Auto-Update: 2025-03-06T15:00:20.642350+00:00

This commit is contained in:
cad-safe-bot 2025-03-06 15:03:50 +00:00
parent 01b47fbd08
commit 12d3e3c954
33 changed files with 1580 additions and 230 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12144",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-06T14:15:35.297",
"lastModified": "2025-03-06T14:15:35.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (Old System) allows SQL Injection.This issue affects Finder ERP/CRM (Old System): before 18.12.2024."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0060",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-13892",
"sourceIdentifier": "cvd@cert.pl",
"published": "2025-03-06T14:15:35.453",
"lastModified": "2025-03-06T14:15:35.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/",
"source": "cvd@cert.pl"
},
{
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-13893",
"sourceIdentifier": "cvd@cert.pl",
"published": "2025-03-06T14:15:35.630",
"lastModified": "2025-03-06T14:15:35.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/",
"source": "cvd@cert.pl"
},
{
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-13894",
"sourceIdentifier": "cvd@cert.pl",
"published": "2025-03-06T14:15:35.777",
"lastModified": "2025-03-06T14:15:35.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to path traversal. \nWhen an affected device is connected to a mobile app, it opens a port 10000 enabling a user to download pictures shot at specific moments by providing paths to the files. However, the directories to which a user has access are not limited, allowing for path traversal attacks and downloading sensitive information.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/",
"source": "cvd@cert.pl"
},
{
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49807",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-31T16:15:34.647",
"lastModified": "2025-01-31T16:15:34.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-06T13:30:34.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
"versionStartIncluding": "6.0.0.0",
"versionEndIncluding": "6.1.2.5",
"matchCriteriaId": "61E77E5A-B2DD-4ABA-BD86-7D097EB0AC8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
"versionStartIncluding": "6.2.0.0",
"versionEndIncluding": "6.2.0.3",
"matchCriteriaId": "5E53D40A-E139-43DE-BF66-87AF94E14343"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7182011",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51945",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:40.483",
"lastModified": "2025-03-03T20:15:40.483",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51946",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:40.640",
"lastModified": "2025-03-03T20:15:40.640",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51947",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:40.797",
"lastModified": "2025-03-03T20:15:40.797",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51948",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:40.953",
"lastModified": "2025-03-03T20:15:40.953",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51949",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.110",
"lastModified": "2025-03-03T20:15:41.110",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51950",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.277",
"lastModified": "2025-03-03T20:15:41.277",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51951",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.437",
"lastModified": "2025-03-03T20:15:41.437",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51952",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.593",
"lastModified": "2025-03-03T20:15:41.593",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51953",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.747",
"lastModified": "2025-03-03T20:15:41.747",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51954",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:41.903",
"lastModified": "2025-03-03T20:15:41.903",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is an improper access control issue in ArcGIS Server versions 10.9.1 through 11.3 on Windows and Linux, which under unique circumstances, could potentially allow a remote, low privileged authenticated attacker to access secure services published a standalone\u00a0(Unfederated)\n\nArcGIS Server instance.\u00a0 If successful this compromise would have a high impact on Confidentiality, low impact on integrity and no impact to availability of the software."
},
{
"lang": "es",
"value": "Existe un problema de control de acceso inadecuado en las versiones 10.9.1 a 11.3 de ArcGIS Server en Windows y Linux que, en circunstancias excepcionales, podr\u00eda permitir que un atacante remoto autenticado con pocos privilegios acceda a servicios seguros publicados en una instancia independiente (no federada) de ArcGIS Server. Si tiene \u00e9xito, esta vulneraci\u00f3n tendr\u00eda un gran impacto en la confidencialidad, un bajo impacto en la integridad y ning\u00fan impacto en la disponibilidad del software."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
@ -45,12 +69,61 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51956",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.063",
"lastModified": "2025-03-03T20:15:42.063",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51957",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.217",
"lastModified": "2025-03-03T20:15:42.217",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-51958",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.397",
"lastModified": "2025-03-03T20:15:42.397",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory.\u00a0 There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de path traversal en las versiones 10.9.1 a 11.3 de ESRI ArcGIS Server. Si se explota con \u00e9xito, es posible que un atacante remoto autenticado con privilegios de administrador pueda recorrer el sistema de archivos para acceder a archivos fuera del directorio previsto. No hay impacto en la integridad ni en la disponibilidad debido a la naturaleza de los archivos a los que se puede acceder, pero existe un alto potencial de impacto en la confidencialidad."
}
],
"metrics": {
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51959",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.550",
"lastModified": "2025-03-03T20:15:42.550",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51960",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.707",
"lastModified": "2025-03-03T20:15:42.707",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-51961",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:42.863",
"lastModified": "2025-03-03T20:15:42.863",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a local file inclusion vulnerability in ArcGIS Server 10.9.1 thru 11.3 that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server.\u00a0 Due to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales en ArcGIS Server 10.9.1 a 11.3 que puede permitir que un atacante remoto no autenticado manipule una URL que podr\u00eda revelar informaci\u00f3n de configuraci\u00f3n confidencial al leer archivos internos del servidor remoto. Debido a la naturaleza de los archivos a los que se puede acceder en esta vulnerabilidad, el impacto en la confidencialidad es alto y no hay impacto en la integridad ni en la disponibilidad."
}
],
"metrics": {
@ -45,12 +49,44 @@
"value": "CWE-73"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51962",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:43.043",
"lastModified": "2025-03-03T20:15:43.043",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in ArcGIS Server allows an EDIT\u00a0operation to modify Column properties allowing for the execution of a SQL Injection by a remote authenticated user with elevated (non admin) privileges.\u00a0 There is a high impact to integrity and confidentiality and no impact to availability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en ArcGIS Server permite que una operaci\u00f3n EDIT modifique las propiedades de las columnas, lo que permite la ejecuci\u00f3n de una inyecci\u00f3n SQL por parte de un usuario autenticado remoto con privilegios elevados (no administrativos). Esto tiene un gran impacto en la integridad y la confidencialidad, pero no en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
@ -47,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-51963",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:43.240",
"lastModified": "2025-03-03T20:15:43.240",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-51966",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:43.387",
