diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48366.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48366.json index 1a9f6a6ab82..e91a465333e 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48366.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48366.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48366", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-12T05:15:12.137", - "lastModified": "2024-11-21T07:33:15.753", + "lastModified": "2025-03-04T17:15:10.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48367.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48367.json index ef55c243926..940fa9172a4 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48367.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48367.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48367", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-12T05:15:12.343", - "lastModified": "2024-11-21T07:33:15.907", + "lastModified": "2025-03-04T17:15:11.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49114.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49114.json index 469b0a6cde5..9dd72c67dba 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49114.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49114.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49114", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.773", - "lastModified": "2025-02-26T07:00:48.773", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:21.570", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: libfc: Se corrige el use-after-free en fc_exch_abts_resp() fc_exch_release(ep) reducir\u00e1 el recuento de referencias de ep. Cuando el recuento de referencias llega a cero, se libera. Pero ep todav\u00eda se usa en el siguiente c\u00f3digo, lo que provocar\u00e1 un use-after-free. Regrese despu\u00e9s de la llamada fc_exch_release() para evitar el use-after-free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d7effe5fff9d28e45e18ac3a564067c7ddfe898", diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49182.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49182.json index 9cf3f2b5960..5cae68166df 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49182.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49182.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49182", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.333", - "lastModified": "2025-02-26T07:00:55.333", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:22.983", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: agregar bloqueo de lista de VLAN para proteger la lista de VLAN Al agregar una VLAN base de puerto, la VLAN de VF debe eliminarse de HW y modificar el estado de VLAN en la lista de VLAN de VF como falso. Si la tarea de periodicidad est\u00e1 liberando el mismo nodo, puede causar un error de \"use-after-free\". Este parche agrega un bloqueo de lista de VLAN para proteger la lista de VLAN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97", diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49196.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49196.json index de8fb2408d1..401d6bc62cc 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49196.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49196.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49196", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.677", - "lastModified": "2025-02-26T07:00:56.677", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:23.177", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/pseries: Se corrige el uso despu\u00e9s de liberar en remove_phb_dynamic() En remove_phb_dynamic() usamos &phb->io_resource, despu\u00e9s de haber llamado a device_unregister(&host_bridge->dev). Pero la anulaci\u00f3n del registro puede haber liberado a phb, porque pcibios_free_controller_deferred() es la funci\u00f3n de liberaci\u00f3n para host_bridge. Si no hay referencias pendientes cuando llamamos a device_unregister(), phb se liberar\u00e1 de nosotros. Esto ha pasado desapercibido, pero con slub_debug y page_poison habilitados puede provocar un bloqueo: PID: 7574 TAREA: c0000000d492cb80 CPU: 13 COMANDO: \"drmgr\" #0 [c0000000e4f075a0] crash_kexec at c00000000027d7dc #1 [c0000000e4f075d0] oops_end at c000000000029608 #2 [c0000000e4f07650] __bad_page_fault at c0000000000904b4 #3 [c0000000e4f076c0] do_bad_slb_fault at c00000000009a5a8 #4 [c0000000e4f076f0] data_access_slb_common_virt en c000000000008b30 Marco de excepci\u00f3n de acceso a datos SLB [380]: R0: c000000000167250 R1: c0000000e4f07a00 R2: c000000002a46100 R3: c000000002b39ce8 R4: 00000000000000c0 R5: 00000000000000a9 R6: 3894674d000000c0 R7: 0000000000000000 R8: 000000000000000ff R9: 0000000000000100 R10: 6b6b6b6b6b6b6b6b R11: 0000000000008000 R12: c00000000023da80 R13: c0000009ffd38b00 R14: 0000000000000000 R15: 000000011c87f0f0 R16: 0000000000000006 R17: 0000000000000003 R18: 0000000000000002 R19: 0000000000000004 R20: 0000000000000005 R21: 000000011c87ede8 R22: 000000011c87c5a8 R23: 000000011c87d3a0 R24: 0000000000000000 R25: 0000000000000001 R26: c0000000e4f07cc8 R27: c00000004d1cc400 R28: c0080000031d00e8 R29: c00000004d23d800 R30: c00000004d1d2400 R31: c00000004d1d2540 PIP: c000000000167258 MSR: 8000000000009033 OR3: c000000000e9f474 CTR: 0000000000000000 LR: c000000000167250 XER: 0000000020040003 CCR: 0000000024088420 MQ: 0000000000000000 DAR: 6b6b6b6b6b6b6ba3 DSISR: c0000000e4f07920 Resultado de llamada al sistema: fffffffffffffff2 [NIP: release_resource+56] [LR: release_resource+48] #5 [c0000000e4f07a00] release_resource en c000000000167258 (no confiable) #6 [c0000000e4f07a30] remove_phb_dynamic en c000000000105648 #7 [c0000000e4f07ab0] dlpar_remove_slot en c0080000031a09e8 [rpadlpar_io] #8 [c0000000e4f07b50] remove_slot_store en c0080000031a0b9c [rpadlpar_io] #9 [c0000000e4f07be0] kobj_attr_store en c000000000817d8c #10 [c0000000e4f07c00] sysfs_kf_write en c00000000063e504 #11 [c0000000e4f07c20] kernfs_fop_write_iter en c00000000063d868 #12 [c0000000e4f07c70] new_sync_write en c00000000054339c #13 [c0000000e4f07d10] vfs_write en c000000000546624 #14 [c0000000e4f07d60] ksys_write en c0000000005469f4 #15 [c0000000e4f07db0] system_call_exception at c000000000030840 #16 [c0000000e4f07e10] system_call_vectored_common at c00000000000c168 Para evitarlo, podemos tomar una referencia a host_bridge->dev hasta que terminemos de usar phb. Luego, cuando eliminemos la referencia, se liberar\u00e1 phb." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/33d39efb61a84e055ca2386157d39ebbdf6b7d31", diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49275.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49275.json index f11298f5cab..e3a58f2e031 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49275.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49275.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49275", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.370", - "lastModified": "2025-02-26T07:01:04.370", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:23.383", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el n\u00facleo de Linux, se ha resuelto la siguiente vulnerabilidad: can: m_can: m_can_tx_handler(): se corrige el use after free skb can_put_echo_skb() clonar\u00e1 skb y luego lo liberar\u00e1. Mueva can_put_echo_skb() para la versi\u00f3n 3.0.x de m_can directamente antes del inicio de la transmisi\u00f3n en el hardware, de manera similar a la rama 3.1.x." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08d90846e438ac22dc56fc49ec0b0d195831c5ed", diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json index ac00ab9c9e7..ef19dc26836 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json @@ -2,13 +2,13 @@ "id": "CVE-2023-3694", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-17T00:15:09.623", - "lastModified": "2024-11-21T08:17:51.537", + "lastModified": "2025-03-04T17:15:11.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as critical, has been found in SourceCodester House Rental and Property Listing 1.0. This issue affects some unknown processing of the file index.php. The manipulation of the argument keywords/location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234245 was assigned to this vulnerability." + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester/projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /index.php. The manipulation of the argument keywords/location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -89,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-89" @@ -137,6 +185,10 @@ "Third Party Advisory" ] }, + { + "url": "https://vuldb.com/?submit.183316", + "source": "cna@vuldb.com" + }, { "url": "https://github.com/safetom6/House-Rental-and-Property-Listing-System/blob/main/House%20Rental%20and%20Property%20Listing%20System%20index.php%20has%20Sqlinjection.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json index 13f148fc630..50cd98146d8 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47802", "sourceIdentifier": "security@synology.com", "published": "2024-06-28T06:15:03.220", - "lastModified": "2024-11-21T08:30:50.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:43:40.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json index 161ed7decaf..1b9a1d57831 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47803", "sourceIdentifier": "security@synology.com", "published": "2024-06-28T06:15:04.833", - "lastModified": "2024-11-21T08:30:50.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:43:40.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json index 3ceb929a023..99f3e5a7a43 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49572.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49572", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T13:15:08.030", - "lastModified": "2024-11-21T08:33:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flexense:vx_search:10.2.14:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "8981E803-BBFF-4DDB-AF9F-21B098B589B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json index b04d0008072..2734bbf776f 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49573.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49573", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T13:15:08.630", - "lastModified": "2024-11-21T08:33:34.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flexense:vx_search:10.2.14:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "8981E803-BBFF-4DDB-AF9F-21B098B589B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json index b829b9a58d3..f5678a08751 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49574.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49574", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T13:15:09.023", - "lastModified": "2024-11-21T08:33:35.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flexense:vx_search:10.2.14:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "8981E803-BBFF-4DDB-AF9F-21B098B589B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json index 4e9e77c14de..f0a1edad007 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49575.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49575", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T13:15:09.360", - "lastModified": "2024-11-21T08:33:35.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flexense:vx_search:10.2.14:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "8981E803-BBFF-4DDB-AF9F-21B098B589B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json index 754ce67000c..fbb7409c34f 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json @@ -2,13 +2,13 @@ "id": "CVE-2023-7100", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T03:15:08.840", - "lastModified": "2024-11-21T08:45:16.293", + "lastModified": "2025-03-04T17:15:11.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952." + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate/tdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -89,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-89" @@ -122,6 +170,10 @@ "Third Party Advisory" ] }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.248952", "source": "cna@vuldb.com", @@ -137,6 +189,10 @@ "Third Party Advisory" ] }, + { + "url": "https://vuldb.com/?submit.256861", + "source": "cna@vuldb.com" + }, { "url": "https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json index 23e916d328b..a3a0bbf6c4c 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10494", "sourceIdentifier": "security@ni.com", "published": "2024-12-10T16:15:21.930", - "lastModified": "2024-12-10T16:15:21.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -93,12 +113,113 @@ "value": "CWE-1285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2021", + "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*", + "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*", + "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*", + "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*", + "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json index 66a0903d09d..d3f82a40060 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10495", "sourceIdentifier": "security@ni.com", "published": "2024-12-10T16:15:22.080", - "lastModified": "2024-12-10T16:15:22.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -93,12 +113,113 @@ "value": "CWE-1285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2021", + "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*", + "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*", + "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*", + "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*", + "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json index ea0155da795..df214f46d03 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10496", "sourceIdentifier": "security@ni.com", "published": "2024-12-10T16:15:22.203", - "lastModified": "2024-12-10T16:15:22.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -93,12 +113,113 @@ "value": "CWE-1285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2021", + "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*", + "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*", + "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*", + "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*", + "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json new file mode 100644 index 00000000000..db5112027de --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-10930", + "sourceIdentifier": "productsecurity@carrier.com", + "published": "2025-03-04T18:15:23.610", + "lastModified": "2025-03-04T18:15:23.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Uncontrolled Search Path Element vulnerability exists which could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productsecurity@carrier.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@carrier.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-01", + "source": "productsecurity@carrier.com" + }, + { + "url": "https://www.corporate.carrier.com/product-security/advisories-resources/", + "source": "productsecurity@carrier.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json index e046b8045ac..ba282687717 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11218", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-22T05:15:08.903", - "lastModified": "2025-02-27T05:15:13.060", + "lastModified": "2025-03-04T18:15:23.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -116,6 +116,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:1713", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:1908", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11218", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30154.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30154.json index 9173cccec44..83425115f7d 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30154.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30154.json @@ -2,13 +2,17 @@ "id": "CVE-2024-30154", "sourceIdentifier": "psirt@hcl.com", "published": "2025-03-03T19:15:33.737", - "lastModified": "2025-03-03T19:15:33.737", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:12.010", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL SX is vulnerable to cross-site request forgery vulnerability which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." + }, + { + "lang": "es", + "value": "HCL SX es vulnerable a una vulnerabilidad de Cross Site Request Forgery que podr\u00eda permitir a un atacante ejecutar acciones maliciosas y no autorizadas transmitidas desde un usuario en el que el sitio web conf\u00eda." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119437", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json index 7eb28f2cc1f..79353da26a5 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3493", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-04-15T22:15:09.073", - "lastModified": "2024-11-21T09:29:43.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:11:31.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,250 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "A29D3775-CAB3-45CF-96CE-71D0672C7E37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "64CAC9B1-19E5-44BB-B814-DDA98B7290E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "305CDBFF-404A-45F5-A391-1B18F446D1B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "9232043F-8A87-446C-8B7E-F8E400AA6F68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62414E65-73C7-4172-B7BF-F40A66AFBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*", + "matchCriteriaId": "91162BBB-AD61-4191-B00A-FDE767268F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:1756-en4tr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898EE953-E0EF-4B52-8EA0-41AAD8B5CCF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "4A1541AE-A429-455E-94C4-3420183CE7CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEDADD8-01DE-4AE5-A0D7-532347FA7DB2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "DF838222-B4B6-4A66-B3CE-55E643368754" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380_process:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77BCC249-D601-4A82-9247-C0981BF990FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "61F8EA3B-C51C-4CB1-9BB3-017577DC6684" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968" + } + ] + } + ] } ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35111.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35111.json index 75ccffe4c30..4bef5184ea3 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35111.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35111", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-25T14:15:28.747", - "lastModified": "2025-01-25T14:15:28.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174806", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35112.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35112.json index e7883059ecf..3ce7b303ed9 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35112.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35112", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-25T14:15:28.910", - "lastModified": "2025-01-25T14:15:28.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,47 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174794", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35113.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35113.json index 531a8034cc1..978e53d71dc 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35113.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35113", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-25T14:15:29.077", - "lastModified": "2025-01-25T14:15:29.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,47 @@ "value": "CWE-548" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174796", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35114.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35114.json index 2e16f6e5391..1497dfcfa02 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35114.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35114", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-25T14:15:29.233", - "lastModified": "2025-01-25T14:15:29.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -49,12 +49,47 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174842", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json index 764be0a296f..5b5d5e17efb 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3696", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T16:15:40.943", - "lastModified": "2024-11-21T09:30:11.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:47:57.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "43C975E7-ADB4-4AAF-8883-8998E01355B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260483", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260483", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314199", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260483", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260483", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314199", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json index 35881679284..63e061c898d 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3697", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T17:17:22.983", - "lastModified": "2024-11-21T09:30:11.