diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json new file mode 100644 index 00000000000..80d662ea913 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12144", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-06T14:15:35.297", + "lastModified": "2025-03-06T14:15:35.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (Old System) allows SQL Injection.This issue affects Finder ERP/CRM (Old System): before 18.12.2024." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0060", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json new file mode 100644 index 00000000000..147a8f0cc5a --- /dev/null +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-13892", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-06T14:15:35.453", + "lastModified": "2025-03-06T14:15:35.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/", + "source": "cvd@cert.pl" + }, + { + "url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json new file mode 100644 index 00000000000..6c98169b7ec --- /dev/null +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-13893", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-06T14:15:35.630", + "lastModified": "2025-03-06T14:15:35.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/", + "source": "cvd@cert.pl" + }, + { + "url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json new file mode 100644 index 00000000000..ec7d4367a68 --- /dev/null +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-13894", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-06T14:15:35.777", + "lastModified": "2025-03-06T14:15:35.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to path traversal. \nWhen an affected device is connected to a mobile app, it opens a port 10000 enabling a user to download pictures shot at specific moments by providing paths to the files. However, the directories to which a user has access are not limited, allowing for path traversal attacks and downloading sensitive information.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-13892/", + "source": "cvd@cert.pl" + }, + { + "url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49807.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49807.json index b264122e44c..0ffe7498114 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49807.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49807", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-31T16:15:34.647", - "lastModified": "2025-01-31T16:15:34.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T13:30:34.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "61E77E5A-B2DD-4ABA-BD86-7D097EB0AC8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.3", + "matchCriteriaId": "5E53D40A-E139-43DE-BF66-87AF94E14343" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7182011", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51945.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51945.json index 7ff53007f10..5d49f793641 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51945.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51945.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51945", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:40.483", - "lastModified": "2025-03-03T20:15:40.483", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51946.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51946.json index de995688520..aa989be7133 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51946.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51946.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51946", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:40.640", - "lastModified": "2025-03-03T20:15:40.640", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51947.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51947.json index e5eb6d77afe..ae4df3a9e3e 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51947.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51947.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51947", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:40.797", - "lastModified": "2025-03-03T20:15:40.797", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51948.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51948.json index ab67173bc3a..c6e773ab2e5 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51948.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51948.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51948", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:40.953", - "lastModified": "2025-03-03T20:15:40.953", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51949.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51949.json index 6fd4a5ca76f..d9286596d7f 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51949.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51949.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51949", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.110", - "lastModified": "2025-03-03T20:15:41.110", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51950.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51950.json index 84bf7999490..63d2c48425c 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51950.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51950.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51950", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.277", - "lastModified": "2025-03-03T20:15:41.277", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51951.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51951.json index 5439ed93813..4ce44c177bc 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51951.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51951.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51951", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.437", - "lastModified": "2025-03-03T20:15:41.437", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51952.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51952.json index 8f383b07983..c092376b978 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51952.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51952.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51952", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.593", - "lastModified": "2025-03-03T20:15:41.593", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51953.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51953.json index 9de94c4eef7..9aecb19858b 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51953.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51953.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51953", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.747", - "lastModified": "2025-03-03T20:15:41.747", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51954.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51954.json index d2b11c72830..35d04042a63 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51954.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51954.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51954", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:41.903", - "lastModified": "2025-03-03T20:15:41.903", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an improper access control issue in ArcGIS Server versions 10.9.1 through 11.3 on Windows and Linux, which under unique circumstances, could potentially allow a remote, low privileged authenticated attacker to access secure services published a standalone\u00a0(Unfederated)\n\nArcGIS Server instance.\u00a0 If successful this compromise would have a high impact on Confidentiality, low impact on integrity and no impact to availability of the software." + }, + { + "lang": "es", + "value": "Existe un problema de control de acceso inadecuado en las versiones 10.9.1 a 11.3 de ArcGIS Server en Windows y Linux que, en circunstancias excepcionales, podr\u00eda permitir que un atacante remoto autenticado con pocos privilegios acceda a servicios seguros publicados en una instancia independiente (no federada) de ArcGIS Server. Si tiene \u00e9xito, esta vulneraci\u00f3n tendr\u00eda un gran impacto en la confidencialidad, un bajo impacto en la integridad y ning\u00fan impacto en la disponibilidad del software." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 } ] }, @@ -45,12 +69,61 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51956.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51956.json index 927cf71d950..b5344244944 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51956.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51956.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51956", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.063", - "lastModified": "2025-03-03T20:15:42.063", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51957.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51957.json index 4bcbe3d3539..cc95593a677 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51957.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51957.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51957", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.217", - "lastModified": "2025-03-03T20:15:42.217", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51958.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51958.json index e4f223e9c68..5793ff8e94b 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51958.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51958.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51958", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.397", - "lastModified": "2025-03-03T20:15:42.397", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory.\u00a0 There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en las versiones 10.9.1 a 11.3 de ESRI ArcGIS Server. Si se explota con \u00e9xito, es posible que un atacante remoto autenticado con privilegios de administrador pueda recorrer el sistema de archivos para acceder a archivos fuera del directorio previsto. No hay impacto en la integridad ni en la disponibilidad debido a la naturaleza de los archivos a los que se puede acceder, pero existe un alto potencial de impacto en la confidencialidad." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51959.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51959.json index c7bc36318d2..6dfb678f12d 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51959.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51959.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51959", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.550", - "lastModified": "2025-03-03T20:15:42.550", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51960.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51960.json index 59c5a44a12c..b256d02b66b 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51960.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51960.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51960", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.707", - "lastModified": "2025-03-03T20:15:42.707", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51961.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51961.json index aaea7a634fc..526a889d8df 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51961.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51961.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51961", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:42.863", - "lastModified": "2025-03-03T20:15:42.863", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a local file inclusion vulnerability in ArcGIS Server 10.9.1 thru 11.3 that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server.\u00a0 Due to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales en ArcGIS Server 10.9.1 a 11.3 que puede permitir que un atacante remoto no autenticado manipule una URL que podr\u00eda revelar informaci\u00f3n de configuraci\u00f3n confidencial al leer archivos internos del servidor remoto. Debido a la naturaleza de los archivos a los que se puede acceder en esta vulnerabilidad, el impacto en la confidencialidad es alto y no hay impacto en la integridad ni en la disponibilidad." } ], "metrics": { @@ -45,12 +49,44 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] } ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json index a5bf7a75f7e..7c90ab2ddfd 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51962", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:43.043", - "lastModified": "2025-03-03T20:15:43.043", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in ArcGIS Server allows an EDIT\u00a0operation to modify Column properties allowing for the execution of a SQL Injection by a remote authenticated user with elevated (non admin) privileges.\u00a0 There is a high impact to integrity and confidentiality and no impact to availability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en ArcGIS Server permite que una operaci\u00f3n EDIT modifique las propiedades de las columnas, lo que permite la ejecuci\u00f3n de una inyecci\u00f3n SQL por parte de un usuario autenticado remoto con privilegios elevados (no administrativos). Esto tiene un gran impacto en la integridad y la confidencialidad, pero no en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51963.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51963.json index dcbf7311c82..46466ee9690 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51963.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51963.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51963", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:43.240", - "lastModified": "2025-03-03T20:15:43.240", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51966.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51966.json index c452845425a..08ec7891919 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51966.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51966.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51966", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:43.387", - "lastModified": "2025-03-03T20:15:43.387", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory. There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en las versiones 10.9.1 a 11.3 de ESRI ArcGIS Server. Si se explota con \u00e9xito, es posible que un atacante remoto autenticado con privilegios de administrador pueda recorrer el sistema de archivos para acceder a archivos fuera del directorio previsto. No hay impacto en la integridad ni en la disponibilidad debido a la naturaleza de los archivos a los que se puede acceder, pero existe un alto potencial de impacto en la confidencialidad." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json index fc070717335..24d3bfa5ebc 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56411.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56411", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:16.203", - "lastModified": "2025-01-03T18:15:16.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T13:30:34.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,14 +95,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.7", + "matchCriteriaId": "2A1A215A-BBAE-4518-8738-717AF6F9C7CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "1D053213-50AD-4AFA-9659-6EADF780E2D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "F5F84150-8F2B-44AF-8AAB-DE0A83319416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.7.0", + "matchCriteriaId": "AC92FDF6-4E94-4706-9501-583EF3DCA2FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/45052f88e04c735d56457a8ffcdc40b2635a028e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-hwcp-2h35-p66w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json index 02f25f6af96..014f93fdaca 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56412", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:16.380", - "lastModified": "2025-01-03T18:15:16.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T13:30:34.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,14 +95,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.7", + "matchCriteriaId": "2A1A215A-BBAE-4518-8738-717AF6F9C7CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "1D053213-50AD-4AFA-9659-6EADF780E2D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "F5F84150-8F2B-44AF-8AAB-DE0A83319416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.7.0", + "matchCriteriaId": "AC92FDF6-4E94-4706-9501-583EF3DCA2FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/45052f88e04c735d56457a8ffcdc40b2635a028e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-q9jv-mm3r-j47r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5888.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5888.json index cc510e0caa7..beb956c898f 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5888.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5888.json @@ -2,20 +2,24 @@ "id": "CVE-2024-5888", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:43.940", - "lastModified": "2025-03-03T20:15:43.940", - "vulnStatus": "Received", + "lastModified": "2025-03-06T14:23:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 \u2013 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting almacenado en ArcGIS Server para las versiones 10.9.1 a 11.3 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo almacenado y manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos y requieren capacidades de publicaci\u00f3n. El impacto es bajo tanto para la confidencialidad como para la integridad, pero no tiene impacto en la disponibilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.9.1", + "versionEndIncluding": "11.3", + "matchCriteriaId": "0F9FCA91-B1DE-4C4E-8E33-C42BEA8F53D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0848.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0848.json index c13098612cf..f1a19adf370 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0848.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0848.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0848", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T02:15:25.597", - "lastModified": "2025-01-30T02:15:25.597", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T13:30:34.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,86 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:a18_firmware:15.13.07.09:*:*:*:*:*:*:*", + "matchCriteriaId": "0916A698-E859-4DA2-899C-5A55B68E25F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:a18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20146A03-30B3-4BFF-83DA-DEDBF6850A6B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/alc9700jmo/CVE/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294011", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294011", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485802", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json new file mode 100644 index 00000000000..859081ed516 --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0877", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-06T14:15:36.107", + "lastModified": "2025-03-06T14:15:36.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AtaksAPP Reservation Management System allows Cross-Site Scripting (XSS).This issue affects Reservation Management System: before 4.