"lastModified": "2025-03-03T20:15:43.387",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory. There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de path traversal en las versiones 10.9.1 a 11.3 de ESRI ArcGIS Server. Si se explota con \u00e9xito, es posible que un atacante remoto autenticado con privilegios de administrador pueda recorrer el sistema de archivos para acceder a archivos fuera del directorio previsto. No hay impacto en la integridad ni en la disponibilidad debido a la naturaleza de los archivos a los que se puede acceder, pero existe un alto potencial de impacto en la confidencialidad."
}
],
"metrics": {
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56411",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T18:15:16.203",
"lastModified": "2025-01-03T18:15:16.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-06T13:30:34.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,14 +95,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.29.7",
"matchCriteriaId": "2A1A215A-BBAE-4518-8738-717AF6F9C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.6",
"matchCriteriaId": "1D053213-50AD-4AFA-9659-6EADF780E2D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.3.5",
"matchCriteriaId": "F5F84150-8F2B-44AF-8AAB-DE0A83319416"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.7.0",
"matchCriteriaId": "AC92FDF6-4E94-4706-9501-583EF3DCA2FD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/45052f88e04c735d56457a8ffcdc40b2635a028e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-hwcp-2h35-p66w",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56412",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T18:15:16.380",
"lastModified": "2025-01-03T18:15:16.380",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-06T13:30:34.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,14 +95,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.29.7",
"matchCriteriaId": "2A1A215A-BBAE-4518-8738-717AF6F9C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.6",
"matchCriteriaId": "1D053213-50AD-4AFA-9659-6EADF780E2D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.3.5",
"matchCriteriaId": "F5F84150-8F2B-44AF-8AAB-DE0A83319416"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.7.0",
"matchCriteriaId": "AC92FDF6-4E94-4706-9501-583EF3DCA2FD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/45052f88e04c735d56457a8ffcdc40b2635a028e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-q9jv-mm3r-j47r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-5888",
"sourceIdentifier": "psirt@esri.com",
"published": "2025-03-03T20:15:43.940",
"lastModified": "2025-03-03T20:15:43.940",
"vulnStatus": "Received",
"lastModified": "2025-03-06T14:23:26.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -47,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.9.1",
"versionEndIncluding": "11.3",
"matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T02:15:25.597",
"lastModified": "2025-01-30T02:15:25.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-06T13:30:34.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,86 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:a18_firmware:15.13.07.09:*:*:*:*:*:*:*",
"matchCriteriaId": "0916A698-E859-4DA2-899C-5A55B68E25F1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:a18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20146A03-30B3-4BFF-83DA-DEDBF6850A6B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/alc9700jmo/CVE/issues/9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.294011",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.294011",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.485802",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0877",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-06T14:15:36.107",
"lastModified": "2025-03-06T14:15:36.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AtaksAPP Reservation Management System allows Cross-Site Scripting (XSS).This issue affects Reservation Management System: before 4.2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0059",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2045",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-03-06T13:15:12.553",
"lastModified": "2025-03-06T13:15:12.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access to potentially sensitive project analytics data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512050",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2921111",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22131",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:27.880",
"lastModified": "2025-01-20T16:15:27.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-06T13:30:34.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,14 +95,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.29.8",
"matchCriteriaId": "C902AF09-CD77-455C-97B6-AA5EB6EB97E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.7",
"matchCriteriaId": "1B99E3BD-258D-4017-98CA-1A3F168C573F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.3.6",
"matchCriteriaId": "FE3C504E-C56A-4051-A590-D9FCA1A1A3E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.8.0",
"matchCriteriaId": "9EF15CF9-433E-4CE8-AEFE-B9BD8E5B761E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/4088381ccfaf241d7d42c333de0dc8c98e338743",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-79xx-vf93-p7cx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-06T13:00:21.008455+00:00
2025-03-06T15:00:20.642350+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-06T12:53:53.273000+00:00
2025-03-06T14:23:26.167000+00:00
```
### Last Data Feed Release
@ -33,52 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284308
284314
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `6`
- [CVE-2024-38311](CVE-2024/CVE-2024-383xx/CVE-2024-38311.json) (`2025-03-06T12:15:34.157`)
- [CVE-2024-56195](CVE-2024/CVE-2024-561xx/CVE-2024-56195.json) (`2025-03-06T12:15:35.373`)
- [CVE-2024-56196](CVE-2024/CVE-2024-561xx/CVE-2024-56196.json) (`2025-03-06T12:15:35.523`)
- [CVE-2024-56202](CVE-2024/CVE-2024-562xx/CVE-2024-56202.json) (`2025-03-06T11:15:11.423`)
- [CVE-2024-7872](CVE-2024/CVE-2024-78xx/CVE-2024-7872.json) (`2025-03-06T12:15:35.667`)
- [CVE-2025-1383](CVE-2025/CVE-2025-13xx/CVE-2025-1383.json) (`2025-03-06T12:15:35.937`)
- [CVE-2025-1666](CVE-2025/CVE-2025-16xx/CVE-2025-1666.json) (`2025-03-06T12:15:36.117`)
- [CVE-2025-1696](CVE-2025/CVE-2025-16xx/CVE-2025-1696.json) (`2025-03-06T12:15:36.293`)
- [CVE-2024-12144](CVE-2024/CVE-2024-121xx/CVE-2024-12144.json) (`2025-03-06T14:15:35.297`)
- [CVE-2024-13892](CVE-2024/CVE-2024-138xx/CVE-2024-13892.json) (`2025-03-06T14:15:35.453`)
- [CVE-2024-13893](CVE-2024/CVE-2024-138xx/CVE-2024-13893.json) (`2025-03-06T14:15:35.630`)
- [CVE-2024-13894](CVE-2024/CVE-2024-138xx/CVE-2024-13894.json) (`2025-03-06T14:15:35.777`)
- [CVE-2025-0877](CVE-2025/CVE-2025-08xx/CVE-2025-0877.json) (`2025-03-06T14:15:36.107`)
- [CVE-2025-2045](CVE-2025/CVE-2025-20xx/CVE-2025-2045.json) (`2025-03-06T13:15:12.553`)
### CVEs modified in the last Commit
Recently modified CVEs: `58`
Recently modified CVEs: `25`
- [CVE-2024-58010](CVE-2024/CVE-2024-580xx/CVE-2024-58010.json) (`2025-03-06T12:42:22.567`)
- [CVE-2024-58011](CVE-2024/CVE-2024-580xx/CVE-2024-58011.json) (`2025-03-06T12:42:22.567`)
- [CVE-2024-58012](CVE-2024/CVE-2024-580xx/CVE-2024-58012.json) (`2025-03-06T12:21:35.360`)
- [CVE-2024-58017](CVE-2024/CVE-2024-580xx/CVE-2024-58017.json) (`2025-03-06T12:21:35.360`)
- [CVE-2024-58020](CVE-2024/CVE-2024-580xx/CVE-2024-58020.json) (`2025-03-06T12:21:35.360`)
- [CVE-2024-58021](CVE-2024/CVE-2024-580xx/CVE-2024-58021.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-0349](CVE-2025/CVE-2025-03xx/CVE-2025-0349.json) (`2025-03-06T12:42:52.363`)
- [CVE-2025-1877](CVE-2025/CVE-2025-18xx/CVE-2025-1877.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1878](CVE-2025/CVE-2025-18xx/CVE-2025-1878.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1900](CVE-2025/CVE-2025-19xx/CVE-2025-1900.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1901](CVE-2025/CVE-2025-19xx/CVE-2025-1901.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1902](CVE-2025/CVE-2025-19xx/CVE-2025-1902.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1903](CVE-2025/CVE-2025-19xx/CVE-2025-1903.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-1904](CVE-2025/CVE-2025-19xx/CVE-2025-1904.json) (`2025-03-06T12:17:33.710`)
- [CVE-2025-1905](CVE-2025/CVE-2025-19xx/CVE-2025-1905.json) (`2025-03-06T12:17:33.710`)
- [CVE-2025-21735](CVE-2025/CVE-2025-217xx/CVE-2025-21735.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-21736](CVE-2025/CVE-2025-217xx/CVE-2025-21736.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-21737](CVE-2025/CVE-2025-217xx/CVE-2025-21737.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-21740](CVE-2025/CVE-2025-217xx/CVE-2025-21740.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-21741](CVE-2025/CVE-2025-217xx/CVE-2025-21741.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-21742](CVE-2025/CVE-2025-217xx/CVE-2025-21742.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-25939](CVE-2025/CVE-2025-259xx/CVE-2025-25939.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-25967](CVE-2025/CVE-2025-259xx/CVE-2025-25967.json) (`2025-03-06T12:21:35.360`)
