From 23c063511134766a3962f142a0f1ed81e2d93b66 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 20 Mar 2025 21:03:51 +0000 Subject: [PATCH] Auto-Update: 2025-03-20T21:00:19.521694+00:00 --- CVE-2011/CVE-2011-01xx/CVE-2011-0186.json | 121 ++++------- CVE-2011/CVE-2011-01xx/CVE-2011-0187.json | 159 +++++++------- CVE-2011/CVE-2011-02xx/CVE-2011-0209.json | 123 ++++------- CVE-2011/CVE-2011-02xx/CVE-2011-0210.json | 131 ++++-------- CVE-2011/CVE-2011-02xx/CVE-2011-0211.json | 128 ++++------- CVE-2011/CVE-2011-02xx/CVE-2011-0213.json | 114 +++------- CVE-2013/CVE-2013-10xx/CVE-2013-1032.json | 71 +++--- CVE-2022/CVE-2022-46xx/CVE-2022-4656.json | 22 +- CVE-2022/CVE-2022-48xx/CVE-2022-4883.json | 24 ++- CVE-2023/CVE-2023-01xx/CVE-2023-0177.json | 22 +- CVE-2023/CVE-2023-229xx/CVE-2023-22996.json | 32 ++- CVE-2023/CVE-2023-229xx/CVE-2023-22997.json | 32 ++- CVE-2023/CVE-2023-229xx/CVE-2023-22999.json | 32 ++- CVE-2023/CVE-2023-230xx/CVE-2023-23000.json | 32 ++- CVE-2023/CVE-2023-230xx/CVE-2023-23001.json | 32 ++- CVE-2023/CVE-2023-230xx/CVE-2023-23002.json | 32 ++- CVE-2023/CVE-2023-241xx/CVE-2023-24187.json | 32 ++- CVE-2023/CVE-2023-251xx/CVE-2023-25141.json | 32 ++- CVE-2023/CVE-2023-257xx/CVE-2023-25725.json | 32 ++- CVE-2023/CVE-2023-257xx/CVE-2023-25758.json | 22 +- CVE-2023/CVE-2023-423xx/CVE-2023-42307.json | 34 ++- CVE-2023/CVE-2023-444xx/CVE-2023-44472.json | 52 ++++- CVE-2023/CVE-2023-521xx/CVE-2023-52159.json | 34 ++- CVE-2024/CVE-2024-05xx/CVE-2024-0559.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13875.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13876.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13877.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13878.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13880.json | 29 ++- CVE-2024/CVE-2024-138xx/CVE-2024-13881.json | 29 ++- CVE-2024/CVE-2024-15xx/CVE-2024-1526.json | 27 ++- CVE-2024/CVE-2024-17xx/CVE-2024-1756.json | 27 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20036.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21026.json | 14 +- CVE-2024/CVE-2024-222xx/CVE-2024-22235.json | 14 +- CVE-2024/CVE-2024-235xx/CVE-2024-23520.json | 52 ++++- CVE-2024/CVE-2024-251xx/CVE-2024-25142.json | 24 ++- CVE-2024/CVE-2024-265xx/CVE-2024-26578.json | 34 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2739.json | 27 ++- CVE-2024/CVE-2024-280xx/CVE-2024-28056.json | 14 +- CVE-2024/CVE-2024-280xx/CVE-2024-28070.json | 39 +++- CVE-2024/CVE-2024-281xx/CVE-2024-28128.json | 42 +++- CVE-2024/CVE-2024-287xx/CVE-2024-28746.json | 22 +- CVE-2024/CVE-2024-294xx/CVE-2024-29466.json | 27 ++- CVE-2024/CVE-2024-295xx/CVE-2024-29509.json | 32 ++- CVE-2024/CVE-2024-313xx/CVE-2024-31399.json | 32 ++- CVE-2024/CVE-2024-315xx/CVE-2024-31506.json | 34 ++- CVE-2024/CVE-2024-326xx/CVE-2024-32680.json | 52 ++++- CVE-2024/CVE-2024-335xx/CVE-2024-33530.json | 14 +- CVE-2024/CVE-2024-344xx/CVE-2024-34447.json | 39 +++- CVE-2024/CVE-2024-345xx/CVE-2024-34553.json | 52 ++++- CVE-2024/CVE-2024-345xx/CVE-2024-34558.json | 52 ++++- CVE-2024/CVE-2024-348xx/CVE-2024-34814.json | 62 +++++- CVE-2024/CVE-2024-35xx/CVE-2024-3594.json | 27 ++- CVE-2024/CVE-2024-362xx/CVE-2024-36264.json | 22 +- CVE-2024/CVE-2024-376xx/CVE-2024-37629.json | 32 ++- CVE-2024/CVE-2024-387xx/CVE-2024-38769.json | 47 +++- CVE-2024/CVE-2024-387xx/CVE-2024-38783.json | 47 +++- CVE-2024/CVE-2024-390xx/CVE-2024-39027.json | 32 ++- CVE-2024/CVE-2024-420xx/CVE-2024-42052.json | 12 +- CVE-2024/CVE-2024-44xx/CVE-2024-4400.json | 74 ++++++- CVE-2024/CVE-2024-465xx/CVE-2024-46596.json | 12 +- CVE-2024/CVE-2024-540xx/CVE-2024-54016.json | 31 ++- CVE-2024/CVE-2024-89xx/CVE-2024-8953.json | 14 +- CVE-2024/CVE-2024-99xx/CVE-2024-9953.json | 24 ++- CVE-2025/CVE-2025-201xx/CVE-2025-20176.json | 16 +- CVE-2025/CVE-2025-206xx/CVE-2025-20653.json | 27 ++- CVE-2025/CVE-2025-25xx/CVE-2025-2557.json | 141 ++++++++++++ CVE-2025/CVE-2025-268xx/CVE-2025-26852.json | 25 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26853.json | 25 +++ CVE-2025/CVE-2025-292xx/CVE-2025-29217.json | 29 +++ CVE-2025/CVE-2025-292xx/CVE-2025-29218.json | 25 +++ CVE-2025/CVE-2025-299xx/CVE-2025-29980.json | 111 ++++++++++ CVE-2025/CVE-2025-301xx/CVE-2025-30160.json | 90 ++++++++ README.md | 84 ++++---- _state.csv | 225 ++++++++++---------- 76 files changed, 2641 insertions(+), 825 deletions(-) create mode 100644 CVE-2025/CVE-2025-25xx/CVE-2025-2557.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26852.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26853.json create mode 100644 CVE-2025/CVE-2025-292xx/CVE-2025-29217.json create mode 100644 CVE-2025/CVE-2025-292xx/CVE-2025-29218.json create mode 100644 CVE-2025/CVE-2025-299xx/CVE-2025-29980.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30160.json diff --git a/CVE-2011/CVE-2011-01xx/CVE-2011-0186.json b/CVE-2011/CVE-2011-01xx/CVE-2011-0186.json index 90813ad84d8..4773d0cf0c0 100644 --- a/CVE-2011/CVE-2011-01xx/CVE-2011-0186.json +++ b/CVE-2011/CVE-2011-01xx/CVE-2011-0186.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0186", "sourceIdentifier": "product-security@apple.com", "published": "2011-03-23T02:00:05.440", - "lastModified": "2024-11-21T01:23:30.013", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:41:02.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,18 +22,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "baseScore": 6.8, + "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", - "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL" + "integrityImpact": "NONE", + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, - "impactScore": 6.4, + "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -49,13 +49,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -64,42 +65,26 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "8D31E3CC-42EA-4519-9077-5C43473CE7C2" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "B84663B7-2B2E-4AAF-8ED2-E7EFDCEBF304" } ] } @@ -113,43 +98,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "8D31E3CC-42EA-4519-9077-5C43473CE7C2" } ] } @@ -159,7 +110,11 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", @@ -179,7 +134,11 @@ }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", diff --git a/CVE-2011/CVE-2011-01xx/CVE-2011-0187.json b/CVE-2011/CVE-2011-01xx/CVE-2011-0187.json index f720f75c7bb..53449ea1043 100644 --- a/CVE-2011/CVE-2011-01xx/CVE-2011-0187.json +++ b/CVE-2011/CVE-2011-01xx/CVE-2011-0187.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0187", "sourceIdentifier": "product-security@apple.com", "published": "2011-03-23T02:00:05.457", - "lastModified": "2024-11-21T01:23:30.137", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:42:23.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,13 +49,14 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -64,42 +65,26 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "8D31E3CC-42EA-4519-9077-5C43473CE7C2" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "B84663B7-2B2E-4AAF-8ED2-E7EFDCEBF304" } ] } @@ -113,43 +98,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.7", + "matchCriteriaId": "8D31E3CC-42EA-4519-9077-5C43473CE7C2" } ] } @@ -159,15 +110,27 @@ "references": [ { "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", @@ -187,23 +150,43 @@ }, { "url": "http://support.apple.com/kb/HT4999", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://support.apple.com/kb/HT5002", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", @@ -223,11 +206,19 @@ }, { "url": "http://support.apple.com/kb/HT4999", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://support.apple.com/kb/HT5002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-02xx/CVE-2011-0209.json b/CVE-2011/CVE-2011-02xx/CVE-2011-0209.json index 661a07e5fa6..296b3c62396 100644 --- a/CVE-2011/CVE-2011-02xx/CVE-2011-0209.json +++ b/CVE-2011/CVE-2011-02xx/CVE-2011-0209.