0,88fdae4e398366a03a1ae316055af270b6b5aa00630d7c4015e0142809fbb6c0,2025-03-20T10:15:37.257000 CVE-2024-7772,0,0,396b4597e25e547435b7faa77b18bd9ca62c7d2ea5d3c311d5015d799171c4ed,2024-10-02T16:10:49.387000 -CVE-2024-7773,0,0,79884efad438fb8e04b03e9e3863617e06866bcecfba80ab2b39b580b32a07d6,2025-03-20T10:15:37.393000 +CVE-2024-7773,0,1,06c44578a0053a8e22f1d611df6f2cf85b6e2034032b16d487209ca4ec43347b,2025-03-20T14:15:21.793000 CVE-2024-7774,0,0,4e4e13ce1c7814e538ce8c1c913f7f3bd71fdf1386aa44aa9b64c07a2218eb14,2024-10-31T15:39:04.510000 CVE-2024-7775,0,0,85aff6affc98cdbcd7e92d0b586bee681b645ef08f2c175be8949a69d8ec938f,2024-08-26T18:18:22.887000 CVE-2024-7776,0,0,1c16e10531d1327b0384eb3402126268a532a224051bb002f3475000e8209d6c,2025-03-20T10:15:37.520000 @@ -278996,7 +278997,7 @@ CVE-2024-8017,0,0,5e0f0040fd6d8d733b91bb077c8b0fa74b7d2336260f72b52452b9d5177dd0 CVE-2024-8018,0,0,b7e1b555ede861555814825288c3003c2053547fd912d3149ae1092d592fe6fe,2025-03-20T10:15:38.887000 CVE-2024-8019,0,0,de3ec14c02dc85e87d5f1cc81c6aa4fb2ae2fdc988128074c969b6c093087176,2025-03-20T10:15:39.010000 CVE-2024-8020,0,0,b36705156619d31ad44530ca93fd75d04556b5a5ebecd285f8beae508486c07f,2025-03-20T10:15:39.137000 -CVE-2024-8021,0,0,22faf242aac469d2adfe469824599a70d04ea91881468701b305c22559bbcd6d,2025-03-20T10:15:39.260000 +CVE-2024-8021,0,1,fc9a8a3d0393f342aa8feff06c8b6eb6fcd052be7bbf1af8098be8f3e69431a4,2025-03-20T14:15:21.883000 CVE-2024-8022,0,0,ee3d8b54bc0b0b17ad96b91114790ab25b5a536bbe36cb188cba8f36dec52123,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,61a92bc8448dc47a65d0bd143c811b4c703b14e871acdf616b3acef8aff34c21,2024-08-21T12:30:33.697000 CVE-2024-8024,0,0,cec4217e2c19633c8f10571f92164b7002bd86833ac717efa8e94e195a4dfb21,2025-03-20T10:15:39.380000 @@ -279025,7 +279026,7 @@ CVE-2024-8048,0,0,ff295b9c9c8fa93e0c6a3b5204f97237c28cc4185a00b44db9d7dce4c3cc3b CVE-2024-8049,0,0,274cda9f191d2467ab1f7fb567537911ee77e963260dcea32ea2b6e62622893b,2024-11-18T17:46:38.177000 CVE-2024-8051,0,0,8e9fee878d5e7631408c4906ee6d422d2dad39846c3e9dba922a4347408befb7,2024-09-27T18:19:41.863000 CVE-2024-8052,0,0,01bfdadf93739fc2d4fcd8ca2ee549a442e377fc63e756e286ed6ad0eef90332,2024-09-27T16:55:57.383000 -CVE-2024-8053,0,0,2bd655220e3f715e7337b8d7b5d296ef06fdde60ae654d2e92e281b9711e2980,2025-03-20T10:15:39.993000 +CVE-2024-8053,0,1,768eef01375c78a74dca1db6bc39e488a62b5b2829c3b11df4860704f7538440,2025-03-20T14:15:21.977000 CVE-2024-8054,0,0,7587a87813e515f4d1b36dbcf3c7051a83e94df022103a0c59749ae8c66becaa,2024-09-27T21:29:57.607000 CVE-2024-8055,0,0,e14beb40fa719542b0530358c0d6284da2fbc8813aa8d27c56a70b725b1ba929,2025-03-20T10:15:40.127000 CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670dcc,2024-09-27T21:29:42.600000 @@ -279066,7 +279067,7 @@ CVE-2024-8093,0,0,658097a3f03fb7b07930350cc5b4a7146f8d518799ba824b264c0334bbd362 CVE-2024-8096,0,0,8a37207d9f2a46b185481a3796a938184964cdd0c881235f37b08701a0d522c6,2024-11-21T09:52:40.063000 CVE-2024-8097,0,0,c73e330cf372ba66691065108ce7a7c3faa714d62d6d305b38abb0b1408d0b60,2024-09-12T12:35:54.013000 CVE-2024-8099,0,0,60bcdccaa46762d88cbc1d228a9af35fcd658fa49f6f9dae5819f583b1183f98,2025-03-20T10:15:41.013000 -CVE-2024-8101,0,0,3e4c165096dcd64c8c28a48f89ce05208c3300da1814152ee7eee0fa372e23f7,2025-03-20T10:15:41.130000 +CVE-2024-8101,0,1,d15187f7c9ed4b266d60872981d998e66e792b835fba05bca0f46fa3ec0539f7,2025-03-20T13:15:36.007000 CVE-2024-8102,0,0,c8d7e80f3d01e30f125b61e16f2075e20200cf969389ffd8a679fa4e25d12ca9,2024-09-05T13:28:54.747000 CVE-2024-8103,0,0,c2a7656e489435896ea57a9d9970fe3499a0bb14c13a60e9b0db54bcdc5dc797,2024-09-30T14:20:16.063000 CVE-2024-8104,0,0,e493a0bdd9ca485d90b4c1faac1d17a7f4cda81ecf7833fe4a37d0f679df8b4b,2024-09-05T13:28:06.817000 @@ -279117,7 +279118,7 @@ CVE-2024-8152,0,0,98db9d7dc13f1febbb0cf16a3d1b4428b631ac462754e50d563613430895bd CVE-2024-8153,0,0,0effa1d585d92b22b2bee0160ab2cf7b99ed45e0729ec56b891bdb22a3f1b97d,2024-08-26T19:04:44.310000 CVE-2024-8154,0,0,ca9e06a7d89404a0292aa904efd8321ba7dee429ae970ccfc2f57c75b90c2259,2024-08-26T19:06:34.983000 CVE-2024-8155,0,0,6294ff0f9bf12227a0434150d97903610dae7f20264328cb3f31cf4229925798,2024-09-12T13:53:23.827000 -CVE-2024-8156,0,0,209b20433c99824e164d9ab6ca90512160933a8e9a1464fa96090c983ed581d3,2025-03-20T10:15:41.247000 +CVE-2024-8156,0,1,c620650aa3f75450b27ddf5dd7eb09556430c66d3737a2b29c8bff59ead6b031,2025-03-20T14:15:22.073000 CVE-2024-8157,0,0,f194cd811aae8618c2c4369d94ae770b67b76f78a64aed0c01651ba5a55d47d4,2024-11-21T18:15:15.043000 CVE-2024-8158,0,0,944909102e9270c82fa14e85bb24ad783610d6fe36a2602f90346c0ac4091a54,2024-09-12T21:00:00.573000 CVE-2024-8159,0,0,57585c099c6e71816992367a7f5e0a7b52a1b97612eb9511539812f640cb8c59,2024-10-04T13:50:43.727000 @@ -279415,7 +279416,7 @@ CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f2 CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000 CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4df5,2024-10-02T16:19:15.993000 CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000 -CVE-2024-8487,0,0,bf9faaeeb74502214229b844f62abcf3671acd3c89bb37a61eeb23f21d113a7f,2025-03-20T10:15:42.360000 +CVE-2024-8487,0,1,ec10a804b29650135c3cefe30166c8106b2b1b2b83110e7e5f98ccf8bd1d1cf7,2025-03-20T13:15:36.117000 CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000 CVE-2024-8489,0,0,52edfd2b7389b20e647ab142918823acc91e245ee93f963df371a8d7f4fc648e,2025-03-20T10:15:42.490000 CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000 @@ -279474,7 +279475,7 @@ CVE-2024-8552,0,0,70425fcd76e2369e4f564ff13922902378a4810d60a83152b70c4e59b4a95b CVE-2024-8553,0,0,26561801580e04aa21c5000b17dc07cb325ac8eca0511de872259669245de7db,2024-11-06T09:15:04.370000 CVE-2024-8554,0,0,228d834dcd3f41195363e5c1711d64c5b0eed379efa685020ea628e379455c43,2024-09-10T13:52:23.250000 CVE-2024-8555,0,0,5a758da3985d194a1f0ef1f54640bcffd33f895627c4fecd537e62fbb689167e,2024-09-10T13:53:11.847000 -CVE-2024-8556,0,0,cdc8e82dc6f99723992d85f7fcf9598707b5cb6424289e459ce2d5cabd07b687,2025-03-20T10:15:43.230000 +CVE-2024-8556,0,1,acf4ff2956a53bd51191c5943f697cafb5df08b1d66d2a22ea4d280652663733,2025-03-20T13:15:36.213000 CVE-2024-8557,0,0,cf8dfccd1335edd5c89c2034caea817398936144dc2c2c33df530aaca4136055,2024-09-10T14:19:36.280000 CVE-2024-8558,0,0,e613269d580840325b2489df61eeb8337bf0f3a386faa55a5d3b7612bb6f9291,2024-09-10T15:50:24.143000 CVE-2024-8559,0,0,49a9895b592ce20ad4dd76c68d2e7295942ca6b3b2c38dc64019571b971c23ab,2024-09-10T15:31:32.443000 @@ -279668,7 +279669,7 @@ CVE-2024-8765,0,0,476ee0c5aa9650972097c78aa7b881c6caab39588565ad830b7f4fa773900d CVE-2024-8766,0,0,6a1d0fd4381a2aefa3c3ebd3af5a6a5535392c6f90911151b52ef1d8a2df5478,2025-01-02T16:15:08.817000 