- [CVE-2025-27499](CVE-2025/CVE-2025-274xx/CVE-2025-27499.json) (`2025-03-06T12:21:35.360`)
- [CVE-2024-49807](CVE-2024/CVE-2024-498xx/CVE-2024-49807.json) (`2025-03-06T13:30:34.893`)
- [CVE-2024-51945](CVE-2024/CVE-2024-519xx/CVE-2024-51945.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51946](CVE-2024/CVE-2024-519xx/CVE-2024-51946.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51947](CVE-2024/CVE-2024-519xx/CVE-2024-51947.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51948](CVE-2024/CVE-2024-519xx/CVE-2024-51948.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51949](CVE-2024/CVE-2024-519xx/CVE-2024-51949.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51950](CVE-2024/CVE-2024-519xx/CVE-2024-51950.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51951](CVE-2024/CVE-2024-519xx/CVE-2024-51951.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51952](CVE-2024/CVE-2024-519xx/CVE-2024-51952.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51953](CVE-2024/CVE-2024-519xx/CVE-2024-51953.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51954](CVE-2024/CVE-2024-519xx/CVE-2024-51954.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51956](CVE-2024/CVE-2024-519xx/CVE-2024-51956.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51957](CVE-2024/CVE-2024-519xx/CVE-2024-51957.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51958](CVE-2024/CVE-2024-519xx/CVE-2024-51958.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51959](CVE-2024/CVE-2024-519xx/CVE-2024-51959.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51960](CVE-2024/CVE-2024-519xx/CVE-2024-51960.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51961](CVE-2024/CVE-2024-519xx/CVE-2024-51961.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51962](CVE-2024/CVE-2024-519xx/CVE-2024-51962.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51963](CVE-2024/CVE-2024-519xx/CVE-2024-51963.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-51966](CVE-2024/CVE-2024-519xx/CVE-2024-51966.json) (`2025-03-06T14:23:26.167`)
- [CVE-2024-56411](CVE-2024/CVE-2024-564xx/CVE-2024-56411.json) (`2025-03-06T13:30:34.893`)
- [CVE-2024-56412](CVE-2024/CVE-2024-564xx/CVE-2024-56412.json) (`2025-03-06T13:30:34.893`)
- [CVE-2024-5888](CVE-2024/CVE-2024-58xx/CVE-2024-5888.json) (`2025-03-06T14:23:26.167`)
- [CVE-2025-0848](CVE-2025/CVE-2025-08xx/CVE-2025-0848.json) (`2025-03-06T13:30:34.893`)
- [CVE-2025-22131](CVE-2025/CVE-2025-221xx/CVE-2025-22131.json) (`2025-03-06T13:30:34.893`)
## Download and Usage

View File

@ -187587,14 +187587,14 @@ CVE-2021-47335,0,0,328eb3645a18c5f29c918b49774ba62cf65897a9bf118eba16623aa0b88c0
CVE-2021-47336,0,0,574b511187a20b144e1a41e424bb252a26bf57fd2f2c258012116c53068fbcd0,2024-11-21T06:35:54.710000
CVE-2021-47337,0,0,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19041,2024-12-24T16:15:04.180000
CVE-2021-47338,0,0,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000
CVE-2021-47339,0,1,0bbf6ea18cc43bc9424cdc88c45e67afdd8a79a5bc05a5b5806223b35d346141,2025-03-06T12:53:53.273000
CVE-2021-47339,0,0,0bbf6ea18cc43bc9424cdc88c45e67afdd8a79a5bc05a5b5806223b35d346141,2025-03-06T12:53:53.273000
CVE-2021-47340,0,0,4800185c819526cfdd83b27045687b91c60e90a3e12af11337074c136ce8ddde,2024-11-21T06:35:55.207000
CVE-2021-47341,0,0,de6df9bc89a00c0eee555b5550f951ca1c227ff6ccb6bb702130533fcb19308f,2025-01-14T17:28:39.313000
CVE-2021-47342,0,0,87691d96ad1a4689fc95ec83dde8f8407d98a729b3e3a4eff31c1bce3aa3fc7d,2024-12-26T19:29:20.557000
CVE-2021-47343,0,0,05baa50e8f01703dbae3936b2595f3acbc4f37225bdead1e4b8828946131a960,2024-11-21T06:35:55.597000
CVE-2021-47344,0,0,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000
CVE-2021-47345,0,0,e7fced2d39bb01ac3aa638228f3d111fb4e7a3b155cc0145bd8963569fdff796,2024-12-24T16:12:42.907000
CVE-2021-47346,0,1,3ad39eb0aa50f6e7e059868f8dd4535c9aa127957aed91df43a10d9d37fde26f,2025-03-06T12:53:53.273000
CVE-2021-47346,0,0,3ad39eb0aa50f6e7e059868f8dd4535c9aa127957aed91df43a10d9d37fde26f,2025-03-06T12:53:53.273000
CVE-2021-47347,0,0,0cc930dc1ed330c553df41204e22122e0adaa56369dd9ae499682bc065fb28c3,2024-11-21T06:35:56.147000
CVE-2021-47348,0,0,e4697ba877d750d4853325d31141852c2f5197fb92af29ad909f172ef0454520,2024-11-21T06:35:56.340000
CVE-2021-47349,0,0,4bbe92cbdd19bea4c0660020f8f6f562d96fbf23f4aff4917213209b46165265,2025-01-10T18:12:28.513000
@ -212902,7 +212902,7 @@ CVE-2022-48801,0,0,a8fd5f16c8a757c25d85dfc312a52de37c1cf99353d1034498d2c616b2131
CVE-2022-48802,0,0,452388413750fad0016a585aeb6293a87a2a7a194129365e3d1068278e8d25d8,2024-11-21T07:34:07.003000
CVE-2022-48803,0,0,3944ba64b4bf5014e3b95671d9aaf2ca749998f790b192bd3d54f239fb4ea60a,2024-11-21T07:34:07.110000
CVE-2022-48804,0,0,d4967cc93f900d12692fa8fabca50399bd7d028413bcceb09e055fdf35a9730a,2024-11-21T07:34:07.233000
CVE-2022-48805,0,1,8e6b524333b04d106219144103e9304ac84f634dae2155072f7be9b027fcfb2e,2025-03-06T12:53:17.520000
CVE-2022-48805,0,0,8e6b524333b04d106219144103e9304ac84f634dae2155072f7be9b027fcfb2e,2025-03-06T12:53:17.520000
CVE-2022-48806,0,0,138d514a8f59997aa967f097597406012727075dc083aaf3ae10ca94a35161d7,2024-11-21T07:34:07.470000
CVE-2022-48807,0,0,2526145aa7b4eed086785b29ff23ceec41a1875b0c9d0ab2bac70882e3cf55f9,2024-11-21T07:34:07.577000
CVE-2022-48808,0,0,0dde40ae7f1b74db3ad7c6c323821786b9fb456c6601160feb9f4b68999dd61a,2024-11-21T07:34:07.673000
@ -241295,7 +241295,7 @@ CVE-2023-52741,0,0,e094cb6d7949e9747b892e241771f0453892c45a739ad5b8d158747bb6e06
CVE-2023-52742,0,0,dcf30954d8fabdab5fd680401ef1008be31a6a0cfb68e9a64806fc115f0213b5,2024-11-21T08:40:29.373000
CVE-2023-52743,0,0,24474008a2d4a403beada0f7d4c53935aab14c11f5c2d46143b8959c21bd597a,2024-11-21T08:40:29.513000
CVE-2023-52744,0,0,7a3a1b5b261511bb66fcf29aaabee541486137c90ee2c22ba6c248ce3835f026,2025-01-06T20:40:45.057000
CVE-2023-52745,0,1,6b03e0345e3a79fe23ee08f8fbe19ea712253ff9277a62ebb384898480dfc2b1,2025-03-06T12:53:53.273000
CVE-2023-52745,0,0,6b03e0345e3a79fe23ee08f8fbe19ea712253ff9277a62ebb384898480dfc2b1,2025-03-06T12:53:53.273000
CVE-2023-52746,0,0,29638259c02e0300a082658fbef0482f5797bd8a4800b195c2b69bc6212469f2,2024-11-21T08:40:29.907000
CVE-2023-52747,0,0,89a1a7bcc5367ff871cada9f72228e4bee14cd524a7a7ce281e3ad78d5396323,2024-11-21T08:40:30.097000
CVE-2023-52748,0,0,2b830ddfbbba0c67aa7dbe55dc7af2c2e0c7de4c1479e35323f1e39833c237ea,2024-11-21T08:40:30.220000
@ -241349,21 +241349,21 @@ CVE-2023-52790,0,0,cf29a624de21cf22cc512d40f0a593951c8cd9239711d0b8442ff032accda
CVE-2023-52791,0,0,be484a6e97e5a1fc91f5818964596896eec93bf44f2a3ba3ebb847d5e9c824b0,2024-11-21T08:40:35.750000
CVE-2023-52792,0,0,2cc23cf56cc94d378ac71d87d803d2cb686a46236118e6b58b26100b7927b4af,2024-11-21T08:40:35.870000
CVE-2023-52793,0,0,1deada04b9b58b9a08cdc8b4e56907afa2f473e86ceaaf1b863ba75e6bd438dd,2024-05-24T05:15:08.403000
CVE-2023-52794,0,1,bc3693e384d7812dd89a94906db45df7f7f197c2dcae1133aea42c4607d3db28,2025-03-06T12:53:53.273000
CVE-2023-52794,0,0,bc3693e384d7812dd89a94906db45df7f7f197c2dcae1133aea42c4607d3db28,2025-03-06T12:53:53.273000
CVE-2023-52795,0,0,4e485f41269e4ca02c2bb151f581018ee7564bf7c1a16986ad072ba672d15994,2025-01-10T17:59:58.747000
CVE-2023-52796,0,0,919ab49a1f7e861a493c89fa6e458020589d307e7c501ef2a28fc7f2409c4699,2024-11-21T08:40:36.233000
CVE-2023-52797,0,0,a8f1fd2b50ee0014f6c08ba16dee5539f5b8b20b0a40b1a44d6ff84573d23ca5,2024-11-21T08:40:36.360000
CVE-2023-52798,0,0,698516f7a6422b64182796c4d1e386edea13c08d9ebe3b1a1a173e4cdc460cee,2024-11-21T08:40:36.483000
CVE-2023-52799,0,1,558d824ca47ee11384d74f49c72379f5ffc461019f8a8398a85e803f1e0276de,2025-03-06T12:53:53.273000
CVE-2023-52799,0,0,558d824ca47ee11384d74f49c72379f5ffc461019f8a8398a85e803f1e0276de,2025-03-06T12:53:53.273000
CVE-2023-5280,0,0,0e31d757c38846a6f016aa4d2a0c766d9c944cae8392888fd9d4cf58ba1afdfc,2024-11-21T08:41:26.490000
CVE-2023-52800,0,0,625396b2707a4b12a8608a41ca88f7c126404d546ab4a0974abef35f6ea67b88,2024-11-21T08:40:36.803000
CVE-2023-52801,0,0,0902d38420cc02715fe58ab7f76650517aa83d22bc371e771b393939439b0034,2024-11-21T08:40:37.040000
CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000
CVE-2023-52803,0,0,ca542d715af19bc455d62c41688c3fc24d4ece330c1660f25b0f2926b8cdad17,2024-11-21T08:40:37.290000
CVE-2023-52804,0,0,f63595acad5f021611a295b0c2137b6f281e5bf0a3b7dab20aa319bececcb019,2024-11-21T08:40:37.423000
CVE-2023-52805,0,1,5186bfc33c8855ecef32265d9b68c63d746ff5e76e8ed7f555e16356ac6e93d9,2025-03-06T12:53:53.273000
CVE-2023-52805,0,0,5186bfc33c8855ecef32265d9b68c63d746ff5e76e8ed7f555e16356ac6e93d9,2025-03-06T12:53:53.273000
CVE-2023-52806,0,0,fb65670f4d45809f58388ae1354ca1aa5879a8eee50756f04297590c93c61e8a,2024-11-21T08:40:37.667000
CVE-2023-52807,0,1,ddf74cd7700539e42b905e69205ce85a408eb5e82fb88ea2b1fbbb1b5bf76ba4,2025-03-06T12:53:53.273000
CVE-2023-52807,0,0,ddf74cd7700539e42b905e69205ce85a408eb5e82fb88ea2b1fbbb1b5bf76ba4,2025-03-06T12:53:53.273000