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0209", "sourceIdentifier": "product-security@apple.com", "published": "2011-06-24T20:55:02.497", - "lastModified": "2024-11-21T01:23:32.947", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:43:41.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,62 +49,42 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { - "vulnerable": false, + "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "BD16A092-B263-400F-BD7E-94DEB5D57EDB" } ] } @@ -118,48 +98,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE" } ] } @@ -169,7 +110,11 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", @@ -189,7 +134,11 @@ }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", diff --git a/CVE-2011/CVE-2011-02xx/CVE-2011-0210.json b/CVE-2011/CVE-2011-02xx/CVE-2011-0210.json index f4c532cd154..a0a27dc6994 100644 --- a/CVE-2011/CVE-2011-02xx/CVE-2011-0210.json +++ b/CVE-2011/CVE-2011-02xx/CVE-2011-0210.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0210", "sourceIdentifier": "product-security@apple.com", "published": "2011-06-24T20:55:02.530", - "lastModified": "2024-11-21T01:23:33.073", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:43:54.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,13 +49,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -64,47 +65,26 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "BD16A092-B263-400F-BD7E-94DEB5D57EDB" } ] } @@ -118,48 +98,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE" } ] } @@ -169,7 +110,11 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", @@ -189,11 +134,18 @@ }, { "url": "http://www.securityfocus.com/bid/48442", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", @@ -213,7 +165,10 @@ }, { "url": "http://www.securityfocus.com/bid/48442", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-02xx/CVE-2011-0211.json b/CVE-2011/CVE-2011-02xx/CVE-2011-0211.json index 0408981d2cc..b70b37cb3c0 100644 --- a/CVE-2011/CVE-2011-02xx/CVE-2011-0211.json +++ b/CVE-2011/CVE-2011-02xx/CVE-2011-0211.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0211", "sourceIdentifier": "product-security@apple.com", "published": "2011-06-24T20:55:02.560", - "lastModified": "2024-11-21T01:23:33.197", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:44:00.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,62 +49,44 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { - "vulnerable": false, + "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "A890E117-79B8-434D-92DF-2CCF73469519" } ] } @@ -118,48 +100,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3" } ] } @@ -169,12 +113,17 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", "source": "product-security@apple.com", "tags": [ + "Mailing List", "Patch", "Vendor Advisory" ] @@ -189,12 +138,17 @@ }, { "url": "http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mailing List", "Patch", "Vendor Advisory" ] diff --git a/CVE-2011/CVE-2011-02xx/CVE-2011-0213.json b/CVE-2011/CVE-2011-02xx/CVE-2011-0213.json index 656f994b237..c4c13d98557 100644 --- a/CVE-2011/CVE-2011-02xx/CVE-2011-0213.json +++ b/CVE-2011/CVE-2011-02xx/CVE-2011-0213.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0213", "sourceIdentifier": "product-security@apple.com", "published": "2011-06-24T20:55:02.623", - "lastModified": "2024-11-21T01:23:33.450", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:44:10.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,13 +49,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -63,48 +64,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EE08FAE-0862-4C36-95BC-878B04CBF397" + "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "8AFCF47D-E5F5-487A-839B-E23159071140" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1E715DFC-ADB8-43D0-9941-76BB0BE7BCF5" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "A890E117-79B8-434D-92DF-2CCF73469519" } ] } @@ -118,48 +100,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EE08FAE-0862-4C36-95BC-878B04CBF397" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8CE84A25-CEFB-4165-9498-2E4BF60E2C0E" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "C49EABED-46D6-4AFC-A440-15B6A44D81E3" } ] } diff --git a/CVE-2013/CVE-2013-10xx/CVE-2013-1032.json b/CVE-2013/CVE-2013-10xx/CVE-2013-1032.json index 96bb480f239..7e7447ef96a 100644 --- a/CVE-2013/CVE-2013-10xx/CVE-2013-1032.json +++ b/CVE-2013/CVE-2013-10xx/CVE-2013-1032.json @@ -2,8 +2,8 @@ "id": "CVE-2013-1032", "sourceIdentifier": "product-security@apple.com", "published": "2013-09-16T13:02:32.940", - "lastModified": "2024-11-21T01:48:46.740", - "vulnStatus": "Modified", + "lastModified": "2025-03-20T19:40:50.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,13 +49,14 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -65,32 +66,34 @@ "vulnerable": true, "criteria": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA5969D4-3D98-490E-89B6-FF7765E78C40" - }, + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.8.5", + "matchCriteriaId": "BD77C581-351E-4410-A375-35D41855C2B8" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "versionEndIncluding": "10.8.4", - "matchCriteriaId": "8A3DFC62-D444-4760-955C-54DD63FF1635" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B2082D62-3821-4DBA-8690-67489F44C38D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8F0DB1BC-DC16-423E-B0C7-8E9C996A50B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E59315BA-B9F1-46A5-86E7-8BE2ED97BA4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "55841123-F78F-42E0-8D40-C688C4B4D29C" + "versionEndExcluding": "10.8.5", + "matchCriteriaId": "BD77C581-351E-4410-A375-35D41855C2B8" } ] } @@ -102,6 +105,7 @@ "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -109,17 +113,23 @@ "url": "http://support.apple.com/kb/HT5880", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, { "url": "http://support.apple.com/kb/HT6151", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -127,12 +137,17 @@ "url": "http://support.apple.com/kb/HT5880", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, { "url": "http://support.apple.com/kb/HT6151", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4656.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4656.json index a2ae8f9a986..9dad8a4ffba 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4656.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4656.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4656", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-13T15:15:18.590", - "lastModified": "2024-11-21T07:35:40.957", + "lastModified": "2025-03-20T19:15:17.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json index 761b8303e02..158b1fe9e1b 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4883", "sourceIdentifier": "secalert@redhat.com", "published": "2023-02-07T19:15:09.223", - "lastModified": "2024-11-21T07:36:08.230", + "lastModified": "2025-03-20T20:15:26.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0177.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0177.json index b3023ad30b4..304f93902dd 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0177.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0177.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0177", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-13T15:15:21.093", - "lastModified": "2024-11-21T07:36:41.500", + "lastModified": "2025-03-20T20:15:27.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22996.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22996.json index 9598bd9ce6f..779d166087f 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22996.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22996.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22996", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T21:15:12.057", - "lastModified": "2024-11-21T07:45:45.700", + "lastModified": "2025-03-20T20:15:28.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-772" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22997.