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0059", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json new file mode 100644 index 00000000000..b7030df7418 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2045", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-03-06T13:15:12.553", + "lastModified": "2025-03-06T13:15:12.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access to potentially sensitive project analytics data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512050", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2921111", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json index 73e3d9246a2..84b958b70e1 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22131", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-20T16:15:27.880", - "lastModified": "2025-01-20T16:15:27.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T13:30:34.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,14 +95,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.8", + "matchCriteriaId": "C902AF09-CD77-455C-97B6-AA5EB6EB97E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.7", + "matchCriteriaId": "1B99E3BD-258D-4017-98CA-1A3F168C573F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.6", + "matchCriteriaId": "FE3C504E-C56A-4051-A590-D9FCA1A1A3E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.8.0", + "matchCriteriaId": "9EF15CF9-433E-4CE8-AEFE-B9BD8E5B761E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/4088381ccfaf241d7d42c333de0dc8c98e338743", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-79xx-vf93-p7cx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index d3acc68ed4f..cfe44185ef8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-06T13:00:21.008455+00:00 +2025-03-06T15:00:20.642350+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-06T12:53:53.273000+00:00 +2025-03-06T14:23:26.167000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284308 +284314 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `6` -- [CVE-2024-38311](CVE-2024/CVE-2024-383xx/CVE-2024-38311.json) (`2025-03-06T12:15:34.157`) -- [CVE-2024-56195](CVE-2024/CVE-2024-561xx/CVE-2024-56195.json) (`2025-03-06T12:15:35.373`) -- [CVE-2024-56196](CVE-2024/CVE-2024-561xx/CVE-2024-56196.json) (`2025-03-06T12:15:35.523`) -- [CVE-2024-56202](CVE-2024/CVE-2024-562xx/CVE-2024-56202.json) (`2025-03-06T11:15:11.423`) -- [CVE-2024-7872](CVE-2024/CVE-2024-78xx/CVE-2024-7872.json) (`2025-03-06T12:15:35.667`) -- [CVE-2025-1383](CVE-2025/CVE-2025-13xx/CVE-2025-1383.json) (`2025-03-06T12:15:35.937`) -- [CVE-2025-1666](CVE-2025/CVE-2025-16xx/CVE-2025-1666.json) (`2025-03-06T12:15:36.117`) -- [CVE-2025-1696](CVE-2025/CVE-2025-16xx/CVE-2025-1696.json) (`2025-03-06T12:15:36.293`) +- [CVE-2024-12144](CVE-2024/CVE-2024-121xx/CVE-2024-12144.json) (`2025-03-06T14:15:35.297`) +- [CVE-2024-13892](CVE-2024/CVE-2024-138xx/CVE-2024-13892.json) (`2025-03-06T14:15:35.453`) +- [CVE-2024-13893](CVE-2024/CVE-2024-138xx/CVE-2024-13893.json) (`2025-03-06T14:15:35.630`) +- [CVE-2024-13894](CVE-2024/CVE-2024-138xx/CVE-2024-13894.json) (`2025-03-06T14:15:35.777`) +- [CVE-2025-0877](CVE-2025/CVE-2025-08xx/CVE-2025-0877.json) (`2025-03-06T14:15:36.107`) +- [CVE-2025-2045](CVE-2025/CVE-2025-20xx/CVE-2025-2045.json) (`2025-03-06T13:15:12.553`) ### CVEs modified in the last Commit -Recently modified CVEs: `58` +Recently modified CVEs: `25` -- [CVE-2024-58010](CVE-2024/CVE-2024-580xx/CVE-2024-58010.json) (`2025-03-06T12:42:22.567`) -- [CVE-2024-58011](CVE-2024/CVE-2024-580xx/CVE-2024-58011.json) (`2025-03-06T12:42:22.567`) -- [CVE-2024-58012](CVE-2024/CVE-2024-580xx/CVE-2024-58012.json) (`2025-03-06T12:21:35.360`) -- [CVE-2024-58017](CVE-2024/CVE-2024-580xx/CVE-2024-58017.json) (`2025-03-06T12:21:35.360`) -- [CVE-2024-58020](CVE-2024/CVE-2024-580xx/CVE-2024-58020.json) (`2025-03-06T12:21:35.360`) -- [CVE-2024-58021](CVE-2024/CVE-2024-580xx/CVE-2024-58021.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-0349](CVE-2025/CVE-2025-03xx/CVE-2025-0349.json) (`2025-03-06T12:42:52.363`) -- [CVE-2025-1877](CVE-2025/CVE-2025-18xx/CVE-2025-1877.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1878](CVE-2025/CVE-2025-18xx/CVE-2025-1878.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1900](CVE-2025/CVE-2025-19xx/CVE-2025-1900.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1901](CVE-2025/CVE-2025-19xx/CVE-2025-1901.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1902](CVE-2025/CVE-2025-19xx/CVE-2025-1902.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1903](CVE-2025/CVE-2025-19xx/CVE-2025-1903.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-1904](CVE-2025/CVE-2025-19xx/CVE-2025-1904.json) (`2025-03-06T12:17:33.710`) -- [CVE-2025-1905](CVE-2025/CVE-2025-19xx/CVE-2025-1905.json) (`2025-03-06T12:17:33.710`) -- [CVE-2025-21735](CVE-2025/CVE-2025-217xx/CVE-2025-21735.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-21736](CVE-2025/CVE-2025-217xx/CVE-2025-21736.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-21737](CVE-2025/CVE-2025-217xx/CVE-2025-21737.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-21740](CVE-2025/CVE-2025-217xx/CVE-2025-21740.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-21741](CVE-2025/CVE-2025-217xx/CVE-2025-21741.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-21742](CVE-2025/CVE-2025-217xx/CVE-2025-21742.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-25939](CVE-2025/CVE-2025-259xx/CVE-2025-25939.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-25967](CVE-2025/CVE-2025-259xx/CVE-2025-25967.json) (`2025-03-06T12:21:35.360`) -- [CVE-2025-27499](CVE-2025/CVE-2025-274xx/CVE-2025-27499.json) (`2025-03-06T12:21:35.360`) +- [CVE-2024-49807](CVE-2024/CVE-2024-498xx/CVE-2024-49807.json) (`2025-03-06T13:30:34.893`) +- [CVE-2024-51945](CVE-2024/CVE-2024-519xx/CVE-2024-51945.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51946](CVE-2024/CVE-2024-519xx/CVE-2024-51946.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51947](CVE-2024/CVE-2024-519xx/CVE-2024-51947.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51948](CVE-2024/CVE-2024-519xx/CVE-2024-51948.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51949](CVE-2024/CVE-2024-519xx/CVE-2024-51949.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51950](CVE-2024/CVE-2024-519xx/CVE-2024-51950.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51951](CVE-2024/CVE-2024-519xx/CVE-2024-51951.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51952](CVE-2024/CVE-2024-519xx/CVE-2024-51952.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51953](CVE-2024/CVE-2024-519xx/CVE-2024-51953.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51954](CVE-2024/CVE-2024-519xx/CVE-2024-51954.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51956](CVE-2024/CVE-2024-519xx/CVE-2024-51956.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51957](CVE-2024/CVE-2024-519xx/CVE-2024-51957.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51958](CVE-2024/CVE-2024-519xx/CVE-2024-51958.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51959](CVE-2024/CVE-2024-519xx/CVE-2024-51959.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51960](CVE-2024/CVE-2024-519xx/CVE-2024-51960.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51961](CVE-2024/CVE-2024-519xx/CVE-2024-51961.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51962](CVE-2024/CVE-2024-519xx/CVE-2024-51962.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51963](CVE-2024/CVE-2024-519xx/CVE-2024-51963.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-51966](CVE-2024/CVE-2024-519xx/CVE-2024-51966.json) (`2025-03-06T14:23:26.167`) +- [CVE-2024-56411](CVE-2024/CVE-2024-564xx/CVE-2024-56411.json) (`2025-03-06T13:30:34.893`) +- [CVE-2024-56412](CVE-2024/CVE-2024-564xx/CVE-2024-56412.json) (`2025-03-06T13:30:34.893`) +- [CVE-2024-5888](CVE-2024/CVE-2024-58xx/CVE-2024-5888.json) (`2025-03-06T14:23:26.167`) +- [CVE-2025-0848](CVE-2025/CVE-2025-08xx/CVE-2025-0848.json) (`2025-03-06T13:30:34.893`) +- [CVE-2025-22131](CVE-2025/CVE-2025-221xx/CVE-2025-22131.json) (`2025-03-06T13:30:34.893`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 39045328747..5a39b992986 100644 --- a/_state.csv +++ b/_state.csv @@ -187587,14 +187587,14 @@ CVE-2021-47335,0,0,328eb3645a18c5f29c918b49774ba62cf65897a9bf118eba16623aa0b88c0 CVE-2021-47336,0,0,574b511187a20b144e1a41e424bb252a26bf57fd2f2c258012116c53068fbcd0,2024-11-21T06:35:54.710000 CVE-2021-47337,0,0,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19041,2024-12-24T16:15:04.180000 CVE-2021-47338,0,0,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000 -CVE-2021-47339,0,1,0bbf6ea18cc43bc9424cdc88c45e67afdd8a79a5bc05a5b5806223b35d346141,2025-03-06T12:53:53.273000 +CVE-2021-47339,0,0,0bbf6ea18cc43bc9424cdc88c45e67afdd8a79a5bc05a5b5806223b35d346141,2025-03-06T12:53:53.273000 CVE-2021-47340,0,0,4800185c819526cfdd83b27045687b91c60e90a3e12af11337074c136ce8ddde,2024-11-21T06:35:55.207000 CVE-2021-47341,0,0,de6df9bc89a00c0eee555b5550f951ca1c227ff6ccb6bb702130533fcb19308f,2025-01-14T17:28:39.313000 CVE-2021-47342,0,0,87691d96ad1a4689fc95ec83dde8f8407d98a729b3e3a4eff31c1bce3aa3fc7d,2024-12-26T19:29:20.557000 CVE-2021-47343,0,0,05baa50e8f01703dbae3936b2595f3acbc4f37225bdead1e4b8828946131a960,2024-11-21T06:35:55.597000 CVE-2021-47344,0,0,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000 CVE-2021-47345,0,0,e7fced2d39bb01ac3aa638228f3d111fb4e7a3b155cc0145bd8963569fdff796,2024-12-24T16:12:42.907000 -CVE-2021-47346,0,1,3ad39eb0aa50f6e7e059868f8dd4535c9aa127957aed91df43a10d9d37fde26f,2025-03-06T12:53:53.273000 +CVE-2021-47346,0,0,3ad39eb0aa50f6e7e059868f8dd4535c9aa127957aed91df43a10d9d37fde26f,2025-03-06T12:53:53.273000 CVE-2021-47347,0,0,0cc930dc1ed330c553df41204e22122e0adaa56369dd9ae499682bc065fb28c3,2024-11-21T06:35:56.147000 CVE-2021-47348,0,0,e4697ba877d750d4853325d31141852c2f5197fb92af29ad909f172ef0454520,2024-11-21T06:35:56.340000 CVE-2021-47349,0,0,4bbe92cbdd19bea4c0660020f8f6f562d96fbf23f4aff4917213209b46165265,2025-01-10T18:12:28.513000 @@ -212902,7 +212902,7 @@ CVE-2022-48801,0,0,a8fd5f16c8a757c25d85dfc312a52de37c1cf99353d1034498d2c616b2131 CVE-2022-48802,0,0,452388413750fad0016a585aeb6293a87a2a7a194129365e3d1068278e8d25d8,2024-11-21T07:34:07.003000 CVE-2022-48803,0,0,3944ba64b4bf5014e3b95671d9aaf2ca749998f790b192bd3d54f239fb4ea60a,2024-11-21T07:34:07.110000 CVE-2022-48804,0,0,d4967cc93f900d12692fa8fabca50399bd7d028413bcceb09e055fdf35a9730a,2024-11-21T07:34:07.233000 -CVE-2022-48805,0,1,8e6b524333b04d106219144103e9304ac84f634dae2155072f7be9b027fcfb2e,2025-03-06T12:53:17.520000 +CVE-2022-48805,0,0,8e6b524333b04d106219144103e9304ac84f634dae2155072f7be9b027fcfb2e,2025-03-06T12:53:17.520000 CVE-2022-48806,0,0,138d514a8f59997aa967f097597406012727075dc083aaf3ae10ca94a35161d7,2024-11-21T07:34:07.470000 CVE-2022-48807,0,0,2526145aa7b4eed086785b29ff23ceec41a1875b0c9d0ab2bac70882e3cf55f9,2024-11-21T07:34:07.577000 CVE-2022-48808,0,0,0dde40ae7f1b74db3ad7c6c323821786b9fb456c6601160feb9f4b68999dd61a,2024-11-21T07:34:07.673000 @@ -241295,7 +241295,7 @@ CVE-2023-52741,0,0,e094cb6d7949e9747b892e241771f0453892c45a739ad5b8d158747bb6e06 CVE-2023-52742,0,0,dcf30954d8fabdab5fd680401ef1008be31a6a0cfb68e9a64806fc115f0213b5,2024-11-21T08:40:29.373000 CVE-2023-52743,0,0,24474008a2d4a403beada0f7d4c53935aab14c11f5c2d46143b8959c21bd597a,2024-11-21T08:40:29.513000 CVE-2023-52744,0,0,7a3a1b5b261511bb66fcf29aaabee541486137c90ee2c22ba6c248ce3835f026,2025-01-06T20:40:45.057000 -CVE-2023-52745,0,1,6b03e0345e3a79fe23ee08f8fbe19ea712253ff9277a62ebb384898480dfc2b1,2025-03-06T12:53:53.273000 +CVE-2023-52745,0,0,6b03e0345e3a79fe23ee08f8fbe19ea712253ff9277a62ebb384898480dfc2b1,2025-03-06T12:53:53.273000 CVE-2023-52746,0,0,29638259c02e0300a082658fbef0482f5797bd8a4800b195c2b69bc6212469f2,2024-11-21T08:40:29.907000 CVE-2023-52747,0,0,89a1a7bcc5367ff871cada9f72228e4bee14cd524a7a7ce281e3ad78d5396323,2024-11-21T08:40:30.097000 CVE-2023-52748,0,0,2b830ddfbbba0c67aa7dbe55dc7af2c2e0c7de4c1479e35323f1e39833c237ea,2024-11-21T08:40:30.220000 @@ -241349,21 +241349,21 @@ CVE-2023-52790,0,0,cf29a624de21cf22cc512d40f0a593951c8cd9239711d0b8442ff032accda CVE-2023-52791,0,0,be484a6e97e5a1fc91f5818964596896eec93bf44f2a3ba3ebb847d5e9c824b0,2024-11-21T08:40:35.750000 CVE-2023-52792,0,0,2cc23cf56cc94d378ac71d87d803d2cb686a46236118e6b58b26100b7927b4af,2024-11-21T08:40:35.870000 CVE-2023-52793,0,0,1deada04b9b58b9a08cdc8b4e56907afa2f473e86ceaaf1b863ba75e6bd438dd,2024-05-24T05:15:08.403000 -CVE-2023-52794,0,1,bc3693e384d7812dd89a94906db45df7f7f197c2dcae1133aea42c4607d3db28,2025-03-06T12:53:53.273000 +CVE-2023-52794,0,0,bc3693e384d7812dd89a94906db45df7f7f197c2dcae1133aea42c4607d3db28,2025-03-06T12:53:53.273000 CVE-2023-52795,0,0,4e485f41269e4ca02c2bb151f581018ee7564bf7c1a16986ad072ba672d15994,2025-01-10T17:59:58.747000 CVE-2023-52796,0,0,919ab49a1f7e861a493c89fa6e458020589d307e7c501ef2a28fc7f2409c4699,2024-11-21T08:40:36.233000 CVE-2023-52797,0,0,a8f1fd2b50ee0014f6c08ba16dee5539f5b8b20b0a40b1a44d6ff84573d23ca5,2024-11-21T08:40:36.360000 CVE-2023-52798,0,0,698516f7a6422b64182796c4d1e386edea13c08d9ebe3b1a1a173e4cdc460cee,2024-11-21T08:40:36.483000 -CVE-2023-52799,0,1,558d824ca47ee11384d74f49c72379f5ffc461019f8a8398a85e803f1e0276de,2025-03-06T12:53:53.273000 +CVE-2023-52799,0,0,558d824ca47ee11384d74f49c72379f5ffc461019f8a8398a85e803f1e0276de,2025-03-06T12:53:53.273000 CVE-2023-5280,0,0,0e31d757c38846a6f016aa4d2a0c766d9c944cae8392888fd9d4cf58ba1afdfc,2024-11-21T08:41:26.490000 CVE-2023-52800,0,0,625396b2707a4b12a8608a41ca88f7c126404d546ab4a0974abef35f6ea67b88,2024-11-21T08:40:36.803000 CVE-2023-52801,0,0,0902d38420cc02715fe58ab7f76650517aa83d22bc371e771b393939439b0034,2024-11-21T08:40:37.040000 CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000 CVE-2023-52803,0,0,ca542d715af19bc455d62c41688c3fc24d4ece330c1660f25b0f2926b8cdad17,2024-11-21T08:40:37.290000 CVE-2023-52804,0,0,f63595acad5f021611a295b0c2137b6f281e5bf0a3b7dab20aa319bececcb019,2024-11-21T08:40:37.423000 -CVE-2023-52805,0,1,5186bfc33c8855ecef32265d9b68c63d746ff5e76e8ed7f555e16356ac6e93d9,2025-03-06T12:53:53.273000 +CVE-2023-52805,0,0,5186bfc33c8855ecef32265d9b68c63d746ff5e76e8ed7f555e16356ac6e93d9,2025-03-06T12:53:53.273000 CVE-2023-52806,0,0,fb65670f4d45809f58388ae1354ca1aa5879a8eee50756f04297590c93c61e8a,2024-11-21T08:40:37.667000 -CVE-2023-52807,0,1,ddf74cd7700539e42b905e69205ce85a408eb5e82fb88ea2b1fbbb1b5bf76ba4,2025-03-06T12:53:53.273000 +CVE-2023-52807,0,0,ddf74cd7700539e42b905e69205ce85a408eb5e82fb88ea2b1fbbb1b5bf76ba4,2025-03-06T12:53:53.273000 CVE-2023-52808,0,0,efd8d7bcb58f484b4b5e80898bd3c70762a13bd27971c0de98e557ec212b9f08,2025-01-14T16:32:53.767000 CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250bea47,2024-11-21T08:40:38.040000 CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000 @@ -245071,7 +245071,7 @@ CVE-2024-10899,0,0,3278ed9055fdf20d3bd937513eb10691156bd1e9c65996b252cdb3333f0a4 CVE-2024-1090,0,0,bc0bffa7867d1fecd545d2e7f7fb647c415e4e72464ebb88604cc3a8a49285b6,2024-12-27T15:41:41.897000 CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000 CVE-2024-10903,0,0,4b83af475b2ee1b428df17dee5389cac414e31e1e9acd0596c2e9a6f9d70e177,2024-12-30T18:15:06.253000 -CVE-2024-10904,0,1,52d94fd1600e7c5493b7463b9a1bf1b1bb9ec7f5a03b12e7d597cc7acde74140,2025-03-06T12:21:35.360000 +CVE-2024-10904,0,0,52d94fd1600e7c5493b7463b9a1bf1b1bb9ec7f5a03b12e7d597cc7acde74140,2025-03-06T12:21:35.360000 CVE-2024-10905,0,0,98e243c9c6d3626765a0f5bec050b58ca35d0a0d124978428fd582cb710fa7ee,2024-12-06T18:15:22.207000 CVE-2024-10909,0,0,8a3e5be040021a81e0e5e83c9e95ad90e5ace916bf19a03e529e43ec6a7f9976,2024-12-06T10:15:05.107000 CVE-2024-1091,0,0,fa73b748b3282d0c18d5fab689944bdcb646646e83d04482ca4b128ad52fd399,2024-12-27T15:45:27.200000 @@ -246230,6 +246230,7 @@ CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408bcb,2025-01-17T11:15:08.683000 +CVE-2024-12144,1,1,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000 CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 @@ -247764,6 +247765,9 @@ CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000 CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 +CVE-2024-13892,1,1,ba0368883c2ac157aa0b89e8621108c536bde0ab709b9f9a40478f1765f6e3de,2025-03-06T14:15:35.453000 +CVE-2024-13893,1,1,6f74c79e0ddcf27b881db98cdd572d3b259cd7cc0ec9c224906e3f24eca39b98,2025-03-06T14:15:35.630000 +CVE-2024-13894,1,1,c08825403e20d9b7d3a5a72ea2c2234dcb1ca09965a1b602a57d161ad708794d,2025-03-06T14:15:35.777000 CVE-2024-13897,0,0,07f598b96e670ba19e3823cc39b2ae054e4338a7f34c42c2715bbbd41cb120b3,2025-03-06T09:15:25.787000 CVE-2024-13899,0,0,372540a329e3dd48ea203e26ad119a2f49b08582c995a840b88c85b67384dc50,2025-02-22T04:15:09.720000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 @@ -260677,7 +260681,7 @@ CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000 CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000 CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000 -CVE-2024-35937,0,1,008f0b099676b1080f92c478a89722853e7a3bcd13760052a5e66ae4736fee3a,2025-03-06T12:53:53.273000 +CVE-2024-35937,0,0,008f0b099676b1080f92c478a89722853e7a3bcd13760052a5e66ae4736fee3a,2025-03-06T12:53:53.273000 CVE-2024-35938,0,0,2efeaa65672def64c85e39f960d3d01dbf5533390de3d3f54f180152cb69f5c5,2024-11-21T09:21:14.773000 CVE-2024-35939,0,0,b275ecea9c74fd7d5d66bfdbd96bb842e1b97b53f548850ac73334b3c0feb367,2024-11-21T09:21:14.910000 CVE-2024-3594,0,0,55e7aa826fd5ac5a92668a76380c7410f96136b5e95724eafd64e2c8b6da6f6b,2024-11-21T09:29:56.900000 @@ -261421,7 +261425,7 @@ CVE-2024-3692,0,0,4dcb31a4127d38bd6452acf10121a61d94095197d226ab1d1d43421fddb139 CVE-2024-36920,0,0,296892b15bf2eebaea9778f89d4376d82d5fbf60b24a815d649d1db5c3fa6f0d,2024-11-21T09:22:49.243000 CVE-2024-36921,0,0,9fca1ce588f5b618b74dc938d23c125f5b25e6ce9d67dfc6fa92e435e2aa9c02,2025-03-01T02:33:14.063000 CVE-2024-36922,0,0,cb456c0e747a1f1081cb6fb9c8ef844df9b204267e34052842655b94a5e35cfc,2024-11-21T09:22:49.503000 -CVE-2024-36923,0,1,0db7b408bf0a465cbfc2832e1b29fcb0647fe6414a24bf7817d48e4bb93e5987,2025-03-06T12:53:37.607000 +CVE-2024-36923,0,0,0db7b408bf0a465cbfc2832e1b29fcb0647fe6414a24bf7817d48e4bb93e5987,2025-03-06T12:53:37.607000 CVE-2024-36924,0,0,137498aa9e34e1e8acd4de9ea1ba41b050722b5260fa3d73369cc3248a483780,2025-01-10T18:29:03.477000 CVE-2024-36925,0,0,e0ca67c8234568b1dc27df68d69c690ead06aac125c9af02d4ad6e41e9d1146a,2024-11-21T09:22:49.863000 CVE-2024-36926,0,0,800fd4d9a99b5fed12fe0fc1b134ce999c0c2fa4531986545f76a96538c7238d,2024-11-21T09:22:50.010000 @@ -262659,7 +262663,7 @@ CVE-2024-38308,0,0,1baa56b2e3fdd13244d0b9df4f23464d3904d173da05d6eee250ad40c0e7a CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc039,2025-02-12T22:15:35.630000 -CVE-2024-38311,1,1,369eff6a0ba7445ff178358722ea77f1fec89a19709c21a4fcf2a228cd4abcc6,2025-03-06T12:15:34.157000 +CVE-2024-38311,0,0,369eff6a0ba7445ff178358722ea77f1fec89a19709c21a4fcf2a228cd4abcc6,2025-03-06T12:15:34.157000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -262883,7 +262887,7 @@ CVE-2024-38552,0,0,720fe50f9f09822193355713378016678554e327fdf10962760ff63ce824c CVE-2024-38553,0,0,7daa674f39b9fbc7f9a8957c03f3f61bd55305270fb94814d9818955a2978ffd,2024-12-02T08:15:06.310000 