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:47:57.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "43C975E7-ADB4-4AAF-8883-8998E01355B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%203.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260484", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260484", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%203.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260484", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260484", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314203", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json index 7adcfd1cdce..fbb36176e26 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3698", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T17:17:23.337", - "lastModified": "2024-11-21T09:30:12.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:47:57.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "43C975E7-ADB4-4AAF-8883-8998E01355B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%204.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260485", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260485", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%204.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260485", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260485", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json index 2c98a4a0d67..149273436cb 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39349", "sourceIdentifier": "security@synology.com", "published": "2024-06-28T06:15:05.500", - "lastModified": "2024-11-21T09:27:31.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:43:40.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json index 2ca46842d44..faba8f61adf 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39351", "sourceIdentifier": "security@synology.com", "published": "2024-06-28T06:15:05.887", - "lastModified": "2024-11-21T09:27:31.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:43:40.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json index 481b9673eea..77a1b5b11cf 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39352", "sourceIdentifier": "security@synology.com", "published": "2024-06-28T06:15:06.223", - "lastModified": "2024-11-21T09:27:31.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:43:40.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41147.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41147.json new file mode 100644 index 00000000000..75445f6ce4d --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41147.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41147", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-03-04T18:15:24.020", + "lastModified": "2025-03-04T18:15:24.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability exists in the ma_dr_flac__decode_samples__lpc functionality of Miniaudio miniaudio v0.11.21. A specially crafted .flac file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2063", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json index 64f13db295f..ea4595a4bac 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41757", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-24T16:15:36.297", - "lastModified": "2025-01-24T16:15:36.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,47 @@ "value": "CWE-311" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1062C8DC-6D32-4761-ABFA-BAA9F25F2A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5CCBC4-696B-4CC4-8274-BF36022D7AF2" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7173596", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json index 3ac880a59ce..1bc5fde7f31 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45417", "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T20:15:35.007", - "lastModified": "2025-02-25T20:15:35.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,61 @@ "value": "CWE-708" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "93A03433-CCF8-4E19-89B4-18368847FB8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "66BFFFB3-351E-43CE-B005-D24AB48B9584" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "9B503B69-9BC0-4B91-BED9-0F2B5ACC0EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "627C5DC4-6AD9-4323-BBEA-4AB6557A29BF" + } + ] + } + ] } ], "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24039/", - "source": "security@zoom.us" + "source": "security@zoom.us", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json index 2f9449e95b7..23150ce3aa2 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45418", "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T20:15:35.223", - "lastModified": "2025-02-25T20:15:35.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,61 @@ "value": "CWE-61" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "93A03433-CCF8-4E19-89B4-18368847FB8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "66BFFFB3-351E-43CE-B005-D24AB48B9584" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "9B503B69-9BC0-4B91-BED9-0F2B5ACC0EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "627C5DC4-6AD9-4323-BBEA-4AB6557A29BF" + } + ] + } + ] } ], "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24040/", - "source": "security@zoom.us" + "source": "security@zoom.us", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json index 0216f2c25a4..6f7edfc5e96 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50704", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T16:15:35.480", - "lastModified": "2025-03-04T16:15:35.480", + "lastModified": "2025-03-04T17:15:12.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via a specially crafted HTTP POST request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://uniguest.com/cve-bulletins/", diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json index 69017a49593..9b48169de45 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50705", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T15:15:19.027", - "lastModified": "2025-03-04T16:15:35.597", + "lastModified": "2025-03-04T17:15:12.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Unauthenticated reflected cross-site scripting (XSS) vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary scripts via the page parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://uniguest.com/cve-bulletins/", diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json index dd4b17fc766..73eb39bb2e1 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50707", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T16:15:35.733", - "lastModified": "2025-03-04T16:15:35.733", + "lastModified": "2025-03-04T17:15:12.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via the X-Forwarded-For header in an HTTP GET request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://uniguest.com/cve-bulletins/", diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json index 990e6058342..f95cf478680 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json @@ -2,20 +2,63 @@ "id": "CVE-2024-51091", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:29.523", - "lastModified": "2025-03-03T18:15:29.523", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:12.870", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in seajs v.2.2.3 allows a remote attacker to execute arbitrary code via the seajs package" + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross-site scripting en seajs v.2.2.3 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del paquete seajs" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json index ef014a5ae28..eac66a3af4e 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53387", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T17:15:13.050", - "lastModified": "2025-03-03T17:15:13.050", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:13.043", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A DOM Clobbering vulnerability in umeditor v1.2.3 allows attackers to execute arbitrary code via supplying a crafted HTML element." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de DOM Clobbering en umeditor v1.2.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el suministro de un elemento HTML manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/jackfromeast/d52c506113f33b8871d0e647411df894", diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json index a4b4878fad4..61159981586 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53388", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T17:15:13.167", - "lastModified": "2025-03-03T17:15:13.167", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:13.217", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jackfromeast/a61a5429a97985e7ff4c1d39e339d5d8", diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5314.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5314.json index 10afaec921e..d573da6ad48 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5314.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5314", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T10:15:10.760", - "lastModified": "2024-11-21T09:47:24.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "22DC97F0-80D1-42CA-916C-0B87C3A4349A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dolibarrs-erp-cms", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dolibarrs-erp-cms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5315.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5315.json index f6be9708b47..107d39be0fe 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5315.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5315", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-24T10:15:11.197", - "lastModified": "2024-11-21T09:47:24.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "22DC97F0-80D1-42CA-916C-0B87C3A4349A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dolibarrs-erp-cms", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dolibarrs-erp-cms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54094.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54094.json index e184c4b12a0..1d58551cc5e 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54094.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54094", "sourceIdentifier": "productcert@siemens.com", "published": "2024-12-10T14:30:47.507", - "lastModified": "2024-12-10T14:30:47.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,12 +93,68 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-730188.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54095.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54095.json index f6b92cf64be..1d4a86cffa6 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54095.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54095", "sourceIdentifier": "productcert@siemens.com", "published": "2024-12-10T14:30:47.660", - "lastModified": "2024-12-10T14:30:47.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,10 +95,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0005:*:*:*:*:*:*", + "matchCriteriaId": "C3738D73-82A5-41E4-8083-34611A6301BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0006:*:*:*:*:*:*", + "matchCriteriaId": "5634352F-0DD1-4731-9E43-61D0A9A40D1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0007:*:*:*:*:*:*", + "matchCriteriaId": "32E3D549-54F0-4909-830D-BDE8CDAD5AF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0008:*:*:*:*:*:*", + "matchCriteriaId": "1137D7B3-17AD-4997-AC19-4308AA5C9438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0009:*:*:*:*:*:*", + "matchCriteriaId": "E5488DEB-3165-4F88-8C63-7B9BC212DEFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-730188.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json index 35cf589ab11..917119925ff 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55064", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T22:15:36.700", - "lastModified": "2025-03-03T22:15:36.700", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:13.390", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in EasyVirt DC NetScope <= 8.6.4 allow remote attackers to inject arbitrary JavaScript or HTML code via the (1) smtp_server, (2) smtp_account, (3) smtp_password, or (4) email_recipients parameter to /smtp/update; the (5) ntp or (6) dns parameter to /proxy/ntp/change; the (7) newVcenterAddress parameter to /process_new_vcenter." + }, + { + "lang": "es", + "value": "Varias vulnerabilidades de cross-site scripting (XSS) en EasyVirt DC NetScope <= 8.6.4 permiten a atacantes remotos inyectar c\u00f3digo JavaScript o HTML arbitrario a trav\u00e9s del par\u00e1metro (1) smtp_server, (2) smtp_account, (3) smtp_password o (4) email_recipients en /smtp/update; el par\u00e1metro (5) ntp o (6) dns en /proxy/ntp/change; el par\u00e1metro (7) newVcenterAddress en /process_new_vcenter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-55064.md", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55532.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55532.json index ab3d90e4250..bc5580503c5 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55532.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55532.json @@ -2,16 +2,43 @@ "id": "CVE-2024-55532", "sourceIdentifier": "security@apache.org", "published": "2025-03-03T16:15:38.777", - "lastModified": "2025-03-03T18:15:29.797", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:13.553", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Formula Elements in Export CSV feature of Apache Ranger in Apache Ranger Version < 2.6.0.\nUsers are recommended to upgrade to version 2.6.0, which fixes this issue." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos de f\u00f3rmula en la funci\u00f3n Exportar CSV de Apache Ranger en la versi\u00f3n de Apache Ranger anterior a la 2.6.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.6.0, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json index 03105ff12ca..a9b0ef0d224 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5520", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-30T12:15:10.807", - "lastModified": "2024-11-21T09:47:51.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alkacon:opencms:16.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07F4D050-DDCA-47F4-8E29-C3A1F135CD87" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-stored-alkacon-opencms", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-stored-alkacon-opencms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5521.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5521.json index 64481c7a181..6e0b2cb3205 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5521.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5521.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5521", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-30T12:15:11.090", - "lastModified": "2024-11-21T09:47:51.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:00:22.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alkacon:opencms:16.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07F4D050-DDCA-47F4-8E29-C3A1F135CD87" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-stored-alkacon-opencms", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-stored-alkacon-opencms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56623.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56623.json index 7679a40e7fd..a666f08e572 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56623.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56623.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56623", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:21.823", - "lastModified": "2025-01-08T21:41:01.397", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-04T18:15:24.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57240.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57240.json index ebd67a461e6..5322598a4b1 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57240.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57240.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57240", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T17:15:13.320", - "lastModified": "2025-03-03T17:15:13.320", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:13.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Scripting (XSS) vulnerability in the Rendering Engine component in Apryse WebViewer v11.1 and earlier allows attackers to execute arbitrary code via a crafted PDF file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente Rendering Engine en Apryse WebViewer v11.1 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo PDF manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/devom3/43c328e23ec854090ed555a13541ca94", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58034.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58034.json index ba856090440..da165c7f052 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58034.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58034", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.160", - "lastModified": "2025-02-27T20:16:02.160", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:24.617", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: memoria: tegra20-emc: se corrige un error de referencia de nodo OF en tegra_emc_find_node_by_ram_code() Como of_find_node_by_name() libera la referencia del nodo de dispositivo de argumento, tegra_emc_find_node_by_ram_code() libera algunos nodos de dispositivo mientras a\u00fan est\u00e1n en uso, lo que da como resultado posibles UAF. Seg\u00fan los enlaces y los archivos DTS en el \u00e1rbol, el nodo \"emc-tables\" siempre es el nodo secundario del dispositivo con la propiedad \"nvidia,use-ram-code\", y el nodo \"lpddr2\" es un nodo secundario del nodo \"emc-tables\". Por lo tanto, utilice la macro for_each_child_of_node() y of_get_child_by_name() en lugar de of_find_node_by_name() para simplificar el c\u00f3digo. Este error fue encontrado por una herramienta de verificaci\u00f3n experimental que estoy desarrollando. [krzysztof: se aplic\u00f3 la versi\u00f3n 1, se ajust\u00f3 el mensaje de confirmaci\u00f3n para incorporar partes de la versi\u00f3n 2]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3b02273446e23961d910b50cc12528faec649fb2", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7507.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7507.json index 1aea562d7ad..81869145608 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7507.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7507", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-08-14T20:15:12.900", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:11:31.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,231 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "AABBF4EF-9F0E-432D-A535-F74402CFD05D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "305CDBFF-404A-45F5-A391-1B18F446D1B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "E5B18F7F-80AB-4146-9D65-B1DB4C2FAA8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "A29D3775-CAB3-45CF-96CE-71D0672C7E37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "CC2E9A2F-AFC7-442D-88FC-C3217ABB560E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "64CAC9B1-19E5-44BB-B814-DDA98B7290E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "560A9F50-DBCF-48CF-856B-BE061C490697" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "F7A5DA9B-E1CA-45FF-8A9B-60B1E506F981" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.013", + "versionEndExcluding": "34.014", + "matchCriteriaId": "3631A2E0-00BA-4DF2-94C2-6906B9A3E941" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "ABE90277-EB8A-4ECE-A573-C1814F35CB47" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B82D842C-0930-41AA-83CD-5F235771AE4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "8C025589-66EE-40EF-8CE6-9A7B76D74BF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "61F8EA3B-C51C-4CB1-9BB3-017577DC6684" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968" + } + ] + } + ] } ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201685.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7515.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7515.json index 4bd828c2dc2..4ced513cbaf 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7515.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7515", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-08-14T20:15:13.150", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T17:11:31.