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22997.json index d7ad0f229f0..d3c554f1f8e 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22997.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22997.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22997", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T21:15:12.117", - "lastModified": "2024-11-21T07:45:45.840", + "lastModified": "2025-03-20T20:15:28.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22999.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22999.json index f389c86b027..0f1ea5351ae 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22999.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22999.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22999", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T21:15:12.240", - "lastModified": "2024-11-21T07:45:46.130", + "lastModified": "2025-03-20T20:15:28.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23000.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23000.json index 14329e52454..8a93d4d3c34 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23000.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23000.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23000", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T19:15:25.967", - "lastModified": "2024-11-21T07:45:46.280", + "lastModified": "2025-03-20T20:15:28.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23001.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23001.json index 748848c5a5a..efb8395e36e 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23001.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23001.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23001", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T20:15:13.270", - "lastModified": "2024-11-21T07:45:46.430", + "lastModified": "2025-03-20T20:15:28.923", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23002.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23002.json index a9b56bfbd15..332a2e5000f 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23002.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23002.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23002", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T20:15:13.813", - "lastModified": "2024-11-21T07:45:46.567", + "lastModified": "2025-03-20T19:15:18.923", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24187.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24187.json index 4a03905d5df..1da6d6a7ead 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24187.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24187.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24187", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-14T02:15:10.907", - "lastModified": "2024-11-21T07:47:32.910", + "lastModified": "2025-03-20T20:15:29.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25141.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25141.json index 1a0e8a6070e..75f34df2108 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25141.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25141.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25141", "sourceIdentifier": "security@apache.org", "published": "2023-02-14T13:15:12.903", - "lastModified": "2024-11-21T07:49:11.340", + "lastModified": "2025-03-20T19:15:19.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25725.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25725.json index 60c4b3ffd42..ffb20b26830 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25725.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25725.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25725", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-14T19:15:11.530", - "lastModified": "2024-11-21T07:50:01.400", + "lastModified": "2025-03-20T20:15:29.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25758.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25758.json index d85ba9a6399..ba310f083ee 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25758.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25758.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25758", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-14T07:15:11.983", - "lastModified": "2024-11-21T07:50:07.180", + "lastModified": "2025-03-20T19:15:20.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json index 7e022dac375..ceac851c194 100644 --- a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json +++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42307", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:55.703", - "lastModified": "2025-01-22T14:54:38.390", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T20:15:29.993", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json index 7d0b858c757..5a7ff332d3b 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44472", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-03T08:15:06.850", - "lastModified": "2024-11-21T08:25:56.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T19:48:57.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:unyson:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.7.28", + "matchCriteriaId": "4B1E1C1A-EC0B-4B30-BD23-7AD9AF10A76A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-28-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-28-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52159.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52159.json index 1b4ff2b559b..b5f3e134531 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52159.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52159.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52159", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T02:15:06.053", - "lastModified": "2025-02-27T14:05:57.350", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T20:15:30.210", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0559.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0559.json index 5cd5d474b9a..8c113bf3f4a 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0559.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0559", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-11T18:15:17.743", - "lastModified": "2024-11-21T08:46:52.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-20T19:15:20.330", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "El complemento Enhanced Text Widget de WordPress anterior a 1.6.6 no valida ni escapa algunas de sus opciones de widget antes de devolverlas en atributos, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://research.cleantalk.org/cve-2024-0559/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13875.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13875.json index 2dda947f78b..24f0fed72fb 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13875.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13875", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:20.620", - "lastModified": "2025-03-20T06:15:20.620", - "vulnStatus": "Received", + "lastModified": "2025-03-20T20:15:30.417", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The WP-PManager WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/82c54fb5-f1d9-4bae-a3de-d4335809b81c/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13876.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13876.json index 5c66f318e62..10237b63a8b 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13876.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13876", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:21.910", - "lastModified": "2025-03-20T06:15:21.910", - "vulnStatus": "Received", + "lastModified": "2025-03-20T19:15:26.637", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The mEintopf WordPress plugin through 0.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d80cd18a-065f-443b-b548-d780b785d68e/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13877.