CVE-2024-8767,0,0,33d117715b6ccb12375aec292e3823ec127bf8cb9f35e261208b79e9c4041c2f,2024-09-20T12:31:20.110000 CVE-2024-8768,0,0,68f3eb07488e96273391cb6bb54e3745accce33e0ac973772852eacb968b15fb,2024-09-20T12:30:51.220000 -CVE-2024-8769,0,0,f1cbb934ab93ba50b3961a0951ee5994879e97027cb8493c3156727a06d85ae2,2025-03-20T10:15:44.220000 +CVE-2024-8769,0,1,8bb9c587ca0a2e9b810fe8a773c98422603eca09e382786db33af4881988c405,2025-03-20T13:15:36.303000 CVE-2024-8770,0,0,c7113885ecad220e747c3ea367cfe403add592b8fe01afb3e0bedfd37441b198,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,0e4ebb772d4e98e8a4a526dca961dd5c09acde45f28acffd114423f8f3c183ac,2024-09-30T12:46:20.237000 CVE-2024-8772,0,0,e8bacf7bfc0ec5a21b856ef5850c73cdc0412d618e7556967faae405da0f4139,2024-11-26T08:15:08.033000 @@ -279846,7 +279847,7 @@ CVE-2024-8954,0,0,136495b47853816b760c8cf66770d1244c15457a64f73fdd74da85e3de78f6 CVE-2024-8955,0,0,c1b148cfa42004d4dab2e8f83a4423b2660db66669b816680c4531b1a960905c,2025-03-20T10:15:45.087000 CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000 CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000 -CVE-2024-8958,0,0,50c7603fce09b5aa851705a4a781f0e91424faf2222aa1275b1dc6e4d061f369,2025-03-20T10:15:45.220000 +CVE-2024-8958,0,1,937a10daf3f6960233f3973b2c9a05e8597bd780125b24e1707f9d20214ad264,2025-03-20T14:15:22.220000 CVE-2024-8959,0,0,bde237c149fec6c92210fdbbc7aacdd281f76acf15c3b725ea185fe4a892f9ad,2024-10-25T12:56:07.750000 CVE-2024-8960,0,0,5206ec29ce7fd60504adf115ea6b5b2889bd827689cb9c5d920d592cf8c3b416,2025-01-29T19:36:35.170000 CVE-2024-8961,0,0,0e23951b1c11ce66a850bb476328c998d665b24a66ba7865bdc4d4c8a88285ad,2024-11-19T17:01:15.787000 @@ -280429,7 +280430,7 @@ CVE-2024-9608,0,0,0fd2e957c376544247f8b2a16ef434733b8eb47ee4d1d04d34b8ba94ac48e3 CVE-2024-9609,0,0,a32ad4ba0330c8bd46a334ed0a6f34b381196d6ee0adb5a1527caca9a51b5222,2024-11-19T21:28:42.670000 CVE-2024-9610,0,0,f327439241391b51adbb56ced5a29061a4e9cbef39684c65a214212a54ae604b,2024-10-15T12:58:51.050000 CVE-2024-9611,0,0,049688b12d23536b7521af43a85c6bc56a995bcf550dd4b062c24ab61d06803f,2024-10-15T12:58:51.050000 -CVE-2024-9612,0,0,dfae4d1023a5df70c767fed1285fa9a93091ccbea1b5a3c68ce1160a6e87843c,2025-03-20T10:15:49.560000 +CVE-2024-9612,0,1,d2b3712b4258a2237356693543fd1aa9c558c0e952b599ddcb02d5804006beab,2025-03-20T14:15:22.310000 CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe63128,2024-10-28T13:58:09.230000 CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000 CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000 @@ -280686,7 +280687,7 @@ CVE-2024-9896,0,0,3adb19d39d02ce2ee570a7726fbffb3aaef96e44b637197ad8e5d0de67af08 CVE-2024-9897,0,0,d10885bb1a732639d22e8cf3cdf237a94daac50b02bfbf8f8b46ddc2a8d8983a,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,1537edc74ab6912e0f49b36b0b2f31dba2b9152cdab29cedc38dec7daa343d47,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 -CVE-2024-9900,0,0,23890e3c68d390425ef1e68069c4270ab1727ec0b87943f80359cff841e0c85b,2025-03-20T10:15:50.417000 +CVE-2024-9900,0,1,ac53ba8c7847af9a535bd2b64d25996d1ba83089feecfd12a53cada003a7fb09,2025-03-20T14:15:22.403000 CVE-2024-9901,0,0,9ebdfd08ad6d03e64b48300c44bda422922a5d1abb4658f8574bd3d53377dd8e,2025-03-20T10:15:50.540000 