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,231 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "AABBF4EF-9F0E-432D-A535-F74402CFD05D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "305CDBFF-404A-45F5-A391-1B18F446D1B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "E5B18F7F-80AB-4146-9D65-B1DB4C2FAA8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "A29D3775-CAB3-45CF-96CE-71D0672C7E37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "CC2E9A2F-AFC7-442D-88FC-C3217ABB560E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "64CAC9B1-19E5-44BB-B814-DDA98B7290E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "560A9F50-DBCF-48CF-856B-BE061C490697" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "F7A5DA9B-E1CA-45FF-8A9B-60B1E506F981" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.013", + "versionEndExcluding": "34.014", + "matchCriteriaId": "3631A2E0-00BA-4DF2-94C2-6906B9A3E941" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "ABE90277-EB8A-4ECE-A573-C1814F35CB47" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B82D842C-0930-41AA-83CD-5F235771AE4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "8C025589-66EE-40EF-8CE6-9A7B76D74BF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*", + "matchCriteriaId": "61F8EA3B-C51C-4CB1-9BB3-017577DC6684" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968" + } + ] + } + ] } ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201686.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1067.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1067.json index 8f4a34e229a..748e18f3f47 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1067.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1067.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1067", "sourceIdentifier": "psirt@esri.com", "published": "2025-02-25T17:15:13.717", - "lastModified": "2025-02-26T00:15:11.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_allsource:1.2:-:*:*:*:*:*:*", + "matchCriteriaId": "7D2CA319-F8C4-4611-A4CF-536085420591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_allsource:1.3:-:*:*:*:*:*:*", + "matchCriteriaId": "22FCC3F7-3ED4-4CFC-9668-48FA4BB37AE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_pro:3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2C69472E-B8D9-4EE2-A548-9CD61A1A22B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_pro:3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1D4A9671-48FC-4ACD-8AB4-3AAF9264EF93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1068.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1068.json index c398266f27f..972b341bf6b 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1068.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1068.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1068", "sourceIdentifier": "psirt@esri.com", "published": "2025-02-25T17:15:13.890", - "lastModified": "2025-02-26T00:15:11.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_allsource:1.2:-:*:*:*:*:*:*", + "matchCriteriaId": "7D2CA319-F8C4-4611-A4CF-536085420591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_allsource:1.3:-:*:*:*:*:*:*", + "matchCriteriaId": "22FCC3F7-3ED4-4CFC-9668-48FA4BB37AE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_pro:3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2C69472E-B8D9-4EE2-A548-9CD61A1A22B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:arcgis_pro:3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1D4A9671-48FC-4ACD-8AB4-3AAF9264EF93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json index 030d4c66ba6..7c9aecdc251 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1876", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T17:15:14.517", - "lastModified": "2025-03-03T17:15:14.517", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:14.313", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1562 1.10. Affected by this issue is the function http_request_parse of the component HTTP Header Handler. The manipulation of the argument Authorization leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DAP-1562 1.10. Este problema afecta a la funci\u00f3n http_request_parse del componente HTTP Header Handler. La manipulaci\u00f3n del argumento Authorization provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json index ea5a9cfe566..92ee6b10044 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1891", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T00:15:31.377", - "lastModified": "2025-03-04T00:15:31.377", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:14.510", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -76,6 +76,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,6 +138,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "references": [ @@ -136,6 +166,10 @@ { "url": "https://vuldb.com/?submit.505741", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json index 5468aa2499b..68ad2f0d5a2 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1892", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T01:15:11.147", - "lastModified": "2025-03-04T01:15:11.147", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:15.700", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.505754", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json index 526dec03866..5f736345893 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1893", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T01:15:11.327", - "lastModified": "2025-03-04T13:15:10.063", + "lastModified": "2025-03-04T17:15:15.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -144,6 +144,10 @@ { "url": "https://vuldb.com/?submit.505952", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/open5gs/open5gs/issues/3707#issue-2833194192", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json index abac94087ce..13afd172051 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1900", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T04:15:11.853", - "lastModified": "2025-03-04T04:15:11.853", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.023", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.506609", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/chenzi-dynasty/CVE/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json index a7134fe673a..8d7a3bb85a7 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1901", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T04:15:12.030", - "lastModified": "2025-03-04T04:15:12.030", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.506612", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/chenzi-dynasty/CVE/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json index 15abcd21b79..7cfa8cb6a3a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1932", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.053", - "lastModified": "2025-03-04T14:15:38.053", + "lastModified": "2025-03-04T17:15:16.327", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944313", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json index 7ee89f79770..acf74a2e604 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20644", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.173", - "lastModified": "2025-03-03T03:15:09.173", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.493", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible corrupci\u00f3n de memoria debido a una gesti\u00f3n incorrecta de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota, si un UE se ha conectado a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01525673; ID de problema: MSV-2747." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json index 48f4ece88b8..5ca4f255ae5 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20645", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.293", - "lastModified": "2025-03-03T03:15:09.293", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.650", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599." + }, + { + "lang": "es", + "value": "En KeyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09475476; ID de problema: MSV-2599." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json index ca6709fefba..7ebbea5092a 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20646", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.403", - "lastModified": "2025-03-03T03:15:09.403", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.803", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803." + }, + { + "lang": "es", + "value": "En el punto de acceso WLAN, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389074; ID de problema: MSV-1803." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json index 9406056738d..ecd329bdb26 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20648", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.620", - "lastModified": "2025-03-03T03:15:09.620", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:16.960", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09456673; Issue ID: MSV-2584." + }, + { + "lang": "es", + "value": "En la APU, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09456673; ID de problema: MSV-2584." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json index dfec1a17fd6..3990daa3fdd 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20649", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.730", - "lastModified": "2025-03-03T03:15:09.730", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:17.130", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184." + }, + { + "lang": "es", + "value": "En Bluetooth Stack SW, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00396437; ID de problema: MSV-2184." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json index e7f0d29ef7a..f5a2a81824b 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20650", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.840", - "lastModified": "2025-03-03T03:15:09.840", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:17.287", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061." + }, + { + "lang": "es", + "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291294; ID de problema: MSV-2061." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json index 8bd088be93e..475b806eb87 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json @@ -2,16 +2,43 @@ "id": "CVE-2025-20652", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:10.060", - "lastModified": "2025-03-03T03:15:10.060", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:17.497", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In V5 DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291215; Issue ID: MSV-2052." + }, + { + "lang": "es", + "value": "En V5 DA, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291215; ID de problema: MSV-2052." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json index 67f05588cd3..83e416ed0b1 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21084", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.537", - "lastModified": "2025-03-04T04:15:13.537", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:41:14.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21811.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21811.json index 953ca19c4a5..3779f571f75 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21811.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21811.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21811", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.680", - "lastModified": "2025-02-27T20:16:03.680", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:24.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: protege el acceso a los b\u00faferes sin referencias activas nilfs_lookup_dirty_data_b\u00faferes(), que itera a trav\u00e9s de los b\u00faferes adjuntos a los folios/p\u00e1ginas de datos sucios, accede a los b\u00faferes adjuntos sin bloquear los folios/p\u00e1ginas. Para el cach\u00e9 de datos, nilfs_clear_folio_dirty() puede llamarse de forma asincr\u00f3nica cuando el sistema de archivos se degenera a solo lectura, por lo que nilfs_lookup_dirty_data_b\u00faferes() a\u00fan tiene el potencial de causar problemas de use after free cuando los b\u00faferes pierden la protecci\u00f3n de su estado sucio a mitad de camino debido a esta limpieza asincr\u00f3nica y son liberados involuntariamente por try_to_free_b\u00faferes(). Elimine este problema de ejecuci\u00f3n ajustando la secci\u00f3n de bloqueo en esta funci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/367a9bffabe08c04f6d725032cce3d891b2b9e1a", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21812.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21812.json index a01b6a54c89..6c0f9fb8278 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21812.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21812.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21812", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.783", - "lastModified": "2025-02-27T20:16:03.783", - "vulnStatus": "Received", + "lastModified": "2025-03-04T18:15:25.100", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ax25: rcu protect dev->ax25_ptr syzbot encontr\u00f3 un problema de lockdep [1]. Deber\u00edamos eliminar la dependencia RTNL de ax25 en ax25_setsockopt(). Esto tambi\u00e9n deber\u00eda solucionar una variedad de posibles UAF en ax25. [1] ADVERTENCIA: se detect\u00f3 una posible dependencia de bloqueo circular 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not tainted ------------------------------------------------------ syz.5.1818/12806 is trying to acquire lock: ffffffff8fcb3988 (rtnl_mutex){+.+.}-{4:4}, at: ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680 but task is already holding lock: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (sk_lock-AF_AX25){+.+.}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 lock_sock_nested+0x48/0x100 net/core/sock.c:3642 lock_sock include/net/sock.h:1618 [inline] ax25_kill_by_device net/ax25/af_ax25.c:101 [inline] ax25_device_event+0x24d/0x580 net/ax25/af_ax25.c:146 notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85 __dev_notify_flags+0x207/0x400 dev_change_flags+0xf0/0x1a0 net/core/dev.c:9026 dev_ifsioc+0x7c8/0xe70 net/core/dev_ioctl.c:563 dev_ioctl+0x719/0x1340 net/core/dev_ioctl.c:820 sock_do_ioctl+0x240/0x460 net/socket.c:1234 sock_ioctl+0x626/0x8e0 net/socket.c:1339 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (rtnl_mutex){+.+.}-{4:4}: check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0x1ac/0xee0 kernel/locking/mutex.c:735 ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680 do_sock_setsockopt+0x3af/0x720 net/socket.c:2324 __sys_setsockopt net/socket.c:2349 [inline] __do_sys_setsockopt net/socket.c:2355 [inline] __se_sys_setsockopt net/socket.c:2352 [inline] __x64_sys_setsockopt+0x1ee/0x280 net/socket.c:2352 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(sk_lock-AF_AX25); lock(rtnl_mutex); lock(sk_lock-AF_AX25); lock(rtnl_mutex); *** DEADLOCK *** 1 lock held by syz.5.1818/12806: #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574 stack backtrace: CPU: 1 UID: 0 PID: 12806 Comm: syz.5.1818 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2074 check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2206 check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/lockin ---truncated--- " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2802ed4ced27ebd474828fc67ffd7d66f11e3605", diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json index 4112dc90964..c486a6b589f 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22837", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.387", - "lastModified": "2025-03-04T04:15:14.387", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json index 91c30a35a2b..38b75ecb090 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22841", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.530", - "lastModified": "2025-03-04T04:15:14.530", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json index 3de41fbcb57..2b3876dae8d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22847", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.663", - "lastModified": "2025-03-04T04:15:14.663", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json index 7d44fb2476b..2cd8f035666 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22897", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.807", - "lastModified": "2025-03-04T04:15:14.807", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json index 44eb189c154..eb20e6a3dfe 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23234", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.953", - "lastModified": "2025-03-04T04:15:14.953", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json index 41ef377a3b7..dcd770ec0c9 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23240", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.097", - "lastModified": "2025-03-04T04:15:15.097", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json index 26d98e226a5..b0df412dd87 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23409", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.240", - "lastModified": "2025-03-04T04:15:15.240", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json index 3dbe53e952a..98930839a93 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23414", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.377", - "lastModified": "2025-03-04T04:15:15.377", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json index 9f4bc577868..ef5f6f4bbd9 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23418", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.523", - "lastModified": "2025-03-04T04:15:15.523", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +65,44 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json index 964b4bc78a4..ec4a6f6b206 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23420", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.657", - "lastModified": "2025-03-04T04:15:15.657", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json index accc0400387..97c7ddb1122 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24301", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.803", - "lastModified": "2025-03-04T04:15:15.803", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json index eb4a17cd88a..17bbddcb554 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24309", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:15.940", - "lastModified": "2025-03-04T04:15:15.940", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:12:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +67,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25939.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25939.json index bb2d52b2168..814b2ed6ca3 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25939.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25939.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25939", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T19:15:35.290", - "lastModified": "2025-03-03T19:15:35.290", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:17.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reprise License Manager 14.2 is vulnerable to reflected cross-site scripting in /goform/activate_process via the akey parameter." + }, + { + "lang": "es", + "value": "Reprise License Manager 14.2 es vulnerable a cross-site scripting reflejado en /goform/activate_process a trav\u00e9s del par\u00e1metro akey." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SamR2406/CVE-IDs/blob/main/Reprise%20License%20Manager%2014.2%20-%20Reflected%20Cross-Site%20Scripting%20%28CVE-2025-25939%29", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SamR2406/CVE-IDs/blob/main/Reprise%20License%20Manager%2014.2%20-%20Reflected%20Cross-Site%20Scripting%20%28CVE-2025-25939%29", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json index 7c4b9746c72..fbbdff9b9ce 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25949", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T01:15:11.423", - "lastModified": "2025-03-03T01:15:11.423", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:17.890", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the User ID parameter at /rest/staffResource/update." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulada en el par\u00e1metro de ID de usuario en /rest/staffResource/update." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-89636", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25967.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25967.json index 4b8f4f445cc..3b2fd7eb144 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25967.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25967.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25967", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T19:15:35.400", - "lastModified": "2025-03-03T19:15:35.400", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:18.070", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acora CMS version 10.1.1 is vulnerable to Cross-Site Request Forgery (CSRF). This flaw enables attackers to trick authenticated users into performing unauthorized actions, such as account deletion or user creation, by embedding malicious requests in external content. The lack of CSRF protections allows exploitation via crafted requests." + }, + { + "lang": "es", + "value": "La versi\u00f3n 10.1.1 de Acora CMS es vulnerable a Cross-Site Request Forgery (CSRF). Esta falla permite a los atacantes enga\u00f1ar a los usuarios autenticados para que realicen acciones no autorizadas, como la eliminaci\u00f3n de cuentas o la creaci\u00f3n de usuarios, mediante la incorporaci\u00f3n de solicitudes maliciosas en contenido externo. La falta de protecci\u00f3n CSRF permite la explotaci\u00f3n mediante solicitudes manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/padayali-JD/CVE-2025-25967", diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json new file mode 100644 index 00000000000..207e22f5070 --- /dev/null +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26091", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T17:15:18.243", + "lastModified": "2025-03-04T17:15:18.