CVE-2024-38554,0,0,df13f1949b7bd7172dedebdb3b62a0c27acdc95d1295e38abf4aeb7af3ad3c7b,2024-11-21T09:26:19.990000 CVE-2024-38555,0,0,48d1e5dfc3dfc2a4b0fa5c5ab09979a6f28a54ef666340efda4f6723bf60db30,2024-11-21T09:26:20.137000 -CVE-2024-38556,0,1,e977e95883a20ac81c76c1728a2713c1d5a8684fee03db223b7ae7f79b586fc7,2025-03-06T12:53:37.607000 +CVE-2024-38556,0,0,e977e95883a20ac81c76c1728a2713c1d5a8684fee03db223b7ae7f79b586fc7,2025-03-06T12:53:37.607000 CVE-2024-38557,0,0,0dfaaf21c71ac44704804f687fb153b22f5d2adac3615ba3150b80b203367d77,2024-11-21T09:26:20.410000 CVE-2024-38558,0,0,bb5f5c588cc6220a8f52a1016f93a06d7e93f2566de01426efa76e676cd4b0af,2024-11-21T09:26:20.560000 CVE-2024-38559,0,0,951562632157e6a8b239329dc6cd2960e3a234244a65bba4b498169c45b70e96,2024-11-21T09:26:20.703000 @@ -262938,7 +262942,7 @@ CVE-2024-38602,0,0,6074885d7e84857d272e5e137d9ef3004b7d1aeb12bd595cc6a908e5bc762 CVE-2024-38603,0,0,2b3756b5f98fde6d2e61eed6983eabc482f401bb309bc43a7cc9339b578c9f49,2024-11-21T09:26:27.690000 CVE-2024-38604,0,0,fb5dc88ac4d02670b799830b7a6a54f5a6ce8e126f7a992e07bd7920b7ba6b1e,2024-11-21T09:26:27.827000 CVE-2024-38605,0,0,183c92803d7c394a3b7337f01dc27e0a8297faa87b9fe235d18e0f744813603c,2024-11-21T09:26:27.937000 -CVE-2024-38606,0,1,5b837976fc0cfff01c96d0ebdbf3bdeb77ee1bcb7c75a0a1b490b22332b86f0d,2025-03-06T12:53:37.607000 +CVE-2024-38606,0,0,5b837976fc0cfff01c96d0ebdbf3bdeb77ee1bcb7c75a0a1b490b22332b86f0d,2025-03-06T12:53:37.607000 CVE-2024-38607,0,0,55432cbb40c6349effbcd61958d80414a37550b349345ac1cd3aae9bdab797a7,2024-11-21T09:26:28.270000 CVE-2024-38608,0,0,9047d5fa6031e3edcce1a9b27f9a4f65f4b59fc23ac62e10259c6e642290f89b,2024-11-21T09:26:28.400000 CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000 @@ -263607,7 +263611,7 @@ CVE-2024-39503,0,0,bfb8778b93d9dc0e3353fdde95567e557faa2bac791848eaa56eec80d82ee CVE-2024-39504,0,0,03a15e491e92fc31a2f489e2f508052010008630cdd84ebe3d7f8047088fc997,2024-11-21T09:27:50.633000 CVE-2024-39505,0,0,90a964e49c1df1a8320475bf163c491aa6a65384a876c0c3c686e952d6b3f1c9,2024-11-21T09:27:50.837000 CVE-2024-39506,0,0,531242bb57168b2c94d7c9f571365b7ffc2568e0de39b689dd6586cfb83bad6d,2024-11-21T09:27:51.840000 -CVE-2024-39507,0,1,0127099630075f68e4559e0978f83cae8096f30555a2cc503a1c48ca8c3cfbe0,2025-03-06T12:53:17.520000 +CVE-2024-39507,0,0,0127099630075f68e4559e0978f83cae8096f30555a2cc503a1c48ca8c3cfbe0,2025-03-06T12:53:17.520000 CVE-2024-39508,0,0,b61527ede473f71ec957d7f063dfe9afc808de70d8a3a6ea55db87260a93d703,2024-11-21T09:27:52.240000 CVE-2024-39509,0,0,1d8d55009f9cf6a11df5a012ce860d80d98e7fff9e22285b239717e5da5825e4,2024-11-21T09:27:52.407000 CVE-2024-3951,0,0,fe866e4ae1f51945bb25f7c9b08a9604548e90afa543b0c28badacc4120fa05b,2024-11-21T09:30:45.817000 @@ -264532,13 +264536,13 @@ CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e CVE-2024-40923,0,0,5efd6b4ae80a0f1404002746c36b7cef623484910276e4bb035c5a2f595a19f6,2024-11-21T09:31:52.723000 CVE-2024-40924,0,0,0f9d33d7b2d19938ae91198bf63ca56eaaeb77e2f520287ce7027ad8d2f1cd68,2024-11-21T09:31:52.850000 CVE-2024-40925,0,0,952bfc3433123f21d86aa6aae5c34aa75b8dbf982f063d2a21b34992f7bd7f1e,2024-11-21T09:31:52.970000 -CVE-2024-40926,0,1,d223453a80724f856ccdd7f4bb557c9f9d03089af135db8a993acbb7fb8c2b9b,2025-03-06T12:53:17.520000 +CVE-2024-40926,0,0,d223453a80724f856ccdd7f4bb557c9f9d03089af135db8a993acbb7fb8c2b9b,2025-03-06T12:53:17.520000 CVE-2024-40927,0,0,3e45cd4c7d7b84f311fd8311cd12a748117e2e084a0ae25d71c9b0f17cb60f82,2024-11-21T09:31:53.210000 CVE-2024-40928,0,0,6bbb47c365ce69b1a36872686a7534abbb78ea0d91fdb478bcb9952597ccc35a,2025-02-03T15:37:36.703000 CVE-2024-40929,0,0,12ca49b2c39711ccc5bc7ec2bc8205b440ce5ff05e6cbcb5d341b829355f554d,2024-11-21T09:31:53.453000 CVE-2024-4093,0,0,791843648abfc4702cff784098fbe535c7a1bd9ba321300437d4415f1c140614,2025-02-11T15:33:25.337000 CVE-2024-40930,0,0,223e3bb5f491ddf209a9c6b0fdb035fae8a1844766aa0528db1cea737cf6605c,2024-11-21T09:31:53.580000 -CVE-2024-40931,0,1,8f4491f4ac7f3cbfe8a7e805820debf6b6a8bf9abd6d3846fe73b7d538d9fa62,2025-03-06T12:53:17.520000 +CVE-2024-40931,0,0,8f4491f4ac7f3cbfe8a7e805820debf6b6a8bf9abd6d3846fe73b7d538d9fa62,2025-03-06T12:53:17.520000 CVE-2024-40932,0,0,396501b3682afb3f6991ae19df88e118e519447a6804c55f105fd35e30fb00dd,2024-11-21T09:31:53.817000 CVE-2024-40933,0,0,7c0cb98e6ad09b1eb03291e4c89ea0fa86745de6ed168fa2a93f9f27003a69b0,2025-02-03T15:38:11.110000 CVE-2024-40934,0,0,715b4cd58b992c333d81aa8ac045f4eea34f011597b59a061268df50bd4135a7,2024-11-21T09:31:54.097000 @@ -264596,7 +264600,7 @@ CVE-2024-40980,0,0,de3031711db513dcb148f704b93b2dd78d8a01c6b42c8e20d4a48c56f1176 CVE-2024-40981,0,0,37c3f0cff46cff282ec46d2f86b939aa2408325f560b29ec75fca4a796526834,2024-11-21T09:31:59.973000 CVE-2024-40982,0,0,bcacd4044a55751834c2f177b012689b5a04e030964cc42170ae5439258936b0,2025-02-24T13:15:10.790000 CVE-2024-40983,0,0,4f1e7e94a10f77a2a960c5963137825b1a7d9ac1338f04d0af0e9fa582272b5b,2024-11-21T09:32:00.260000 -CVE-2024-40984,0,1,fe8e68c20234bcaf7527f868ca295e700815cf8eed594aa35fa1e26e09754795,2025-03-06T12:53:17.520000 +CVE-2024-40984,0,0,fe8e68c20234bcaf7527f868ca295e700815cf8eed594aa35fa1e26e09754795,2025-03-06T12:53:17.520000 CVE-2024-40985,0,0,53f2aaafe6f291a7057a7769a5566edb3215c6fde96a4df2ae27d2aacc836123,2024-11-21T09:32:00.513000 CVE-2024-40986,0,0,70433503e15bf19a04d4804979b973ebc8834bf0f36157900d4e6769acc11f76,2024-11-21T09:32:00.620000 CVE-2024-40987,0,0,8c6da8c46e3a70e3ea00130ef8dc2384edf3f6f8358535f996c64f7236534443,2024-11-21T09:32:00.723000 @@ -264644,7 +264648,7 @@ CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d8428345 CVE-2024-41025,0,0,de776435d7227d8dd4a23ef7e5396bac477026279e493e401efa28a0e142b9b2,2025-02-03T15:43:55.150000 CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000 CVE-2024-41027,0,0,eaa63e74c3ce16129be48c23bd10b961f700b28c359c1860f0f1e79e575ef9f2,2024-11-21T09:32:05.680000 -CVE-2024-41028,0,1,b924dfe0be651b444de118992a2fc5d3da1562c9baa5d2af8c66efd53f193fb0,2025-03-06T12:53:17.520000 +CVE-2024-41028,0,0,b924dfe0be651b444de118992a2fc5d3da1562c9baa5d2af8c66efd53f193fb0,2025-03-06T12:53:17.520000 CVE-2024-41029,0,0,f9db8ea6446b76e46dc00691964188fe35e2a1ac13ab357464786adaee900744,2024-11-21T09:32:05.920000 CVE-2024-4103,0,0,aaca6600ff13db66884b3ef298ff81547c88ad56078acd57bcd1d6a0339d855f,2024-11-21T09:42:11.887000 CVE-2024-41030,0,0,9168be225963c75def9fd0a94bac40604a890ecf2829523390253cb24d1adb15,2024-11-21T09:32:06.033000 @@ -265574,7 +265578,7 @@ CVE-2024-42260,0,0,eb52125b7ac8aa328b971df28fae3672970357ac79f1958c3b76d2a4939b7 CVE-2024-42261,0,0,72fe870a41ca864453ed4788fd4a91439d6c4b246a2a5f09a56b04af1e7ecbf8,2024-08-19T12:59:59.177000 CVE-2024-42262,0,0,7f3d17e5526185f5375daae7ba422211b70f3364ede237c89feab9ff5e43cedf,2024-08-19T20:05:15.407000 CVE-2024-42263,0,0,3493b915ba1505678529c159f5fa9faa50bc66ec51cc9c94e8dae616046ad302,2024-08-19T20:41:11.240000 -CVE-2024-42264,0,1,19896bcf2395821479fd72c8393e62d357c4df261d67a94cbe2787b624fb5190,2025-03-06T12:53:17.520000 +CVE-2024-42264,0,0,19896bcf2395821479fd72c8393e62d357c4df261d67a94cbe2787b624fb5190,2025-03-06T12:53:17.520000 CVE-2024-42265,0,0,dc9a1e67a9f4810f2841027c6483efefd3f1789eb7007a2fd693f56892bd11a5,2024-08-19T12:59:59.177000 CVE-2024-42266,0,0,e3773d6d9416557898775f8e251bb3caface8cb0ca7f14ef02f46bb386d50723,2024-08-19T12:59:59.177000 CVE-2024-42267,0,0,881474d04f014e3df273462be8ded36c9d57a485e542f49fb9e4732784ec7797,2024-08-19T12:59:59.177000 @@ -271012,7 +271016,7 @@ CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1 CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004a44,2025-01-29T21:24:00.387000 CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000 CVE-2024-49806,0,0,1e9e7366d429bfe4288411d8922c4ce74b00945547b83f0b9b47dea0218eb8ae,2025-01-29T21:25:06.310000 -CVE-2024-49807,0,0,68d646b93ca169d9246962a92303d7bb36c19bfd79c59c0a41204a851f5cb51d,2025-01-31T16:15:34.647000 +CVE-2024-49807,0,1,fa93f519f28a27fa1a6f3184ddd160494536ae94aaeccfdd0ab3674a1ea7fc28,2025-03-06T13:30:34.893000 CVE-2024-49814,0,0,73913b2547105d571411ec726289dcdf22a5171ac9632e1edb82b0e05878de6d,2025-02-06T01:15:08.230000 CVE-2024-49816,0,0,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000 CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000 @@ -272698,29 +272702,29 @@ CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e2 CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 -CVE-2024-51942,0,1,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000 -CVE-2024-51944,0,1,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000 -CVE-2024-51945,0,0,1ae5ce04d1d327652720171f30e6b6504353f9d9238219139425e6dde4fc5bc0,2025-03-03T20:15:40.483000 -CVE-2024-51946,0,0,32d060e63bb43a324ec55d23a71a44484d8536def4a0cea14a4ef958035a8ff0,2025-03-03T20:15:40.640000 -CVE-2024-51947,0,0,da610cce302aa6ac199dfd0acfd63684d2e11449b65a14620f4ba6cc7bcb3c54,2025-03-03T20:15:40.797000 -CVE-2024-51948,0,0,d3672bf970f4c743112d71732fbda88e9f7d1f990176556a4bb9c9a1b5ba9c46,2025-03-03T20:15:40.953000 -CVE-2024-51949,0,0,f848e450c66ff3cc0ac44e37864ae9eb912631efaa84841cad4363dac93a03fc,2025-03-03T20:15:41.110000 +CVE-2024-51942,0,0,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000 +CVE-2024-51944,0,0,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000 +CVE-2024-51945,0,1,38f5a32d001f0190ef98670af553cf8909de1cdbe13a8644d47acb1a89844580,2025-03-06T14:23:26.167000 +CVE-2024-51946,0,1,374690e9df38794b94ca4b4d59d90dab7831490073d30a4221e31c258c9b8934,2025-03-06T14:23:26.167000 +CVE-2024-51947,0,1,e86d80d8ac1ca36d9cfee6310112fc4344a741f349117c7760dbe0154aa86ed5,2025-03-06T14:23:26.167000 +CVE-2024-51948,0,1,9b932a0aa110b7e3984a33d1efe3da4d75583774b2026f209391f1bc6c55b912,2025-03-06T14:23:26.167000 +CVE-2024-51949,0,1,0e53f287752c336e888822b58d1dcda00ac87123548cecb923834dd8f676d2d2,2025-03-06T14:23:26.167000 CVE-2024-5195,0,0,fa8698da02fa582ea365b08f4fecc73e615774ea2cc6020b120dbb6e842cd656,2024-11-21T09:47:10.100000 -CVE-2024-51950,0,0,e63af37df8cb944e876afe766d94cf673c2c6c9c21cdb0fef4648ca8cbf9bfbf,2025-03-03T20:15:41.277000 -CVE-2024-51951,0,0,b0a70ff21c02a3353204ddb592154c8ead31f55aee831eac76f9d24c3a6a47c1,2025-03-03T20:15:41.437000 -CVE-2024-51952,0,0,c2e58f1af276d48df9e6ac1156158c5e343feccdbdc04b4b49a5e01d7f3a9d40,2025-03-03T20:15:41.593000 -CVE-2024-51953,0,0,67774962b27fed27679193f3b8aead9facba4cc3a07ae29db6afd4dd272cfa2e,2025-03-03T20:15:41.747000 -CVE-2024-51954,0,0,be77c60f8f257881fa643df46b0ee66e8d8c1039c224634ccd268e1a059a2dc2,2025-03-03T20:15:41.903000 -CVE-2024-51956,0,0,327b8e8588d322b6f0c4415ad15129e51935d7fad292db8a45444de4541558f9,2025-03-03T20:15:42.063000 -CVE-2024-51957,0,0,8dd1c81680575fd19726636577a4d82040f27e20f65135427b1294158b6b5182,2025-03-03T20:15:42.217000 -CVE-2024-51958,0,0,666d591d4068e4f46732cf55672fa338aedd9feca614542312e4f4a66be24de1,2025-03-03T20:15:42.397000 -CVE-2024-51959,0,0,34e6e382054142802e70430181005b69c35afac6e208c5537d0ca6e0abb2fcc7,2025-03-03T20:15:42.550000 +CVE-2024-51950,0,1,9aeda626b1a73a36d836b337ddb6e2f40b2ec04d820e0927b810933191b2c93f,2025-03-06T14:23:26.167000 +CVE-2024-51951,0,1,45b279c60f428072e4a402c59a266fa8a9671d6ad374ada6dcbc6685b3a0f85b,2025-03-06T14:23:26.167000 +CVE-2024-51952,0,1,4fdf2c2b2af227b55576eabd7dbee3c57f6dcd0e1262b5ff98f342cbc4e4b89a,2025-03-06T14:23:26.167000 +CVE-2024-51953,0,1,2e4d40eea33b0bca63db4d7c6b7ecea597d0e1d849214f0978d201b82c0795fc,2025-03-06T14:23:26.167000 +CVE-2024-51954,0,1,e1d46ee4c71df9ca356fa427b044a377fecda6d84414278b7f3044764cb8f13c,2025-03-06T14:23:26.167000 +CVE-2024-51956,0,1,8a1cff218519e698bd7ab4cc64d9391ec72ec4a9b841ec9e0ec4b1297b2aa570,2025-03-06T14:23:26.167000 +CVE-2024-51957,0,1,8f0fa1ce82029e78611a7f2084c1cbb2c6a120c4ee8520adba3e121ce1c2487d,2025-03-06T14:23:26.167000 +CVE-2024-51958,0,1,fec30b06696b6bb28ee38c30f7890ac0c60ac9f1cba574ddcc27a0495dc0d22e,2025-03-06T14:23:26.167000 +CVE-2024-51959,0,1,a00f7484f54002cf0451ae5d3d18f94fbb0197136c77d7c4af6efbdc21752116,2025-03-06T14:23:26.167000 CVE-2024-5196,0,0,6d90077174f7697bbfa31bc4f0436f8c9f218990f5eb59e7edd22cabda3ff370,2024-11-21T09:47:10.230000 -CVE-2024-51960,0,0,245bd5f3b73e100c98572ee9b0a352d632020e8af239c6c1ebf5cb1699b815dd,2025-03-03T20:15:42.707000 -CVE-2024-51961,0,0,01e9ffa0a457ddc30eb2336f871db149d8662bad43d101cd91915aebc98a42df,2025-03-03T20:15:42.863000 -CVE-2024-51962,0,0,4ceafa67ac11228d6f6db25d014157e259ceb7afda9f59829f982bbe747cbf04,2025-03-03T20:15:43.043000 -CVE-2024-51963,0,0,e7b459ea88eb7101b3628bcfffa412a87b3fa3b9e52b6af071f2cc833dc7b726,2025-03-03T20:15:43.240000 -CVE-2024-51966,0,0,93bafd72071cc92b1023d43c577c2f8dcea05c664443f62944773ed5f965756e,2025-03-03T20:15:43.387000 +CVE-2024-51960,0,1,4fc5cb483e8866725dcb2c62b316f692664ccac493913ae82ea7ff308291f324,2025-03-06T14:23:26.167000 +CVE-2024-51961,0,1,fcfb4dc7c6437182d6d1b78ca82922bcadca2fb75db9e2b12a36cde2849df2d0,2025-03-06T14:23:26.167000 +CVE-2024-51962,0,1,17f37fb9fb87587a68332c2ceae76372d40c06cabef66c0137bdccaba1220562,2025-03-06T14:23:26.167000 +CVE-2024-51963,0,1,c61743d3b34745847f281194e9ab430d9bc91fb42f597d40e2492c3bd4146653,2025-03-06T14:23:26.167000 +CVE-2024-51966,0,1,57235b2ae25a1c9bc7f244c2ebe0c2ff6ca0135bbb9202f4691d03357fd1f7db,2025-03-06T14:23:26.167000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 CVE-2024-5198,0,0,0cb0dbc1ecb18e948c4424650c67decdfcc909aef2c2c929df2436f4b9fa7302,2025-01-15T15:15:13.607000 CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000 @@ -273538,8 +273542,8 @@ CVE-2024-53158,0,0,e531f3eba6de342b83e364b8771c46bf2c1c9fd8d80363877d69a71c57f42 CVE-2024-53159,0,0,0efe60c571308791e08c5af46e2d936d40b42d7671e5dc75fbe9400ec226f8d4,2025-01-09T16:16:21.233000 CVE-2024-53160,0,0,4057796bb00f7bfb6f732886520cc805fa7c46e82813820ad292c8bad3293b53,2024-12-24T12:15:24.340000 CVE-2024-53161,0,0,eeaec3335f10b57ba4a8525bcd94f1272174075b2c57b00bf93a768e727c0f4c,2025-02-03T15:25:26.370000 -CVE-2024-53162,0,1,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c6d1,2025-03-06T12:42:52.363000 -CVE-2024-53163,0,1,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000 +CVE-2024-53162,0,0,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c6d1,2025-03-06T12:42:52.363000 +CVE-2024-53163,0,0,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000 CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 CVE-2024-53165,0,0,a4943f78f99297463146bf300537cb48a621a1dff9c540e1bec71a9d3b2949f4,2025-02-11T16:15:40.500000 CVE-2024-53166,0,0,6b47b227a3c2839f79bbaeaa4f5e16e222ce5bbd89cad0bd429474bf1b6f91e1,2025-02-10T18:15:26.717000 @@ -273587,7 +273591,7 @@ CVE-2024-53205,0,0,aad40af383a0fae2dfd165489485b38af4279f086ab2ffc2acc584ef6f771 CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000 CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000 CVE-2024-53208,0,0,bc7e68ca2f003cd79ddc6d7ce610dc12e11f263a6b66fec26ebcb92d92485dc8,2025-01-16T16:46:38.657000 -CVE-2024-53209,0,1,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000 +CVE-2024-53209,0,0,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000 CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000 CVE-2024-53210,0,0,edb6f6743b39b3d9aaae84e10ec98f8816051f339f526267a629d8a9b382a055,2025-01-14T15:50:32.413000 CVE-2024-53211,0,0,18d392b735905bf509d5b499622b5915d2a7dc656aac6c7b71a8cc77eb401829,2024-12-27T14:15:29.017000 @@ -275171,15 +275175,15 @@ CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56195,1,1,5061972a1cb73878137e3bd459e010e89d1c1704b622db6ed4fbc91bfa8ff13b,2025-03-06T12:15:35.373000 -CVE-2024-56196,1,1,b46ae86c15fd0353a72c49b206ddbd52d33b27b1eae894036c9613fbfa8f4b28,2025-03-06T12:15:35.523000 +CVE-2024-56195,0,0,5061972a1cb73878137e3bd459e010e89d1c1704b622db6ed4fbc91bfa8ff13b,2025-03-06T12:15:35.373000 +CVE-2024-56196,0,0,b46ae86c15fd0353a72c49b206ddbd52d33b27b1eae894036c9613fbfa8f4b28,2025-03-06T12:15:35.523000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,3b67ef470891f025afa6af0da137e788f43839b85f759fed43bf437c7d57fc06,2024-12-31T16:15:27.247000 CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,fcf381b194171b51a5229bbac53f5e329fb502829416a1a37abaece0e20f4002,2025-02-18T22:15:12.910000 -CVE-2024-56202,1,1,56b4a87f440cecd788b6a9dd57890c9c4416d61ca169d201a38d8af53065d0ed,2025-03-06T11:15:11.423000 +CVE-2024-56202,0,0,56b4a87f440cecd788b6a9dd57890c9c4416d61ca169d201a38d8af53065d0ed,2025-03-06T11:15:11.423000 CVE-2024-56203,0,0,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000 CVE-2024-56204,0,0,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000 CVE-2024-56205,0,0,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000 @@ -275354,8 +275358,8 @@ CVE-2024-56408,0,0,937b0b6dcb8b7e22700c52d825204d5a29fd9d235db7298d220870025b8b9 CVE-2024-56409,0,0,5308d88426ba47579b9e4814446ee52648c1ad6c1efaeac0ba2c7848d693aa32,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 CVE-2024-56410,0,0,773584879180f8e91ff1c4d215aa7e545e4564d5fb6f40fae69849530878b183,2025-01-03T21:15:13.723000 -CVE-2024-56411,0,0,a08ca91a72231c6a154ca10536c8a561c34fab0a4dc6751ff667317d6cb8ebcf,2025-01-03T18:15:16.203000 -CVE-2024-56412,0,0,9d42bd036e8aef394bdb153cf89625129ee1e8bc4318110e9f42ab101734661d,2025-01-03T18:15:16.380000 +CVE-2024-56411,0,1,8a8f707c7bfe42da58c26531de0000f76c5a24eb783381a2a81a1a9fef0dc05b,2025-03-06T13:30:34.893000 +CVE-2024-56412,0,1,ffbda529bc4b3d5376fc38b6bb3dbb9527a4234f16921504f6f0df51d478a8ed,2025-03-06T13:30:34.893000 CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000 CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000 CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000 @@ -275442,7 +275446,7 @@ CVE-2024-56544,0,0,8a7f14bcfbf3a6d0d0b05eb7bf9e4f8c9bffe91101daa0f73648af61ea7c5 CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b1f2,2024-12-27T14:15:34.270000 CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000 CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000 -CVE-2024-56548,0,1,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b7371e,2025-03-06T12:42:52.363000 +CVE-2024-56548,0,0,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b7371e,2025-03-06T12:42:52.363000 CVE-2024-56549,0,0,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000 CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000 CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000 @@ -275450,7 +275454,7 @@ CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000 CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030fb6,2025-01-15T18:35:51.337000 CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000 -CVE-2024-56555,0,1,884600d2a02055b52b7728da3577ca03c9ba0b308206c6e00653bcca6cccc353,2025-03-06T12:42:52.363000 +CVE-2024-56555,0,0,884600d2a02055b52b7728da3577ca03c9ba0b308206c6e00653bcca6cccc353,2025-03-06T12:42:52.363000 CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000 CVE-2024-56557,0,0,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000 CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000 @@ -276007,11 +276011,11 @@ CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b CVE-2024-57575,0,0,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000 CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000 CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000 -CVE-2024-57579,0,1,998c634aaf72ebc07e60fd4101f3ff588564deb00e5a24d254aea61bfbf0aa4f,2025-03-06T12:42:52.363000 +CVE-2024-57579,0,0,998c634aaf72ebc07e60fd4101f3ff588564deb00e5a24d254aea61bfbf0aa4f,2025-03-06T12:42:52.363000 