CVE-2023-52808,0,0,efd8d7bcb58f484b4b5e80898bd3c70762a13bd27971c0de98e557ec212b9f08,2025-01-14T16:32:53.767000
CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250bea47,2024-11-21T08:40:38.040000
CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000
@ -245071,7 +245071,7 @@ CVE-2024-10899,0,0,3278ed9055fdf20d3bd937513eb10691156bd1e9c65996b252cdb3333f0a4
CVE-2024-1090,0,0,bc0bffa7867d1fecd545d2e7f7fb647c415e4e72464ebb88604cc3a8a49285b6,2024-12-27T15:41:41.897000
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
CVE-2024-10903,0,0,4b83af475b2ee1b428df17dee5389cac414e31e1e9acd0596c2e9a6f9d70e177,2024-12-30T18:15:06.253000
CVE-2024-10904,0,1,52d94fd1600e7c5493b7463b9a1bf1b1bb9ec7f5a03b12e7d597cc7acde74140,2025-03-06T12:21:35.360000
CVE-2024-10904,0,0,52d94fd1600e7c5493b7463b9a1bf1b1bb9ec7f5a03b12e7d597cc7acde74140,2025-03-06T12:21:35.360000
CVE-2024-10905,0,0,98e243c9c6d3626765a0f5bec050b58ca35d0a0d124978428fd582cb710fa7ee,2024-12-06T18:15:22.207000
CVE-2024-10909,0,0,8a3e5be040021a81e0e5e83c9e95ad90e5ace916bf19a03e529e43ec6a7f9976,2024-12-06T10:15:05.107000
CVE-2024-1091,0,0,fa73b748b3282d0c18d5fab689944bdcb646646e83d04482ca4b128ad52fd399,2024-12-27T15:45:27.200000
@ -246230,6 +246230,7 @@ CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d
CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000
CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000
CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408bcb,2025-01-17T11:15:08.683000
CVE-2024-12144,1,1,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000
CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000
CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000
CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000
@ -247764,6 +247765,9 @@ CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e
CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000
CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000
CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000
CVE-2024-13892,1,1,ba0368883c2ac157aa0b89e8621108c536bde0ab709b9f9a40478f1765f6e3de,2025-03-06T14:15:35.453000
CVE-2024-13893,1,1,6f74c79e0ddcf27b881db98cdd572d3b259cd7cc0ec9c224906e3f24eca39b98,2025-03-06T14:15:35.630000
CVE-2024-13894,1,1,c08825403e20d9b7d3a5a72ea2c2234dcb1ca09965a1b602a57d161ad708794d,2025-03-06T14:15:35.777000
CVE-2024-13897,0,0,07f598b96e670ba19e3823cc39b2ae054e4338a7f34c42c2715bbbd41cb120b3,2025-03-06T09:15:25.787000
CVE-2024-13899,0,0,372540a329e3dd48ea203e26ad119a2f49b08582c995a840b88c85b67384dc50,2025-02-22T04:15:09.720000
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
@ -260677,7 +260681,7 @@ CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c
CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000
CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000
CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000
CVE-2024-35937,0,1,008f0b099676b1080f92c478a89722853e7a3bcd13760052a5e66ae4736fee3a,2025-03-06T12:53:53.273000
CVE-2024-35937,0,0,008f0b099676b1080f92c478a89722853e7a3bcd13760052a5e66ae4736fee3a,2025-03-06T12:53:53.273000
CVE-2024-35938,0,0,2efeaa65672def64c85e39f960d3d01dbf5533390de3d3f54f180152cb69f5c5,2024-11-21T09:21:14.773000
CVE-2024-35939,0,0,b275ecea9c74fd7d5d66bfdbd96bb842e1b97b53f548850ac73334b3c0feb367,2024-11-21T09:21:14.910000
CVE-2024-3594,0,0,55e7aa826fd5ac5a92668a76380c7410f96136b5e95724eafd64e2c8b6da6f6b,2024-11-21T09:29:56.900000
@ -261421,7 +261425,7 @@ CVE-2024-3692,0,0,4dcb31a4127d38bd6452acf10121a61d94095197d226ab1d1d43421fddb139
CVE-2024-36920,0,0,296892b15bf2eebaea9778f89d4376d82d5fbf60b24a815d649d1db5c3fa6f0d,2024-11-21T09:22:49.243000
CVE-2024-36921,0,0,9fca1ce588f5b618b74dc938d23c125f5b25e6ce9d67dfc6fa92e435e2aa9c02,2025-03-01T02:33:14.063000
CVE-2024-36922,0,0,cb456c0e747a1f1081cb6fb9c8ef844df9b204267e34052842655b94a5e35cfc,2024-11-21T09:22:49.503000
CVE-2024-36923,0,1,0db7b408bf0a465cbfc2832e1b29fcb0647fe6414a24bf7817d48e4bb93e5987,2025-03-06T12:53:37.607000
CVE-2024-36923,0,0,0db7b408bf0a465cbfc2832e1b29fcb0647fe6414a24bf7817d48e4bb93e5987,2025-03-06T12:53:37.607000
CVE-2024-36924,0,0,137498aa9e34e1e8acd4de9ea1ba41b050722b5260fa3d73369cc3248a483780,2025-01-10T18:29:03.477000
CVE-2024-36925,0,0,e0ca67c8234568b1dc27df68d69c690ead06aac125c9af02d4ad6e41e9d1146a,2024-11-21T09:22:49.863000
CVE-2024-36926,0,0,800fd4d9a99b5fed12fe0fc1b134ce999c0c2fa4531986545f76a96538c7238d,2024-11-21T09:22:50.010000
@ -262659,7 +262663,7 @@ CVE-2024-38308,0,0,1baa56b2e3fdd13244d0b9df4f23464d3904d173da05d6eee250ad40c0e7a
CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000
CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000
CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc039,2025-02-12T22:15:35.630000
CVE-2024-38311,1,1,369eff6a0ba7445ff178358722ea77f1fec89a19709c21a4fcf2a228cd4abcc6,2025-03-06T12:15:34.157000
CVE-2024-38311,0,0,369eff6a0ba7445ff178358722ea77f1fec89a19709c21a4fcf2a228cd4abcc6,2025-03-06T12:15:34.157000
CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000
CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000
CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000
@ -262883,7 +262887,7 @@ CVE-2024-38552,0,0,720fe50f9f09822193355713378016678554e327fdf10962760ff63ce824c
CVE-2024-38553,0,0,7daa674f39b9fbc7f9a8957c03f3f61bd55305270fb94814d9818955a2978ffd,2024-12-02T08:15:06.310000
CVE-2024-38554,0,0,df13f1949b7bd7172dedebdb3b62a0c27acdc95d1295e38abf4aeb7af3ad3c7b,2024-11-21T09:26:19.990000
CVE-2024-38555,0,0,48d1e5dfc3dfc2a4b0fa5c5ab09979a6f28a54ef666340efda4f6723bf60db30,2024-11-21T09:26:20.137000
CVE-2024-38556,0,1,e977e95883a20ac81c76c1728a2713c1d5a8684fee03db223b7ae7f79b586fc7,2025-03-06T12:53:37.607000
CVE-2024-38556,0,0,e977e95883a20ac81c76c1728a2713c1d5a8684fee03db223b7ae7f79b586fc7,2025-03-06T12:53:37.607000
CVE-2024-38557,0,0,0dfaaf21c71ac44704804f687fb153b22f5d2adac3615ba3150b80b203367d77,2024-11-21T09:26:20.410000
CVE-2024-38558,0,0,bb5f5c588cc6220a8f52a1016f93a06d7e93f2566de01426efa76e676cd4b0af,2024-11-21T09:26:20.560000
CVE-2024-38559,0,0,951562632157e6a8b239329dc6cd2960e3a234244a65bba4b498169c45b70e96,2024-11-21T09:26:20.703000
@ -262938,7 +262942,7 @@ CVE-2024-38602,0,0,6074885d7e84857d272e5e137d9ef3004b7d1aeb12bd595cc6a908e5bc762
CVE-2024-38603,0,0,2b3756b5f98fde6d2e61eed6983eabc482f401bb309bc43a7cc9339b578c9f49,2024-11-21T09:26:27.690000
CVE-2024-38604,0,0,fb5dc88ac4d02670b799830b7a6a54f5a6ce8e126f7a992e07bd7920b7ba6b1e,2024-11-21T09:26:27.827000
CVE-2024-38605,0,0,183c92803d7c394a3b7337f01dc27e0a8297faa87b9fe235d18e0f744813603c,2024-11-21T09:26:27.937000
CVE-2024-38606,0,1,5b837976fc0cfff01c96d0ebdbf3bdeb77ee1bcb7c75a0a1b490b22332b86f0d,2025-03-06T12:53:37.607000
CVE-2024-38606,0,0,5b837976fc0cfff01c96d0ebdbf3bdeb77ee1bcb7c75a0a1b490b22332b86f0d,2025-03-06T12:53:37.607000
CVE-2024-38607,0,0,55432cbb40c6349effbcd61958d80414a37550b349345ac1cd3aae9bdab797a7,2024-11-21T09:26:28.270000
CVE-2024-38608,0,0,9047d5fa6031e3edcce1a9b27f9a4f65f4b59fc23ac62e10259c6e642290f89b,2024-11-21T09:26:28.400000
CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000
@ -263607,7 +263611,7 @@ CVE-2024-39503,0,0,bfb8778b93d9dc0e3353fdde95567e557faa2bac791848eaa56eec80d82ee
CVE-2024-39504,0,0,03a15e491e92fc31a2f489e2f508052010008630cdd84ebe3d7f8047088fc997,2024-11-21T09:27:50.633000
CVE-2024-39505,0,0,90a964e49c1df1a8320475bf163c491aa6a65384a876c0c3c686e952d6b3f1c9,2024-11-21T09:27:50.837000
CVE-2024-39506,0,0,531242bb57168b2c94d7c9f571365b7ffc2568e0de39b689dd6586cfb83bad6d,2024-11-21T09:27:51.840000
CVE-2024-39507,0,1,0127099630075f68e4559e0978f83cae8096f30555a2cc503a1c48ca8c3cfbe0,2025-03-06T12:53:17.520000
CVE-2024-39507,0,0,0127099630075f68e4559e0978f83cae8096f30555a2cc503a1c48ca8c3cfbe0,2025-03-06T12:53:17.520000
CVE-2024-39508,0,0,b61527ede473f71ec957d7f063dfe9afc808de70d8a3a6ea55db87260a93d703,2024-11-21T09:27:52.240000
CVE-2024-39509,0,0,1d8d55009f9cf6a11df5a012ce860d80d98e7fff9e22285b239717e5da5825e4,2024-11-21T09:27:52.407000
CVE-2024-3951,0,0,fe866e4ae1f51945bb25f7c9b08a9604548e90afa543b0c28badacc4120fa05b,2024-11-21T09:30:45.817000
@ -264532,13 +264536,13 @@ CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e
CVE-2024-40923,0,0,5efd6b4ae80a0f1404002746c36b7cef623484910276e4bb035c5a2f595a19f6,2024-11-21T09:31:52.723000
CVE-2024-40924,0,0,0f9d33d7b2d19938ae91198bf63ca56eaaeb77e2f520287ce7027ad8d2f1cd68,2024-11-21T09:31:52.850000
CVE-2024-40925,0,0,952bfc3433123f21d86aa6aae5c34aa75b8dbf982f063d2a21b34992f7bd7f1e,2024-11-21T09:31:52.970000
CVE-2024-40926,0,1,d223453a80724f856ccdd7f4bb557c9f9d03089af135db8a993acbb7fb8c2b9b,2025-03-06T12:53:17.520000
CVE-2024-40926,0,0,d223453a80724f856ccdd7f4bb557c9f9d03089af135db8a993acbb7fb8c2b9b,2025-03-06T12:53:17.520000
CVE-2024-40927,0,0,3e45cd4c7d7b84f311fd8311cd12a748117e2e084a0ae25d71c9b0f17cb60f82,2024-11-21T09:31:53.210000
CVE-2024-40928,0,0,6bbb47c365ce69b1a36872686a7534abbb78ea0d91fdb478bcb9952597ccc35a,2025-02-03T15:37:36.703000