CVE-2024-9902,0,0,988cf1e25e07eba8fa29aab2e0822f1bb86c9b585332e08c3140d35a61eec696,2025-02-25T20:15:36.143000 CVE-2024-9903,0,0,3419001cde5082b79796b9c94795511915defc2d60c542640b205ea9a613358e,2024-10-15T12:57:46.880000 @@ -280909,6 +280910,7 @@ CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f CVE-2025-0245,0,0,d3f443614cf269edf96a7044d50adaa402232a03e23aa318a1f5e6bf4990a77e,2025-01-08T16:15:37.693000 CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e08082,2025-01-08T16:15:37.880000 CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000 +CVE-2025-0254,1,1,196a81bbb17bba05736dd651af49296e243c295e3d52b7511caf99525e94bdf0,2025-03-20T14:15:22.493000 CVE-2025-0281,0,0,a129a29bcfb1ef9ab2876b8a3ad91d47775b87563c176e7a890fd116399ef380,2025-03-20T10:15:52.153000 CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 @@ -281023,7 +281025,7 @@ CVE-2025-0434,0,0,865677e7d723396f8f162183763a82d312d1d17bfef7ef19d82b8b00574da5 CVE-2025-0435,0,0,60338c7b5ffc7e99e8a50f2cf427531bc1f9bac53588ae4248bf7b091dcac4f6,2025-03-19T21:15:38.093000 CVE-2025-0436,0,0,040db70870a9b4a1f4f472cb714947a73423d7303f229ed73ca1d249dd10a962,2025-03-18T20:15:25.330000 CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000 -CVE-2025-0438,0,0,8c7333aeb87f87a4f7e9edbefc8fc5ab12029c07bdaef09c154718d38cd9690f,2025-02-18T22:15:16.743000 +CVE-2025-0438,0,1,08c4703e7314b15c95bd12464cca58b2a2639530903c5288a8aaa24274d51d99,2025-03-20T14:15:22.613000 CVE-2025-0439,0,0,101658db461148311c4db52613ef0d8a033b47ac11db7b69a0cae87e2b2f57c1,2025-03-17T16:15:24.267000 CVE-2025-0440,0,0,bab5646fe57be32b81759b8d43c7715137b5a3dd2925726f076ac6ff1f169843,2025-03-18T21:15:32.617000 CVE-2025-0441,0,0,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000 @@ -281457,7 +281459,7 @@ CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a279 CVE-2025-1063,0,0,f6ebc08f6e2568783d19012ba06b647ad752279ad00c89461f145d2a92f0083e,2025-02-28T16:07:01.990000 CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000 CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000 -CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000 +CVE-2025-1066,0,1,ea1d475b44d8de28b14f691f200e1ff9439b36f3af9912524721934b30c9a74f,2025-03-20T14:15:22.783000 CVE-2025-1067,0,0,927436541ec90f91ee0c55a0f16d97d24f4f02b2b15a1545388407257072bccf,2025-03-04T17:37:53.743000 CVE-2025-1068,0,0,34ea09810e1cb88030f7e45203d13961eec4e37f8d9cce7698642bd1dd286136,2025-03-04T17:37:41.050000 CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000 @@ -281724,6 +281726,7 @@ CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e537331 CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000 CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000 +CVE-2025-1496,1,1,af98d675be57151ae867323c534c076061e30c35cde524c8f778ffde4167b7e5,2025-03-20T14:15:22.920000 CVE-2025-1497,0,0,73c65262de8597db2330458449134b69d8689fcddf215f0ff2ac234a69e62d4c,2025-03-10T14:15:24.723000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1503,0,0,bf0115e84ffc3af0aac47a0335c32a67525411feb884b3b8341d4eecd156a3ff,2025-03-13T05:15:24.917000 @@ -281731,7 +281734,7 @@ CVE-2025-1504,0,0,605a331819c229096cc2c4923e74c9e91e1a9ba7f49878bc5577cb113c8bbf CVE-2025-1505,0,0,4ca6a7ac695c0aadd7c07c0b0b554235345ea5ff41d366464d688f8a76207c56,2025-03-06T20:36:32.810000 