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13877.json index c51d7293c4e..a91c144773b 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13877.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13877", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:22.007", - "lastModified": "2025-03-20T06:15:22.007", - "vulnStatus": "Received", + "lastModified": "2025-03-20T19:15:26.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Passbeemedia Web Push Notification WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0e8ce3cf-1598-4c5d-b119-99d5f676e619/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13878.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13878.json index a54753382b4..b52f82559ad 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13878.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13878", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:22.113", - "lastModified": "2025-03-20T06:15:22.113", - "vulnStatus": "Received", + "lastModified": "2025-03-20T20:15:30.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The SpotBot WordPress plugin through 0.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/882b2022-4ed6-4d9e-8b35-f48ea1580884/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13880.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13880.json index c04618a0765..6fd7ce457a4 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13880.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13880", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:22.213", - "lastModified": "2025-03-20T06:15:22.213", - "vulnStatus": "Received", + "lastModified": "2025-03-20T20:15:30.667", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The My Quota WordPress plugin through 1.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bee3b002-e808-4402-8bf6-4375ed7b3807/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13881.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13881.json index cb100058282..1f0d4809a33 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13881.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13881", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-20T06:15:22.317", - "lastModified": "2025-03-20T06:15:22.317", - "vulnStatus": "Received", + "lastModified": "2025-03-20T20:15:30.790", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Link My Posts WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/900fa2c6-0cac-4920-aef2-e8b94248b62e/", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json index baf9e2b049e..fb7340e4a36 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1526", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-01T05:15:07.797", - "lastModified": "2024-11-21T08:50:45.473", + "lastModified": "2025-03-20T20:15:30.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Hubbub Lite de WordPress anterior a 1.33.1 no garantiza que el usuario tenga acceso a una publicaci\u00f3n protegida con contrase\u00f1a antes de mostrar su contenido en una metaetiqueta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1756.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1756.json index 42cd53ec05e..6611d3e8cd7 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1756.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1756.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1756", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-24T05:15:47.020", - "lastModified": "2024-11-21T08:51:14.803", + "lastModified": "2025-03-20T20:15:31.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WooCommerce Customers Manager de WordPress anterior a 29.8 no tiene autorizaci\u00f3n ni CSRF en una acci\u00f3n AJAX, lo que permite a cualquier usuario autenticado, como un suscriptor, llamarlo y recuperar la lista de direcciones de correo electr\u00f3nico de los clientes junto con su identificaci\u00f3n, nombre y apellido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20036.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20036.json index 930440f1335..bd951d94eeb 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20036.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20036", "sourceIdentifier": "security@mediatek.com", "published": "2024-03-04T03:15:07.717", - "lastModified": "2024-11-21T08:51:51.970", + "lastModified": "2025-03-20T19:15:27.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/March-2024", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json index 1352a8d6282..fc31961d95b 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21026", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:18.020", - "lastModified": "2024-11-21T08:53:38.623", + "lastModified": "2025-03-20T19:15:27.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json index e8197cea368..e91d83e8730 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22235", "sourceIdentifier": "security@vmware.com", "published": "2024-02-21T05:15:08.880", - "lastModified": "2025-02-12T16:59:46.897", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T20:15:31.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json index 39c6cdebdcf..ae91bcfde92 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23520", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T12:15:49.293", - "lastModified": "2024-11-21T08:57:52.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-20T19:47:41.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:accessally:popupally:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.1", + "matchCriteriaId": "4B3420CD-A93D-4EBA-ABED-A61E393DFA2B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-0-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json index 9ce292d4886..1df92313af6 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25142", "sourceIdentifier": "security@apache.org", "published": "2024-06-14T09:15:09.103", - "lastModified": "2024-12-11T15:37:21.737", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T20:15:31.320", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json index 51a95c623c8..507b2422120 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26578", "sourceIdentifier": "security@apache.org", "published": "2024-02-22T10:15:08.503", - "lastModified": "2025-02-13T18:17:19.373", + "lastModified": "2025-03-20T20:15:31.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,43 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2739.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2739.json index 12bf791bea1..3adaf2ccd76 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2739.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2739.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2739", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:15.220", - "lastModified": "2024-11-21T09:10:24.570", + "lastModified": "2025-03-20T19:15:28.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Advanced Search de WordPress hasta la versi\u00f3n 1.1.6 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json index 7d4b6ea9f48..8fd3e0b0024 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28056", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T18:15:10.723", - "lastModified": "2024-11-21T09:05:42.933", + "lastModified": "2025-03-20T19:15:28.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-003/", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28070.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28070.json index 6b68ec7fb11..66e44b96557 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28070.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28070", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-16T06:15:14.117", - "lastModified": "2024-11-21T09:05:45.067", + "lastModified": "2025-03-20T20:15:31.