CVE-2024-40929,0,0,12ca49b2c39711ccc5bc7ec2bc8205b440ce5ff05e6cbcb5d341b829355f554d,2024-11-21T09:31:53.453000
CVE-2024-4093,0,0,791843648abfc4702cff784098fbe535c7a1bd9ba321300437d4415f1c140614,2025-02-11T15:33:25.337000
CVE-2024-40930,0,0,223e3bb5f491ddf209a9c6b0fdb035fae8a1844766aa0528db1cea737cf6605c,2024-11-21T09:31:53.580000
CVE-2024-40931,0,1,8f4491f4ac7f3cbfe8a7e805820debf6b6a8bf9abd6d3846fe73b7d538d9fa62,2025-03-06T12:53:17.520000
CVE-2024-40931,0,0,8f4491f4ac7f3cbfe8a7e805820debf6b6a8bf9abd6d3846fe73b7d538d9fa62,2025-03-06T12:53:17.520000
CVE-2024-40932,0,0,396501b3682afb3f6991ae19df88e118e519447a6804c55f105fd35e30fb00dd,2024-11-21T09:31:53.817000
CVE-2024-40933,0,0,7c0cb98e6ad09b1eb03291e4c89ea0fa86745de6ed168fa2a93f9f27003a69b0,2025-02-03T15:38:11.110000
CVE-2024-40934,0,0,715b4cd58b992c333d81aa8ac045f4eea34f011597b59a061268df50bd4135a7,2024-11-21T09:31:54.097000
@ -264596,7 +264600,7 @@ CVE-2024-40980,0,0,de3031711db513dcb148f704b93b2dd78d8a01c6b42c8e20d4a48c56f1176
CVE-2024-40981,0,0,37c3f0cff46cff282ec46d2f86b939aa2408325f560b29ec75fca4a796526834,2024-11-21T09:31:59.973000
CVE-2024-40982,0,0,bcacd4044a55751834c2f177b012689b5a04e030964cc42170ae5439258936b0,2025-02-24T13:15:10.790000
CVE-2024-40983,0,0,4f1e7e94a10f77a2a960c5963137825b1a7d9ac1338f04d0af0e9fa582272b5b,2024-11-21T09:32:00.260000
CVE-2024-40984,0,1,fe8e68c20234bcaf7527f868ca295e700815cf8eed594aa35fa1e26e09754795,2025-03-06T12:53:17.520000
CVE-2024-40984,0,0,fe8e68c20234bcaf7527f868ca295e700815cf8eed594aa35fa1e26e09754795,2025-03-06T12:53:17.520000
CVE-2024-40985,0,0,53f2aaafe6f291a7057a7769a5566edb3215c6fde96a4df2ae27d2aacc836123,2024-11-21T09:32:00.513000
CVE-2024-40986,0,0,70433503e15bf19a04d4804979b973ebc8834bf0f36157900d4e6769acc11f76,2024-11-21T09:32:00.620000
CVE-2024-40987,0,0,8c6da8c46e3a70e3ea00130ef8dc2384edf3f6f8358535f996c64f7236534443,2024-11-21T09:32:00.723000
@ -264644,7 +264648,7 @@ CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d8428345
CVE-2024-41025,0,0,de776435d7227d8dd4a23ef7e5396bac477026279e493e401efa28a0e142b9b2,2025-02-03T15:43:55.150000
CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000
CVE-2024-41027,0,0,eaa63e74c3ce16129be48c23bd10b961f700b28c359c1860f0f1e79e575ef9f2,2024-11-21T09:32:05.680000
CVE-2024-41028,0,1,b924dfe0be651b444de118992a2fc5d3da1562c9baa5d2af8c66efd53f193fb0,2025-03-06T12:53:17.520000
CVE-2024-41028,0,0,b924dfe0be651b444de118992a2fc5d3da1562c9baa5d2af8c66efd53f193fb0,2025-03-06T12:53:17.520000
CVE-2024-41029,0,0,f9db8ea6446b76e46dc00691964188fe35e2a1ac13ab357464786adaee900744,2024-11-21T09:32:05.920000
CVE-2024-4103,0,0,aaca6600ff13db66884b3ef298ff81547c88ad56078acd57bcd1d6a0339d855f,2024-11-21T09:42:11.887000
CVE-2024-41030,0,0,9168be225963c75def9fd0a94bac40604a890ecf2829523390253cb24d1adb15,2024-11-21T09:32:06.033000
@ -265574,7 +265578,7 @@ CVE-2024-42260,0,0,eb52125b7ac8aa328b971df28fae3672970357ac79f1958c3b76d2a4939b7
CVE-2024-42261,0,0,72fe870a41ca864453ed4788fd4a91439d6c4b246a2a5f09a56b04af1e7ecbf8,2024-08-19T12:59:59.177000
CVE-2024-42262,0,0,7f3d17e5526185f5375daae7ba422211b70f3364ede237c89feab9ff5e43cedf,2024-08-19T20:05:15.407000
CVE-2024-42263,0,0,3493b915ba1505678529c159f5fa9faa50bc66ec51cc9c94e8dae616046ad302,2024-08-19T20:41:11.240000
CVE-2024-42264,0,1,19896bcf2395821479fd72c8393e62d357c4df261d67a94cbe2787b624fb5190,2025-03-06T12:53:17.520000
CVE-2024-42264,0,0,19896bcf2395821479fd72c8393e62d357c4df261d67a94cbe2787b624fb5190,2025-03-06T12:53:17.520000
CVE-2024-42265,0,0,dc9a1e67a9f4810f2841027c6483efefd3f1789eb7007a2fd693f56892bd11a5,2024-08-19T12:59:59.177000
CVE-2024-42266,0,0,e3773d6d9416557898775f8e251bb3caface8cb0ca7f14ef02f46bb386d50723,2024-08-19T12:59:59.177000
CVE-2024-42267,0,0,881474d04f014e3df273462be8ded36c9d57a485e542f49fb9e4732784ec7797,2024-08-19T12:59:59.177000
@ -271012,7 +271016,7 @@ CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1
CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004a44,2025-01-29T21:24:00.387000
CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000
CVE-2024-49806,0,0,1e9e7366d429bfe4288411d8922c4ce74b00945547b83f0b9b47dea0218eb8ae,2025-01-29T21:25:06.310000
CVE-2024-49807,0,0,68d646b93ca169d9246962a92303d7bb36c19bfd79c59c0a41204a851f5cb51d,2025-01-31T16:15:34.647000
CVE-2024-49807,0,1,fa93f519f28a27fa1a6f3184ddd160494536ae94aaeccfdd0ab3674a1ea7fc28,2025-03-06T13:30:34.893000
CVE-2024-49814,0,0,73913b2547105d571411ec726289dcdf22a5171ac9632e1edb82b0e05878de6d,2025-02-06T01:15:08.230000
CVE-2024-49816,0,0,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000
CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000
@ -272698,29 +272702,29 @@ CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e2
CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000
CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000
CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000
CVE-2024-51942,0,1,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000
CVE-2024-51944,0,1,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000
CVE-2024-51945,0,0,1ae5ce04d1d327652720171f30e6b6504353f9d9238219139425e6dde4fc5bc0,2025-03-03T20:15:40.483000
CVE-2024-51946,0,0,32d060e63bb43a324ec55d23a71a44484d8536def4a0cea14a4ef958035a8ff0,2025-03-03T20:15:40.640000
CVE-2024-51947,0,0,da610cce302aa6ac199dfd0acfd63684d2e11449b65a14620f4ba6cc7bcb3c54,2025-03-03T20:15:40.797000
CVE-2024-51948,0,0,d3672bf970f4c743112d71732fbda88e9f7d1f990176556a4bb9c9a1b5ba9c46,2025-03-03T20:15:40.953000
CVE-2024-51949,0,0,f848e450c66ff3cc0ac44e37864ae9eb912631efaa84841cad4363dac93a03fc,2025-03-03T20:15:41.110000
CVE-2024-51942,0,0,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000
CVE-2024-51944,0,0,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000
CVE-2024-51945,0,1,38f5a32d001f0190ef98670af553cf8909de1cdbe13a8644d47acb1a89844580,2025-03-06T14:23:26.167000
CVE-2024-51946,0,1,374690e9df38794b94ca4b4d59d90dab7831490073d30a4221e31c258c9b8934,2025-03-06T14:23:26.167000
CVE-2024-51947,0,1,e86d80d8ac1ca36d9cfee6310112fc4344a741f349117c7760dbe0154aa86ed5,2025-03-06T14:23:26.167000
CVE-2024-51948,0,1,9b932a0aa110b7e3984a33d1efe3da4d75583774b2026f209391f1bc6c55b912,2025-03-06T14:23:26.167000
CVE-2024-51949,0,1,0e53f287752c336e888822b58d1dcda00ac87123548cecb923834dd8f676d2d2,2025-03-06T14:23:26.167000
CVE-2024-5195,0,0,fa8698da02fa582ea365b08f4fecc73e615774ea2cc6020b120dbb6e842cd656,2024-11-21T09:47:10.100000
CVE-2024-51950,0,0,e63af37df8cb944e876afe766d94cf673c2c6c9c21cdb0fef4648ca8cbf9bfbf,2025-03-03T20:15:41.277000
CVE-2024-51951,0,0,b0a70ff21c02a3353204ddb592154c8ead31f55aee831eac76f9d24c3a6a47c1,2025-03-03T20:15:41.437000
CVE-2024-51952,0,0,c2e58f1af276d48df9e6ac1156158c5e343feccdbdc04b4b49a5e01d7f3a9d40,2025-03-03T20:15:41.593000
CVE-2024-51953,0,0,67774962b27fed27679193f3b8aead9facba4cc3a07ae29db6afd4dd272cfa2e,2025-03-03T20:15:41.747000
CVE-2024-51954,0,0,be77c60f8f257881fa643df46b0ee66e8d8c1039c224634ccd268e1a059a2dc2,2025-03-03T20:15:41.903000
CVE-2024-51956,0,0,327b8e8588d322b6f0c4415ad15129e51935d7fad292db8a45444de4541558f9,2025-03-03T20:15:42.063000
CVE-2024-51957,0,0,8dd1c81680575fd19726636577a4d82040f27e20f65135427b1294158b6b5182,2025-03-03T20:15:42.217000
CVE-2024-51958,0,0,666d591d4068e4f46732cf55672fa338aedd9feca614542312e4f4a66be24de1,2025-03-03T20:15:42.397000
CVE-2024-51959,0,0,34e6e382054142802e70430181005b69c35afac6e208c5537d0ca6e0abb2fcc7,2025-03-03T20:15:42.550000
CVE-2024-51950,0,1,9aeda626b1a73a36d836b337ddb6e2f40b2ec04d820e0927b810933191b2c93f,2025-03-06T14:23:26.167000
CVE-2024-51951,0,1,45b279c60f428072e4a402c59a266fa8a9671d6ad374ada6dcbc6685b3a0f85b,2025-03-06T14:23:26.167000
CVE-2024-51952,0,1,4fdf2c2b2af227b55576eabd7dbee3c57f6dcd0e1262b5ff98f342cbc4e4b89a,2025-03-06T14:23:26.167000
CVE-2024-51953,0,1,2e4d40eea33b0bca63db4d7c6b7ecea597d0e1d849214f0978d201b82c0795fc,2025-03-06T14:23:26.167000
CVE-2024-51954,0,1,e1d46ee4c71df9ca356fa427b044a377fecda6d84414278b7f3044764cb8f13c,2025-03-06T14:23:26.167000
CVE-2024-51956,0,1,8a1cff218519e698bd7ab4cc64d9391ec72ec4a9b841ec9e0ec4b1297b2aa570,2025-03-06T14:23:26.167000
CVE-2024-51957,0,1,8f0fa1ce82029e78611a7f2084c1cbb2c6a120c4ee8520adba3e121ce1c2487d,2025-03-06T14:23:26.167000
CVE-2024-51958,0,1,fec30b06696b6bb28ee38c30f7890ac0c60ac9f1cba574ddcc27a0495dc0d22e,2025-03-06T14:23:26.167000
CVE-2024-51959,0,1,a00f7484f54002cf0451ae5d3d18f94fbb0197136c77d7c4af6efbdc21752116,2025-03-06T14:23:26.167000
CVE-2024-5196,0,0,6d90077174f7697bbfa31bc4f0436f8c9f218990f5eb59e7edd22cabda3ff370,2024-11-21T09:47:10.230000
CVE-2024-51960,0,0,245bd5f3b73e100c98572ee9b0a352d632020e8af239c6c1ebf5cb1699b815dd,2025-03-03T20:15:42.707000
CVE-2024-51961,0,0,01e9ffa0a457ddc30eb2336f871db149d8662bad43d101cd91915aebc98a42df,2025-03-03T20:15:42.863000
CVE-2024-51962,0,0,4ceafa67ac11228d6f6db25d014157e259ceb7afda9f59829f982bbe747cbf04,2025-03-03T20:15:43.043000
CVE-2024-51963,0,0,e7b459ea88eb7101b3628bcfffa412a87b3fa3b9e52b6af071f2cc833dc7b726,2025-03-03T20:15:43.240000
CVE-2024-51966,0,0,93bafd72071cc92b1023d43c577c2f8dcea05c664443f62944773ed5f965756e,2025-03-03T20:15:43.387000