CVE-2025-1506,0,0,56e7cfac203f4722aa6cad39100296d27461de65c7953a7f5e4e340ab83b346b,2025-03-06T18:54:45.667000 CVE-2025-1507,0,0,085f56d06f66199f0d98bb7d083b47449b1fbc8b00fd031c578655dd7e33a4d7,2025-03-14T09:15:14.477000 -CVE-2025-1508,0,0,b209810aaca9c17cf5318eaaa420f1820d35b63cb55c07b44197444b0aa14ceb,2025-03-12T04:15:16.520000 +CVE-2025-1508,0,1,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9ef6,2025-03-20T13:57:41.123000 CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000 CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000 CVE-2025-1511,0,0,279c911956f36e53d500484b1c7383564c6360bea4a7283f4d6a3dc61c829703,2025-03-06T17:55:34.303000 @@ -281903,7 +281906,7 @@ CVE-2025-1797,0,0,21932d476b45bdfb45af7756ea9c313776c862e5d32503d17ac7b8ec47d6a2 CVE-2025-1799,0,0,ecb0d3b56d4b323c7219f9a8afa0b58675a5a7b2283b2f8ba1e01ad7d5346823,2025-03-03T21:15:16.707000 CVE-2025-1800,0,0,ccd6f4bbccefc45f48ec444e61873d1dbe21c83cff41f19d6933a1cac20729cd,2025-03-05T03:15:09.160000 CVE-2025-1801,0,0,a6bebf279dfd13940c53ee57820f3d2385eb4821c64d6b780ee1162086e6c089,2025-03-03T15:15:16.500000 -CVE-2025-1802,1,1,8baf246b279a56194b8fd72ea8f4f55f81e9a48ed8fe05c07cfd0cf86a14113a,2025-03-20T12:15:14.413000 +CVE-2025-1802,0,0,8baf246b279a56194b8fd72ea8f4f55f81e9a48ed8fe05c07cfd0cf86a14113a,2025-03-20T12:15:14.413000 CVE-2025-1803,0,0,61b8ea959516cf458cfa0ea204219ee983e8adc2cba473f893652a1e07a05d40,2025-03-01T01:15:28.077000 CVE-2025-1804,0,0,d9a84f00fff83ba1b976e1f99e54d8d7bd9d32a10eeb71378628c4f7f3e82618,2025-03-07T20:15:37.550000 CVE-2025-1806,0,0,912413ec1862655f80c0924ce2f29f25f2ff7976c05332199dd89fb175bd2feb,2025-03-03T21:15:17.103000 @@ -283407,7 +283410,7 @@ CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32a CVE-2025-22803,0,0,40579bef037b2313067d92dc65978feb36bebc6c2ed9d74c87c1ec3f2a0020b9,2025-01-09T16:16:29.627000 CVE-2025-22804,0,0,f849e4fceefdae8c4a10bdfcd020e30e710279d149d09f73eaf1413b5639f4c9,2025-01-09T16:16:29.787000 CVE-2025-22805,0,0,48706ba2e450e09bd94a95527a9affded1d7c5bdf1954e506fc7c0ba15e41310,2025-01-09T16:16:29.937000 -CVE-2025-22806,0,1,003f1960af19a3a7d2834a9c8e0c00662cab208fc10c0fa1b7f034cd16957102,2025-03-20T11:25:38.747000 +CVE-2025-22806,0,0,003f1960af19a3a7d2834a9c8e0c00662cab208fc10c0fa1b7f034cd16957102,2025-03-20T11:25:38.747000 CVE-2025-22807,0,0,ced3f50260e3170a9fd485cda90cbb19dd2040ef2dde019f7e65e19c5e51985a,2025-01-09T16:16:30.253000 CVE-2025-22808,0,0,1d405d848c33182da454380b95184a0511541dbaf161916a1cd9f31192056b68,2025-01-09T16:16:30.403000 CVE-2025-22809,0,0,9639933c123de30217540507527e9ab6e2f2d9e2437d2d1fcc08b2e18f33c6ee,2025-01-09T16:16:30.557000 @@ -283451,12 +283454,12 @@ CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29 CVE-2025-22896,0,0,cadb16b30aa07fd019cf5a31775c9c5a2a292f523d02b1c4ef2ed5d9558f302e,2025-03-04T21:25:33.663000 CVE-2025-22897,0,0,9a22b887d81fcac41848fbf55628d95a06189013b3a027c7ddc8085a3cd9eb1a,2025-03-04T17:39:48.960000 CVE-2025-2290,0,0,11af56ff6285a5f3028ad838da5752bac7bb9a41af222f693267b4ccc9e5ae68,2025-03-19T05:15:41.180000 -CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000 +CVE-2025-22904,0,1,f46e7567d154eb64bb50379cd0362c380a01047478cdeb7c8b7c70993e4fc47a,2025-03-20T14:15:23.117000 CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000 CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000 