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross Site Scripting (XSS) vulnerability exists in TeamPasswordManager v12.162.284 and before that could allow a remote attacker to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'name' parameter when creating a new password in the \"My Passwords\" page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://brunocaseiro.github.io/CVE-2025-26091/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json new file mode 100644 index 00000000000..b8c657cd00f --- /dev/null +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26182", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T17:15:18.363", + "lastModified": "2025-03-04T17:15:18.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in xxyopen novel plus v.4.4.0 and before allows a remote attacker to execute arbitrary code via the PageController.java file" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/GSBP0/007355c5f6bd213264ae1c35c347e5cc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json index 40cbbc3cb0b..047328b8679 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26206", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T19:15:35.507", - "lastModified": "2025-03-03T19:15:35.507", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:18.487", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in sell done storefront v.1.0 allows a remote attacker to escalate privileges via the index.html component" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Request Forgery en sell done storefront v.1.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente index.html" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/selldone/storefront/blob/main/index.html", diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26594.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26594.json index 39273e2a49a..28f9ac564a4 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26594.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26594.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26594", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.227", - "lastModified": "2025-02-25T16:15:38.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26594", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345248", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json index beda5a9b691..372dcb912d6 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26595", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.390", - "lastModified": "2025-02-25T16:15:38.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26595", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345257", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26596.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26596.json index 05968d5478d..b2ab62795e4 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26596.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26596.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26596", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.603", - "lastModified": "2025-02-25T16:15:38.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,23 +42,101 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26596", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345256", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26597.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26597.json index 23b98f2a74d..0a587624485 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26597.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26597.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26597", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.797", - "lastModified": "2025-02-25T16:15:38.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,23 +42,101 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26597", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345255", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26598.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26598.json index 942a80b230d..75d32a2bd57 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26598.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26598.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26598", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.977", - "lastModified": "2025-02-25T16:15:38.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26598", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345254", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26599.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26599.json index da9e32cc227..1a2c2301de4 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26599.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26599.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26599", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:39.163", - "lastModified": "2025-02-25T16:15:39.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26599", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345253", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26600.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26600.json index 3f8716567f6..2ae9d5471ad 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26600.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26600.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26600", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:39.350", - "lastModified": "2025-02-25T16:15:39.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26600", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345252", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26601.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26601.json index c1c79f9268c..1402602e0ab 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26601.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26601.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26601", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:39.537", - "lastModified": "2025-02-25T16:15:39.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858025BB-24A3-42C3-B157-486862B37124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:*", + "matchCriteriaId": "698FAFE9-BC9C-4ACF-8884-A18135EB2AA0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26601", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345251", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json new file mode 100644 index 00000000000..86ed385c065 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27150", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:18.663", + "lastModified": "2025-03-04T17:15:18.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-538" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/a6702622a8db969a17522b8fac0774afdb1c916f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc5r-684x-j46q", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=41870", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json new file mode 100644 index 00000000000..49bc4a932b4 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27155", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:18.833", + "lastModified": "2025-03-04T17:15:18.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pinecone is an experimental overlay routing protocol suite which is the foundation of the current P2P Matrix demos. The Pinecone Simulator (pineconesim) included in Pinecone up to commit ea4c337 is vulnerable to stored cross-site scripting. The payload storage is not permanent and will be wiped when restarting pineconesim." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/pinecone/commit/218b2801995b174085cb1c8fafe2d3aa661f85bd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/pinecone/security/advisories/GHSA-fr62-mg2q-7wqv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json new file mode 100644 index 00000000000..8322a2f710c --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27156", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:18.997", + "lastModified": "2025-03-04T17:15:18.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The mass emailing features do not sanitize the content of the HTML emails. A malicious user could use this issue to facilitate a phishing attempt or to indirectly exploit issues in the recipients mail clients. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740567344 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/a0bc657297b405debce1f5bcbbb30c733f3f09bd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x2v2-xr59-c9cf", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=42177", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json new file mode 100644 index 00000000000..6359f377717 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27401", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:19.547", + "lastModified": "2025-03-04T17:15:19.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-440" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=41850", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json new file mode 100644 index 00000000000..f4e397a1748 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27402", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:19.703", + "lastModified": "2025-03-04T17:15:19.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Enalean/tuleap/commit/ea6319e2ad40beeda335af4ccd7a204a6912765c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-66pg-cpjf-2mfg", + "source": "security-advisories@github.com" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=41857", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27417.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27417.json index 5a47be8bde0..97b979bb1f1 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27417.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27417.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27417", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:43.820", - "lastModified": "2025-03-03T16:15:43.820", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:19.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto para instituciones enfocado en los usuarios de lengua portuguesa. Se identific\u00f3 una vulnerabilidad de cross-site scripting (XSS) almacenado en el endpoint adicionar_status_atendido.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro de estado. Las secuencias de comandos inyectadas se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.16." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +81,10 @@ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27418.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27418.json index f5f375cc80d..32104e65ae0 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27418.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27418.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27418", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:43.960", - "lastModified": "2025-03-03T16:15:43.960", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:19.967", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_tipo_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the tipo parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto para instituciones enfocado en los usuarios de lengua portuguesa. Se identific\u00f3 una vulnerabilidad de cross-site scripting (XSS) almacenado en el endpoint adicionar_tipo_atendido.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro tipo. Las secuencias de comandos inyectadas se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.16." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +81,10 @@ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27420.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27420.json index f4aea15d4cd..dc5e8743662 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27420.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27420.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27420", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:44.223", - "lastModified": "2025-03-03T16:15:44.223", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:20.137", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the atendido_parentesco_adicionar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the descricao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability fix in 3.2.16." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto para instituciones enfocado en usuarios de lengua portuguesa. Se identific\u00f3 una vulnerabilidad de cross-site scripting (XSS) almacenado en el endpoint atendido_parentesco_adicionar.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro descricao. Las secuencias de comandos inyectadas se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. Esta vulnerabilidad se corrige en la versi\u00f3n 3.2.16." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +81,10 @@ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27499.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27499.json index 4dc704b6097..32f8db688c4 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27499.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27499.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27499", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T19:15:36.027", - "lastModified": "2025-03-03T19:15:36.027", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:20.250", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the processa_edicao_socio.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the socio_nome parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.10." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto para instituciones enfocado en los usuarios de lengua portuguesa. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado en el endpoint processa_edicao_socio.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro socio_nome. Las secuencias de comandos inyectadas se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.10." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +81,10 @@ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v248-mr5r-87pf", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v248-mr5r-87pf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json new file mode 100644 index 00000000000..cb7607aefe8 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27507", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T17:15:20.360", + "lastModified": "2025-03-04T17:15:20.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zitadel/zitadel/commit/d9d8339813f1c43d3eb7d8d80f11fdabb2fd2ee4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-f3gh-529w-v32x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json index 6607126f2e3..562b2028fe8 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27584", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T01:15:12.157", - "lastModified": "2025-03-03T01:15:12.157", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:20.527", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the First Name parameter at /rest/staffResource/update." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Nombre en /rest/staffResource/update." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-89636", diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json index df70badea20..0344e6806a4 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27585", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T01:15:12.277", - "lastModified": "2025-03-03T01:15:12.277", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:15:20.690", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Print Name parameter at /rest/staffResource/update." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Print Name en /rest/staffResource/update." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-89636", diff --git a/README.md b/README.md index 082bbee7952..a29a1600270 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-04T17:00:19.916462+00:00 +2025-03-04T19:00:20.656745+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-04T16:15:40.933000+00:00 +2025-03-04T18:43:40.097000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284083 +284093 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `10` -- [CVE-2024-11957](CVE-2024/CVE-2024-119xx/CVE-2024-11957.json) (`2025-03-04T16:15:34.927`) -- [CVE-2024-50704](CVE-2024/CVE-2024-507xx/CVE-2024-50704.json) (`2025-03-04T16:15:35.480`) -- [CVE-2024-50705](CVE-2024/CVE-2024-507xx/CVE-2024-50705.json) (`2025-03-04T15:15:19.027`) -- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T15:15:19.290`) -- [CVE-2024-50707](CVE-2024/CVE-2024-507xx/CVE-2024-50707.json) (`2025-03-04T16:15:35.733`) -- [CVE-2024-9149](CVE-2024/CVE-2024-91xx/CVE-2024-9149.json) (`2025-03-04T15:15:22.530`) -- [CVE-2025-1424](CVE-2025/CVE-2025-14xx/CVE-2025-1424.json) (`2025-03-04T16:15:36.663`) -- [CVE-2025-1425](CVE-2025/CVE-2025-14xx/CVE-2025-1425.json) (`2025-03-04T16:15:36.803`) -- [CVE-2025-23368](CVE-2025/CVE-2025-233xx/CVE-2025-23368.json) (`2025-03-04T16:15:39.270`) -- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-04T16:15:40.240`) -- [CVE-2025-27111](CVE-2025/CVE-2025-271xx/CVE-2025-27111.json) (`2025-03-04T16:15:40.487`) +- [CVE-2024-10930](CVE-2024/CVE-2024-109xx/CVE-2024-10930.json) (`2025-03-04T18:15:23.610`) +- [CVE-2024-41147](CVE-2024/CVE-2024-411xx/CVE-2024-41147.json) (`2025-03-04T18:15:24.020`) +- [CVE-2025-26091](CVE-2025/CVE-2025-260xx/CVE-2025-26091.json) (`2025-03-04T17:15:18.243`) +- [CVE-2025-26182](CVE-2025/CVE-2025-261xx/CVE-2025-26182.json) (`2025-03-04T17:15:18.363`) +- [CVE-2025-27150](CVE-2025/CVE-2025-271xx/CVE-2025-27150.json) (`2025-03-04T17:15:18.663`) +- [CVE-2025-27155](CVE-2025/CVE-2025-271xx/CVE-2025-27155.json) (`2025-03-04T17:15:18.833`) +- [CVE-2025-27156](CVE-2025/CVE-2025-271xx/CVE-2025-27156.json) (`2025-03-04T17:15:18.997`) +- [CVE-2025-27401](CVE-2025/CVE-2025-274xx/CVE-2025-27401.json) (`2025-03-04T17:15:19.547`) +- [CVE-2025-27402](CVE-2025/CVE-2025-274xx/CVE-2025-27402.json) (`2025-03-04T17:15:19.703`) +- [CVE-2025-27507](CVE-2025/CVE-2025-275xx/CVE-2025-27507.json) (`2025-03-04T17:15:20.360`) ### CVEs modified in the last Commit -Recently modified CVEs: `62` +Recently modified CVEs: `101` -- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T16:15:37.970`) -- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T16:15:38.110`) -- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T16:15:38.310`) -- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T16:15:38.457`) -- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T16:15:38.607`) -- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T15:15:24.493`) -- [CVE-2025-21181](CVE-2025/CVE-2025-211xx/CVE-2025-21181.json) (`2025-03-04T15:15:26.497`) -- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-03-04T15:15:28.007`) -- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T16:15:38.850`) -- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T16:15:38.970`) -- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T16:15:39.097`) -- [CVE-2025-22402](CVE-2025/CVE-2025-224xx/CVE-2025-22402.json) (`2025-03-04T14:53:43.637`) -- [CVE-2025-22604](CVE-2025/CVE-2025-226xx/CVE-2025-22604.json) (`2025-03-04T14:45:17.807`) -- [CVE-2025-23208](CVE-2025/CVE-2025-232xx/CVE-2025-23208.json) (`2025-03-04T14:45:17.807`) -- [CVE-2025-25379](CVE-2025/CVE-2025-253xx/CVE-2025-25379.json) (`2025-03-04T16:15:39.433`) -- [CVE-2025-25428](CVE-2025/CVE-2025-254xx/CVE-2025-25428.json) (`2025-03-04T16:15:39.597`) -- [CVE-2025-25430](CVE-2025/CVE-2025-254xx/CVE-2025-25430.json) (`2025-03-04T16:15:39.763`) -- [CVE-2025-25431](CVE-2025/CVE-2025-254xx/CVE-2025-25431.json) (`2025-03-04T16:15:39.917`) -- [CVE-2025-25476](CVE-2025/CVE-2025-254xx/CVE-2025-25476.json) (`2025-03-04T16:15:40.080`) -- [CVE-2025-25759](CVE-2025/CVE-2025-257xx/CVE-2025-25759.json) (`2025-03-04T15:15:28.353`) -- [CVE-2025-25760](CVE-2025/CVE-2025-257xx/CVE-2025-25760.json) (`2025-03-04T15:15:28.590`) -- [CVE-2025-26849](CVE-2025/CVE-2025-268xx/CVE-2025-26849.json) (`2025-03-04T16:15:40.360`) -- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T16:15:40.647`) -- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T16:15:40.797`) -- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T16:15:40.933`) +- [CVE-2025-23240](CVE-2025/CVE-2025-232xx/CVE-2025-23240.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-23409](CVE-2025/CVE-2025-234xx/CVE-2025-23409.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-23414](CVE-2025/CVE-2025-234xx/CVE-2025-23414.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-23418](CVE-2025/CVE-2025-234xx/CVE-2025-23418.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-23420](CVE-2025/CVE-2025-234xx/CVE-2025-23420.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-24301](CVE-2025/CVE-2025-243xx/CVE-2025-24301.