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en el componente de chat heredado de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de cross-site scripting (XSS) reflejado debido a una validaci\u00f3n de entrada insuficiente. Un exploit exitoso podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial y obtener acceso no autorizado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0002", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json index 4427274e7cb..a29c3f9ea73 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28128", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T08:15:06.400", - "lastModified": "2025-03-04T18:29:34.530", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T19:15:28.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { @@ -74,8 +104,8 @@ "url": "http://fitnesse.org/FitNesseDownload", "source": "vultures@jpcert.or.jp", "tags": [ - "Release Notes", - "Product" + "Product", + "Release Notes" ] }, { @@ -103,8 +133,8 @@ "url": "http://fitnesse.org/FitNesseDownload", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", - "Product" + "Product", + "Release Notes" ] }, { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json index fa4a1a85218..e350cb7d4b8 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28746", "sourceIdentifier": "security@apache.org", "published": "2024-03-14T09:15:47.577", - "lastModified": "2025-02-13T18:17:48.710", + "lastModified": "2025-03-20T19:15:28.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json index b298527c50f..372ad11fd1d 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29466", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T21:15:45.863", - "lastModified": "2024-11-21T09:08:03.290", + "lastModified": "2025-03-20T20:15:31.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de Directory Traversal en lsgwr spring boot online exam v.0.9 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente FileTransUtil.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29509.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29509.json index 445092d4c03..14245570777 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29509.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29509.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29509", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T18:15:04.973", - "lastModified": "2024-11-21T09:08:06.510", + "lastModified": "2025-03-20T19:15:28.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31399.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31399.json index cea64cab4d0..2ee146945f0 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31399.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31399.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31399", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-11T06:15:10.490", - "lastModified": "2024-11-21T09:13:27.323", + "lastModified": "2025-03-20T19:15:29.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json index 09ec17fe3fd..278d70d258e 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31506", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T18:15:10.467", - "lastModified": "2025-02-18T17:23:42.777", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T19:15:29.227", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json index 78722aa2d48..75e1f146f8d 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32680", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:38.820", - "lastModified": "2024-11-21T09:15:27.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T20:30:34.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -55,14 +75,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5.3", + "matchCriteriaId": "CB2B0D73-70FF-4081-A797-2C9166C43BA7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-5-2-remote-code-execution-rce-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-5-2-remote-code-execution-rce-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json index 6cad41c07ca..77960fefede 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33530.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33530", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-02T16:15:08.190", - "lastModified": "2024-11-21T09:17:05.633", + "lastModified": "2025-03-20T20:15:32.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], "references": [ { "url": "https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34447.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34447.json index a17207f0e8e..c9db4548db5 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34447.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34447.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34447", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T16:15:11.460", - "lastModified": "2024-11-21T09:18:41.543", + "lastModified": "2025-03-20T20:15:32.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en las API de criptograf\u00eda Java de Bouncy Castle antes de BC 1.78. Cuando la identificaci\u00f3n de endpoint est\u00e1 habilitada en BCJSSE y se crea un socket SSL sin un nombre de host expl\u00edcito (como sucede con HttpsURLConnection), la verificaci\u00f3n del nombre de host podr\u00eda realizarse contra una direcci\u00f3n IP resuelta por DNS en algunas situaciones, lo que abre una posibilidad de envenenamiento de DNS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-297" + } + ] + } + ], "references": [ { "url": "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9034447", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json index 331bdc1f447..061c0b911d0 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34553", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T12:15:08.747", - "lastModified": "2024-11-21T09:18:55.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T19:59:34.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:select-themes:stockholm_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.2", + "matchCriteriaId": "35FF816B-4B36-405A-ABA4-6CA48968F14C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stockholm-core/wordpress-stockholm-core-plugin-2-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/stockholm-core/wordpress-stockholm-core-plugin-2-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json index 3738390d11b..9bc4ee29cc2 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34558", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T12:15:08.933", - "lastModified": "2024-11-21T09:18:55.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T20:01:44.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.8.3", + "matchCriteriaId": "074864F3-51AE-46D6-8EB3-FEAFE92FB20F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34814.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34814.json index 317f3fe87ec..696a49aa57e 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34814.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34814", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:33.597", - "lastModified": "2024-11-21T09:19:27.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T20:09:07.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:unyson:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.31", + "matchCriteriaId": "035D56AF-DAE4-484A-8127-91FA4150BF62" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-29-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-29-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3594.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3594.json index ab87babec90..ecd2ce744b1 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3594.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3594.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3594", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-23T06:15:10.143", - "lastModified": "2024-11-21T09:29:56.900", + "lastModified": "2025-03-20T19:15:29.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento IDonate WordPress hasta la versi\u00f3n 1.9.