CVE-2025-22907,0,0,20b58859c8117d6948f4881a8512703bc1a347c501765ebfad2b82b119c89bb4,2025-03-19T19:15:44.263000 -CVE-2025-22912,0,0,bc13de059e2dac442bfb981cb719957ca16fc9db7927c792711a8a050a6d3b57,2025-02-18T21:15:27.630000 -CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e974,2025-02-18T21:15:27.790000 +CVE-2025-22912,0,1,4957f47e6c8b906a99274165fe2b6132122b49fe67062be07a7b117c8e0a557d,2025-03-20T14:15:23.270000 +CVE-2025-22913,0,1,78cb787aa11587edea1bf14131cb93b96417dce962960ce24e566e922f13d71a,2025-03-20T14:15:23.423000 CVE-2025-22916,0,0,894d45082057205ae80e6263e604aa99aac9da87f2527da37d587ece072246ff,2025-03-19T15:15:53.807000 CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000 @@ -283489,7 +283492,7 @@ CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000 CVE-2025-23006,0,0,85d3eb8a6cd7a895863210fc386b2b763ed49b703bb4f960bd8ede52b28a4e0a,2025-03-18T18:15:28.613000 -CVE-2025-23007,0,0,8755d54df92e87b37e4145f55351bcaff32866353888bcdbfad8a65ec70ebf2c,2025-02-18T19:15:27.263000 +CVE-2025-23007,0,1,d1b5ee041d1da4d5d9b473dbebc56e99161baeac6a945869046b5f76008d432c,2025-03-20T14:15:23.570000 CVE-2025-23011,0,0,cefe33a46d0161bb6c6a24c1c3d6c06bd96db41dbbf7220897035ad8b05d8820,2025-02-03T20:15:36.823000 CVE-2025-23012,0,0,21902a51089bbb86496843888942542af88455b4e3e34d54286f2fa9da81320e,2025-02-03T20:15:36.977000 CVE-2025-23013,0,0,3fec3cd2c5a637941d673cd3a30388d6eceae58c49f808dfa1c8d532c5060c57,2025-02-03T10:15:09.250000 @@ -283559,7 +283562,7 @@ CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9 CVE-2025-2310,0,0,3b3ba3523782ffedb97cb689c8e87d850ff86441e81973841824c42139be3b8c,2025-03-14T21:15:37.443000 CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000 -CVE-2025-2311,1,1,26401023a6b7f56743b7b030402e528f5773941bc69fbdc38984cd6ab15e2d6b,2025-03-20T12:15:14.750000 +CVE-2025-2311,0,0,26401023a6b7f56743b7b030402e528f5773941bc69fbdc38984cd6ab15e2d6b,2025-03-20T12:15:14.750000 CVE-2025-23110,0,0,1f29652a619b8421219adac1a2002e9dc55acad71b98814d2bc2dba042d7f047,2025-02-25T16:46:57.373000 CVE-2025-23111,0,0,bee2b37690105f94a2919f948d33470ba27eac7a0501ea5db580d8c336b4a360,2025-02-25T16:16:50.967000 CVE-2025-23112,0,0,5295af5f2d972260409bf6e8ddb1e42cd398e210c99c068cbfdfd18c1a2f69a7,2025-02-25T16:14:20.857000 @@ -284373,7 +284376,7 @@ CVE-2025-24185,0,0,780ce933a4599922763fb258510562036511606364e33341b032c72a71c2a CVE-2025-2419,0,0,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000 CVE-2025-2420,0,0,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000 CVE-2025-24200,0,0,0f6f41d17b1c80c9261ddc7d6ef23ac7e19cbdbd2c08a07eed9362b293d75967,2025-03-07T17:12:01.477000 -CVE-2025-24201,0,0,ce749944f29eb7a58a39f521ebc27f910b93ce1f347524410204067e6a960180,2025-03-14T20:35:27.923000 +CVE-2025-24201,0,1,5635dd9bbab12c7c74705486b0b6ed966690a727053a5e07b8e13547cf823c1f,2025-03-20T14:15:23.733000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 CVE-2025-24306,0,0,e210195f360c27240f00fdb72863ab45cdcc5e9e27f3265f94696064f329bbdb,2025-03-18T09:15:13.570000 CVE-2025-24309,0,0,b881e80e18a543dac7caf5dbe4ebf8345a69e13fed09525eee5962b72198dbe3,2025-03-04T17:16:06.513000 @@ -284413,7 +284416,7 @@ CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,ee9da22a13b3c2a05aba47928897e56493040057408f7bc7be29fd032a4fd24c,2025-01-23T16:15:40.920000 