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 -CVE-2024-57580,0,1,5386ab0a31ac0414e0bafcdd93e2d3649e0dc143fcb13adc039707846357654a,2025-03-06T12:42:52.363000 -CVE-2024-57581,0,1,86f2c2ce89d7f7c1ea938f6ec9bdb7e42f919b1b3148032fa9c5467796d1eb80,2025-03-06T12:42:52.363000 -CVE-2024-57582,0,1,ec57dc747c9963ddf2f1259638e8142ee12e0a5daccca4dde80591a5cb608b5c,2025-03-06T12:42:52.363000 +CVE-2024-57580,0,0,5386ab0a31ac0414e0bafcdd93e2d3649e0dc143fcb13adc039707846357654a,2025-03-06T12:42:52.363000 +CVE-2024-57581,0,0,86f2c2ce89d7f7c1ea938f6ec9bdb7e42f919b1b3148032fa9c5467796d1eb80,2025-03-06T12:42:52.363000 +CVE-2024-57582,0,0,ec57dc747c9963ddf2f1259638e8142ee12e0a5daccca4dde80591a5cb608b5c,2025-03-06T12:42:52.363000 CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000 CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 @@ -276176,7 +276180,7 @@ CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698 CVE-2024-57822,0,0,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74d81,2025-01-10T15:15:16.337000 CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 -CVE-2024-57834,0,1,e3cca5e287184f32d20397e91dde398ce533990b77cde31e05ffb1748294feb6,2025-03-06T12:42:22.567000 +CVE-2024-57834,0,0,e3cca5e287184f32d20397e91dde398ce533990b77cde31e05ffb1748294feb6,2025-03-06T12:42:22.567000 CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000 CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000 CVE-2024-5784,0,0,f27ecf8abffd9e6c282a3d3ca16cce2ce0cb1c19ecd7f5c543f166278a4d8c33,2024-09-03T14:48:19.570000 @@ -276329,28 +276333,28 @@ CVE-2024-57999,0,0,192cd62115ee0eebfc0e3194a10d118c6cde7d7dffe718c35de3e7f488afc CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000 CVE-2024-58000,0,0,9bead4c6f4a6e6b0b3e4ccb9dcb95d8e89506cd6b149e93be860b24427528e09,2025-02-27T02:15:14.033000 CVE-2024-58001,0,0,062b95b71d62b8392e7dec859d235ae0235da3e946e47b40e89a8df2d660fc6c,2025-02-27T03:15:11.080000 -CVE-2024-58002,0,1,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000 +CVE-2024-58002,0,0,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000 CVE-2024-58003,0,0,d63162215e1a5dbdf2f26a3a80f9f12faed3d9c520fa6be1ac27c057f67243cd,2025-02-27T03:15:11.277000 CVE-2024-58004,0,0,68844712d1835a2f20b5302361ac491d98dd1a1f13907be2f39c078787a0c250,2025-02-27T03:15:11.380000 -CVE-2024-58005,0,1,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000 +CVE-2024-58005,0,0,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000 CVE-2024-58006,0,0,99bcd7c70bad6c86d4a686c41e032b597709b74aa5784099886d83704a9dc686,2025-02-27T03:15:11.583000 CVE-2024-58007,0,0,99668dc3f95779e9ab7d159225d35092d54f8a625cb70f7c1df3ac9c1790c35c,2025-02-27T03:15:11.680000 CVE-2024-58008,0,0,83bb44015382c711e9fe765b2c4558ae62041f53545addc939db33a1da1a9569,2025-02-27T03:15:11.780000 CVE-2024-58009,0,0,6a6126ef4bf4110693d6a0d67f707884629b7a16a613596b22e7f8f6785b193e,2025-02-27T03:15:11.880000 CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add0a,2024-08-12T13:41:36.517000 -CVE-2024-58010,0,1,c1fd457cf19b62729c1f9b9b7bbb9293ec963169d1a004a0837507c00ece7219,2025-03-06T12:42:22.567000 -CVE-2024-58011,0,1,fc794450673cbe9ad7f2b33dc371eab9dfbd1bfc29db3b7101769aa8d3911f9e,2025-03-06T12:42:22.567000 -CVE-2024-58012,0,1,c8d740bec17d8fc7f5d246a577a3ca722860950bfe7cc6f3f55a1529388c0457,2025-03-06T12:21:35.360000 +CVE-2024-58010,0,0,c1fd457cf19b62729c1f9b9b7bbb9293ec963169d1a004a0837507c00ece7219,2025-03-06T12:42:22.567000 +CVE-2024-58011,0,0,fc794450673cbe9ad7f2b33dc371eab9dfbd1bfc29db3b7101769aa8d3911f9e,2025-03-06T12:42:22.567000 +CVE-2024-58012,0,0,c8d740bec17d8fc7f5d246a577a3ca722860950bfe7cc6f3f55a1529388c0457,2025-03-06T12:21:35.360000 CVE-2024-58013,0,0,db720d7ccdda587cf86c812bf9a23ff3242ad2c6818001578519aa3e1096cd28,2025-03-05T22:15:35.690000 CVE-2024-58014,0,0,c7b2aa63e8b7bec392f61441db5b82d30877f13fd011c4249345a8e6613810f5,2025-02-27T03:15:12.390000 CVE-2024-58015,0,0,408dce73f62364b52ba252950975a281e1135fb7b4b23b2ccae7c773ad3c39ca,2025-02-27T03:15:12.493000 CVE-2024-58016,0,0,4b26c1146b2a0dfbe10569fbb6f1cac4750ac1fe03a88c36d84acf78d6c876e6,2025-02-27T03:15:12.590000 -CVE-2024-58017,0,1,18bd37de338911a20f5914e76e03d06f45cf2a45cb08188b214fd79e66278cc8,2025-03-06T12:21:35.360000 +CVE-2024-58017,0,0,18bd37de338911a20f5914e76e03d06f45cf2a45cb08188b214fd79e66278cc8,2025-03-06T12:21:35.360000 CVE-2024-58018,0,0,2d45ea9e1b61e8eef6ac2402ad337a326ac66e5ce54a80719f057d18b1037900,2025-02-27T03:15:12.797000 CVE-2024-58019,0,0,ebe852acb58145e0f515ee4e65d8d88d1691b0b856363c64f164142eb938ae30,2025-02-27T03:15:12.897000 CVE-2024-5802,0,0,19fff604014c9cef9e0f8bc6a62b84f7523f1797653eafe6700c36b3d03bd7a8,2024-11-21T09:48:21.447000 -CVE-2024-58020,0,1,5a8fbd0ea6230b3adf124651d3209ddd707b5ccdd2a1f6069d1ce1136d9e87ff,2025-03-06T12:21:35.360000 -CVE-2024-58021,0,1,1a52cd1a00902ee421b6fe06d4bf4ed4d9ccb5fd0ebd997107ce026e3de83c83,2025-03-06T12:21:35.360000 +CVE-2024-58020,0,0,5a8fbd0ea6230b3adf124651d3209ddd707b5ccdd2a1f6069d1ce1136d9e87ff,2025-03-06T12:21:35.360000 +CVE-2024-58021,0,0,1a52cd1a00902ee421b6fe06d4bf4ed4d9ccb5fd0ebd997107ce026e3de83c83,2025-03-06T12:21:35.360000 CVE-2024-58022,0,0,fa469b1694a27ff9f3883dfbb31bb0fb81728568f162205ac4ad417c587e1c4b,2025-03-05T14:05:15.387000 CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974d3,2024-10-04T13:50:43.727000 CVE-2024-58034,0,0,a58d20858f51668ab0e30ae7e40910f616321f1f89fdedf57b44aac4e3186045,2025-03-04T18:15:24.617000 @@ -276445,7 +276449,7 @@ CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5 CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 -CVE-2024-5888,0,0,b01cdf2669fd18c7554d12fa64aa10c8adf3fceea18ffcfb34332b4eb5c533a3,2025-03-03T20:15:43.940000 +CVE-2024-5888,0,1,20f59e0814c65babf2f0e66d48a127098726020f44ce6e0309b928c6093d5daf,2025-03-06T14:23:26.167000 CVE-2024-5889,0,0,b7da0432a39a45529584a1b2f747e31f7e73bfff06d966025659d00202e054f6,2024-11-21T09:48:31.583000 CVE-2024-5890,0,0,50a5a9d6ce6b94fe3e5714721a54c52cb0baf0048b9af07fdeef8cdcefb5efd7,2024-12-02T19:15:12.357000 CVE-2024-5891,0,0,ae9d57cc1702609e0862660090fa56b838e4604ff46aac9331af1fa5a8086c71,2024-11-21T09:48:31.703000 @@ -278236,7 +278240,7 @@ CVE-2024-7868,0,0,9e808ba59db5e75df79564ecc2138484211632b9d431d14239406d748d65bd CVE-2024-7869,0,0,a24ed1b37588c27588e8f347c06825561aa4e483768430e73928fa9d6c6d77d1,2024-10-04T13:51:25.567000 CVE-2024-7870,0,0,3ed63dc8c6790f45531fa92ee00a8019436a7c365c07e1d62a5d07b0d3c88d17,2024-10-07T12:29:19.203000 CVE-2024-7871,0,0,31db92eb5e0af181e39b35c41b604931a9d330c8192fefbcc353a016d70cbca3,2024-09-04T17:34:14.630000 -CVE-2024-7872,1,1,da9e48ba3c5ebdf2a98907c1d3bb0d0d8666f811524323efeb2f562336a5c4c6,2025-03-06T12:15:35.667000 +CVE-2024-7872,0,0,da9e48ba3c5ebdf2a98907c1d3bb0d0d8666f811524323efeb2f562336a5c4c6,2025-03-06T12:15:35.667000 CVE-2024-7873,0,0,03a7d50af22555e4239c69e93e200f90c2450fb77addde43aeb65c5f4bc2bdc1,2024-09-20T12:30:51.220000 CVE-2024-7874,0,0,79509650a2a2c64601c5be3ed14299dfd192578a0a0c4b43f8e745203fae82b5,2024-12-06T21:15:09.487000 CVE-2024-7875,0,0,fb1669572475de6533c581f8c56bc49b1a49b90132a9fcae7ae022ebc7e1b8e2,2024-12-06T21:15:09.613000 @@ -280199,7 +280203,7 @@ CVE-2025-0345,0,0,fdab4ab061ba34e7ae56477c0a30fa81f9f16f64f88fe386d4634a52d9c45c CVE-2025-0346,0,0,784962397b9f922e5eb47e0f60b46c47f1349646424ee2278ecbe0e3b77a240f,2025-02-27T02:05:55.703000 CVE-2025-0347,0,0,6673240c782ee6585e0b98006b3eaddd70b95ff8f7b53165bb334c59c3c173da,2025-02-27T02:05:55.703000 CVE-2025-0348,0,0,e571492bb8da0d49f53156cf92abd508dd738cda3756ae8e9a52c4288cbf6dee,2025-01-09T10:15:07.700000 -CVE-2025-0349,0,1,aefa841112d10deacd44207c4ea560230b6873b18e02516a9c1ce182b55a447c,2025-03-06T12:42:52.363000 +CVE-2025-0349,0,0,aefa841112d10deacd44207c4ea560230b6873b18e02516a9c1ce182b55a447c,2025-03-06T12:42:52.363000 CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000 CVE-2025-0352,0,0,3a526a5a58f779d9c18dd79a4421979dfef5808334aa001e60b548298e16dc22,2025-02-20T20:15:46.383000 CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000 @@ -280525,7 +280529,7 @@ CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f CVE-2025-0844,0,0,071e9d4f5de1eed9b63c09ffd0ea19a371d7cff2071b2b278c26d7f50a60a457,2025-02-04T17:17:18.457000 CVE-2025-0846,0,0,2f157ad7524f9611de30718adef5bf4f9523f0c2e3fd3595be8e6b55eaf2b5c7,2025-02-04T16:49:08.027000 CVE-2025-0847,0,0,ea927878808932b75502c7906c4cc6399e2fb275f98c51b7493b1bd399022943,2025-02-04T16:36:19.400000 -CVE-2025-0848,0,0,32914991a687958521823760c34bed606970cacdc9dcd4cf80621b51751f9222,2025-01-30T02:15:25.597000 +CVE-2025-0848,0,1,ca6d630f71f0e762dfc43d0d857c8db3999e805cb355c08f22ff4610c1a9e475,2025-03-06T13:30:34.893000 CVE-2025-0849,0,0,c1571bb2b5b492c6f92204c6e608b11f867312e7feddc38eeea3bee1b20e34e6,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,62423acde853af0a12a4aec10e4529f32bf957e75f81daf2b9cb54a67a3c55a5,2025-01-29T22:15:30.463000 CVE-2025-0858,0,0,f891231954c92d22a87eae2f502f820f9d12773d9f7834eea219f8626f292204,2025-02-05T15:15:21.580000 @@ -280544,6 +280548,7 @@ CVE-2025-0871,0,0,a9db8232db94718d41bf6e96d50fc960e1fc11044b43405a9641244f217c6b CVE-2025-0872,0,0,e07508ceef8393fa75d891955449dc691af8810cd495d3336262099110723cda,2025-02-07T14:07:40.797000 CVE-2025-0873,0,0,5aa4d6fb1c3a8eb595c4da8c3d69b8728e6fd89d36901ed8245170c7f8b81c38,2025-02-07T14:05:17.653000 CVE-2025-0874,0,0,125dbc60ce30bbccf3019f6512261a2e3942682e065309657be2653037ecf35f,2025-02-21T21:36:58.723000 +CVE-2025-0877,1,1,9abd91ef8daaee0e2c940a8a18ca67cbbbc22c8da6225fc8641235a410cbacf7,2025-03-06T14:15:36.107000 CVE-2025-0880,0,0,77e515b74976a5dc3eae29ea5053c11b5ba4746b76e1c02c2445f07f8eff78da,2025-02-25T19:20:49.193000 