CVE-2024-51960,0,1,4fc5cb483e8866725dcb2c62b316f692664ccac493913ae82ea7ff308291f324,2025-03-06T14:23:26.167000
CVE-2024-51961,0,1,fcfb4dc7c6437182d6d1b78ca82922bcadca2fb75db9e2b12a36cde2849df2d0,2025-03-06T14:23:26.167000
CVE-2024-51962,0,1,17f37fb9fb87587a68332c2ceae76372d40c06cabef66c0137bdccaba1220562,2025-03-06T14:23:26.167000
CVE-2024-51963,0,1,c61743d3b34745847f281194e9ab430d9bc91fb42f597d40e2492c3bd4146653,2025-03-06T14:23:26.167000
CVE-2024-51966,0,1,57235b2ae25a1c9bc7f244c2ebe0c2ff6ca0135bbb9202f4691d03357fd1f7db,2025-03-06T14:23:26.167000
CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000
CVE-2024-5198,0,0,0cb0dbc1ecb18e948c4424650c67decdfcc909aef2c2c929df2436f4b9fa7302,2025-01-15T15:15:13.607000
CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000
@ -273538,8 +273542,8 @@ CVE-2024-53158,0,0,e531f3eba6de342b83e364b8771c46bf2c1c9fd8d80363877d69a71c57f42
CVE-2024-53159,0,0,0efe60c571308791e08c5af46e2d936d40b42d7671e5dc75fbe9400ec226f8d4,2025-01-09T16:16:21.233000
CVE-2024-53160,0,0,4057796bb00f7bfb6f732886520cc805fa7c46e82813820ad292c8bad3293b53,2024-12-24T12:15:24.340000
CVE-2024-53161,0,0,eeaec3335f10b57ba4a8525bcd94f1272174075b2c57b00bf93a768e727c0f4c,2025-02-03T15:25:26.370000
CVE-2024-53162,0,1,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c6d1,2025-03-06T12:42:52.363000
CVE-2024-53163,0,1,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000
CVE-2024-53162,0,0,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c6d1,2025-03-06T12:42:52.363000
CVE-2024-53163,0,0,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000
CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000
CVE-2024-53165,0,0,a4943f78f99297463146bf300537cb48a621a1dff9c540e1bec71a9d3b2949f4,2025-02-11T16:15:40.500000
CVE-2024-53166,0,0,6b47b227a3c2839f79bbaeaa4f5e16e222ce5bbd89cad0bd429474bf1b6f91e1,2025-02-10T18:15:26.717000
@ -273587,7 +273591,7 @@ CVE-2024-53205,0,0,aad40af383a0fae2dfd165489485b38af4279f086ab2ffc2acc584ef6f771
CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000
CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000
CVE-2024-53208,0,0,bc7e68ca2f003cd79ddc6d7ce610dc12e11f263a6b66fec26ebcb92d92485dc8,2025-01-16T16:46:38.657000
CVE-2024-53209,0,1,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000
CVE-2024-53209,0,0,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
CVE-2024-53210,0,0,edb6f6743b39b3d9aaae84e10ec98f8816051f339f526267a629d8a9b382a055,2025-01-14T15:50:32.413000
CVE-2024-53211,0,0,18d392b735905bf509d5b499622b5915d2a7dc656aac6c7b71a8cc77eb401829,2024-12-27T14:15:29.017000
@ -275171,15 +275175,15 @@ CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-56195,1,1,5061972a1cb73878137e3bd459e010e89d1c1704b622db6ed4fbc91bfa8ff13b,2025-03-06T12:15:35.373000
CVE-2024-56196,1,1,b46ae86c15fd0353a72c49b206ddbd52d33b27b1eae894036c9613fbfa8f4b28,2025-03-06T12:15:35.523000
CVE-2024-56195,0,0,5061972a1cb73878137e3bd459e010e89d1c1704b622db6ed4fbc91bfa8ff13b,2025-03-06T12:15:35.373000
CVE-2024-56196,0,0,b46ae86c15fd0353a72c49b206ddbd52d33b27b1eae894036c9613fbfa8f4b28,2025-03-06T12:15:35.523000
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
CVE-2024-56198,0,0,3b67ef470891f025afa6af0da137e788f43839b85f759fed43bf437c7d57fc06,2024-12-31T16:15:27.247000
CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000
CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000
CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000
CVE-2024-56201,0,0,fcf381b194171b51a5229bbac53f5e329fb502829416a1a37abaece0e20f4002,2025-02-18T22:15:12.910000
CVE-2024-56202,1,1,56b4a87f440cecd788b6a9dd57890c9c4416d61ca169d201a38d8af53065d0ed,2025-03-06T11:15:11.423000
CVE-2024-56202,0,0,56b4a87f440cecd788b6a9dd57890c9c4416d61ca169d201a38d8af53065d0ed,2025-03-06T11:15:11.423000
CVE-2024-56203,0,0,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000
CVE-2024-56204,0,0,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000
CVE-2024-56205,0,0,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000
@ -275354,8 +275358,8 @@ CVE-2024-56408,0,0,937b0b6dcb8b7e22700c52d825204d5a29fd9d235db7298d220870025b8b9
CVE-2024-56409,0,0,5308d88426ba47579b9e4814446ee52648c1ad6c1efaeac0ba2c7848d693aa32,2025-01-03T19:15:12.627000
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
CVE-2024-56410,0,0,773584879180f8e91ff1c4d215aa7e545e4564d5fb6f40fae69849530878b183,2025-01-03T21:15:13.723000
CVE-2024-56411,0,0,a08ca91a72231c6a154ca10536c8a561c34fab0a4dc6751ff667317d6cb8ebcf,2025-01-03T18:15:16.203000
CVE-2024-56412,0,0,9d42bd036e8aef394bdb153cf89625129ee1e8bc4318110e9f42ab101734661d,2025-01-03T18:15:16.380000
CVE-2024-56411,0,1,8a8f707c7bfe42da58c26531de0000f76c5a24eb783381a2a81a1a9fef0dc05b,2025-03-06T13:30:34.893000
CVE-2024-56412,0,1,ffbda529bc4b3d5376fc38b6bb3dbb9527a4234f16921504f6f0df51d478a8ed,2025-03-06T13:30:34.893000
CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000
CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000
CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000
@ -275442,7 +275446,7 @@ CVE-2024-56544,0,0,8a7f14bcfbf3a6d0d0b05eb7bf9e4f8c9bffe91101daa0f73648af61ea7c5
CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b1f2,2024-12-27T14:15:34.270000
CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000
CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000
CVE-2024-56548,0,1,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b7371e,2025-03-06T12:42:52.363000
CVE-2024-56548,0,0,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b7371e,2025-03-06T12:42:52.363000
CVE-2024-56549,0,0,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000
CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000
CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000
@ -275450,7 +275454,7 @@ CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f
CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000
CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030fb6,2025-01-15T18:35:51.337000
CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000
CVE-2024-56555,0,1,884600d2a02055b52b7728da3577ca03c9ba0b308206c6e00653bcca6cccc353,2025-03-06T12:42:52.363000
CVE-2024-56555,0,0,884600d2a02055b52b7728da3577ca03c9ba0b308206c6e00653bcca6cccc353,2025-03-06T12:42:52.363000
CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000
CVE-2024-56557,0,0,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000
CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000
@ -276007,11 +276011,11 @@ CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b
CVE-2024-57575,0,0,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000
CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000
CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000
CVE-2024-57579,0,1,998c634aaf72ebc07e60fd4101f3ff588564deb00e5a24d254aea61bfbf0aa4f,2025-03-06T12:42:52.363000
CVE-2024-57579,0,0,998c634aaf72ebc07e60fd4101f3ff588564deb00e5a24d254aea61bfbf0aa4f,2025-03-06T12:42:52.363000
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
CVE-2024-57580,0,1,5386ab0a31ac0414e0bafcdd93e2d3649e0dc143fcb13adc039707846357654a,2025-03-06T12:42:52.363000
CVE-2024-57581,0,1,86f2c2ce89d7f7c1ea938f6ec9bdb7e42f919b1b3148032fa9c5467796d1eb80,2025-03-06T12:42:52.363000
CVE-2024-57582,0,1,ec57dc747c9963ddf2f1259638e8142ee12e0a5daccca4dde80591a5cb608b5c,2025-03-06T12:42:52.363000
CVE-2024-57580,0,0,5386ab0a31ac0414e0bafcdd93e2d3649e0dc143fcb13adc039707846357654a,2025-03-06T12:42:52.363000
CVE-2024-57581,0,0,86f2c2ce89d7f7c1ea938f6ec9bdb7e42f919b1b3148032fa9c5467796d1eb80,2025-03-06T12:42:52.363000
CVE-2024-57582,0,0,ec57dc747c9963ddf2f1259638e8142ee12e0a5daccca4dde80591a5cb608b5c,2025-03-06T12:42:52.363000
CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000
CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
@ -276176,7 +276180,7 @@ CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698
CVE-2024-57822,0,0,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74d81,2025-01-10T15:15:16.337000
CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000
CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000
CVE-2024-57834,0,1,e3cca5e287184f32d20397e91dde398ce533990b77cde31e05ffb1748294feb6,2025-03-06T12:42:22.567000
CVE-2024-57834,0,0,e3cca5e287184f32d20397e91dde398ce533990b77cde31e05ffb1748294feb6,2025-03-06T12:42:22.567000
CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000
CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000
CVE-2024-5784,0,0,f27ecf8abffd9e6c282a3d3ca16cce2ce0cb1c19ecd7f5c543f166278a4d8c33,2024-09-03T14:48:19.570000
@ -276329,28 +276333,28 @@ CVE-2024-57999,0,0,192cd62115ee0eebfc0e3194a10d118c6cde7d7dffe718c35de3e7f488afc
CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000
CVE-2024-58000,0,0,9bead4c6f4a6e6b0b3e4ccb9dcb95d8e89506cd6b149e93be860b24427528e09,2025-02-27T02:15:14.033000
CVE-2024-58001,0,0,062b95b71d62b8392e7dec859d235ae0235da3e946e47b40e89a8df2d660fc6c,2025-02-27T03:15:11.080000