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-24309](CVE-2025/CVE-2025-243xx/CVE-2025-24309.json) (`2025-03-04T17:12:06.513`) +- [CVE-2025-25939](CVE-2025/CVE-2025-259xx/CVE-2025-25939.json) (`2025-03-04T17:15:17.720`) +- [CVE-2025-25949](CVE-2025/CVE-2025-259xx/CVE-2025-25949.json) (`2025-03-04T17:15:17.890`) +- [CVE-2025-25967](CVE-2025/CVE-2025-259xx/CVE-2025-25967.json) (`2025-03-04T17:15:18.070`) +- [CVE-2025-26206](CVE-2025/CVE-2025-262xx/CVE-2025-26206.json) (`2025-03-04T17:15:18.487`) +- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-04T17:22:39.620`) +- [CVE-2025-27417](CVE-2025/CVE-2025-274xx/CVE-2025-27417.json) (`2025-03-04T17:15:19.857`) +- [CVE-2025-27418](CVE-2025/CVE-2025-274xx/CVE-2025-27418.json) (`2025-03-04T17:15:19.967`) +- [CVE-2025-27420](CVE-2025/CVE-2025-274xx/CVE-2025-27420.json) (`2025-03-04T17:15:20.137`) +- [CVE-2025-27499](CVE-2025/CVE-2025-274xx/CVE-2025-27499.json) (`2025-03-04T17:15:20.250`) +- [CVE-2025-27584](CVE-2025/CVE-2025-275xx/CVE-2025-27584.json) (`2025-03-04T17:15:20.527`) +- [CVE-2025-27585](CVE-2025/CVE-2025-275xx/CVE-2025-27585.json) (`2025-03-04T17:15:20.690`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 87364b264f7..b01005e72da 100644 --- a/_state.csv +++ b/_state.csv @@ -180669,10 +180669,10 @@ CVE-2021-38112,0,0,a516ccd688b3159a26d29a0542b1c43f34877df13f43b28ebc723fa181534 CVE-2021-38113,0,0,5d46b02d44dc495677e9944e1d41b326640fa8e6ba7e6607ee011515521389db,2024-11-21T06:16:25.040000 CVE-2021-38114,0,0,dcc34993449335bce7ac164918f8ca13087f09cfe97ee05f1f3c1ffaea5268a6,2024-11-21T06:16:25.210000 CVE-2021-38115,0,0,aac65d670b83c50bb6fdf3dde8ca97dd9df4d7eee0cdf91517338dfa0ded44ba,2024-11-21T06:16:25.407000 -CVE-2021-38116,0,1,9e2fcb7c454c84f0b73e4d451e4413ed14590e6d837393661712109d6c18a1ca,2025-03-04T14:45:17.807000 -CVE-2021-38117,0,1,c738ea68a8ed127f7c256f1f36be5720aae895b5778cdb70d63718b5b689ec05,2025-03-04T14:45:17.807000 -CVE-2021-38118,0,1,19afdc159a962568ad4d5ce3a0527049365f3ee9bf24d4050e4a7a28bb6b7674,2025-03-04T14:45:17.807000 -CVE-2021-38119,0,1,c51e04931621af9a60c5862276d47e6123773da43400202d3becd6612e750d3d,2025-03-04T14:45:17.807000 +CVE-2021-38116,0,0,9e2fcb7c454c84f0b73e4d451e4413ed14590e6d837393661712109d6c18a1ca,2025-03-04T14:45:17.807000 +CVE-2021-38117,0,0,c738ea68a8ed127f7c256f1f36be5720aae895b5778cdb70d63718b5b689ec05,2025-03-04T14:45:17.807000 +CVE-2021-38118,0,0,19afdc159a962568ad4d5ce3a0527049365f3ee9bf24d4050e4a7a28bb6b7674,2025-03-04T14:45:17.807000 +CVE-2021-38119,0,0,c51e04931621af9a60c5862276d47e6123773da43400202d3becd6612e750d3d,2025-03-04T14:45:17.807000 CVE-2021-3812,0,0,c5cb3f5b7111b975944866407ce7921fd1756d44d3c707face417fefec9022e0,2024-11-21T06:22:30.810000 CVE-2021-38120,0,0,b60e1861e1b921e1137b6df18349a144506c4be8364c1355e526faee82dc1255,2024-09-13T18:04:28.527000 CVE-2021-38121,0,0,bdeea87570d2aa637690322ce273b1fd44ad6ff765ffafe37b82df033fc08cd3,2024-09-13T18:04:16.260000 @@ -180688,8 +180688,8 @@ CVE-2021-38130,0,0,5dd7dd740c971ae448230e2fa7c6fa473ff13dd5ba4fffac83ff3ded78f32 CVE-2021-38131,0,0,980eb492833fef04df71f8c1be96cc90363084ebe94acd61a1b0ddd54c9cf526,2024-09-18T21:00:30.420000 CVE-2021-38132,0,0,cc4e1381a735ddb1e1b2e30ee731f10ac1786d2b08adbdb5c6b1a67d1117697d,2024-09-18T21:04:11.840000 CVE-2021-38133,0,0,0d77afe3c41e217ee49f58798c33ffe693557e4f4c683fac1020b9d1c0576a03,2024-09-18T21:05:17.027000 -CVE-2021-38134,0,1,41def84a96a3d580650d1c7b11022b92a9312986e0554171cd30a23f3b11fdb8,2025-03-04T14:45:17.807000 -CVE-2021-38135,0,1,6d6e41e6bc7b9a1351c2dd4f5bb95b6bf0dd710ff2b709eab83029b5c13588bd,2025-03-04T14:45:17.807000 +CVE-2021-38134,0,0,41def84a96a3d580650d1c7b11022b92a9312986e0554171cd30a23f3b11fdb8,2025-03-04T14:45:17.807000 +CVE-2021-38135,0,0,6d6e41e6bc7b9a1351c2dd4f5bb95b6bf0dd710ff2b709eab83029b5c13588bd,2025-03-04T14:45:17.807000 CVE-2021-38136,0,0,75dccf60c11e25464bc510952d9ccdd379a17e029a4ca730fef234378d74c33b,2024-11-21T06:16:27.247000 CVE-2021-38137,0,0,2ddc1b293c690f5b9d3e7ffefcd4ca372c28380db582fcb89b1014416b90329f,2024-11-21T06:16:27.437000 CVE-2021-38138,0,0,1e14c27b356072692022b0b633e52103df305663f6cc532303cc54463d19ff14,2024-11-21T06:16:27.617000 @@ -195539,7 +195539,7 @@ CVE-2022-26318,0,0,07059bedee342f87c82fd403ca9f475724f3e3520a133422d7d146531f355 CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000 CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000 CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000 -CVE-2022-26324,0,1,2cf850d71ebd6ea115d8393bdf5f5fd251b338a6a65536c9dccc8ab5b19b2468,2025-03-04T14:45:17.807000 +CVE-2022-26324,0,0,2cf850d71ebd6ea115d8393bdf5f5fd251b338a6a65536c9dccc8ab5b19b2468,2025-03-04T14:45:17.807000 CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000 CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000 CVE-2022-26327,0,0,14209176bfddac3742a841a3f635ca4404a584d709335abb6ed62100d8608437,2024-08-21T17:25:08.560000 @@ -208920,7 +208920,7 @@ CVE-2022-43143,0,0,868df4c4bb9b71ab79398441260504ea4a2d34397197a776dbb7b3925861a CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000 CVE-2022-43146,0,0,84fc36b0fa34c0e6ead69551bc9e1f56df82e44d1b7de7fb090389def45d5436,2024-11-21T07:25:59.457000 CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad77bb,2024-11-21T07:25:59.620000 -CVE-2022-4315,0,1,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000 +CVE-2022-4315,0,0,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000 CVE-2022-43151,0,0,ec89dabd3a8fe8d38444eb7088f65645800c95a944f74fc4a0c9106f179d5e70,2024-11-21T07:25:59.777000 CVE-2022-43152,0,0,7758037884cb4ab135d613748ea4d21af54b5940bb82e54694efe5a64eaf1a18,2024-11-21T07:25:59.940000 CVE-2022-43162,0,0,1ccbaac0bb66d6449309a729c532512bc27611c36ca1d066f10c644d326c69e3,2024-11-21T07:26:00.100000 @@ -212504,8 +212504,8 @@ CVE-2022-48362,0,0,a38eaad973d052fb8eacb61a27cb037ec8505981e43cf64cdd466cc188539 CVE-2022-48363,0,0,ae4c901f61cd4343186e6d40e9f444a91647523881c8c467f0d831123ad34cf8,2024-11-21T07:33:15.307000 CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434f6b,2024-11-21T07:33:15.467000 CVE-2022-48365,0,0,b935554843b9537d40e30b971626a708eb32cc0a7c1c7683e5ed169f2896d8ea,2024-11-21T07:33:15.613000 -CVE-2022-48366,0,0,75258b876168fcbd6991b11ddddb8498c473455509bd89f55e02878066d92c9b,2024-11-21T07:33:15.753000 -CVE-2022-48367,0,0,a624f3e93dd4cc5a193c7e3b785ef14b07571b38121346de63f21b74f0211e42,2024-11-21T07:33:15.907000 +CVE-2022-48366,0,1,40b8dcee156b44165a66a59dac89249a9f52ab12258de1e17f30c4c54cdff5b5,2025-03-04T17:15:10.980000 +CVE-2022-48367,0,1,d82067646b346a8279d79bfe5c8a110a939fc1772a639bf1a5605ff44510a41c,2025-03-04T17:15:11.203000 CVE-2022-48368,0,0,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000 CVE-2022-48369,0,0,54899196847c57d74a4cd598c1dede975771f962361a60ace2f6c23d87bd0a2b,2025-01-28T19:15:10.660000 CVE-2022-4837,0,0,6d97788184674a1102a7bec1dd87cf23022e3b52a475e5f5f22f1d81fba5b96b,2024-11-21T07:36:02.690000 @@ -213235,7 +213235,7 @@ CVE-2022-49110,0,0,5103555fcd11a5bf199fd33baab0d617149db9851329b3965ac253a8520ab CVE-2022-49111,0,0,0f73ff8884819a3d31422b81d543b4b48c8e71296c668745b64672b525f0720c,2025-02-27T19:15:41.783000 CVE-2022-49112,0,0,3f89b3060ac2c9e27a6960ab3f5c3defc2cea3fe5d522fa573c1592379e38bdc,2025-02-26T07:00:48.577000 CVE-2022-49113,0,0,95a432f029e3467048855426f584a077c7500c916716068e6f0c98bdffa00d8b,2025-02-26T07:00:48.677000 -CVE-2022-49114,0,0,a546a5ee95e06812a96b916a10f0379a8f1a86dafe28794988b28b6848b1604b,2025-02-26T07:00:48.773000 +CVE-2022-49114,0,1,a219b9bb24f6df65546aaaceb5d717da949556e470de3d544cef3d51184cb52a,2025-03-04T18:15:21.570000 CVE-2022-49115,0,0,c937c4341d31ee3c2c6f7df41443d43292834dee62fe1e5f7dcfbde1cf86b47d,2025-02-26T07:00:48.873000 CVE-2022-49116,0,0,685da781059ed88dd0ea8fceb53acd10c5eb252ca9de8661761424cb06797c75,2025-02-26T07:00:48.967000 CVE-2022-49117,0,0,bd5f9c0c823d8b9e51459dc8f0b0c3c51729f6482fc77c31ad31b3be5334d483,2025-02-26T07:00:49.057000 @@ -213310,7 +213310,7 @@ CVE-2022-49179,0,0,f809abe75024c89c1be081dc7b98f0457500eac5eef524ab67f4b1f5d8bcf CVE-2022-4918,0,0,c4f03a0a064390463bddfe1751a6538e5a2ff20b187ebaa73606b1a29097d2ab,2024-11-21T07:36:14.707000 CVE-2022-49180,0,0,fd553303e08653bf133e223a7c533e3966a8e2a5e8a3f3b1caf0d5833967408b,2025-02-26T07:00:55.137000 CVE-2022-49181,0,0,8a4c3e6b9ca8dc4d9b8f15b356b1ef8d9d688badb48456bd7a0c47c0d7df2b88,2025-02-26T13:15:34.087000 -CVE-2022-49182,0,0,c5ead6d4995601275e898837296aeb52c5c5e075ee2868df47d7f9ab685df852,2025-02-26T07:00:55.333000 +CVE-2022-49182,0,1,883287071792b936302c7d47daae023b448598e117a22190aa402e63bc20fed2,2025-03-04T18:15:22.983000 CVE-2022-49183,0,0,f8c53352b1fd47ee782723bb12ae6c3cf1c0cd537eba665131cd013a2c68de56,2025-02-26T07:00:55.427000 CVE-2022-49184,0,0,5498f6de59582de3111a051889e69eed6c724077540b5b7fb7e8b696b6088c6c,2025-02-26T07:00:55.520000 CVE-2022-49185,0,0,7ccf9d278019a34828ec6c364b91bca76db62defe14c95fee1843f641619636d,2025-02-26T07:00:55.607000 @@ -213325,7 +213325,7 @@ CVE-2022-49192,0,0,232d007c5973ec979d2064ddfc9f7f8fad4388ac5b241d3da39ed36e264e6 CVE-2022-49193,0,0,fcd9f06c4e7ea186f63178e22c84ab3b524fafeffdfbe20ddca2067c0296a2de,2025-02-26T07:00:56.383000 CVE-2022-49194,0,0,2597ebb9d08da19d1ad95aa8673d9018b9529e2e6541e81ffed37bc1bcc751c6,2025-02-26T07:00:56.483000 CVE-2022-49195,0,0,67b70760ade9b68f909e922fcac1d573e66925e4d731c7ac526b4c6a1644355a,2025-02-26T07:00:56.580000 -CVE-2022-49196,0,0,aff91bee98f87d1bace65a50645e1dbaace457eb955877feb56c854f7a771cb8,2025-02-26T07:00:56.677000 +CVE-2022-49196,0,1,fea9ee81b9383a9695877d11e16f2099abc180a823bf9cb71581438e5696f2fb,2025-03-04T18:15:23.177000 CVE-2022-49197,0,0,753e7429090ac7b3503114c8f3ad832359194131c3c881c0f853e6c2b26f8ac0,2025-02-26T07:00:56.770000 CVE-2022-49198,0,0,39ad1fa40e3f5d1353ac484e1ae5f1fda3580cf943f4ce3bc8998be7569a6c47,2025-02-26T07:00:56.880000 CVE-2022-49199,0,0,3a0cf9906d86cd5f9d045ed3812d2fdc2d09b3474c9c0fb9d1b366b764b20b39,2025-02-26T07:00:56.970000 @@ -213412,7 +213412,7 @@ CVE-2022-49271,0,0,5145c273b897ee14b5804578d6e18152dece157f29871f62a6dd96935ee75 CVE-2022-49272,0,0,0156f88ce8df73f0c2db70893af230069eb9cadf3220d92ec2ab7d1960f864e1,2025-02-26T07:01:04.097000 CVE-2022-49273,0,0,c2e118b7c24de13e599e1f2cdb24f879f758e8adfd6e61cb1b7736918fe9ad40,2025-02-26T07:01:04.190000 CVE-2022-49274,0,0,c79889ef5ea39b0927c0120a06849e008c9bea7f9988bbd89134df912f527698,2025-02-26T07:01:04.280000 -CVE-2022-49275,0,0,db84dca0408af0c020225acbfaa3b9549d18919a4955b5282026769571b8f98b,2025-02-26T07:01:04.370000 +CVE-2022-49275,0,1,8237c164fae950391ee554fa669f82ddb70248843715c5c4bd185fa576bd08c1,2025-03-04T18:15:23.383000 CVE-2022-49276,0,0,e3c6fde16cc3d9c90db3a0a2e4638a8a4f03c67b7b06202e4d7dd19795df5c35,2025-02-26T07:01:04.470000 CVE-2022-49277,0,0,8085b16635c57e27c2bdc3f0f64d0ff93ab427839d779c4f4d856843061c6d37,2025-02-26T07:01:04.567000 CVE-2022-49278,0,0,9fb36fb1aa810994731cef6f92c562e1cc42167b3eea65e0837a1007a791ae09,2025-02-26T07:01:04.660000 @@ -219610,8 +219610,8 @@ CVE-2023-24461,0,0,fd8bc2abb65aada1d7309949da776fd5d44c92bdea8ca6223fb68c7781454 CVE-2023-24463,0,0,a3c9e4674f772990b219d4f3438aaa2243bf93efafd37788b7290fa8764d44b4,2024-11-21T07:47:54.737000 CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66119,2025-02-11T17:15:15.437000 CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000 -CVE-2023-24466,0,1,1531d5aa8037433592fb8ed22ccab6d1519aba55b9991ced01572ffa4bda530c,2025-03-04T14:45:17.807000 -CVE-2023-24467,0,1,ab8e076c3763270e0693d9addd66b4b0c5c52ff5f6b3f9268c08789601c6c418,2025-03-04T14:45:17.807000 +CVE-2023-24466,0,0,1531d5aa8037433592fb8ed22ccab6d1519aba55b9991ced01572ffa4bda530c,2025-03-04T14:45:17.807000 +CVE-2023-24467,0,0,ab8e076c3763270e0693d9addd66b4b0c5c52ff5f6b3f9268c08789601c6c418,2025-03-04T14:45:17.807000 CVE-2023-24468,0,0,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000 CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000 CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000 @@ -221582,7 +221582,7 @@ CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884 CVE-2023-2692,0,0,ad06513e2f116b8fb6a964da6618fc1d94588cf004f25980806dd3b489093f9f,2024-11-21T07:59:05.780000 CVE-2023-26920,0,0,7032d8fb85b06c0f68b934efb7c1ddc8da00b25992344fdcc0d0ab8b925ca6a8,2024-11-21T07:52:04.053000 CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef63f2,2025-02-13T16:15:40.510000 -CVE-2023-26922,0,1,5257fd53c31086036e10c945e5d64e3cfb29fb098c4fd4c471d83fb6324a5b27,2025-03-04T15:15:17.240000 +CVE-2023-26922,0,0,5257fd53c31086036e10c945e5d64e3cfb29fb098c4fd4c471d83fb6324a5b27,2025-03-04T15:15:17.240000 CVE-2023-26923,0,0,75862e39801fb950c2f14e9f720d435da722d14d0e221faf7dfcb2b0a16c8d5c,2025-02-18T21:15:14.770000 CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000 CVE-2023-26925,0,0,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000 @@ -229410,7 +229410,7 @@ CVE-2023-36934,0,0,30bac902c373cd9ee753fda058f986cdb95225a1525cfc488f27d3dc36b8a CVE-2023-36935,0,0,2ad1bb160f82fa8692d63a84bc5cef9854a42287d4ab070f489ddf7f5896a46f,2023-11-07T04:16:47.183000 CVE-2023-36936,0,0,6de63bb209fc228600b415518e203a197f3afc5e24f5807639dfb31792d89bda,2024-11-21T08:10:57.263000 CVE-2023-36939,0,0,22c5d3929029ac694a557c3ef5d22c41bae02b738f863383d2e8a7e7156173ee,2024-11-21T08:10:57.413000 -CVE-2023-3694,0,0,329c8e9e981ba634c2f714e986d0c4aa776fadfaee4d2e1487251e5772ffe710,2024-11-21T08:17:51.537000 +CVE-2023-3694,0,1,0fd366f0370d94cf092e5f9da852627df6af55cd56adb8d5f0a3c8b819480f1f,2025-03-04T17:15:11.407000 CVE-2023-36940,0,0,4c1157225ff900b579ecd122bfc31fcc33d28fe909643e7732b49f2ffe93a2e4,2024-11-21T08:10:57.563000 CVE-2023-36941,0,0,0243a0ffba5033dbc0296a7f243dfec680eddbf1ea4d7b3279cf35ef2f24a038,2024-11-21T08:10:57.720000 CVE-2023-36942,0,0,3eca92b514959e5c7b1e38a7a247a92c860015694186a722ce5759563dd053d7,2024-11-21T08:10:57.883000 @@ -237627,8 +237627,8 @@ CVE-2023-47798,0,0,eabe9df12662645a26581da7b4c9c3364ea7ba78f7e46417e8d593c5db616 CVE-2023-4780,0,0,9f7ccf66ba8678635b360d166ab38a48497fa91d8e39887310aa19865cfebd7d,2024-03-12T15:15:47.163000 CVE-2023-47800,0,0,536e6191d1c37aa440b029981bd06f193385f45bb4f51ad8b28f91bea759064f,2024-11-21T08:30:49.757000 CVE-2023-47801,0,0,6f061e52216fb88e9afdab960e303a263cd89f8039729a97804f9d992ec4bea8,2024-11-21T08:30:49.907000 -CVE-2023-47802,0,0,a2d305b4c1ac383033fe9417c3ba4ae7ecdb1faf7af3ed24b6f999a9b91a0077,2024-11-21T08:30:50.053000 -CVE-2023-47803,0,0,3766ab834beab6f7e33ea054d338d95f1985b8fe64b846032e25331843467f90,2024-11-21T08:30:50.187000 +CVE-2023-47802,0,1,6dd946f699df6a491ac9834a15ddba63e64f16c5a6f5a062225cd8cfaecf9526,2025-03-04T18:43:40.097000 +CVE-2023-47803,0,1,c49de6e54ad79301c655a131558ab3ecfd613b8f091c559078a77637e6507981,2025-03-04T18:43:40.097000 CVE-2023-47804,0,0,6205142f7b14e239ef92fef2b1ac44f9d1e9b48dff0ed3b2e07500fdcf8f815a,2025-02-13T18:15:39.070000 CVE-2023-47805,0,0,a0525de6234d3b1e9bdc7e814d4514ded58e7b5fbeedb2b4ce90abaa3b961354,2024-12-09T13:15:30.923000 CVE-2023-47806,0,0,b0cdbd3a00354474ea134767ba68204fac150af82620653bb81d9b5e16a93e04,2024-11-21T08:30:50.427000 @@ -238951,10 +238951,10 @@ CVE-2023-49568,0,0,ac97689f0ee3fdbcc2dd33fe136cfca6f31010f7eecffece93c383b28fe47 CVE-2023-49569,0,0,6c6e37b06c255397b0b6ba93613bda98a26f6fadb0c9e852279f687080822d18,2024-11-21T08:33:34.583000 CVE-2023-4957,0,0,ca889a9477285b07904ddd4eb86ae0d0f9a134a768a54c58b84e7d4c0bad85c1,2024-11-21T08:36:20.357000 CVE-2023-49570,0,0,ca1fd3c4a6664ff51e0f833771fbe4b305afce1cae6ae36eb7fba6255bca1b86,2024-10-22T16:26:47.317000 -CVE-2023-49572,0,0,697ae93935b271787604f247c41232d9917d1b2201a388646294ace7086ec3e7,2024-11-21T08:33:34.853000 -CVE-2023-49573,0,0,0dfbfa5df8831b5b644cdf6c193e35ca73dad95dc108cef84f39a03060dfd203,2024-11-21T08:33:34.997000 -CVE-2023-49574,0,0,114374bead0179c3fe0ba680e7887a2367cccc1fa234949bc7616fd2d6f8312e,2024-11-21T08:33:35.123000 -CVE-2023-49575,0,0,4e6a6ae45793251cd661adc67df047c9f922d62451a8ddd68bb2bdfb8c439cd5,2024-11-21T08:33:35.260000 +CVE-2023-49572,0,1,4ddbcbf774c961c7bd660e32434128d24a4859fd5803310bf50390cb3a600ee1,2025-03-04T17:00:22.900000 +CVE-2023-49573,0,1,d7bbb9a949301dda043380bc6df83724f499d41f0d6d15a20f67f8de384e4f12,2025-03-04T17:00:22.900000 +CVE-2023-49574,0,1,e73934b9a4b2c28412048c5cacf00175cfd31cd2eac290c782366b25b15500e4,2025-03-04T17:00:22.900000 +CVE-2023-49575,0,1,43e5803b107014d0b1d8ce324987c41a6ec4449b86716a2e129a32cd431408a6,2025-03-04T17:00:22.900000 CVE-2023-49577,0,0,374576f0b7a20639768bf93404ed6883519f2037ce77b80e5b8b44acc944ff9c,2024-11-21T08:33:35.403000 CVE-2023-49578,0,0,2f6804b61c4d3d159baddcc8b0f8a76f68f452d5bcb145d2b1d282d25199de35,2024-11-21T08:33:35.570000 CVE-2023-4958,0,0,7f001dea70f53cb5a7a2462105854a03aaf170261e405f2314f4fd789e045b32,2024-11-21T08:36:20.490000 @@ -243154,7 +243154,7 @@ CVE-2023-7096,0,0,19da0549658ea770c7cbfd44c78d54ce61a6ed1ad74fadb2961574294429d6 CVE-2023-7097,0,0,bab463a157a0ec4c86b8d05086d020c8321cb0e2ddfa748238550f6301bba5ce,2024-11-21T08:45:14.723000 CVE-2023-7098,0,0,fb45e550044e716b2cd60264b1407659634acf1d3e7cc58f963426aa4635aad8,2024-11-21T08:45:15.690000 CVE-2023-7099,0,0,e5a2b72389968a01cc4f6096c3e1ce4ac890861a6e3386a7275b06db2e27cf70,2024-11-21T08:45:16.090000 -CVE-2023-7100,0,0,20a8a7c633d2e22493d410430d2c093151c16dddbb9e608da8319a1412a54e3b,2024-11-21T08:45:16.293000 +CVE-2023-7100,0,1,d677b41de093998f0edb23384ca32d3a17e346e2181a72ddd7db4fe96959d1aa,2025-03-04T17:15:11.650000 CVE-2023-7101,0,0,78a85b1311a31dfa9c8b894c9505c43b5a39d6d339543bcf68dc72fc2d6db90f,2025-02-13T18:16:12.690000 CVE-2023-7102,0,0,eda46931e4d5cc965a4562425a4a4a96d50c0b667307576457f7ed3697edc4a3,2024-11-21T08:45:16.750000 CVE-2023-7103,0,0,b2b8227ac2e0796238c704873dbc5543721fca2e7ab91f34fb3c87b288acac1b,2024-11-21T08:45:16.913000 @@ -244686,9 +244686,9 @@ CVE-2024-10490,0,0,4a4e4a08646346a5f6feeaf95c30f2410bbf3f4738b2d07bd796d69484a52 CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000 CVE-2024-10492,0,0,7f8940123504b47e7360ed943050a0eaf7d86e6d3f4447616bea276ef0817dfb,2024-11-25T08:15:08.453000 CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000 -CVE-2024-10494,0,0,0d61ebe1a49a296a6be41e5cf027c129adaf35d85bd52b4b10f8fe7c53483667,2024-12-10T16:15:21.930000 -CVE-2024-10495,0,0,c532e5576ad3f53b0d92da7f8c39bbfa0d2d2604397241692161cb1ba41dcffe,2024-12-10T16:15:22.080000 -CVE-2024-10496,0,0,b44674066242ec3115a5c03892d18c5285ca6f100c99971a9f991b938b897df3,2024-12-10T16:15:22.203000 +CVE-2024-10494,0,1,6646f3a333cc7b6403791225561c5677c09275e54e872d702889a286de87d904,2025-03-04T18:19:12.327000 +CVE-2024-10495,0,1,c1343f6d5c1e465d5ae95660269d8d6a20de4cf98583da96cc92c3c163f32b0e,2025-03-04T18:19:12.327000 +CVE-2024-10496,0,1,25edf9eef22f8a20a26bdf749b3980f9ea680a08ce7d28810b4119985eef3ae4,2025-03-04T18:19:12.327000 CVE-2024-10497,0,0,4212e0181580f29e1420db9a5e909d78265b1843b32c34455084331c49d5efd4,2025-01-17T11:15:06.980000 CVE-2024-10498,0,0,b6e36d63c386402ac4020d318693fe8dd16c04fbe0ab182bc1ac943bb311d11b,2025-01-17T11:15:08.340000 CVE-2024-10499,0,0,17b74beb086be3ec64eefaa097e37e1d1fc71a291b6b0e133ea9adf1d4040a72,2024-12-12T16:15:10.113000 @@ -245088,6 +245088,7 @@ CVE-2024-10927,0,0,51dbff092839b5cdc766883cb457518cde87efb23eee9d8146d4558d0c340 CVE-2024-10928,0,0,ceaf3b03b939bd800d5c1c0e8522d8c6c53e642e161d3e2104c315d8f30327a7,2024-11-22T19:10:19.290000 CVE-2024-10929,0,0,5249104b33f81585f5d79feff2e8cc0afe8730a77942ffeae12c6a983d8dd86c,2025-02-03T15:15:16.143000 CVE-2024-1093,0,0,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f747481a,2024-12-23T17:03:58.370000 +CVE-2024-10930,1,1,e3fa825c0a5cec409eb003d6a2b8bbe64791576eb4f54ac4167ca9175ba914a0,2025-03-04T18:15:23.610000 CVE-2024-10932,0,0,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000 CVE-2024-10933,0,0,290d54a194bd2d10a18db40a4b1aa6a391e3833a1d9eb9c0bad921d0d66d51cd,2024-12-05T20:15:21.417000 CVE-2024-10934,0,0,1ac6b03ca6c5955124da6cc79ba064edeca22e200355615d5f571464ca4e3256,2024-11-18T17:11:56.587000 @@ -245263,9 +245264,9 @@ CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51 CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000 CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000 CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000 -CVE-2024-11132,0,1,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000 -CVE-2024-11133,0,1,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000 -CVE-2024-11134,0,1,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000 +CVE-2024-11132,0,0,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000 +CVE-2024-11133,0,0,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000 +CVE-2024-11134,0,0,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000 CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000 CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 @@ -245333,7 +245334,7 @@ CVE-2024-11213,0,0,0a835f1f24f19dbff91d96d3a6351088ad7320e11ffd8b9112fe1d7f03522 CVE-2024-11214,0,0,ce293b49fa3792aed1bdef0278728de22346b7c8c6fd060fecdb1a211d7c2a56,2024-11-19T15:38:59.060000 CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000 CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000 -CVE-2024-11218,0,0,35c0a820ba27efe184934ec25a1a96f82a3e2bd1cc58b8e02600398afadb4228,2025-02-27T05:15:13.060000 +CVE-2024-11218,0,1,229897f668467750b11bad6efece5d29a3d0833fcbcdb5922dd864c0dfb19e89,2025-03-04T18:15:23.820000 CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000 CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000 CVE-2024-11220,0,0,bea01215af1b0ab3953945bb3fe68c48439557338f0129d7423ffdb58e634441,2025-01-23T16:54:24.970000 @@ -246056,7 +246057,7 @@ CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000 CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000 CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000 -CVE-2024-11957,1,1,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000 +CVE-2024-11957,0,0,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000 CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,98cccdbf2a56893ba844e9a27d11d8e19b411cb229a2ffc9fddc1d1b0c64d4ba,2024-12-04T16:52:34.413000 @@ -247603,7 +247604,7 @@ CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47 CVE-2024-13682,0,0,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000 -CVE-2024-13685,0,1,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000 +CVE-2024-13685,0,0,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000 CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000 CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000 CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000 @@ -256192,7 +256193,7 @@ CVE-2024-30142,0,0,363bc8d9ef2cad1109db0231f1d9e043ce9476ebb48510d5ff80d7b6f8e54 CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d679,2024-11-01T12:57:03.417000 CVE-2024-3015,0,0,05f5bb37dc8a3d22ba33d8caf2864b7f47e6f12d954d75d0efa934bd109df0e9,2024-11-21T09:28:41.097000 CVE-2024-30150,0,0,a62c26783832b053b5bcefcdb3738447ad86959ef5b6422f707ac574e115fe4c,2025-02-25T23:15:10.753000 -CVE-2024-30154,0,0,d41c0d6c7d6912b17378b7851b8ec82768cc6d10d56bb0f92226af7810fcab20,2025-03-03T19:15:33.737000 +CVE-2024-30154,0,1,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959affc,2025-03-04T17:15:12.010000 CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000 CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000 CVE-2024-30158,0,0,95d9ce829a91f171649545534b80b43680e23fd13b3b02f53cdc5be44785afcc,2024-10-25T16:30:09.927000 @@ -259883,7 +259884,7 @@ CVE-2024-34923,0,0,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5e CVE-2024-34927,0,0,cb7df4b23e37ef549254c4db52a0e18c56c7a16df31685fb7ebea0fb3b9c8f5b,2024-11-21T09:19:33.080000 CVE-2024-34928,0,0,6948ff991ad71f88113604cf8e5ed2ff9a99ec59c0c7d23553d5f536b5e99167,2024-11-21T09:19:33.307000 CVE-2024-34929,0,0,cdb28d9c0a1ab2a147a8dd483f6b655fffaa9c560bdb240a424b6286cdaeea56,2024-11-21T09:19:33.527000 -CVE-2024-3493,0,0,8c2135a0b79fd83a64756990f188eb4d4e868186d7be146e3cf7118657196df4,2024-11-21T09:29:43.297000 +CVE-2024-3493,0,1,6f26f51cfda2eeb8546736ab0a1537474024438b21c3b8a54f2a63a9473c0403,2025-03-04T17:11:31.917000 CVE-2024-34930,0,0,8e4758b04d182faf35af8d2d8b4d7bbb7a23c5e30ded31cb3b36806e3a76b69f,2024-11-21T09:19:33.760000 CVE-2024-34931,0,0,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000 CVE-2024-34932,0,0,fa667bc8efec7742ae79a7e2235ccec724f4d66353f90714c1639179a2bb15ff,2024-11-21T09:19:34.150000 @@ -259963,10 +259964,10 @@ CVE-2024-35106,0,0,b3cbb527e89eeaa447d1de741b34621dea8868efaceae836286cd0a4cc5c9 CVE-2024-35108,0,0,b35293f68c398181aa7dd98d91bf19a5b66693652be25f91f159d41015bd2319,2024-11-21T09:19:47.853000 CVE-2024-35109,0,0,08011b7d41e2e2ee8e6b1b22a9480c987fe4602b83b318bd03fc38fd378b48af,2024-11-21T09:19:48.060000 CVE-2024-35110,0,0,f235fb8e69bced6be621e94a356e9ba742d873a5caa9dfedaa44c9bd587c6830,2024-11-21T09:19:48.270000 -CVE-2024-35111,0,0,bd961483306805e938d5921a36860c44f319d07fbfd4e7eb7d4f21d1620a94c4,2025-01-25T14:15:28.747000 -CVE-2024-35112,0,0,df27ae09b443e13214e2eb10314c0c5b7f0a56731981a24c584d88ea4e38bda1,2025-01-25T14:15:28.910000 -CVE-2024-35113,0,0,907c3ef8f486a2f9dce86a0134059c4cab0b88c17e76e2afe629086319466b2c,2025-01-25T14:15:29.077000 -CVE-2024-35114,0,0,6e3e2e91ed8d3b54700a6fe8cf78c8d4810ad6ce4dcd9e3943ccbd10d2d40182,2025-01-25T14:15:29.233000 +CVE-2024-35111,0,1,59f5e0b69a11dc808ef222e6bf20b84ea110370f361325151010e7dfb652e8d1,2025-03-04T16:58:06.783000 +CVE-2024-35112,0,1,40c581145a724512626d7e318ca644ccc2b96cf3933bb0a587539bd354249ed4,2025-03-04T16:58:06.783000 +CVE-2024-35113,0,1,07c3cd7f98b1ff5a0016ccb8714719e151e27009fa4fc4a89b0e1116bc69c833,2025-03-04T16:58:06.783000 +CVE-2024-35114,0,1,2d75db3b597f8679347bca07974ba4bf36e6c5777c9c9a911eaa295a51e3c057,2025-03-04T16:58:06.783000 CVE-2024-35116,0,0,d47935dd566afa46ad3df0ca0d4d923bfe978e4a5bbfa383efb6411adef9fe3f,2024-11-21T09:19:48.577000 CVE-2024-35117,0,0,775edc85fc6292ca975b97313cb5e23af42f4ca9689462af06c7300c98306e66,2024-12-11T02:15:05.140000 CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000 @@ -261418,7 +261419,7 @@ CVE-2024-36956,0,0,670367ce28b981b19beb483f65703c81b6c9e3f1cfa11ba71ef0de2c9fd73 CVE-2024-36957,0,0,e832b85488d403a3576dfa9850b89c0e9192ac2af139c7d8635591403bb02162,2024-11-21T09:22:54.457000 CVE-2024-36958,0,0,36069f287079226cd51addf0df8415e2baf6adfafb47ace15524b98c89f37aba,2024-11-21T09:22:54.593000 CVE-2024-36959,0,0,5ea22f91ec0ae9d206a9d5aa206a0a0a40192b401da7b70baff93b240bf4beab,2025-01-14T15:38:24.327000 -CVE-2024-3696,0,0,a0e308b434fa8d20ca888cb3c247a740b140489c1f6a408fce30737edaf59e62,2024-11-21T09:30:11.760000 +CVE-2024-3696,0,1,eb9b55cdc2fe7c830cad6ef7f40e8d2c62a5ac5a6ecd851ea04676c7592b666a,2025-03-04T17:47:57.433000 CVE-2024-36960,0,0,f901c9d2bdc15372fd8c9ce7e795369381da1d72e53e97beec6d1b284300d1b4,2024-11-21T09:22:54.847000 CVE-2024-36961,0,0,0f03204501e82bf4c2787836e56dd2ae44fb2b94d37d92b1de67cb5b7712dd3d,2024-11-21T09:22:54.983000 CVE-2024-36962,0,0,30334bf77c188f75ce77622f0b019ab8087c081c329217161c3dfb612b138858,2024-11-21T09:22:55.130000 @@ -261429,7 +261430,7 @@ CVE-2024-36966,0,0,b06bf6d239b38283f463ecc99619955f541b88a4b1473eeeee31b11b4cc4c CVE-2024-36967,0,0,9bdfcf8562ac59ff2bce98afa8c2db99e827228e69a2eed8f9fbadc1ff9a636a,2024-11-21T09:22:55.877000 CVE-2024-36968,0,0,b51e2dc68c2824dcef3d9ab6950e2622baf141d6d50669e83aad56533abb99b2,2024-11-21T09:22:56.013000 CVE-2024-36969,0,0,19398af1a45dda3d9c920cf795c9977020937f8b3790bf11297b97110d9de854,2024-11-21T09:22:56.150000 -CVE-2024-3697,0,0,d9235d217d676dc9ff065369ed247516ad73dab94cfa34b8113c4b5fb5928036,2024-11-21T09:30:11.900000 +CVE-2024-3697,0,1,855efe46aa5156c47b1145cbf4c3a2896fcc6cdf578c5f477a9bf917741bb8a0,2025-03-04T17:47:57.433000 CVE-2024-36970,0,0,af2bab7b212e0d770fa460473318c24ec2ab92a5579d772878bad433082bdb50,2025-02-03T15:51:47.613000 CVE-2024-36971,0,0,989c5efec4869e265f1c9ad6d4bc877a7c4d888aa90d466274612b57a3cfa6e4,2025-01-27T21:43:21.750000 CVE-2024-36972,0,0,a776155922d5b636bf6506240846b6f1c39e0467d33ac02856b88db045a46650,2024-11-21T09:22:56.643000 @@ -261440,7 +261441,7 @@ CVE-2024-36976,0,0,79a80b0ab6033bf56212c6c5e83052a876a9b691529bfb5da5fb30d62e275 CVE-2024-36977,0,0,d48334f3849bf3827d378613ea2b15df7583db81d2ec2469063959851191b4fe,2024-11-21T09:22:57.463000 CVE-2024-36978,0,0,c871bfd6269a966a65366b1045e1c7ad9dd01da1e82214437ec7169913504385,2024-11-21T09:22:57.660000 CVE-2024-36979,0,0,70a6ba477580234ba4271442309a6e54f3f89cebc4d67af5e68dd99d3b6b01c9,2024-11-21T09:22:57.820000 -CVE-2024-3698,0,0,9d95694eecf9582764f9fa1a1c7fe55ebc89caf3ff1a158ade54331389cd8919,2024-11-21T09:30:12.050000 +CVE-2024-3698,0,1,12147dc3bb2f5a1fc18fded0f33005cb94125941e45c1ded7e56b93ab8c7f4e0,2025-03-04T17:47:57.433000 CVE-2024-36980,0,0,089f8099ecabd03482da3a8897aab642ab783b7442198cf7a4c02463e209b50a,2024-09-26T20:53:57.597000 CVE-2024-36981,0,0,4ef7db0d01c8ae7f95bdcef9bc0bd36c40a986a629272624fe257c629fcdfd83,2024-09-26T20:55:39.783000 CVE-2024-36982,0,0,cc4a220fdd8a42e8aad7f2c8c8b02865c677b908a7047d3d5f217be9bc0ea725,2024-11-21T09:22:58.247000 @@ -263411,11 +263412,11 @@ CVE-2024-39344,0,0,601608b1d6e9f21537b49c3079929d84716b989a7deb279c52f1ca8f4be7e CVE-2024-39345,0,0,288dda536354f2e2e51f07fe958b1f6cd5d729852cd898f4d9311bc6a8a9565d,2024-11-21T09:27:30.973000 CVE-2024-39347,0,0,c33e3d2207c9e4923512f386e77a574814cecd46daea64fc6a6dda15f247c205,2024-11-21T09:27:31.230000 CVE-2024-39348,0,0,428b8c1972131c0ce55ff4a36c1ce6fb48467e1060389452ae0ca9873e8c2719,2024-11-21T09:27:31.367000 -CVE-2024-39349,0,0,8aa5bd0949ee78c8eb55113896c0d7ce5fea62e907b46fd618316727ce5ef924,2024-11-21T09:27:31.493000 +CVE-2024-39349,0,1,6cc28f01e75ad07577ae57b8b13229f5ac2b1b4f1365d1187a82a17870d98d5f,2025-03-04T18:43:40.097000 CVE-2024-3935,0,0,b2830fb3fb12bb5696cea398a4552351a820f246543e4f3686a33e6921d62735,2025-01-29T17:12:19.780000 CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864ed1,2024-11-21T09:27:31.610000 -CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000 -CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 +CVE-2024-39351,0,1,3c460c84531fe4ffce68d32d5a05041dee4bf0c1d2ca9c3f1c2524c1ad93c47d,2025-03-04T18:43:40.097000 +CVE-2024-39352,0,1,99c37565d2c3d1d35be152c69633b37fec36b26e02123ba04b60c033f68359f4,2025-03-04T18:43:40.097000 CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,b747e71a4360f319286112d4bdbda4cc02bca21b0d0079d82ab5439589205d75,2025-01-30T14:35:18.047000 CVE-2024-39355,0,0,16df2107f1585271c41f3cccb5e923aa710b657767a47a7c7adc525abbde907e,2025-02-12T22:15:36.380000 @@ -264722,6 +264723,7 @@ CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808c CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 CVE-2024-41145,0,0,e583948039235f072af443025bc0ea6bb5630b5a84bc37fad1ee2b5dbca5d3b0,2024-12-18T23:15:07.970000 CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000 +CVE-2024-41147,1,1,9d3654f47101c33ff0e6bb218f24dddcdea5396be1d0bfc0094726528fd3d919,2025-03-04T18:15:24.020000 CVE-2024-41149,0,0,a971cf0aedf9cee5d8fa4c27e9a50e30f9e939e67806350993a8176bbcd4f77c,2025-02-11T16:15:40.073000 CVE-2024-4115,0,0,ffb5f36fbe2984a7256aff205f47c39ef178d82820690299ed15db732f03d6a7,2025-01-15T18:42:08.110000 CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000 @@ -265073,7 +265075,7 @@ CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9 CVE-2024-41746,0,0,989806c900ffd11c21b1fa6f91d833c84f6c1680e4b868bdf0c4c4b2010f26cb,2025-01-16T18:15:22.863000 CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a15,2024-11-21T09:42:20.143000 CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 -CVE-2024-41757,0,0,697f2962726b4eae23b6a76f571a741313dec1984134ef15a7d3909c167243f2,2025-01-24T16:15:36.297000 +CVE-2024-41757,0,1,adb5f4b542a7b16af6b71d1e87a048661b9da0542f10941d3eef8a15957fc294,2025-03-04T16:58:06.783000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 CVE-2024-41761,0,0,48d0303faeacb5aea64f43156f94a0affd943a18971bba4b04fb6042b87c2c03,2025-01-31T15:26:34.900000 CVE-2024-41762,0,0,c1974aea0e06b2927c18784e57637a55268819be3644cbae33cf4f7fc7ed3224,2025-01-31T15:27:03.190000 @@ -267943,8 +267945,8 @@ CVE-2024-45413,0,0,97b5271a249aecdac1531eb5157c85a5f824b705455cfa2b1a660706fe101 CVE-2024-45414,0,0,254358147ceadb1c2a4f90200d9c3b24659f014da45263ea141552de5c6691ce,2024-09-20T12:31:20.110000 CVE-2024-45415,0,0,d83394ff1f05f84e069e60652d41ee778a43f03cca8284d8609c990371d96646,2024-09-20T12:31:20.110000 CVE-2024-45416,0,0,56fbbfc6dd3fbd26ecb2734f984767a580adba040688fa0a1ad6dd44c8338b07,2024-09-20T12:31:20.110000 -CVE-2024-45417,0,0,cd7542e62102110d4d855d83f342c07681eb54606db421ba8449a6e38bfc022f,2025-02-25T20:15:35.007000 -CVE-2024-45418,0,0,dcaa3c1ebc8a55c1099e584615ffec648123863f9aa823f19f065494bf81df93,2025-02-25T20:15:35.223000 +CVE-2024-45417,0,1,f84152a1cd0de4ad639f930c302b82cdb2f7c2091fba9fbcb5fedfbaadd917b8,2025-03-04T17:22:39.620000 +CVE-2024-45418,0,1,43279b4e2e5239a64db6bb286f07dabc5b88ad7e8260a3ef24f65bad6e91c414,2025-03-04T17:22:39.620000 CVE-2024-45419,0,0,e29987400dc7a70a46eaa15282ddd07daa810db0126cea2d64216241ae00d0c5,2024-11-19T21:56:45.533000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45420,0,0,03f4264734f64936227955b0cd7295bf6ba9995138d84e0a2d97323a06156f95,2024-11-19T21:56:45.533000 @@ -268075,7 +268077,7 @@ CVE-2024-45594,0,0,7a3512bdd289e08930c55958e7a3b82e2f30b26c968886b9e51f5b9001958 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,5a68594db914cb6b4d8306c16fbb00f262377974d86e7839e390f218fadb00b1,2024-09-11T16:26:11.920000 -CVE-2024-45598,0,1,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000 +CVE-2024-45598,0,0,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000 @@ -269964,7 +269966,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 -CVE-2024-48248,0,1,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 +CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -271477,7 +271479,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000 CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000 CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000 -CVE-2024-50302,0,1,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000 +CVE-2024-50302,0,0,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000 CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000 CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000 CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000 @@ -271809,7 +271811,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 -CVE-2024-50656,0,1,0388b4db16cd9aabe7b5e8e43f14e295a2a569883a92c3216db45e5c95061e17,2025-03-04T14:53:43.637000 +CVE-2024-50656,0,0,0388b4db16cd9aabe7b5e8e43f14e295a2a569883a92c3216db45e5c95061e17,2025-03-04T14:53:43.637000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000 CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 @@ -271842,10 +271844,10 @@ CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e0265 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000 CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000 -CVE-2024-50704,1,1,9d331c8d6b363d37fff2547f6d76cc65ecf4258701e3633eed0ee80ab60702ca,2025-03-04T16:15:35.480000 -CVE-2024-50705,1,1,7f8c9f9cf68b3101f3ba62602ce2f5e6e57e21f3f81bbd324b10b941dd67f273,2025-03-04T16:15:35.597000 -CVE-2024-50706,1,1,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000 -CVE-2024-50707,1,1,44896e88bc7dc773fec1e11f006564a397b1d0d8621287ea0206c057d3930403,2025-03-04T16:15:35.733000 +CVE-2024-50704,0,1,33de55037448a6030b29028b7c032e00bcd17665a8884aeb1bb01713ccfcdcbc,2025-03-04T17:15:12.323000 +CVE-2024-50705,0,1,5fba789015dc4730dfd900eb12ed13b5d6925a0038226a440b770e2b421e3a62,2025-03-04T17:15:12.523000 +CVE-2024-50706,0,0,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000 +CVE-2024-50707,0,1,b4c98511e68eadc38c0eaad86845af9d03870972465b2ad348462d5ec825f76d,2025-03-04T17:15:12.700000 CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000 CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000 CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5076,2024-12-28T18:15:08.193000 @@ -272014,7 +272016,7 @@ CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d8 CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000 CVE-2024-5108,0,0,2dbe7b73a30a679e8187fbb42897811cbeb8e5e0df154c40c12811a3dfea6c02,2025-02-21T21:14:08.303000 CVE-2024-5109,0,0,71e4e0c4bca00ee29a2fa080f7e148d6d2b101e79a10d5714f213d96eed611a1,2025-02-21T20:22:51.190000 -CVE-2024-51091,0,0,7e3be999d132c421726433ace9a407b1f700c09d94767f9fdddb3b85c60ce5ff,2025-03-03T18:15:29.523000 +CVE-2024-51091,0,1,5e78b6015d2c820814efac8df60c412b14455b3c1ffa2d633d89a588bbd70514,2025-03-04T17:15:12.870000 CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c851,2024-11-21T18:15:11.043000 CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9299,2024-11-19T17:35:14.493000 CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000 @@ -273469,7 +273471,7 @@ CVE-2024-53136,0,0,85f4f102ba504c742a170df1f99c5a44d12a6891f1af2e35a0467d55cef3b CVE-2024-53137,0,0,ab21365dc50b4678bed6ce6c5762aff8f85aed03af19b1c02f26a57cff53277b,2024-12-11T17:01:09.277000 CVE-2024-53138,0,0,0d9a92d9979f4e494675759d9bdca5abbe78270dcedc656fbca0993c8d0aa5b4,2024-12-14T21:15:38.140000 CVE-2024-53139,0,0,38e0ae2d6b2c4e8a68fa87c84522af1b5dddfecf72b546f9f1556d45a497a8c8,2024-12-11T16:47:34.503000 -CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a6342b,2024-11-21T09:47:24.810000 +CVE-2024-5314,0,1,5e7dbbbc11682e1eca5a756e02896ec623292c2d8adba0613c7a28fbfb247b57,2025-03-04T17:00:22.900000 CVE-2024-53140,0,0,278cbdb637af028f369abd9e56d14ef405930db6ac1e94694d5107009c64dd48,2024-12-14T21:15:38.317000 CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9fbc7,2024-12-14T21:15:38.550000 CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000 @@ -273480,7 +273482,7 @@ CVE-2024-53146,0,0,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543 CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000 CVE-2024-53148,0,0,4b9d4dc07b7bfc2792b42b5f67199b390604698146ea12cfd91f1c4f238361d1,2024-12-24T12:15:22.887000 CVE-2024-53149,0,0,871a7de0af2c5f9581bb879b9201e108fc0359e1ac44fcd43474c16daa7bbc52,2025-01-09T16:16:21.097000 -CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000 +CVE-2024-5315,0,1,51bc531b4766a3cbe34e992775509c059673271fafcb10c677e381e174decf29,2025-03-04T17:00:22.900000 CVE-2024-53150,0,0,42062accc76561f05b3a37cb4c8683d4a5bafa996981cf7fbbd661e8aa552bdd,2025-01-07T16:38:32.010000 CVE-2024-53151,0,0,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000 CVE-2024-53152,0,0,8c8f4f476264eba0a73ea6d3f2f2e87f1734a052b6ac9dc8cfbd62726a584cb9,2024-12-24T12:15:23.353000 @@ -273658,8 +273660,8 @@ CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac9 CVE-2024-53382,0,0,2488076516d1ebcfd2ad12e680a94caed7283ef6a09ea27a43a166505c7166e8,2025-03-03T22:15:35.637000 CVE-2024-53384,0,0,e63525e28645ffd574e4bc5c37cec43657018cac2aeb992a27d57ce5edd4d535,2025-03-03T18:15:29.670000 CVE-2024-53386,0,0,7f05252fb8b0d166f1c2ba66ecc4b7344953d98b8f75dafbb0948fe4c267094e,2025-03-03T22:15:36.583000 -CVE-2024-53387,0,0,609df7ae497cedd9f156e2ec60775eff9e6d887f421bbcb389ceb26e5ac9aac5,2025-03-03T17:15:13.050000 -CVE-2024-53388,0,0,8d3e08409f54a376783ce329de4e860405860aa5f0436b7497252430669d8c0e,2025-03-03T17:15:13.167000 +CVE-2024-53387,0,1,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d896,2025-03-04T17:15:13.043000 +CVE-2024-53388,0,1,8b8dacfab9439ff4969bd847d9389950511a224c15ee4c724e3aaa2186354ee1,2025-03-04T17:15:13.217000 CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000 CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000 @@ -274001,7 +274003,7 @@ CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2 CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000 CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2e17,2025-02-03T18:15:36.633000 CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000 -CVE-2024-53944,0,1,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000 +CVE-2024-53944,0,0,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000 CVE-2024-53947,0,0,e2f76f81a7b4b04a6a0933301af0327b41592be00ca6e33f47671fd393eff3dc,2024-12-09T14:15:12.267000 CVE-2024-53948,0,0,d599ead73c1f590fbb2eff6448b7bf9439b2eabd12941877aab993eed63132d0,2025-02-11T16:27:31.023000 CVE-2024-53949,0,0,a7aea508a7c1f88d7575b0e16e3be5a77b1cd694ac35d309754b1488d9891f8c,2025-02-12T10:15:13.790000 @@ -274097,8 +274099,8 @@ CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 CVE-2024-54091,0,0,c74ca88b9c9f1f179fcfa192e0d2590f76bd392ddd6ead18a993fbadb250f86b,2024-12-12T14:15:22.953000 CVE-2024-54093,0,0,90cfd514a71d6aff56ccf462952cf23d9786fa3e801cbeadbbd1eb38e63e92b6,2024-12-10T14:30:47.350000 -CVE-2024-54094,0,0,85467ac21ce61371b0d7cb064bc1de793a4b2649b66777d404a2f96e8aab4656,2024-12-10T14:30:47.507000 -CVE-2024-54095,0,0,ccf0d6b8dbb7543420ef714aada92591613700b99d268f7e42b03346d5c24f08,2024-12-10T14:30:47.660000 +CVE-2024-54094,0,1,7e40ab3942715aa9bec4bb94fbfea6c6abd1a5baf96aa364a533672091025692,2025-03-04T18:19:12.327000 +CVE-2024-54095,0,1,0027211cfec45475cc40eeaeef135f682a04eedc757a2d4b406c768677ab825f,2025-03-04T18:19:12.327000 CVE-2024-54096,0,0,107e3e1e9fce43db7d66d8992c64f13742c7ff6e28d2e11adc856e52e2f1a3e9,2025-01-10T18:36:31.427000 CVE-2024-54097,0,0,b4c6de44e728b11c175226d8c406b1afd8e09dbc3d2026f314223e1d73a6dedc,2025-01-10T18:34:56.863000 CVE-2024-54098,0,0,fcf0a7b4b42a408ef14e2cdd83601e83ad8a047dacc93336f07058716f90e9d2,2025-01-10T18:32:00.453000 @@ -274152,8 +274154,8 @@ CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000 CVE-2024-54142,0,0,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000 CVE-2024-54143,0,0,8db75f45f675c8e0c94c9f789265e5f7040d3230f01c944775ae37d21a402ba6,2024-12-06T17:15:12.687000 -CVE-2024-54145,0,1,0086ede8d33f4c38cf42c46cc6e8e377784b371f7ac491d57a1e89761d1ee349,2025-03-04T14:45:17.807000 -CVE-2024-54146,0,1,ec63a6eaa7f42f80e3e3b10f3681a77c87540f5ea9640756664e7e50eb919830,2025-03-04T14:45:17.807000 +CVE-2024-54145,0,0,0086ede8d33f4c38cf42c46cc6e8e377784b371f7ac491d57a1e89761d1ee349,2025-03-04T14:45:17.807000 +CVE-2024-54146,0,0,ec63a6eaa7f42f80e3e3b10f3681a77c87540f5ea9640756664e7e50eb919830,2025-03-04T14:45:17.807000 CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000 CVE-2024-54148,0,0,1bfb17d4d936ce6a940dfc88f1d38025c4aaaa0bf878ea9058eb2876c8005731,2024-12-24T02:15:06.410000 CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000 @@ -274682,7 +274684,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-55062,0,0,3123150d46b761ada11b83c374a54e9242d8e139ac058a4ffae965af3a17f30c,2025-02-11T22:15:28.900000 -CVE-2024-55064,0,0,1671e0a354fa65ebfbe00aa09a9f0c002da4c524b01b0d8035c63de0f52d328d,2025-03-03T22:15:36.700000 +CVE-2024-55064,0,1,b0b34f0c868ee7b5cfd21e0c4e754219f5b5a28eed1f4b98f4ec5b14166073a2,2025-03-04T17:15:13.390000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-55074,0,0,1bb56c00ce7b87cd6028403786c83c9593cbcc8954e072dc461304855924628a,2025-01-06T21:15:14.803000 CVE-2024-55075,0,0,4928182cae41a13ce4b894fa02b7ed8267f67e5fe7ff39725507907b9004a7ab,2025-01-06T21:15:14.970000 @@ -274719,8 +274721,8 @@ CVE-2024-55193,0,0,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000 CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030b31,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 -CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 -CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 +CVE-2024-5520,0,1,e6d97b1dda441d8a0c302258b741a51060a2df1d0eb8bad8a068e05ca70f1628,2025-03-04T17:00:22.900000 +CVE-2024-5521,0,1,ebd1c0326746de4cb989a5e4cd7a8949653ccfaea201d5d184ffb9658b250015,2025-03-04T17:00:22.900000 CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000 CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000 @@ -274807,7 +274809,7 @@ CVE-2024-55517,0,0,3c8c33e9f0396a101831f3e5ff6c0b4973f6bbd431af52c58783b2edaa611 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 CVE-2024-55529,0,0,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503dd18,2025-01-06T20:15:39.163000 CVE-2024-5553,0,0,cbe2ddf67f45d187893926fbbdd2baf5f4f4aaeda85e24ec6fe6e5dc2690683a,2025-01-15T17:29:08.167000 -CVE-2024-55532,0,0,6019b1ad578f2bed61169992a977212f42c83f99040b7f33db42bada10e85f78,2025-03-03T18:15:29.797000 +CVE-2024-55532,0,1,ccd28e4c4b4945e7683ec8a94d7043e8fbdd4bfcc022d5a0d308010d67cc1882,2025-03-04T17:15:13.553000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 @@ -275476,7 +275478,7 @@ CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd9 CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000 CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000 CVE-2024-56622,0,0,90dd041f66ad97c8c7e4424d08636d2738bbe8a14292241e2b0155ecb704e99a,2025-01-14T15:45:40.167000 -CVE-2024-56623,0,0,0e93d745489795428a20c54b35ad52e910e61dcb2158be56884d826399a6b1a3,2025-01-08T21:41:01.397000 +CVE-2024-56623,0,1,ea73f9992508782e28e0b2a30af559c0db5714a60552117a01fc21226146582d,2025-03-04T18:15:24.360000 CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000 CVE-2024-56625,0,0,01037372e944818596a9b7f73f6b5c3b9ecad55d8f3378e4d833626252bed489,2024-12-27T15:15:22.033000 CVE-2024-56626,0,0,d4500ca38a8345814277a2086bba9b42de76652347297780d5ed6db58371e834,2025-01-16T16:18:20.643000 @@ -275762,7 +275764,7 @@ CVE-2024-57034,0,0,e52a39ecd5c7a609e90fa7ae9c35e819ec30d141102d18c5cb8dc9ebebfd4 CVE-2024-57035,0,0,8f647174886ad5489698835d701ee28c5ff6c813395545be8ae09bfd3cde425f,2025-02-28T19:16:13.133000 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 -CVE-2024-57040,0,1,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000 +CVE-2024-57040,0,0,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 CVE-2024-57045,0,0,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000 CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000 @@ -275837,7 +275839,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b CVE-2024-57237,0,0,fef0cbf59beef0bbb0800c060e5efd45e878e97a99de79a05a81bee9e443498e,2025-03-03T18:15:29.913000 CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 -CVE-2024-57240,0,0,72eff3f38096ef7320505323de413dfbe06e6971e701418633b96c9d22b36f06,2025-03-03T17:15:13.320000 +CVE-2024-57240,0,1,b506afd7d581a576838367bcc2e6abefbe6469e1a537c3ea366ab2b2c2362da5,2025-03-04T17:15:13.733000 CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000 CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000 CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000 @@ -276302,7 +276304,7 @@ CVE-2024-58020,0,0,c6dd37c1ce19d533a907eee523d03dd86887dec00b10f065b1660bbe7fc71 CVE-2024-58021,0,0,228350909b9f49e0925cb16d6fff6890df30f86ad805ed469980f5769f553c12,2025-02-27T03:15:13.110000 CVE-2024-58022,0,0,c59187fdd2099f2dec586001ea4c6972a210587752ee11248ba233a172fffa01,2025-02-27T20:16:02.073000 CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974d3,2024-10-04T13:50:43.727000 -CVE-2024-58034,0,0,793347351cd00b08f1b0b7752ce11e6ac3ff6b4b28335b53d214998e6898e7fb,2025-02-27T20:16:02.160000 +CVE-2024-58034,0,1,a58d20858f51668ab0e30ae7e40910f616321f1f89fdedf57b44aac4e3186045,2025-03-04T18:15:24.617000 CVE-2024-5804,0,0,2f00fd3e9947e9e26596c3d44370745abf63c8732a08c44c5ab0acfd9a8ea957,2024-11-21T09:48:21.677000 CVE-2024-58042,0,0,502331969ce94ccf5daf60fc8f541250357b1f650adae06328d2ee8a405cb343,2025-02-27T20:16:02.257000 CVE-2024-58043,0,0,6c9910f151efabab9fe50138adf0da55634410981bc17ef17a1c0db9e0e3064e,2025-03-04T08:15:34.480000 @@ -277860,7 +277862,7 @@ CVE-2024-7502,0,0,3d48b5160a60b0b52457d33ace8b486d4c8d94c5b53a8f8f0a6965a353bdbd CVE-2024-7503,0,0,6f91670b5df8fc2cf24cc575e1a4ec777c4fffe91c690d5f9f8e06999ae94e47,2025-02-07T16:06:13.577000 CVE-2024-7505,0,0,bfa4d15952f802402ee91b24aef891e71e2dbce621fc81f9b13788a770a39fa4,2024-09-11T19:53:44.640000 CVE-2024-7506,0,0,558c8ee2b1a5738c55ad1b92337d7240683a7081d00a086d02e166b3b90d9f87,2024-09-11T20:02:56.717000 -CVE-2024-7507,0,0,67d331d47f0314ac8949a3f0eddead2ab2a85c029368501bfaaaaaf37932825c,2024-08-15T13:01:10.150000 +CVE-2024-7507,0,1,81f2ab319d251c54893f817485f4dff326a8b55e82c579d6f103ddc3ceefd79f,2025-03-04T17:11:31.917000 CVE-2024-7508,0,0,a7d4299addf15fc74e07e60c708d376762d878236db909cc3b16cc673da8cb3e,2024-12-04T17:36:12.870000 CVE-2024-7509,0,0,1d20a01ba25ba429690bc4a3d75ed6316644cb9406cd3eb90a5bb7d5e7873d40,2024-12-03T21:54:37.137000 CVE-2024-7510,0,0,45504ac03358aed12f1633b52cd834d55efea8194dbc4d2192df23d30460f213,2024-12-03T21:36:54.357000 @@ -277868,7 +277870,7 @@ CVE-2024-7511,0,0,9bf089a5dbb9957d15202d89b865f1149744d0ed4ad1c450b9f46cf07d7d96 CVE-2024-7512,0,0,d790e9e3e8f4cde5793df1d40ea7b84b52679d2b090f27b08de9889914cd1ec0,2025-01-17T21:15:10.317000 CVE-2024-7513,0,0,fac0f807969ae4ea31148c3e6e628d75c5eca6878ee9c0031b9c31b6cb85b317,2025-01-31T15:25:24.030000 CVE-2024-7514,0,0,14ce9dcc3ffed0373a6deaa5aa3e357b4b0f7014d133d7f13dac237fa2f5873a,2024-10-15T12:58:51.050000 -CVE-2024-7515,0,0,5a6f7ad5d2b5175267bb68477583779b07dd1f014ec91fa19d3e19b6a891ce37,2024-08-15T13:01:10.150000 +CVE-2024-7515,0,1,e76e67859bfb4c0063545e44431afc079c70ecd09fcd857da2e7499eb31de63e,2025-03-04T17:11:31.917000 CVE-2024-7516,0,0,968eeecc551b8e7065773d2fb6d2dc57f2c455111168dc883e35278b4cd82060,2025-02-04T15:25:22.437000 CVE-2024-7517,0,0,5c7ee47dc70a2a3b0cb67a6c2c3a60c71bc4d4185563fe3d363437c501df9008,2024-11-21T13:57:24.187000 CVE-2024-7518,0,0,3b0dcafb77453d8cc2fdabac4c13d17bf38d6dfd279e8d4067ed746793e3f86e,2024-10-29T20:35:43.097000 @@ -279266,7 +279268,7 @@ CVE-2024-9145,0,0,97a312c1c66b488d02b8e5ae15f80967927307525d089b410f672665e8c386 CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000 CVE-2024-9147,0,0,0093d2743a16315fb2395e20e4313d0098c0f4e5a32333383ccd3780d7d6e4a8,2024-11-06T15:53:59.983000 CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000 -CVE-2024-9149,1,1,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000 +CVE-2024-9149,0,0,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000 CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c3126535,2025-02-21T12:15:30.463000 CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000 CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000 @@ -280100,11 +280102,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080 CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000 CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 -CVE-2025-0285,0,1,8bef17d3f85cba40ca0c2d7eb2962a0b4098c9c2a2ea291e3924377e2de2a5c0,2025-03-04T16:15:36.020000 -CVE-2025-0286,0,1,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000 +CVE-2025-0285,0,0,8bef17d3f85cba40ca0c2d7eb2962a0b4098c9c2a2ea291e3924377e2de2a5c0,2025-03-04T16:15:36.020000 +CVE-2025-0286,0,0,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000 CVE-2025-0287,0,0,99b2806e0b914384724b92a9eeda355dfeaeb1f153364014a4accbba6bc06de4,2025-03-03T20:15:44.100000 -CVE-2025-0288,0,1,5535019b67c8186a5a2a2f66909842decaee326bbc7e615060a66e0dcdf41d37,2025-03-04T16:15:36.317000 -CVE-2025-0289,0,1,bde669fd45186b8a31a5a0375129ab340a8c051d355c15c4807dca5af7b187de,2025-03-04T16:15:36.467000 +CVE-2025-0288,0,0,5535019b67c8186a5a2a2f66909842decaee326bbc7e615060a66e0dcdf41d37,2025-03-04T16:15:36.317000 +CVE-2025-0289,0,0,bde669fd45186b8a31a5a0375129ab340a8c051d355c15c4807dca5af7b187de,2025-03-04T16:15:36.467000 CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 @@ -280463,7 +280465,7 @@ CVE-2025-0825,0,0,a0334191040ddd84cf58e374702797f73c6f21c21dcc064c3fd05efc814927 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000 -CVE-2025-0840,0,1,582d68c7d01609df8f75b41175c198a68760a9d4af98efb8dd178ec4d57bbaae,2025-03-04T14:53:43.637000 +CVE-2025-0840,0,0,582d68c7d01609df8f75b41175c198a68760a9d4af98efb8dd178ec4d57bbaae,2025-03-04T14:53:43.637000 CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000 CVE-2025-0842,0,0,880989b2076d537c6bb018739fce330a49d894aec3d353193ef18e6fe884c71a,2025-02-25T19:45:04.700000 CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f69,2025-02-04T17:16:08.127000 @@ -280596,8 +280598,8 @@ CVE-2025-1063,0,0,40513da056718f32cf6f0777dfe5f117d58050b50520fd8bc2e9f0fd640e4e CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000 CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000 CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000 -CVE-2025-1067,0,0,4fd1ad8e08058df6b54657f1db3d2c5da5afd039918b71254cfe1c1256b49876,2025-02-26T00:15:11.040000 -CVE-2025-1068,0,0,e59610abe8f84e6af17c0fb801744521182a9183bd0c0ff5105021e9539f36db,2025-02-26T00:15:11.140000 +CVE-2025-1067,0,1,bdf45e75c39b2893cf95fe87aa3320b325c0a5716fb284d6122b24f713747b41,2025-03-04T17:22:39.620000 +CVE-2025-1068,0,1,879e3da1d6816f4284ab831dd12f980ce58a715d75fd579b54072a6546ff467e,2025-03-04T17:22:39.620000 CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000 CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000 CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000 @@ -280622,7 +280624,7 @@ CVE-2025-1102,0,0,0a58fac809cb082841f9122cd183bbcaae0c3230347602227d2b0c09eb06da CVE-2025-1103,0,0,0e526fd4466d75abc344bf0bd683cde20cd72e5c520f7b078f91058dbcc62271,2025-02-07T16:15:39.973000 CVE-2025-1104,0,0,cd698b7fb9abc7a0e8cf365342427529ce4ee897116a726790abd164b5d7a4e8,2025-02-07T17:15:31.477000 CVE-2025-1105,0,0,3bacdf77291dd429d5a36d299846ec2970e0b6d32e073b87ebe633608b8b63d8,2025-02-07T18:15:28.433000 -CVE-2025-1106,0,1,524d2874116becb8ba796cd93b1a3dfabff51569f8ccd989ff4bae924e49e1aa,2025-03-04T14:53:43.637000 +CVE-2025-1106,0,0,524d2874116becb8ba796cd93b1a3dfabff51569f8ccd989ff4bae924e49e1aa,2025-03-04T14:53:43.637000 CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000 @@ -280643,9 +280645,9 @@ CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000 CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000 CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000 -CVE-2025-1147,0,1,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000 +CVE-2025-1147,0,0,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000 CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e57c,2025-02-10T14:15:29.927000 -CVE-2025-1149,0,1,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000 +CVE-2025-1149,0,0,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000 CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000 CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000 CVE-2025-1152,0,0,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000 @@ -280795,8 +280797,8 @@ CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3d CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000 CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 -CVE-2025-1424,1,1,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000 -CVE-2025-1425,1,1,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000 +CVE-2025-1424,0,0,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000 +CVE-2025-1425,0,0,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000 CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000 CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 @@ -280995,7 +280997,7 @@ CVE-2025-1872,0,0,37d85e8c5e628c1acd5202959187915e2c659fa3bf0379a3a04d86d535bc53 CVE-2025-1873,0,0,e1c282e5ad730be363eaf77efd9ada11d8c28125c103f5c76eae6f3dc74ed906,2025-03-03T13:15:12.547000 CVE-2025-1874,0,0,aaac5f5bbefa513f1f275c65a81e3107f76733903a225b9b994a8887fc4365fa,2025-03-03T13:15:12.693000 CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327f8,2025-03-03T13:15:12.837000 -CVE-2025-1876,0,0,5ab8224545773fa9f93a39ef9ebb1dd5f5c34e4ebc74e7211110b0307ff1d955,2025-03-03T17:15:14.517000 +CVE-2025-1876,0,1,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000 CVE-2025-1877,0,0,4b3ca9eb38fe13d61b6a5fe1999238787def06e15c7cfb4ade6a5110ae7008d1,2025-03-03T19:15:34.180000 CVE-2025-1878,0,0,ec23e88b569005bf7d3c4526d077acc62c590ae5f6c22422ff423486f2dbc798,2025-03-03T19:15:34.387000 CVE-2025-1879,0,0,acc64ec8d5a295a37fd36d2847aa407b8c77ad841f38a076dbb5ebaf330d518d,2025-03-03T20:15:45.510000 @@ -281004,37 +281006,37 @@ CVE-2025-1881,0,0,f200a1b35fa04fb1cf756c59d318883b14b2ed22445032eb6d28b374aaf837 CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000 CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000 CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000 -CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000 -CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000 -CVE-2025-1893,0,0,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000 +CVE-2025-1891,0,1,48564a83b01094f027d40be0fc2e0faa1b03fdb1978bf68de11e33632eeefdd9,2025-03-04T17:15:14.510000 +CVE-2025-1892,0,1,2fa96864979ccd34da4a094f4e313760a12e68561a0843aec1e575c6ac276b4a,2025-03-04T17:15:15.700000 +CVE-2025-1893,0,1,9be412d2514b9be0790e5a4193b6955597746daf900e90c81d514cf9ccc312d7,2025-03-04T17:15:15.890000 CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000 CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000 CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000 CVE-2025-1899,0,0,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000 -CVE-2025-1900,0,0,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000 -CVE-2025-1901,0,0,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000 -CVE-2025-1902,0,1,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000 -CVE-2025-1903,0,1,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612c4,2025-03-04T16:15:37.577000 -CVE-2025-1904,0,1,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000 -CVE-2025-1905,0,1,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000 -CVE-2025-1906,0,1,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 +CVE-2025-1900,0,1,d3082e94b9592441088dc165b99a15ab6d554db678fa3c756afc71794924b0d3,2025-03-04T17:15:16.023000 +CVE-2025-1901,0,1,6a0e0b6d920b5be207e384b12f77ca4dbc6181d350853bd89c4970865324796a,2025-03-04T17:15:16.150000 +CVE-2025-1902,0,0,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000 +CVE-2025-1903,0,0,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612c4,2025-03-04T16:15:37.577000 +CVE-2025-1904,0,0,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000 +CVE-2025-1905,0,0,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000 +CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 CVE-2025-1930,0,0,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000 CVE-2025-1931,0,0,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000 -CVE-2025-1932,0,0,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000 -CVE-2025-1933,0,1,013824cf9256af099bc6347ceda0ada705eda8a2cf83be8ba6383655963c9e57,2025-03-04T16:15:37.823000 -CVE-2025-1934,0,1,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6b0,2025-03-04T16:15:37.970000 -CVE-2025-1935,0,1,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000 +CVE-2025-1932,0,1,d2161d051733b9f100d2a2a27fe52bc20a397c64742659c3e14fc43f44c83143,2025-03-04T17:15:16.327000 +CVE-2025-1933,0,0,013824cf9256af099bc6347ceda0ada705eda8a2cf83be8ba6383655963c9e57,2025-03-04T16:15:37.823000 +CVE-2025-1934,0,0,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6b0,2025-03-04T16:15:37.970000 +CVE-2025-1935,0,0,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000 CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000 CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000 CVE-2025-1938,0,0,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000 CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 -CVE-2025-1940,0,1,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 -CVE-2025-1941,0,1,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 -CVE-2025-1942,0,1,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000 -CVE-2025-1943,0,1,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000 +CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 +CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 +CVE-2025-1942,0,0,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000 +CVE-2025-1943,0,0,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 @@ -281114,15 +281116,15 @@ CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee44 CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000 CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000 CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000 -CVE-2025-20644,0,0,ca4674e609c8d43590774d83b33a9ead2d66ed4ea8d3e9136628580894824b31,2025-03-03T03:15:09.173000 -CVE-2025-20645,0,0,50c2f7a77d19c85e70131931e626054a7b3b307d4380740abc99317c0cc503c0,2025-03-03T03:15:09.293000 -CVE-2025-20646,0,0,cffc2e10e8f144699ea086242ab9f118a4a5f283ffced233e9122854e6f3cb85,2025-03-03T03:15:09.403000 +CVE-2025-20644,0,1,36fe45487698c38b084c19e27dd2a6a54d47d97b62c0a820afad7c659a338360,2025-03-04T17:15:16.493000 +CVE-2025-20645,0,1,e73b14ddd1a35f5495a8566186ab64fa8e029ae7479f97e94d9a40a7fd29751e,2025-03-04T17:15:16.650000 +CVE-2025-20646,0,1,a6481196a444de54518e6b2858a02b34acb7ed12a172ec1c376727a8e58a1116,2025-03-04T17:15:16.803000 CVE-2025-20647,0,0,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000 -CVE-2025-20648,0,0,8a5329795e49d943046cd42334c66ec6e22086a139db47fcc996c0e16d9bec63,2025-03-03T03:15:09.620000 -CVE-2025-20649,0,0,e6b321888e5587435d9fe5c887af311fd6ada0707e9e5d0aaa38016074282498,2025-03-03T03:15:09.730000 -CVE-2025-20650,0,0,d87d253c52d390a1c1085865131f5ccd369068e01b98708e99f6223902cbbf92,2025-03-03T03:15:09.840000 +CVE-2025-20648,0,1,c46df21f1209c3ff238046d1ba22eabca91fd50b76bec446eef99f2da50f6b27,2025-03-04T17:15:16.960000 +CVE-2025-20649,0,1,ad4f0f122ba16e08327b5ecac761a81e21676479957237b3040e3e5a614e3454,2025-03-04T17:15:17.130000 +CVE-2025-20650,0,1,4839c3a5cbb4aeb9330b5312101e579111320a345dc24a6ab22be3803767178c,2025-03-04T17:15:17.287000 CVE-2025-20651,0,0,d0b2f57cefd6b14fe4ec9b006d4611fde15e3d9c3f09f4bb055081eee93fabc8,2025-03-03T19:15:34.823000 -CVE-2025-20652,0,0,3253055a437a7e7167e30e28345b7382edb1b4af82598b45ccb73b9362c6f828,2025-03-03T03:15:10.060000 +CVE-2025-20652,0,1,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458755,2025-03-04T17:15:17.497000 CVE-2025-20653,0,0,b2968adfcae86c06be703d17e416c9128a6d8c15cde3e34e7292e056ebacb491,2025-03-03T03:15:10.170000 CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 @@ -281151,7 +281153,7 @@ CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8 CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000 CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 -CVE-2025-21084,0,0,a6ccac491e8fd860362cb1b473826781c3d964715a65af957853ceb55ad630ba,2025-03-04T04:15:13.537000 +CVE-2025-21084,0,1,ace7c6554080c25439589c0a6a78bc459d9093293af90dc6240cc40f99cc164e,2025-03-04T17:41:14.237000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 CVE-2025-21089,0,0,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000 @@ -281201,7 +281203,7 @@ CVE-2025-21176,0,0,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd89 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 CVE-2025-21178,0,0,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000 CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000 -CVE-2025-21181,0,1,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000 +CVE-2025-21181,0,0,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000 CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000 CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000 CVE-2025-21184,0,0,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000 @@ -281401,7 +281403,7 @@ CVE-2025-21394,0,0,4ccc160d26f412d0660db2820673933d53f9e960ede3214b61aa7e3d64874 CVE-2025-21395,0,0,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 -CVE-2025-21399,0,1,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000 +CVE-2025-21399,0,0,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000 CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 CVE-2025-21401,0,0,e4d9e7c879800da1629474ad618445ce941bd3b909c5b2d4a6d10765a7fe87ae,2025-02-18T17:15:20.057000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 @@ -281715,8 +281717,8 @@ CVE-2025-21807,0,0,839061c416ed53205346020cb397a0da118a6b3431eca5e326eaa2d635936 CVE-2025-21808,0,0,84bce3df420f8d3db785caf233d71bd40ee3985bd8337dd2a9b820e6bd0a408e,2025-02-27T20:16:03.410000 