CVE-2025-0881,0,0,db910fe9bbcd2f0479a83598ac8b27c8e73be02c1af8fa69430d4bd0072a10a7,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000 @@ -280842,7 +280847,7 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89 CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000 CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000 CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000 -CVE-2025-1383,1,1,26b3f9287a3dc8bde52150fc61dab501d76865193cef15f0f8e76bc4558f6230,2025-03-06T12:15:35.937000 +CVE-2025-1383,0,0,26b3f9287a3dc8bde52150fc61dab501d76865193cef15f0f8e76bc4558f6230,2025-03-06T12:15:35.937000 CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 @@ -280961,7 +280966,7 @@ CVE-2025-1645,0,0,04ec87d98beb60cc953f9d19acf54f139fb80161a3db0460324c4b28ab5996 CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc304,2025-02-25T14:15:31.320000 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000 -CVE-2025-1666,1,1,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000 +CVE-2025-1666,0,0,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000 CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000 CVE-2025-1672,0,0,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000 CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000 @@ -280978,7 +280983,7 @@ CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec58 CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000 CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000 CVE-2025-1695,0,0,11ac8a68241490aba1f5f798db0dba9522b478d170bec56bb4dd6fd08e218fb4,2025-03-05T15:18:38.660000 -CVE-2025-1696,1,1,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000 +CVE-2025-1696,0,0,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000 CVE-2025-1714,0,0,7d464005cc3e2fe8abdf07631689d8f1c4467f8ffe467852e3ced1b0a0be0afa,2025-03-05T15:15:15.413000 CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000 @@ -281070,8 +281075,8 @@ CVE-2025-1873,0,0,e1c282e5ad730be363eaf77efd9ada11d8c28125c103f5c76eae6f3dc74ed9 CVE-2025-1874,0,0,aaac5f5bbefa513f1f275c65a81e3107f76733903a225b9b994a8887fc4365fa,2025-03-03T13:15:12.693000 CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327f8,2025-03-03T13:15:12.837000 CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000 -CVE-2025-1877,0,1,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000 -CVE-2025-1878,0,1,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000 +CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000 +CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000 CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9ad,2025-03-05T14:05:15.387000 CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000 CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000 @@ -281080,19 +281085,19 @@ CVE-2025-1889,0,0,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc98 CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000 CVE-2025-1891,0,0,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000 CVE-2025-1892,0,0,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000 -CVE-2025-1893,0,1,b2d203b613f27dbac4f37dcede36fc006d1bdec55036de6db0319aba9208eaa8,2025-03-06T12:21:35.360000 +CVE-2025-1893,0,0,b2d203b613f27dbac4f37dcede36fc006d1bdec55036de6db0319aba9208eaa8,2025-03-06T12:21:35.360000 CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000 CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000 CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000 CVE-2025-1899,0,0,a77691b4c448ef2bbbe9d4136b221ec0c7528d9c510c1bc782c445389d323e3c,2025-03-05T18:47:21.313000 -CVE-2025-1900,0,1,2bb4415842bd144755e10d37e7bdda984b10b0e407943e93eb4e77d1b80545fa,2025-03-06T12:21:35.360000 -CVE-2025-1901,0,1,39502d1ad733af26c8353312629d13298f6f85261490cede3884982e164f6103,2025-03-06T12:21:35.360000 -CVE-2025-1902,0,1,6642b45a5b9d0157dbcbfe7ed8407322ac885c09e239452506eca1dd8061d1d4,2025-03-06T12:21:35.360000 -CVE-2025-1903,0,1,c97c725b330640c2eb326cf708d9cdba957f8bee8128cf210d90507df4f160cd,2025-03-06T12:21:35.360000 -CVE-2025-1904,0,1,5982f191697594854129a95e84a87d047a15fabc77030ebb45046f4ce2b93e2a,2025-03-06T12:17:33.710000 -CVE-2025-1905,0,1,f6cb8f547b222722f8a05ade71066d34df308515521c260f6830f7a0901183d4,2025-03-06T12:17:33.710000 +CVE-2025-1900,0,0,2bb4415842bd144755e10d37e7bdda984b10b0e407943e93eb4e77d1b80545fa,2025-03-06T12:21:35.360000 +CVE-2025-1901,0,0,39502d1ad733af26c8353312629d13298f6f85261490cede3884982e164f6103,2025-03-06T12:21:35.360000 +CVE-2025-1902,0,0,6642b45a5b9d0157dbcbfe7ed8407322ac885c09e239452506eca1dd8061d1d4,2025-03-06T12:21:35.360000 +CVE-2025-1903,0,0,c97c725b330640c2eb326cf708d9cdba957f8bee8128cf210d90507df4f160cd,2025-03-06T12:21:35.360000 +CVE-2025-1904,0,0,5982f191697594854129a95e84a87d047a15fabc77030ebb45046f4ce2b93e2a,2025-03-06T12:17:33.710000 +CVE-2025-1905,0,0,f6cb8f547b222722f8a05ade71066d34df308515521c260f6830f7a0901183d4,2025-03-06T12:17:33.710000 CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 CVE-2025-1914,0,0,26644d87f7ea78754e61afdf88af3b53e637cc322d9c410d45452411107b6199,2025-03-05T15:15:15.560000 CVE-2025-1915,0,0,87990d884ed6a1cf9c53cbb9074aeaf50ed7455c17bcda3f0fc14c8f3723c450,2025-03-05T15:15:15.743000 @@ -281202,6 +281207,7 @@ CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb3686 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 +CVE-2025-2045,1,1,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000 CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 @@ -281775,14 +281781,14 @@ CVE-2025-21731,0,0,7c1b8af4bebbeff1dfc9fae4f71bc7c3973872aeed99474f1f0af7f7a91ef CVE-2025-21732,0,0,3b60bb445ae2b0c463604586ead7cd7b0115346717e34f71b063126e52774df3,2025-02-27T03:15:13.820000 CVE-2025-21733,0,0,f431674ee055b07860a3ac39c72dd3c08e4e4c04f40b001135cbbbbb35e430d4,2025-02-27T03:15:13.923000 CVE-2025-21734,0,0,d9f8314f03451f7ef65c7d0edb09eb5d3aed3906394ae2705f0dbf091413da63,2025-02-27T03:15:14.030000 -CVE-2025-21735,0,1,9447e89c5d3f0e8239c27fb7722fcbae09018357fec71126d259ef460ed6c98d,2025-03-06T12:21:35.360000 -CVE-2025-21736,0,1,95b5d003bb740dbf9be6a52daa32d7623c068f24bfe6d5597bc9ed5c0178fb53,2025-03-06T12:21:35.360000 -CVE-2025-21737,0,1,adbd37458e33d4b47282f1ae2cdaa9237f3384c7ef422beb49ae5c4d15493f31,2025-03-06T12:21:35.360000 +CVE-2025-21735,0,0,9447e89c5d3f0e8239c27fb7722fcbae09018357fec71126d259ef460ed6c98d,2025-03-06T12:21:35.360000 +CVE-2025-21736,0,0,95b5d003bb740dbf9be6a52daa32d7623c068f24bfe6d5597bc9ed5c0178fb53,2025-03-06T12:21:35.360000 +CVE-2025-21737,0,0,adbd37458e33d4b47282f1ae2cdaa9237f3384c7ef422beb49ae5c4d15493f31,2025-03-06T12:21:35.360000 CVE-2025-21738,0,0,be77dcc026730be68ea4112c0fa30198339fe27d884a1a08600eb0bb1db551ea,2025-02-27T03:15:14.427000 CVE-2025-21739,0,0,744890e3cb1b9afcafda7c757903b6daa82212d794f0c9620286b179d883b7a1,2025-02-27T19:15:50.067000 -CVE-2025-21740,0,1,22d267932c0c117f2bd6c851facd5454bb12998f423d0c9d7180bce46944d5ed,2025-03-06T12:21:35.360000 -CVE-2025-21741,0,1,865a61ef696dae829a575967cdb4ff384cea015538d94f81eb0d0bf40d9dc881,2025-03-06T12:21:35.360000 -CVE-2025-21742,0,1,b7fdadee381668e0eb92c87e1e70c39135d4fab66863f67fa8e359a4c75a4348,2025-03-06T12:21:35.360000 +CVE-2025-21740,0,0,22d267932c0c117f2bd6c851facd5454bb12998f423d0c9d7180bce46944d5ed,2025-03-06T12:21:35.360000 +CVE-2025-21741,0,0,865a61ef696dae829a575967cdb4ff384cea015538d94f81eb0d0bf40d9dc881,2025-03-06T12:21:35.360000 +CVE-2025-21742,0,0,b7fdadee381668e0eb92c87e1e70c39135d4fab66863f67fa8e359a4c75a4348,2025-03-06T12:21:35.360000 CVE-2025-21743,0,0,9a9acf545dda075999a27b2c6861db1133404fa1f33a76b52eb77a04cdf73400,2025-03-05T18:47:21.313000 CVE-2025-21744,0,0,4b24b592f92e54ef2bc8ba435c4dc52efe3ad202fb9364b0c791aa7b879e6019,2025-03-05T18:47:21.313000 CVE-2025-21745,0,0,bacd274e8d326f43626f4106545cf6113091b8569b7bec5b3c07f641bfe243d8,2025-03-05T18:47:21.313000 @@ -281867,7 +281873,7 @@ CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e206520 CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 -CVE-2025-22131,0,0,209f0b09db7969ce0de8827739da84ae754f62e53b6787f1c269b033ae39f483,2025-01-20T16:15:27.880000 +CVE-2025-22131,0,1,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 CVE-2025-22132,0,0,8f2a17f80eb849275738cca93335a0536605ff289b1fa4e5b349c43fa2cad954,2025-02-13T18:55:14.053000 CVE-2025-22133,0,0,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000 CVE-2025-22134,0,0,3c2fd591225b705584c74bda8da9b9be07bc4fac46ac5a8cbc29997594d0c4cf,2025-01-13T21:15:14.333000 @@ -283808,7 +283814,7 @@ CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25916,0,0,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000 -CVE-2025-25939,0,1,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 +CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000 CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000 @@ -283824,7 +283830,7 @@ CVE-2025-25953,0,0,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000 CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000 -CVE-2025-25967,0,1,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000 +CVE-2025-25967,0,0,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000 CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000 @@ -284237,7 +284243,7 @@ CVE-2025-27425,0,0,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5 CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 -CVE-2025-27499,0,1,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000 +CVE-2025-27499,0,0,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000 CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000 CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000 CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000