CVE-2025-24399,0,0,9e2b8368d79470df64393e92711907111b86a093d0c5d40914c6d8eac10d8a6a,2025-03-18T15:15:59.850000 -CVE-2025-24400,0,0,fc2d35dcc02dfde6472cd44ddd220493709314070b1167c1ac10abb11d37eaff,2025-02-18T20:15:31.630000 +CVE-2025-24400,0,1,688f55c8434b6d75b2a47eeaaca4c2596bd1613b0ce146b7759d1b11639da277,2025-03-20T14:15:23.903000 CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 @@ -284999,8 +285002,8 @@ CVE-2025-25287,0,0,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a4 CVE-2025-25288,0,0,0584d712e57f52bee8eae9744431d7edb4ff073c5208efea9ba9d4aad69105ee,2025-02-14T20:15:34.737000 CVE-2025-25289,0,0,9f524d670b2ea0e928c8409b5f46ea35f805bd4f11134f0dcb16ef0bb77ce771,2025-02-14T20:15:35.100000 CVE-2025-25290,0,0,927339a6905b50f325cf414d0d0e7fad53929abe8412c231085b72dda312b675,2025-02-14T20:15:35.593000 -CVE-2025-25291,0,0,c0d31e42861977597990d32bec96fa51e461a9843dc0ab355646426ee606b80c,2025-03-15T21:15:34.987000 -CVE-2025-25292,0,0,ba4cf64de5105004bb573a05f0773a0c1eea88efccda2fe4a13e0e2bdd03a6f3,2025-03-15T21:15:35.143000 +CVE-2025-25291,0,1,f1835428a95b689e982cf8fed8e892bce59e7e5dd4dfe38c15b065cfec7df445,2025-03-20T14:15:24.050000 +CVE-2025-25292,0,1,f0109f5d36aadb8f1601d476dd0de8ca220cc9dda804a966bda35416b9a25277,2025-03-20T14:15:24.213000 CVE-2025-25293,0,0,75b4c2e39ac12a2c3d449d17b84245d13bd3782825afdf76368cf68cec382c6f,2025-03-14T10:15:16.783000 CVE-2025-25294,0,0,f5f631bb0d3a66ef3946a184ab77f89389f0272dd7aa555e4fd92fae40ef72bd,2025-03-06T19:15:27.267000 CVE-2025-25295,0,0,ab7cbec386eec3a44bf55fb5a8d6852f900324ec8d3c216c21202391f71c954b,2025-02-14T17:15:20.230000 @@ -285041,7 +285044,7 @@ CVE-2025-25382,0,0,88d0c9aebff390fe6125675f7fda1114ad4b4dbbaf723b80d3bea82edb3ec CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 -CVE-2025-2539,1,1,9d4fd27b71db1e294b40f09a5a5a229fea068c434b1aebddde556e8921721bac,2025-03-20T12:15:14.900000 +CVE-2025-2539,0,0,9d4fd27b71db1e294b40f09a5a5a229fea068c434b1aebddde556e8921721bac,2025-03-20T12:15:14.900000 CVE-2025-25426,0,0,108c4b754e54717537bad215341cffab6a867457930f1858a7d85368cf0a6951,2025-03-05T17:15:15.320000 CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000 @@ -285273,7 +285276,7 @@ CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4e CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000 CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000 -CVE-2025-26318,0,0,16686eed1a2dd200b3d251994a33e38e9220f5ca5f67b4df87c6beb26b606734,2025-03-05T17:15:16.180000 +CVE-2025-26318,0,1,37a227ec04cb06a6666466de1108bef82e3fad90fe6fc7e33cd05b6f886caa90,2025-03-20T14:15:24.353000 CVE-2025-26319,0,0,f00500492e7a3f0a2bff919ad8b60c606fcf031aa95c7496eeafad4b93d44cff,2025-03-05T17:15:16.340000 CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000 CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000 @@ -285469,7 +285472,7 @@ CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000 CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000 CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000 -CVE-2025-26772,0,1,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000 +CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000 CVE-2025-26773,0,0,d49de72c13c2b86c2a31c05293d547eb9b0be3797bd82de8c3f9ffd6b4c04d67,2025-02-17T12:15:29.123000 