CVE-2025-21809,0,0,f644127e42d3636b36c81e6c30dccdadcda85ab653c3bf8d10540ba5b3f11e26,2025-02-27T20:16:03.497000 CVE-2025-21810,0,0,a6c30e94287c9c8d86b20b52c523e8b0de4fba5b3ecf6bbcb1e02bf3205e74bd,2025-02-27T20:16:03.587000 -CVE-2025-21811,0,0,310669523ab8682fba69d2b529bba7fc72bc37445a962e0b0bafed18ff13a5a5,2025-02-27T20:16:03.680000 -CVE-2025-21812,0,0,123e2509cf0dca7ac4b226346a9496027a283f4defe6842fc3678397d28c8877,2025-02-27T20:16:03.783000 +CVE-2025-21811,0,1,f4cf837d733fe9c7f89ff20c50a9b1b21bfae5f9fa68f7560bb7735d2ba8c602,2025-03-04T18:15:24.840000 +CVE-2025-21812,0,1,7ab1e2667db13e9301bf6dc8371a94bc370eac4d101187c6481cc0bd898c0a20,2025-03-04T18:15:25.100000 CVE-2025-21813,0,0,796169d7100b9f68cc3cae340072c0f90bd1f5da53f6ec3d5de4f6f96ffe2fff,2025-02-27T20:16:03.883000 CVE-2025-21814,0,0,d61e6a6604289a43928f9985281c7eaadc09d460fef0080c1f10b34fdf9b65b2,2025-02-27T20:16:03.973000 CVE-2025-21815,0,0,505081b931ce8b8c7648642e1759e5d2b9d854ed396415c4f32376b2124b935f,2025-02-27T20:16:04.063000 @@ -281768,9 +281770,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000 CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000 -CVE-2025-22224,0,1,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000 -CVE-2025-22225,0,1,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000 -CVE-2025-22226,0,1,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000 +CVE-2025-22224,0,0,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000 +CVE-2025-22225,0,0,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000 +CVE-2025-22226,0,0,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -281873,7 +281875,7 @@ CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6a CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000 CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000 -CVE-2025-22402,0,1,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000 +CVE-2025-22402,0,0,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000 CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 @@ -281982,7 +281984,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02 CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 -CVE-2025-22604,0,1,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000 +CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000 CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000 CVE-2025-22607,0,0,7c0a771fa15c2fffda62d633c9927cd84470e8d10f639a2980e7fc8bdf835ab5,2025-01-24T16:15:38.470000 @@ -282151,10 +282153,10 @@ CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b5 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 CVE-2025-22835,0,0,65f8f025b66dc12096c15d5621dd955024f35c23b59c4c3cde6816f0a58a7344,2025-03-04T04:15:14.250000 -CVE-2025-22837,0,0,5bcf94d71de1560c279c447dc9eb1b776336014724e04358a3f277e340414c8c,2025-03-04T04:15:14.387000 -CVE-2025-22841,0,0,072ba533aa369b15076e8797aefadd90cb80a40f29b8c8d07a2570aef9cd7dc4,2025-03-04T04:15:14.530000 +CVE-2025-22837,0,1,e57642ce15dc85ed16a5b7cbd6696ad4126ef4965787c2ebed6a51995632507a,2025-03-04T17:12:06.513000 +CVE-2025-22841,0,1,615d4dc7c3c3366e6714052cabf0106fd722824d53f6174e31c8e2ef78bc8959,2025-03-04T17:12:06.513000 CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31 -CVE-2025-22847,0,0,ef613b7f7ebb09f8e1ade69ae655ad00540703cacc9e91ad810215178c207167,2025-03-04T04:15:14.663000 +CVE-2025-22847,0,1,2381a8fdabd9e5f9ab5087c91d81dca24291b4fc388ea1e391e50b3cdc3703d7,2025-03-04T17:12:06.513000 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 @@ -282167,7 +282169,7 @@ CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03 CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000 CVE-2025-22896,0,0,9d75a19ade9d91162e9a0c4a13a263140173b5a69917e95ab6dc8bbc94c9913f,2025-02-13T22:15:11.737000 -CVE-2025-22897,0,0,f517f7dffa30cf34d1b81f125c504122235d16d524cc2ae99f3398e0f171cc87,2025-03-04T04:15:14.807000 +CVE-2025-22897,0,1,a295222b6163a7e71540804650907cffe2d3c82432401321f3950139acc1d17a,2025-03-04T17:12:06.513000 CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000 CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000 CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000 @@ -282302,7 +282304,7 @@ CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83 CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000 CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000 CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000 -CVE-2025-23208,0,1,18e8dd4156ff7a971fcd6f122778478e5486080caeaf8f18c2797a06dc02b4cb,2025-03-04T14:45:17.807000 +CVE-2025-23208,0,0,18e8dd4156ff7a971fcd6f122778478e5486080caeaf8f18c2797a06dc02b4cb,2025-03-04T14:45:17.807000 CVE-2025-23209,0,0,5039cc636732004b36d1abe67ffc1f35372cacab530b3970be9516a2d86f22df,2025-02-21T14:48:55.367000 CVE-2025-23210,0,0,65bcfc40caedf4e3c9e8b75bd933193b1248e3166d8ac42679477e8b6066d8bd,2025-02-03T22:15:28.187000 CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6770,2025-01-28T17:15:26.160000 @@ -282319,32 +282321,32 @@ CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 -CVE-2025-23234,0,0,c99890ea5803634d3b44ab04d07f89c51e4ede9c03d8a36461768b37a382390a,2025-03-04T04:15:14.953000 +CVE-2025-23234,0,1,441581b32d61def6dc5b91d1bd69f15e8f9e5be2090cbd6276efe420a180eab0,2025-03-04T17:12:06.513000 CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23239,0,0,73761053f1cf486225f31cfbe2c5d7282e449e2379e63bc42bc6b88358fef062,2025-02-05T18:15:31.373000 -CVE-2025-23240,0,0,e955cbe93738c965e335514d4f82c583433490aee69fdbf7b523e5c1a0c095ad,2025-03-04T04:15:15.097000 +CVE-2025-23240,0,1,f959b4feefe49b9ec7c7051fe72c68f17ca44d34dc9b7b29b0371d3261c83518,2025-03-04T17:12:06.513000 CVE-2025-23359,0,0,078a2b254b9542e7cfbdc0b2539045b6c597acb96680d65380627cec160e1602,2025-02-12T01:15:09.230000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 -CVE-2025-23368,1,1,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000 +CVE-2025-23368,0,0,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000 CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442a91,2025-02-11T11:15:16.420000 CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000 -CVE-2025-23409,0,0,791c1b5e3844624d112a68844f0f5da6d88602db9084bc743d9422721a2c22e6,2025-03-04T04:15:15.240000 +CVE-2025-23409,0,1,06262ad791ce570937296bcb697070013ba33b5198b3c057b85c061f90b04a2b,2025-03-04T17:12:06.513000 CVE-2025-23411,0,0,2149399d3d8cce275d78a69bd832e8585ca8be81bc1e889fab80ae4194b4819b,2025-02-13T22:15:11.913000 CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000 CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000 -CVE-2025-23414,0,0,598762937910804a093c0bf5df13b9d5781a045eafc5b25828b98a5f86372da1,2025-03-04T04:15:15.377000 +CVE-2025-23414,0,1,2c9de769450c672cb0ed8621be68efc7fb4031b86902dc24212f40994c2669ef,2025-03-04T17:12:06.513000 CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711bd88,2025-02-05T18:15:32.573000 -CVE-2025-23418,0,0,9cc8343191dd3c890a4f9a16d8794def53350e53f4801e87e832763786a05569,2025-03-04T04:15:15.523000 +CVE-2025-23418,0,1,b560b331a0d6c1d64f53a311d14d0150022927a9bccc490bdea6a032ad9aa775,2025-03-04T17:12:06.513000 CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000 -CVE-2025-23420,0,0,24aa341ef76549f447dd7cf59a7ef0d5380fe732c6f6d07339c148187a33cdb3,2025-03-04T04:15:15.657000 +CVE-2025-23420,0,1,e40880a9b24585d5dfdcb427a281a44babdfcb41db4c12310ab309bdd9fe6cba,2025-03-04T17:12:06.513000 CVE-2025-23421,0,0,00e828297d8c47e57ba7a8d1a3f41d7d51541a2cde4acbd6d1a3d704f1af2297,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 @@ -282959,8 +282961,8 @@ CVE-2025-24174,0,0,95dfb379df306aeb43eb6243b1abac4c2b93f5fa4cc8ec6eac185094887da CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24200,0,0,d9c7918e8a07e18518c12bcf14fe92863d4e1d1a93377db97d110f68957cafff,2025-02-18T18:15:33.667000 -CVE-2025-24301,0,0,396e3699cc53a7536e4b7469729e85d0b112cbb5e39b71450afa9a2c7bb9d7a2,2025-03-04T04:15:15.803000 -CVE-2025-24309,0,0,54349ac3caee4d6f49000e54e0207b04497279b635a9d3d68364b4bbb6e50b75,2025-03-04T04:15:15.940000 +CVE-2025-24301,0,1,59239fef4b27eeed85b6fe6c71f37171a7e684fafcc3ed8933ce31676a0f5a14,2025-03-04T17:12:06.513000 +CVE-2025-24309,0,1,9fdc72038f56947ecf9d9d30185e97627ee6f41dea81dd9e019935de6baa9993,2025-03-04T17:12:06.513000 CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000 CVE-2025-24316,0,0,770bef4f97559304e30386e8115bd7582afb0c9db56f36e83bccb579d61f5751,2025-02-28T17:15:16.790000 CVE-2025-24318,0,0,141558a454419e2326c0c64b4fbc3e837b318d293574156c8e8685ddefe4e612,2025-02-28T17:15:16.937000 @@ -283539,14 +283541,14 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6 CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 -CVE-2025-25379,0,1,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 +CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 -CVE-2025-25428,0,1,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 +CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 -CVE-2025-25430,0,1,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 -CVE-2025-25431,0,1,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 +CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 +CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 @@ -283558,7 +283560,7 @@ CVE-2025-25472,0,0,6c6dc9c03a8c0408df3e1a9caeca7e0bfec3e9936d5584756b38960f4938d CVE-2025-25473,0,0,e8e0a8342346bf2f32dfaaee95898f0b633608ccb1cba92ce43fca3dc31e73b1,2025-02-20T22:15:30.863000 CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4113,2025-02-20T22:15:31.027000 CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000 -CVE-2025-25476,0,1,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000 +CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000 CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,12db196fdbdedfe1d57ae93bb18fa9d9c8691821fcbf897c2d62e811de8bb585,2025-02-28T23:15:11.170000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 @@ -283612,8 +283614,8 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 -CVE-2025-25759,0,1,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 -CVE-2025-25760,0,1,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 +CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 +CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 CVE-2025-25761,0,0,3db442c19fbfc76e4afa4e4eacc9350d95fd28b1bf92eb230c9d214105e6b76b,2025-02-27T15:15:41.777000 CVE-2025-25765,0,0,4771a7e87c33cb6b1bf793f3b79e4f059f64eb7778711124d0e26c1a7b4b4033,2025-03-03T20:15:46.433000 CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413b60,2025-03-03T20:15:46.600000 @@ -283657,7 +283659,7 @@ CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25916,0,0,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000 -CVE-2025-25939,0,0,5921f8c546337d3d2aa99ec4fc47d8dd0d0763044ca087538d61f7304111544b,2025-03-03T19:15:35.290000 +CVE-2025-25939,0,1,992d3a3af85a865c5e3cc230e47c5cf7bd41ddf87fd1808183c7bb3c2eac5924,2025-03-04T17:15:17.720000 CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000 CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000 @@ -283665,7 +283667,7 @@ CVE-2025-25945,0,0,a135cb8b6e7bd92832108ad425fd681184321fd3911817b0fa3751ad82620 CVE-2025-25946,0,0,dd68555679ad8b07f36b669fbde20639acf7f7115a512ba533c880a157808efa,2025-02-20T15:15:15.227000 CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c736,2025-02-20T15:15:15.530000 CVE-2025-25948,0,0,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000 -CVE-2025-25949,0,0,3cfa74ff045f781d89869a7cdbed7b20ce1334851fd89a396fe13626a2974881,2025-03-03T01:15:11.423000 +CVE-2025-25949,0,1,29482f12ffd0f2b6fd752f7c5eba6fa6abde4b17a1f82f01edef5f8dee7003ca,2025-03-04T17:15:17.890000 CVE-2025-25950,0,0,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000 CVE-2025-25951,0,0,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000 CVE-2025-25952,0,0,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000 @@ -283673,7 +283675,7 @@ CVE-2025-25953,0,0,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c7 CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000 CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000 -CVE-2025-25967,0,0,be9eee57833c17cdc733d3351ec4713b219760aa45327e02b2010c49728358f2,2025-03-03T19:15:35.400000 +CVE-2025-25967,0,1,8662c596eed740ea24b45b4d8fa4d0f68ae1a4d1dd35ac039e7586a3b87f6d25,2025-03-04T17:15:18.070000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000 CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000 @@ -283687,12 +283689,14 @@ CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127f CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922eccf1,2025-02-21T17:15:14.680000 CVE-2025-26047,0,0,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 +CVE-2025-26091,1,1,de888ac48b9f6b5458a595acd54af619dbe9af0acc8f88bc90bf02904e83c7b4,2025-03-04T17:15:18.243000 CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 +CVE-2025-26182,1,1,6a92295a726305134e0425c70d4139d9e04662ca5b2a45afb0e0f0461299a57f,2025-03-04T17:15:18.363000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 -CVE-2025-26206,0,0,e3bf4a5d909ab77454f264f5cb753904898b09af5131b78baae5028280e7761d,2025-03-03T19:15:35.507000 +CVE-2025-26206,0,1,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000 CVE-2025-26263,0,0,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000 CVE-2025-26264,0,0,3e1d4d30fa9513d426ec3a7ec9d2895da1266ed6b8213b35e226a5d2b686e5dc,2025-02-28T22:15:39.780000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 @@ -283703,7 +283707,7 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000 -CVE-2025-26320,1,1,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000 +CVE-2025-26320,0,0,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000 CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 @@ -283810,14 +283814,14 @@ CVE-2025-26586,0,0,9de798772bcf8b69e1f9d59046278061df5835cbaf2bec86432fb70a5b0e0 CVE-2025-26587,0,0,9dc6f2a7bb360069e4b8cc02514cde74f4a8d2bcaac5ee6bdad13028e58f561e,2025-03-03T14:15:55.780000 CVE-2025-26588,0,0,3d48a24eb2502fc6c90773e5ff07df46aea0a78afc7299ab4e2317fbf1b71d2c,2025-03-03T14:15:55.920000 CVE-2025-26589,0,0,944d5104a3821c549e39415555e5cac14ff0ae961ea607176bbfcada777b7096,2025-03-03T14:15:56.067000 -CVE-2025-26594,0,0,f52622e90ba02322fe54e5494c4e427cc87f99b4ddf1ffa95d2c6287b6ff03d2,2025-02-25T16:15:38.227000 -CVE-2025-26595,0,0,faa3621d427daf06dcbd4c84b0455d0d377f52d455439a7d523a5b271ab6f5b9,2025-02-25T16:15:38.390000 -CVE-2025-26596,0,0,5a229b8b2590f44710dba6a8a132ba9f956796cb0a5f60f3f2e0b0397b6e33eb,2025-02-25T16:15:38.603000 -CVE-2025-26597,0,0,7a394e2f8e1d62aede8006355f2120b784e6c756c27bae3a29b816e79aeb35c2,2025-02-25T16:15:38.797000 -CVE-2025-26598,0,0,8457e776af4bff046354622f9adf46b5467240148d2e997ff4f101653fe8d17b,2025-02-25T16:15:38.977000 -CVE-2025-26599,0,0,691cbb3ca19344530752fd688ceb7f9c573e999901976efe5046637615fcae99,2025-02-25T16:15:39.163000 -CVE-2025-26600,0,0,5429b2fd00825ae17c93e3301fbb08df135b9e6247697f418cc64502475cd8a3,2025-02-25T16:15:39.350000 -CVE-2025-26601,0,0,1f51a088c5f6807c31e189aa3344e5eb2b812ad8af3f659e984ecd8b1513f1fa,2025-02-25T16:15:39.537000 +CVE-2025-26594,0,1,0d6d9befe6da920872ec22e8e208a0d81f4bd77a0af2601af6452e5457b8c1b9,2025-03-04T17:22:39.620000 +CVE-2025-26595,0,1,9c7fff58832704987ccf743960665d07f758e30383f1a9601ecd32dca83c0576,2025-03-04T17:22:39.620000 +CVE-2025-26596,0,1,cfec1b7af7b418f4d0d8101bb5388b19d5ce1506fde9b472b400bc369e32cded,2025-03-04T17:22:39.620000 +CVE-2025-26597,0,1,43933b899c1f6ff6efcb53cd6e8de7da5cdc190fa2fb15c2e199d0cba70b5cbf,2025-03-04T17:22:39.620000 +CVE-2025-26598,0,1,249e463aec360aaee57c161340cb9cb054f9c157b6d99153bab02ef4ac9745c2,2025-03-04T17:22:39.620000 +CVE-2025-26599,0,1,afd8c7753c270562848674c01847e01fe4ca6a8cb8594f3b77dee7d073efabe2,2025-03-04T17:22:39.620000 +CVE-2025-26600,0,1,b70868cb4f0d5dd570d9675f446c858543abac07cbfa946c800602da33062c75,2025-03-04T17:22:39.620000 +CVE-2025-26601,0,1,7dace7dde4cc8605a0f307f3cb720808b01e6fe329e1b2bcb193d336e541f0af,2025-03-04T17:22:39.620000 CVE-2025-26603,0,0,d7b32426c9c5b8092b0a3a00936a8b4ac681bdacea4f4d5107ef124749624d76,2025-02-18T19:15:29.387000 CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000 CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000 @@ -283875,7 +283879,7 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 -CVE-2025-26849,0,1,b13951f979e617745ee5f8ac921a867df9f510109c7775edd0473f90fdd96dd7,2025-03-04T16:15:40.360000 +CVE-2025-26849,0,0,b13951f979e617745ee5f8ac921a867df9f510109c7775edd0473f90fdd96dd7,2025-03-04T16:15:40.360000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 @@ -283969,7 +283973,7 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000 CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000 CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 -CVE-2025-27111,1,1,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000 +CVE-2025-27111,0,0,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000 CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000 CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000 CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 @@ -283984,7 +283988,10 @@ CVE-2025-27144,0,0,7b7ab9cc6cc8170173ae9d52939463b9ea29a5775bc47236dbba73f17e364 CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75c2c,2025-02-25T14:15:31.567000 CVE-2025-27146,0,0,58f0af25db9d232a1eee9ca67dc8e1db80fbdacd3401b627e0e4af37e9b4cdaf,2025-02-25T20:15:38.030000 CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000 +CVE-2025-27150,1,1,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000 CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000 +CVE-2025-27155,1,1,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000 +CVE-2025-27156,1,1,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000 CVE-2025-27157,0,0,d1dc9b4dc7f892f66b40d5a59eaf35f745dad910762a74c52136c3d66f64265b,2025-02-27T17:15:16.867000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,295fec405d19b897ec81e7396e3eb1cc1e33ecd15786ce88f5ec798acd7a75e1,2025-03-04T00:15:31.550000 @@ -284056,29 +284063,32 @@ CVE-2025-27370,0,0,cb1da8898ee5a31817ad922078eead78a820d1050fd07cee6c6cb22d7a73a CVE-2025-27371,0,0,faee6e4ab8c9b25a7425e6e20b19acd9e485a3c93dbbf835a72dad70fe8350fe,2025-03-03T19:15:35.843000 CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000 CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000 +CVE-2025-27401,1,1,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000 +CVE-2025-27402,1,1,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000 CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000 CVE-2025-27410,0,0,542213b5e82bd30fa9408540bb6d09bd94cf07a4e4b5ab21e3b6313192903c64,2025-02-28T21:15:27.677000 CVE-2025-27413,0,0,3c683ca647c635eed6050d34ef335b08e4f82a229181584d65143149a8f8e1dd,2025-02-28T21:15:27.820000 CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000 CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000 -CVE-2025-27417,0,0,5c589d1a1bba9dd4dfbe6007cf98586df4e847d94a8f2b250e5956247447fa54,2025-03-03T16:15:43.820000 -CVE-2025-27418,0,0,95d40949cc41880d5e8884f774a33f7f897b5b967ed3adfce78866d647a990ee,2025-03-03T16:15:43.960000 +CVE-2025-27417,0,1,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000 +CVE-2025-27418,0,1,41f3eb54bc8960a9271d089bac74e54194694ac4af5959c0bca02edfdd330c78,2025-03-04T17:15:19.967000 CVE-2025-27419,0,0,55e62c002b978adac6247e565a20ef9edbd5cdd15575177be89a6632879d00e7,2025-03-03T16:15:44.090000 -CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef822,2025-03-03T16:15:44.223000 +CVE-2025-27420,0,1,b3c5167d23216466badc66bb683feb7a3d63f11b0877f522ded65752258de9d9,2025-03-04T17:15:20.137000 CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000 CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000 CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000 -CVE-2025-27424,0,1,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000 -CVE-2025-27425,0,1,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000 -CVE-2025-27426,0,1,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 +CVE-2025-27424,0,0,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000 +CVE-2025-27425,0,0,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000 +CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 -CVE-2025-27499,0,0,ab06e5a6a9e6a84d5061b8c89a502ae1ba119ec86416a651117e80b7694ffcba,2025-03-03T19:15:36.027000 +CVE-2025-27499,0,1,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369f59,2025-03-04T17:15:20.250000 CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000 CVE-2025-27501,0,0,585f2e0737e182b22f02653235a04e243ed477e6e20bf1f8010304d8d76990c5,2025-03-03T19:15:36.300000 +CVE-2025-27507,1,1,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000 CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000 CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,1e17d16504251ae47acc90d9c67b6caae5e3d8109a892a4d76197d339c767b90,2025-03-03T00:15:43.210000 CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000 -CVE-2025-27584,0,0,528fd914f7c34c65eae553c4ccbee063eaa5a2dc2276b2287ac4b1a05fd56700,2025-03-03T01:15:12.157000 -CVE-2025-27585,0,0,ec13aea414938446dd43753a7aefcb7dfd82f11bab9f163de2447f190af31843,2025-03-03T01:15:12.277000 +CVE-2025-27584,0,1,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 +CVE-2025-27585,0,1,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000