CVE-2024-58002,0,1,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000
CVE-2024-58002,0,0,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000
CVE-2024-58003,0,0,d63162215e1a5dbdf2f26a3a80f9f12faed3d9c520fa6be1ac27c057f67243cd,2025-02-27T03:15:11.277000
CVE-2024-58004,0,0,68844712d1835a2f20b5302361ac491d98dd1a1f13907be2f39c078787a0c250,2025-02-27T03:15:11.380000
CVE-2024-58005,0,1,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000
CVE-2024-58005,0,0,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000
CVE-2024-58006,0,0,99bcd7c70bad6c86d4a686c41e032b597709b74aa5784099886d83704a9dc686,2025-02-27T03:15:11.583000
CVE-2024-58007,0,0,99668dc3f95779e9ab7d159225d35092d54f8a625cb70f7c1df3ac9c1790c35c,2025-02-27T03:15:11.680000
CVE-2024-58008,0,0,83bb44015382c711e9fe765b2c4558ae62041f53545addc939db33a1da1a9569,2025-02-27T03:15:11.780000
CVE-2024-58009,0,0,6a6126ef4bf4110693d6a0d67f707884629b7a16a613596b22e7f8f6785b193e,2025-02-27T03:15:11.880000
CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add0a,2024-08-12T13:41:36.517000
CVE-2024-58010,0,1,c1fd457cf19b62729c1f9b9b7bbb9293ec963169d1a004a0837507c00ece7219,2025-03-06T12:42:22.567000
CVE-2024-58011,0,1,fc794450673cbe9ad7f2b33dc371eab9dfbd1bfc29db3b7101769aa8d3911f9e,2025-03-06T12:42:22.567000
CVE-2024-58012,0,1,c8d740bec17d8fc7f5d246a577a3ca722860950bfe7cc6f3f55a1529388c0457,2025-03-06T12:21:35.360000
CVE-2024-58010,0,0,c1fd457cf19b62729c1f9b9b7bbb9293ec963169d1a004a0837507c00ece7219,2025-03-06T12:42:22.567000
CVE-2024-58011,0,0,fc794450673cbe9ad7f2b33dc371eab9dfbd1bfc29db3b7101769aa8d3911f9e,2025-03-06T12:42:22.567000
CVE-2024-58012,0,0,c8d740bec17d8fc7f5d246a577a3ca722860950bfe7cc6f3f55a1529388c0457,2025-03-06T12:21:35.360000
CVE-2024-58013,0,0,db720d7ccdda587cf86c812bf9a23ff3242ad2c6818001578519aa3e1096cd28,2025-03-05T22:15:35.690000
CVE-2024-58014,0,0,c7b2aa63e8b7bec392f61441db5b82d30877f13fd011c4249345a8e6613810f5,2025-02-27T03:15:12.390000
CVE-2024-58015,0,0,408dce73f62364b52ba252950975a281e1135fb7b4b23b2ccae7c773ad3c39ca,2025-02-27T03:15:12.493000
CVE-2024-58016,0,0,4b26c1146b2a0dfbe10569fbb6f1cac4750ac1fe03a88c36d84acf78d6c876e6,2025-02-27T03:15:12.590000
CVE-2024-58017,0,1,18bd37de338911a20f5914e76e03d06f45cf2a45cb08188b214fd79e66278cc8,2025-03-06T12:21:35.360000
CVE-2024-58017,0,0,18bd37de338911a20f5914e76e03d06f45cf2a45cb08188b214fd79e66278cc8,2025-03-06T12:21:35.360000
CVE-2024-58018,0,0,2d45ea9e1b61e8eef6ac2402ad337a326ac66e5ce54a80719f057d18b1037900,2025-02-27T03:15:12.797000
CVE-2024-58019,0,0,ebe852acb58145e0f515ee4e65d8d88d1691b0b856363c64f164142eb938ae30,2025-02-27T03:15:12.897000
CVE-2024-5802,0,0,19fff604014c9cef9e0f8bc6a62b84f7523f1797653eafe6700c36b3d03bd7a8,2024-11-21T09:48:21.447000
CVE-2024-58020,0,1,5a8fbd0ea6230b3adf124651d3209ddd707b5ccdd2a1f6069d1ce1136d9e87ff,2025-03-06T12:21:35.360000
CVE-2024-58021,0,1,1a52cd1a00902ee421b6fe06d4bf4ed4d9ccb5fd0ebd997107ce026e3de83c83,2025-03-06T12:21:35.360000
CVE-2024-58020,0,0,5a8fbd0ea6230b3adf124651d3209ddd707b5ccdd2a1f6069d1ce1136d9e87ff,2025-03-06T12:21:35.360000
CVE-2024-58021,0,0,1a52cd1a00902ee421b6fe06d4bf4ed4d9ccb5fd0ebd997107ce026e3de83c83,2025-03-06T12:21:35.360000
CVE-2024-58022,0,0,fa469b1694a27ff9f3883dfbb31bb0fb81728568f162205ac4ad417c587e1c4b,2025-03-05T14:05:15.387000
CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974d3,2024-10-04T13:50:43.727000
CVE-2024-58034,0,0,a58d20858f51668ab0e30ae7e40910f616321f1f89fdedf57b44aac4e3186045,2025-03-04T18:15:24.617000
@ -276445,7 +276449,7 @@ CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5
CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000
CVE-2024-5888,0,0,b01cdf2669fd18c7554d12fa64aa10c8adf3fceea18ffcfb34332b4eb5c533a3,2025-03-03T20:15:43.940000
CVE-2024-5888,0,1,20f59e0814c65babf2f0e66d48a127098726020f44ce6e0309b928c6093d5daf,2025-03-06T14:23:26.167000
CVE-2024-5889,0,0,b7da0432a39a45529584a1b2f747e31f7e73bfff06d966025659d00202e054f6,2024-11-21T09:48:31.583000
CVE-2024-5890,0,0,50a5a9d6ce6b94fe3e5714721a54c52cb0baf0048b9af07fdeef8cdcefb5efd7,2024-12-02T19:15:12.357000
CVE-2024-5891,0,0,ae9d57cc1702609e0862660090fa56b838e4604ff46aac9331af1fa5a8086c71,2024-11-21T09:48:31.703000
@ -278236,7 +278240,7 @@ CVE-2024-7868,0,0,9e808ba59db5e75df79564ecc2138484211632b9d431d14239406d748d65bd
CVE-2024-7869,0,0,a24ed1b37588c27588e8f347c06825561aa4e483768430e73928fa9d6c6d77d1,2024-10-04T13:51:25.567000
CVE-2024-7870,0,0,3ed63dc8c6790f45531fa92ee00a8019436a7c365c07e1d62a5d07b0d3c88d17,2024-10-07T12:29:19.203000
CVE-2024-7871,0,0,31db92eb5e0af181e39b35c41b604931a9d330c8192fefbcc353a016d70cbca3,2024-09-04T17:34:14.630000
CVE-2024-7872,1,1,da9e48ba3c5ebdf2a98907c1d3bb0d0d8666f811524323efeb2f562336a5c4c6,2025-03-06T12:15:35.667000
CVE-2024-7872,0,0,da9e48ba3c5ebdf2a98907c1d3bb0d0d8666f811524323efeb2f562336a5c4c6,2025-03-06T12:15:35.667000
CVE-2024-7873,0,0,03a7d50af22555e4239c69e93e200f90c2450fb77addde43aeb65c5f4bc2bdc1,2024-09-20T12:30:51.220000
CVE-2024-7874,0,0,79509650a2a2c64601c5be3ed14299dfd192578a0a0c4b43f8e745203fae82b5,2024-12-06T21:15:09.487000
CVE-2024-7875,0,0,fb1669572475de6533c581f8c56bc49b1a49b90132a9fcae7ae022ebc7e1b8e2,2024-12-06T21:15:09.613000
@ -280199,7 +280203,7 @@ CVE-2025-0345,0,0,fdab4ab061ba34e7ae56477c0a30fa81f9f16f64f88fe386d4634a52d9c45c
CVE-2025-0346,0,0,784962397b9f922e5eb47e0f60b46c47f1349646424ee2278ecbe0e3b77a240f,2025-02-27T02:05:55.703000
CVE-2025-0347,0,0,6673240c782ee6585e0b98006b3eaddd70b95ff8f7b53165bb334c59c3c173da,2025-02-27T02:05:55.703000
CVE-2025-0348,0,0,e571492bb8da0d49f53156cf92abd508dd738cda3756ae8e9a52c4288cbf6dee,2025-01-09T10:15:07.700000
CVE-2025-0349,0,1,aefa841112d10deacd44207c4ea560230b6873b18e02516a9c1ce182b55a447c,2025-03-06T12:42:52.363000
CVE-2025-0349,0,0,aefa841112d10deacd44207c4ea560230b6873b18e02516a9c1ce182b55a447c,2025-03-06T12:42:52.363000
CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000
CVE-2025-0352,0,0,3a526a5a58f779d9c18dd79a4421979dfef5808334aa001e60b548298e16dc22,2025-02-20T20:15:46.383000
CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000
@ -280525,7 +280529,7 @@ CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f
CVE-2025-0844,0,0,071e9d4f5de1eed9b63c09ffd0ea19a371d7cff2071b2b278c26d7f50a60a457,2025-02-04T17:17:18.457000
CVE-2025-0846,0,0,2f157ad7524f9611de30718adef5bf4f9523f0c2e3fd3595be8e6b55eaf2b5c7,2025-02-04T16:49:08.027000
CVE-2025-0847,0,0,ea927878808932b75502c7906c4cc6399e2fb275f98c51b7493b1bd399022943,2025-02-04T16:36:19.400000
CVE-2025-0848,0,0,32914991a687958521823760c34bed606970cacdc9dcd4cf80621b51751f9222,2025-01-30T02:15:25.597000
CVE-2025-0848,0,1,ca6d630f71f0e762dfc43d0d857c8db3999e805cb355c08f22ff4610c1a9e475,2025-03-06T13:30:34.893000
CVE-2025-0849,0,0,c1571bb2b5b492c6f92204c6e608b11f867312e7feddc38eeea3bee1b20e34e6,2025-02-04T16:27:36.197000
CVE-2025-0851,0,0,62423acde853af0a12a4aec10e4529f32bf957e75f81daf2b9cb54a67a3c55a5,2025-01-29T22:15:30.463000
CVE-2025-0858,0,0,f891231954c92d22a87eae2f502f820f9d12773d9f7834eea219f8626f292204,2025-02-05T15:15:21.580000
@ -280544,6 +280548,7 @@ CVE-2025-0871,0,0,a9db8232db94718d41bf6e96d50fc960e1fc11044b43405a9641244f217c6b
CVE-2025-0872,0,0,e07508ceef8393fa75d891955449dc691af8810cd495d3336262099110723cda,2025-02-07T14:07:40.797000
CVE-2025-0873,0,0,5aa4d6fb1c3a8eb595c4da8c3d69b8728e6fd89d36901ed8245170c7f8b81c38,2025-02-07T14:05:17.653000
CVE-2025-0874,0,0,125dbc60ce30bbccf3019f6512261a2e3942682e065309657be2653037ecf35f,2025-02-21T21:36:58.723000
CVE-2025-0877,1,1,9abd91ef8daaee0e2c940a8a18ca67cbbbc22c8da6225fc8641235a410cbacf7,2025-03-06T14:15:36.107000
CVE-2025-0880,0,0,77e515b74976a5dc3eae29ea5053c11b5ba4746b76e1c02c2445f07f8eff78da,2025-02-25T19:20:49.193000
CVE-2025-0881,0,0,db910fe9bbcd2f0479a83598ac8b27c8e73be02c1af8fa69430d4bd0072a10a7,2025-01-30T22:15:09.950000
CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000
@ -280842,7 +280847,7 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89
CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000
CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000
CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000
CVE-2025-1383,1,1,26b3f9287a3dc8bde52150fc61dab501d76865193cef15f0f8e76bc4558f6230,2025-03-06T12:15:35.937000
CVE-2025-1383,0,0,26b3f9287a3dc8bde52150fc61dab501d76865193cef15f0f8e76bc4558f6230,2025-03-06T12:15:35.937000
CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000
@ -280961,7 +280966,7 @@ CVE-2025-1645,0,0,04ec87d98beb60cc953f9d19acf54f139fb80161a3db0460324c4b28ab5996
CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc304,2025-02-25T14:15:31.320000
CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000
CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000
CVE-2025-1666,1,1,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000
CVE-2025-1666,0,0,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000
CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000
CVE-2025-1672,0,0,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000
CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000