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json index 1968c1f5a77..7ec820de968 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36264", "sourceIdentifier": "security@apache.org", "published": "2024-06-12T14:15:11.983", - "lastModified": "2024-11-21T09:21:57.363", + "lastModified": "2025-03-20T19:15:29.423", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json index 3ad555b6579..d5940b5fd9c 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37629", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T18:15:12.293", - "lastModified": "2024-11-21T09:24:08.307", + "lastModified": "2025-03-20T19:15:29.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json index eda3753d9f1..803670e2559 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38769", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:34.730", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T20:47:44.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.12", + "matchCriteriaId": "65526986-4A0E-4084-ADAD-63ED229AD45C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/arconix-shortcodes/wordpress-arconix-shortcodes-plugin-2-1-11-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json index 3377c93bcdb..e9143d32b67 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38783", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:35.567", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-20T20:52:23.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tychesoftwares:arconix_faq:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.5", + "matchCriteriaId": "C66B1590-F65A-4FA3-B790-C18074546515" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/arconix-faq/wordpress-arconix-faq-plugin-1-9-4-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json index 6cc29efebae..e2f443844e3 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39027", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T14:15:02.997", - "lastModified": "2024-11-21T09:27:09.693", + "lastModified": "2025-03-20T19:15:29.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42052.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42052.json index ec3d0705929..6a56bd5b52f 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42052.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42052.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42052", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-28T03:15:02.223", - "lastModified": "2024-11-21T09:33:29.153", + "lastModified": "2025-03-20T19:15:30.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json index 1904ed7d090..f5438af18a3 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4400", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.773", - "lastModified": "2024-11-21T09:42:46.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-20T20:10:54.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:boldgrid:post_and_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.26.5", + "matchCriteriaId": "DBA97B84-4720-4B68-8526-13E5F980765E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3087230/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb6683a-b8e6-4776-880f-5b48966fc5c6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087230/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb6683a-b8e6-4776-880f-5b48966fc5c6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46596.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46596.json index b9bc2ca8a96..55519b7121d 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46596.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46596.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46596", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:18.353", - "lastModified": "2025-03-17T19:15:22.790", + "lastModified": "2025-03-20T19:15:30.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54016.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54016.json index e39ee2f43fb..e44adecac96 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54016.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54016", "sourceIdentifier": "security@apache.org", "published": "2025-03-20T09:15:12.963", - "lastModified": "2025-03-20T09:15:12.963", - "vulnStatus": "Received", + "lastModified": "2025-03-20T19:15:30.597", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,11 +11,34 @@ "value": "Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Apache Seata (incubating).\n\nThis issue affects Apache Seata (incubating): through <=2.2.0.\n\nUsers are recommended to upgrade to version 2.3.0, which fixes the issue." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8953.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8953.json index 1a57b0957a0..cd9f0a5c41a 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8953.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8953.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8953", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:44.843", - "lastModified": "2025-03-20T10:15:44.843", - "vulnStatus": "Received", + "lastModified": "2025-03-20T19:15:33.943", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In composiohq/composio version 0.4.3, the mathematical_calculator endpoint uses the unsafe eval() function to perform mathematical operations. This can lead to arbitrary code execution if untrusted input is passed to the eval() function." + }, + { + "lang": "es", + "value": "En composiohq/composio versi\u00f3n 0.4.3, el endpoint mathematical_calculator utiliza la funci\u00f3n eval() no segura para realizar operaciones matem\u00e1ticas. Esto puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario si se pasa una entrada no confiable a la funci\u00f3n eval()." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://huntr.com/bounties/8203d721-e05f-4500-a5bc-c0bec980420c", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8203d721-e05f-4500-a5bc-c0bec980420c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9953.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9953.json index f5e246c57c3..85684d3b641 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9953.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9953", "sourceIdentifier": "cret@cert.org", "published": "2024-10-14T22:15:03.957", - "lastModified": "2024-10-17T20:59:01.940", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-20T19:15:36.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json index 96a8a141572..834d4e6116a 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20176", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:24.997", - "lastModified": "2025-02-05T17:15:24.997", + "lastModified": "2025-03-20T19:15:37.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json index 713fb92ce8f..786caf4e5a7 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20653", "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:10.170", - "lastModified": "2025-03-03T03:15:10.170", + "lastModified": "2025-03-20T19:15:37.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291064; ID de problema: MSV-2046." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2557.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2557.json new file mode 100644 index 00000000000..8f9752a3b03 --- /dev/null +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2557.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2557", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-20T19:15:38.220", + "lastModified": "2025-03-20T19:15:38.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Audi UTR Dashcam 2.0. Affected by this issue is some unknown functionality of the component Command API. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. Upgrading to version 2.89 and 2.90 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about these issues and acted very professional. Version 2.89 is fixing this issue for new customers and 2.90 is going to fix it for existing customers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 5.2, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/Audi/blob/main/README.md#finding-4-execute-remote-commands", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300170", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300170", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.513393", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json new file mode 100644 index 00000000000..9b85b875e7a --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-26852", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T20:15:32.497", + "lastModified": "2025-03-20T20:15:32.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 allows SQL Injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.descor.com/prodotti/infocad", + "source": "cve@mitre.org" + }, + { + "url": "https://www.infocadfm.com/changelog/sql-injection/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26853.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26853.json new file mode 100644 index 00000000000..4f2e15e2b37 --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26853.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-26853", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T20:15:32.640", + "lastModified": "2025-03-20T20:15:32.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 has a broken authorization schema." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.descor.com/prodotti/infocad", + "source": "cve@mitre.org" + }, + { + "url": "https://www.infocadfm.com/changelog/broken-authorization-schema/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29217.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29217.json new file mode 100644 index 00000000000..98c44cd141e --- /dev/null +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29217.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-29217", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T19:15:37.680", + "lastModified": "2025-03-20T19:15:37.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W18E v2.0 v16.01.0.11 was discovered to contain a stack overflow in the wifiSSID parameter at /goform/setModules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://w18e.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/isstabber/d170f68bd85ed97e66ff316e57634b99", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29218.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29218.json new file mode 100644 index 00000000000..cb31e26a854 --- /dev/null +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29218.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-29218", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-20T19:15:37.790", + "lastModified": "2025-03-20T19:15:37.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W18E v2.0 v16.01.0.11 was discovered to contain a stack overflow in the wifiPwd parameter at /goform/setModules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/isstabber/a03c9dc3e89d5cf3b9e46dbef1ee5bf1", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/isstabber/my_VulnHub/blob/main/TendaW18eV2/poc_wifipwd_stack_overflow.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29980.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29980.json new file mode 100644 index 00000000000..e9125ebd7ed --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29980.json @@ -0,0 +1,111 @@ +{ + "id": "CVE-2025-29980", + "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", + "published": "2025-03-20T19:15:38.080", + "lastModified": "2025-03-20T20:15:33.233", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a remote unauthenticated attacker can run arbitrary commands as the current MS SQL server account. It is recommended that the CRM feature is turned off while on eTRAKiT.net release 3.2.1.77. eTRAKiT.Net is no longer supported, and users are recommended to migrate to the latest version of CentralSquare Community Development." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cisagov/CSAF/pull/182/files#diff-53861466371a59578b21f5e4b4b6be7b2a6267c5d0fe81eda2a849bf6915ed8d", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, + { + "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-079-01.json", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30160.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30160.json new file mode 100644 index 00000000000..07e567768ce --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30160.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-30160", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-20T19:15:38.383", + "lastModified": "2025-03-20T19:15:38.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Redlib is an alternative private front-end to Reddit. A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability is fixed in 0.36.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/redlib-org/redlib/commit/15147cea8e42f6569a11603d661d71122f6a02dc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redlib-org/redlib/commit/2e95e1fc6e2064ccfae87964b4860bda55eddb9a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redlib-org/redlib/security/advisories/GHSA-g8vq-v3mg-7mrg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 64935eb21c8..f80ab2c7ac4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-20T19:00:19.617847+00:00 +2025-03-20T21:00:19.521694+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-20T18:15:20.400000+00:00 +2025-03-20T20:52:23.083000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286107 +286114 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `7` -- [CVE-2024-57440](CVE-2024/CVE-2024-574xx/CVE-2024-57440.json) (`2025-03-20T17:15:37.550`) -- [CVE-2024-7598](CVE-2024/CVE-2024-75xx/CVE-2024-7598.json) (`2025-03-20T17:15:37.707`) -- [CVE-2025-2480](CVE-2025/CVE-2025-24xx/CVE-2025-2480.json) (`2025-03-20T17:15:38.523`) -- [CVE-2025-2549](CVE-2025/CVE-2025-25xx/CVE-2025-2549.json) (`2025-03-20T17:15:38.693`) -- [CVE-2025-2550](CVE-2025/CVE-2025-25xx/CVE-2025-2550.json) (`2025-03-20T17:15:38.903`) -- [CVE-2025-2551](CVE-2025/CVE-2025-25xx/CVE-2025-2551.json) (`2025-03-20T17:15:39.090`) -- [CVE-2025-2552](CVE-2025/CVE-2025-25xx/CVE-2025-2552.json) (`2025-03-20T17:15:39.283`) -- [CVE-2025-2553](CVE-2025/CVE-2025-25xx/CVE-2025-2553.json) (`2025-03-20T18:15:19.973`) -- [CVE-2025-2555](CVE-2025/CVE-2025-25xx/CVE-2025-2555.json) (`2025-03-20T18:15:20.197`) -- [CVE-2025-2556](CVE-2025/CVE-2025-25xx/CVE-2025-2556.json) (`2025-03-20T18:15:20.400`) -- [CVE-2025-2565](CVE-2025/CVE-2025-25xx/CVE-2025-2565.json) (`2025-03-20T17:15:39.450`) -- [CVE-2025-29121](CVE-2025/CVE-2025-291xx/CVE-2025-29121.json) (`2025-03-20T17:15:38.267`) -- [CVE-2025-29149](CVE-2025/CVE-2025-291xx/CVE-2025-29149.json) (`2025-03-20T17:15:38.383`) -- [CVE-2025-29215](CVE-2025/CVE-2025-292xx/CVE-2025-29215.json) (`2025-03-20T18:15:18.790`) -- [CVE-2025-29914](CVE-2025/CVE-2025-299xx/CVE-2025-29914.json) (`2025-03-20T18:15:18.907`) -- [CVE-2025-29922](CVE-2025/CVE-2025-299xx/CVE-2025-29922.json) (`2025-03-20T18:15:19.063`) -- [CVE-2025-29923](CVE-2025/CVE-2025-299xx/CVE-2025-29923.json) (`2025-03-20T18:15:19.230`) +- [CVE-2025-2557](CVE-2025/CVE-2025-25xx/CVE-2025-2557.json) (`2025-03-20T19:15:38.220`) +- [CVE-2025-26852](CVE-2025/CVE-2025-268xx/CVE-2025-26852.json) (`2025-03-20T20:15:32.497`) +- [CVE-2025-26853](CVE-2025/CVE-2025-268xx/CVE-2025-26853.json) (`2025-03-20T20:15:32.640`) +- [CVE-2025-29217](CVE-2025/CVE-2025-292xx/CVE-2025-29217.json) (`2025-03-20T19:15:37.680`) +- [CVE-2025-29218](CVE-2025/CVE-2025-292xx/CVE-2025-29218.json) (`2025-03-20T19:15:37.790`) +- [CVE-2025-29980](CVE-2025/CVE-2025-299xx/CVE-2025-29980.json) (`2025-03-20T19:15:38.080`) +- [CVE-2025-30160](CVE-2025/CVE-2025-301xx/CVE-2025-30160.json) (`2025-03-20T19:15:38.383`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `67` -- [CVE-2020-14410](CVE-2020/CVE-2020-144xx/CVE-2020-14410.json) (`2025-03-20T17:01:20.517`) -- [CVE-2022-31266](CVE-2022/CVE-2022-312xx/CVE-2022-31266.json) (`2025-03-20T17:01:16.070`) -- [CVE-2022-41216](CVE-2022/CVE-2022-412xx/CVE-2022-41216