CVE-2025-26774,0,0,526dfe51d520753de4e60d175888e5d8ca8738aa723fd20bff017fe643f4fb4b,2025-02-22T16:15:32.060000 CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c0462c,2025-03-19T20:39:46.850000 @@ -285518,7 +285521,7 @@ CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca CVE-2025-26914,0,0,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000 CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000 CVE-2025-26916,0,0,f758c32d09b38a24f4c348c15aba8cb3a44ed6c4ea3664e23dee9d5858835140,2025-03-10T15:15:37.830000 -CVE-2025-26917,0,1,3fc39fec66986a8b7bd40f698f506534d61e59c6582e491b1216365ddb3f6932,2025-03-20T12:25:42 +CVE-2025-26917,0,0,3fc39fec66986a8b7bd40f698f506534d61e59c6582e491b1216365ddb3f6932,2025-03-20T12:25:42 CVE-2025-26918,0,0,e0fc59a79e46c5fcf8cafd0b2b3657455a0238ac9b7d59603d1a8c12f6ce4a03,2025-03-17T17:57:36.580000 CVE-2025-26921,0,0,c2442d28350ae7faf4df30b8935eab7e61e5cf8ba448a3d60bbef0e85d56ea9a,2025-03-15T22:15:14.517000 CVE-2025-26924,0,0,49cebed7e80447b71d19993301efab305d1259be135138e224586f0226f3187e,2025-03-15T22:15:14.663000 @@ -285903,7 +285906,7 @@ CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce434802448 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-27867,0,0,34728fa5af8938af6d116e9c5118e28249371e0842dcdc39a9f7feee21691d1c,2025-03-12T18:15:26.320000 -CVE-2025-27888,1,1,dcbe5c1f6652c537417a3b871210f8a73f6dfbcaebd727c8c1bf99ddc54f8035,2025-03-20T12:15:14.563000 +CVE-2025-27888,0,0,dcbe5c1f6652c537417a3b871210f8a73f6dfbcaebd727c8c1bf99ddc54f8035,2025-03-20T12:15:14.563000 CVE-2025-27893,0,0,e84577b5fcdd778bbc1f7429e59a23dbdaffc7f181556a9020c20ce55649162f,2025-03-11T14:15:26.033000 CVE-2025-27910,0,0,0bb94e3f7527c14f76129f12ea1086d3e9a5c32bf0c93521589ebefce719530f,2025-03-12T16:15:24.253000 CVE-2025-27911,0,0,10e67228aa90db73c3414ce28096a25aef6cbc3f128533308c9edad1912d6fdb,2025-03-11T08:15:11.500000 @@ -285983,6 +285986,7 @@ CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 +CVE-2025-29101,1,1,18d2cbad5c8b235e8ef9b9169f1b067dec1f11f872a8278319bf676efb28f716,2025-03-20T13:15:36.467000 CVE-2025-29118,0,0,544cc61f27b329117a892d08f384d5737c3e9c8a3738f1368db354f799c3eaf0,2025-03-19T19:15:48.220000 CVE-2025-29137,0,0,60d01c1f2ea1a4852779ae5347a42a9c78e823ee0ac7de08f61d7134be2334df,2025-03-19T21:15:41.063000 CVE-2025-29357,0,0,ddd0f218f7f0a63a4864093fc2a3ded7f064b1382e370d0ee41cc0a1c1a3ddb4,2025-03-19T15:15:54.690000 @@ -285998,6 +286002,8 @@ CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff5 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 CVE-2025-29401,0,0,5960fa825f3ca9babeed4b3834be7738456577242f6a1e28c67620bf622471fd,2025-03-19T16:15:31.827000 CVE-2025-29405,0,0,2b1de6e84d9d8c71b0d66c8d66f707c8051e16cad3e287b6a763e4cd0c6ad79e,2025-03-19T19:15:49.567000 +CVE-2025-29410,1,1,390cb89330efa1f41cf2ddb4072dd5949306c46e31251cd2d9ed83b1ed28156e,2025-03-20T14:15:24.540000 +CVE-2025-29412,1,1,335f6fb03617019443f56489e785849608626f14314eef18f0de0ad063a26622,2025-03-20T14:15:24.653000 CVE-2025-29425,0,0,093ec6e3d630ec63e64b9d502b6c3ce157d67185098d8bf640788edb6f541730,2025-03-19T19:15:49.697000 CVE-2025-29426,0,0,ca5c399697b63e00d85ae3ac02bfa32554e49d24d7b16bfb13e68f3f5d9d962d,2025-03-19T19:15:49.830000 CVE-2025-29427,0,0,4503f6be6491e147faa0bce916d074b949bff04ef067cf46ffc8e368d2ec7c2d,2025-03-19T19:15:49.970000