@ -280978,7 +280983,7 @@ CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec58
CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000
CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000
CVE-2025-1695,0,0,11ac8a68241490aba1f5f798db0dba9522b478d170bec56bb4dd6fd08e218fb4,2025-03-05T15:18:38.660000
CVE-2025-1696,1,1,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000
CVE-2025-1696,0,0,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000
CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000
CVE-2025-1714,0,0,7d464005cc3e2fe8abdf07631689d8f1c4467f8ffe467852e3ced1b0a0be0afa,2025-03-05T15:15:15.413000
CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
@ -281070,8 +281075,8 @@ CVE-2025-1873,0,0,e1c282e5ad730be363eaf77efd9ada11d8c28125c103f5c76eae6f3dc74ed9
CVE-2025-1874,0,0,aaac5f5bbefa513f1f275c65a81e3107f76733903a225b9b994a8887fc4365fa,2025-03-03T13:15:12.693000
CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327f8,2025-03-03T13:15:12.837000
CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000
CVE-2025-1877,0,1,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000
CVE-2025-1878,0,1,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000
CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000
CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000
CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9ad,2025-03-05T14:05:15.387000
CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000
CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000
@ -281080,19 +281085,19 @@ CVE-2025-1889,0,0,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc98
CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000
CVE-2025-1891,0,0,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000
CVE-2025-1892,0,0,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000
CVE-2025-1893,0,1,b2d203b613f27dbac4f37dcede36fc006d1bdec55036de6db0319aba9208eaa8,2025-03-06T12:21:35.360000
CVE-2025-1893,0,0,b2d203b613f27dbac4f37dcede36fc006d1bdec55036de6db0319aba9208eaa8,2025-03-06T12:21:35.360000
CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000
CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000
CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000
CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000
CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000
CVE-2025-1899,0,0,a77691b4c448ef2bbbe9d4136b221ec0c7528d9c510c1bc782c445389d323e3c,2025-03-05T18:47:21.313000
CVE-2025-1900,0,1,2bb4415842bd144755e10d37e7bdda984b10b0e407943e93eb4e77d1b80545fa,2025-03-06T12:21:35.360000
CVE-2025-1901,0,1,39502d1ad733af26c8353312629d13298f6f85261490cede3884982e164f6103,2025-03-06T12:21:35.360000
CVE-2025-1902,0,1,6642b45a5b9d0157dbcbfe7ed8407322ac885c09e239452506eca1dd8061d1d4,2025-03-06T12:21:35.360000
CVE-2025-1903,0,1,c97c725b330640c2eb326cf708d9cdba957f8bee8128cf210d90507df4f160cd,2025-03-06T12:21:35.360000
CVE-2025-1904,0,1,5982f191697594854129a95e84a87d047a15fabc77030ebb45046f4ce2b93e2a,2025-03-06T12:17:33.710000
CVE-2025-1905,0,1,f6cb8f547b222722f8a05ade71066d34df308515521c260f6830f7a0901183d4,2025-03-06T12:17:33.710000
CVE-2025-1900,0,0,2bb4415842bd144755e10d37e7bdda984b10b0e407943e93eb4e77d1b80545fa,2025-03-06T12:21:35.360000
CVE-2025-1901,0,0,39502d1ad733af26c8353312629d13298f6f85261490cede3884982e164f6103,2025-03-06T12:21:35.360000
CVE-2025-1902,0,0,6642b45a5b9d0157dbcbfe7ed8407322ac885c09e239452506eca1dd8061d1d4,2025-03-06T12:21:35.360000
CVE-2025-1903,0,0,c97c725b330640c2eb326cf708d9cdba957f8bee8128cf210d90507df4f160cd,2025-03-06T12:21:35.360000
CVE-2025-1904,0,0,5982f191697594854129a95e84a87d047a15fabc77030ebb45046f4ce2b93e2a,2025-03-06T12:17:33.710000
CVE-2025-1905,0,0,f6cb8f547b222722f8a05ade71066d34df308515521c260f6830f7a0901183d4,2025-03-06T12:17:33.710000
CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000
CVE-2025-1914,0,0,26644d87f7ea78754e61afdf88af3b53e637cc322d9c410d45452411107b6199,2025-03-05T15:15:15.560000
CVE-2025-1915,0,0,87990d884ed6a1cf9c53cbb9074aeaf50ed7455c17bcda3f0fc14c8f3723c450,2025-03-05T15:15:15.743000
@ -281202,6 +281207,7 @@ CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb3686
CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000
CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000
CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000
CVE-2025-2045,1,1,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000
CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000
CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
@ -281775,14 +281781,14 @@ CVE-2025-21731,0,0,7c1b8af4bebbeff1dfc9fae4f71bc7c3973872aeed99474f1f0af7f7a91ef
CVE-2025-21732,0,0,3b60bb445ae2b0c463604586ead7cd7b0115346717e34f71b063126e52774df3,2025-02-27T03:15:13.820000
CVE-2025-21733,0,0,f431674ee055b07860a3ac39c72dd3c08e4e4c04f40b001135cbbbbb35e430d4,2025-02-27T03:15:13.923000
CVE-2025-21734,0,0,d9f8314f03451f7ef65c7d0edb09eb5d3aed3906394ae2705f0dbf091413da63,2025-02-27T03:15:14.030000
CVE-2025-21735,0,1,9447e89c5d3f0e8239c27fb7722fcbae09018357fec71126d259ef460ed6c98d,2025-03-06T12:21:35.360000
CVE-2025-21736,0,1,95b5d003bb740dbf9be6a52daa32d7623c068f24bfe6d5597bc9ed5c0178fb53,2025-03-06T12:21:35.360000
CVE-2025-21737,0,1,adbd37458e33d4b47282f1ae2cdaa9237f3384c7ef422beb49ae5c4d15493f31,2025-03-06T12:21:35.360000
CVE-2025-21735,0,0,9447e89c5d3f0e8239c27fb7722fcbae09018357fec71126d259ef460ed6c98d,2025-03-06T12:21:35.360000
CVE-2025-21736,0,0,95b5d003bb740dbf9be6a52daa32d7623c068f24bfe6d5597bc9ed5c0178fb53,2025-03-06T12:21:35.360000
CVE-2025-21737,0,0,adbd37458e33d4b47282f1ae2cdaa9237f3384c7ef422beb49ae5c4d15493f31,2025-03-06T12:21:35.360000
CVE-2025-21738,0,0,be77dcc026730be68ea4112c0fa30198339fe27d884a1a08600eb0bb1db551ea,2025-02-27T03:15:14.427000
CVE-2025-21739,0,0,744890e3cb1b9afcafda7c757903b6daa82212d794f0c9620286b179d883b7a1,2025-02-27T19:15:50.067000
CVE-2025-21740,0,1,22d267932c0c117f2bd6c851facd5454bb12998f423d0c9d7180bce46944d5ed,2025-03-06T12:21:35.360000
CVE-2025-21741,0,1,865a61ef696dae829a575967cdb4ff384cea015538d94f81eb0d0bf40d9dc881,2025-03-06T12:21:35.360000
CVE-2025-21742,0,1,b7fdadee381668e0eb92c87e1e70c39135d4fab66863f67fa8e359a4c75a4348,2025-03-06T12:21:35.360000
CVE-2025-21740,0,0,22d267932c0c117f2bd6c851facd5454bb12998f423d0c9d7180bce46944d5ed,2025-03-06T12:21:35.360000
CVE-2025-21741,0,0,865a61ef696dae829a575967cdb4ff384cea015538d94f81eb0d0bf40d9dc881,2025-03-06T12:21:35.360000
CVE-2025-21742,0,0,b7fdadee381668e0eb92c87e1e70c39135d4fab66863f67fa8e359a4c75a4348,2025-03-06T12:21:35.360000
CVE-2025-21743,0,0,9a9acf545dda075999a27b2c6861db1133404fa1f33a76b52eb77a04cdf73400,2025-03-05T18:47:21.313000
CVE-2025-21744,0,0,4b24b592f92e54ef2bc8ba435c4dc52efe3ad202fb9364b0c791aa7b879e6019,2025-03-05T18:47:21.313000
CVE-2025-21745,0,0,bacd274e8d326f43626f4106545cf6113091b8569b7bec5b3c07f641bfe243d8,2025-03-05T18:47:21.313000
@ -281867,7 +281873,7 @@ CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e206520
CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,209f0b09db7969ce0de8827739da84ae754f62e53b6787f1c269b033ae39f483,2025-01-20T16:15:27.880000
CVE-2025-22131,0,1,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
CVE-2025-22132,0,0,8f2a17f80eb849275738cca93335a0536605ff289b1fa4e5b349c43fa2cad954,2025-02-13T18:55:14.053000
CVE-2025-22133,0,0,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000
CVE-2025-22134,0,0,3c2fd591225b705584c74bda8da9b9be07bc4fac46ac5a8cbc29997594d0c4cf,2025-01-13T21:15:14.333000
@ -283808,7 +283814,7 @@ CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25916,0,0,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000
CVE-2025-25939,0,1,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000
CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000
CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000
CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000
CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000
@ -283824,7 +283830,7 @@ CVE-2025-25953,0,0,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b
CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000
CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000
CVE-2025-25967,0,1,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000
CVE-2025-25967,0,0,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000
CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000
CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000
CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000
@ -284237,7 +284243,7 @@ CVE-2025-27425,0,0,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5
CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000
CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000
CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
CVE-2025-27499,0,1,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000
CVE-2025-27499,0,0,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000
CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000

Can't render this file because it is too large.