.json) (`2025-03-20T17:01:12.887`) -- [CVE-2022-41545](CVE-2022/CVE-2022-415xx/CVE-2022-41545.json) (`2025-03-20T17:15:36.803`) -- [CVE-2022-4900](CVE-2022/CVE-2022-49xx/CVE-2022-4900.json) (`2025-03-20T17:01:07.010`) -- [CVE-2023-1194](CVE-2023/CVE-2023-11xx/CVE-2023-1194.json) (`2025-03-20T17:01:03.870`) -- [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2025-03-20T17:01:00.757`) -- [CVE-2023-1825](CVE-2023/CVE-2023-18xx/CVE-2023-1825.json) (`2025-03-20T17:00:56.707`) -- [CVE-2023-2030](CVE-2023/CVE-2023-20xx/CVE-2023-2030.json) (`2025-03-20T17:00:53.620`) -- [CVE-2023-2414](CVE-2023/CVE-2023-24xx/CVE-2023-2414.json) (`2025-03-20T17:00:49.310`) -- [CVE-2023-24159](CVE-2023/CVE-2023-241xx/CVE-2023-24159.json) (`2025-03-20T18:15:16.760`) -- [CVE-2023-2485](CVE-2023/CVE-2023-24xx/CVE-2023-2485.json) (`2025-03-20T17:00:44.947`) -- [CVE-2023-32423](CVE-2023/CVE-2023-324xx/CVE-2023-32423.json) (`2025-03-20T17:00:39.597`) -- [CVE-2023-33202](CVE-2023/CVE-2023-332xx/CVE-2023-33202.json) (`2025-03-20T17:00:27.223`) -- [CVE-2023-3362](CVE-2023/CVE-2023-33xx/CVE-2023-3362.json) (`2025-03-20T17:00:14.963`) -- [CVE-2024-10569](CVE-2024/CVE-2024-105xx/CVE-2024-10569.json) (`2025-03-20T18:15:17.533`) -- [CVE-2024-11364](CVE-2024/CVE-2024-113xx/CVE-2024-11364.json) (`2025-03-20T18:15:17.637`) -- [CVE-2024-12759](CVE-2024/CVE-2024-127xx/CVE-2024-12759.json) (`2025-03-20T18:15:17.887`) -- [CVE-2024-27136](CVE-2024/CVE-2024-271xx/CVE-2024-27136.json) (`2025-03-20T18:15:17.993`) -- [CVE-2024-28085](CVE-2024/CVE-2024-280xx/CVE-2024-28085.json) (`2025-03-20T17:58:00.680`) -- [CVE-2024-6232](CVE-2024/CVE-2024-62xx/CVE-2024-6232.json) (`2025-03-20T18:15:18.197`) -- [CVE-2024-8898](CVE-2024/CVE-2024-88xx/CVE-2024-8898.json) (`2025-03-20T17:15:37.863`) -- [CVE-2025-22228](CVE-2025/CVE-2025-222xx/CVE-2025-22228.json) (`2025-03-20T18:15:18.663`) -- [CVE-2025-23120](CVE-2025/CVE-2025-231xx/CVE-2025-23120.json) (`2025-03-20T17:15:37.973`) -- [CVE-2025-23363](CVE-2025/CVE-2025-233xx/CVE-2025-23363.json) (`2025-03-20T17:15:38.153`) +- [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2025-03-20T19:15:28.523`) +- [CVE-2024-29466](CVE-2024/CVE-2024-294xx/CVE-2024-29466.json) (`2025-03-20T20:15:31.863`) +- [CVE-2024-29509](CVE-2024/CVE-2024-295xx/CVE-2024-29509.json) (`2025-03-20T19:15:28.703`) +- [CVE-2024-31399](CVE-2024/CVE-2024-313xx/CVE-2024-31399.json) (`2025-03-20T19:15:29.070`) +- [CVE-2024-31506](CVE-2024/CVE-2024-315xx/CVE-2024-31506.json) (`2025-03-20T19:15:29.227`) +- [CVE-2024-32680](CVE-2024/CVE-2024-326xx/CVE-2024-32680.json) (`2025-03-20T20:30:34.187`) +- [CVE-2024-33530](CVE-2024/CVE-2024-335xx/CVE-2024-33530.json) (`2025-03-20T20:15:32.063`) +- [CVE-2024-34447](CVE-2024/CVE-2024-344xx/CVE-2024-34447.json) (`2025-03-20T20:15:32.217`) +- [CVE-2024-34553](CVE-2024/CVE-2024-345xx/CVE-2024-34553.json) (`2025-03-20T19:59:34.887`) +- [CVE-2024-34558](CVE-2024/CVE-2024-345xx/CVE-2024-34558.json) (`2025-03-20T20:01:44.623`) +- [CVE-2024-34814](CVE-2024/CVE-2024-348xx/CVE-2024-34814.json) (`2025-03-20T20:09:07.020`) +- [CVE-2024-3594](CVE-2024/CVE-2024-35xx/CVE-2024-3594.json) (`2025-03-20T19:15:29.977`) +- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2025-03-20T19:15:29.423`) +- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2025-03-20T19:15:29.613`) +- [CVE-2024-38769](CVE-2024/CVE-2024-387xx/CVE-2024-38769.json) (`2025-03-20T20:47:44.543`) +- [CVE-2024-38783](CVE-2024/CVE-2024-387xx/CVE-2024-38783.json) (`2025-03-20T20:52:23.083`) +- [CVE-2024-39027](CVE-2024/CVE-2024-390xx/CVE-2024-39027.json) (`2025-03-20T19:15:29.797`) +- [CVE-2024-42052](CVE-2024/CVE-2024-420xx/CVE-2024-42052.json) (`2025-03-20T19:15:30.127`) +- [CVE-2024-4400](CVE-2024/CVE-2024-44xx/CVE-2024-4400.json) (`2025-03-20T20:10:54.077`) +- [CVE-2024-46596](CVE-2024/CVE-2024-465xx/CVE-2024-46596.json) (`2025-03-20T19:15:30.293`) +- [CVE-2024-54016](CVE-2024/CVE-2024-540xx/CVE-2024-54016.json) (`2025-03-20T19:15:30.597`) +- [CVE-2024-8953](CVE-2024/CVE-2024-89xx/CVE-2024-8953.json) (`2025-03-20T19:15:33.943`) +- [CVE-2024-9953](CVE-2024/CVE-2024-99xx/CVE-2024-9953.json) (`2025-03-20T19:15:36.063`) +- [CVE-2025-20176](CVE-2025/CVE-2025-201xx/CVE-2025-20176.json) (`2025-03-20T19:15:37.083`) +- [CVE-2025-20653](CVE-2025/CVE-2025-206xx/CVE-2025-20653.json) (`2025-03-20T19:15:37.333`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1804e9d7252..b2665160918 100644 --- a/_state.csv +++ b/_state.csv @@ -47134,8 +47134,8 @@ CVE-2011-0182,0,0,71b5dd291e22244a0317889c7924257bbf4bc0ab44c32abd8a62af7e07a945 CVE-2011-0183,0,0,9c382cbb05e0e48661551b1a27f110382d6921671f1721181354f8e903ea1904,2024-11-21T01:23:29.653000 CVE-2011-0184,0,0,b637db5820cf7544028b45fee07c9f3554d276cc37ee3d92e25aa1fdd2c53024,2024-11-21T01:23:29.777000 CVE-2011-0185,0,0,52dcd7cf9eec3aa91946aedbaa7c6774ae687bd649589dffdc90fa9cb8393259,2024-11-21T01:23:29.897000 -CVE-2011-0186,0,0,d70451217cfffdf8286b1154130ec6e81eae82aef0b46aec6a8acf2851e9a6aa,2024-11-21T01:23:30.013000 -CVE-2011-0187,0,0,0f989ca18d506b345ea3acbb2ac810e69c6c9d007e9c8e8efacc0a2938bf3d98,2024-11-21T01:23:30.137000 +CVE-2011-0186,0,1,195fcd21dc57bf20a95fb7a0f64fe3ff5223b238e592b2cd19c1f4129d29ebcd,2025-03-20T19:41:02.683000 +CVE-2011-0187,0,1,994f2c130d1169d3b73cdd0b25af5c01a37f8c8b9b950da2810b093b468eb79a,2025-03-20T19:42:23.150000 CVE-2011-0188,0,0,7ad019d2324b1813e6acc9e44c641381b9987582f42a5c9ec6c06791f68f7250,2024-11-21T01:23:30.253000 CVE-2011-0189,0,0,5beeb21dd6e4005b3fb80f096a13518021a7977fab823baba539325e98ee5c4b,2024-11-21T01:23:30.397000 CVE-2011-0190,0,0,29d67369bf9dbf1c82756bc9f8ca8938b0a9328f2eabd7eed53966c5242f8cde,2024-11-21T01:23:30.513000 @@ -47157,11 +47157,11 @@ CVE-2011-0205,0,0,655cc1feea7a0dc2a4230302842e99bb018a399bebb62a30a4fa6fb515728e CVE-2011-0206,0,0,657a6bc7bd640cb7279de68ea6d5630003d23524a92543d797a63f98b0b2ef1d,2024-11-21T01:23:32.583000 CVE-2011-0207,0,0,d5389d64ed618a5994bf306fb94160fff70faf96b034c1f1ab90fd3edaf233fd,2024-11-21T01:23:32.703000 CVE-2011-0208,0,0,75a954bac8e1bb21feaa4872f5092983d723727afd12547c211fdadf20323e84,2024-11-21T01:23:32.820000 -CVE-2011-0209,0,0,85a6931338fc7d69f8af6086dbbea72ea5458fc4d2c0a161dee5f1390d84640e,2024-11-21T01:23:32.947000 -CVE-2011-0210,0,0,8fa7bc765bf61b30834bbee55b117538bdd054873e1343a6528dbebed6554fd1,2024-11-21T01:23:33.073000 -CVE-2011-0211,0,0,74b7af001de05beea35f1bd587ba1c22e0377fcb3d21a1efb10df510ec2da610,2024-11-21T01:23:33.197000 +CVE-2011-0209,0,1,ae1dd7a1573fc75350145170ec7b0d7f8cc5ecdb8f06cca2a29c8b161b37fcb0,2025-03-20T19:43:41.777000 +CVE-2011-0210,0,1,82de5cf5fd54e20fe70cff9045c2797ab40364896053d2a69ac754975cbdbc31,2025-03-20T19:43:54.210000 +CVE-2011-0211,0,1,aab78b140a9da6be7202e5019e0fdbda171ec3d361a6b6dec261272a03431422,2025-03-20T19:44:00.500000 CVE-2011-0212,0,0,797428f71634d0f495382aa8f75176a2d2f8a901c32f245ad77e299e26f202bb,2024-11-21T01:23:33.330000 -CVE-2011-0213,0,0,0a02c9729eb2aecfe0632603ebc4a5abfd2e5c4e59208949fa17f935a329763b,2024-11-21T01:23:33.450000 +CVE-2011-0213,0,1,b76399279d83102a216826a1b0ba8f1ae6ba2a48e7d78952685ea8e07c14c6fc,2025-03-20T19:44:10.720000 CVE-2011-0214,0,0,55a530ff03f1b35d42eb8ef3be663d377030e6b55d08061cf8d87b93e64f636a,2024-11-21T01:23:33.580000 CVE-2011-0215,0,0,b0202ac8274ccdd7b1b81c9ec0d4bc6b1907891e26dc32f3f032e9b0425c24e2,2024-11-21T01:23:33.727000 CVE-2011-0216,0,0,6d46c96bdf2205f6369287eac5d79978a3a3882f47e6eb362ca64d7a072cc273,2024-11-21T01:23:33.853000 @@ -58700,7 +58700,7 @@ CVE-2013-1028,0,0,f88c77655d65646c822a40096aa80abc577bd75ad8e429196f6c5deedc8f68 CVE-2013-1029,0,0,d4793c73d73245f43cfc8b726d563e49fbd1d6bf47c5ca310ed00b45ef53ac8e,2024-11-21T01:48:46.397000 CVE-2013-1030,0,0,9108c150d769046f9ccb611364a8377920cca86cc81ebf8b8ec90bbb0f5e091f,2024-11-21T01:48:46.510000 CVE-2013-1031,0,0,4d0e24fe2d1ec773da0952058895ed2029249ce3113dc377228fe9c19b509db9,2024-11-21T01:48:46.620000 -CVE-2013-1032,0,0,9f2d1346a946c0cd3459bea8aa6b0ab87f2903b16fe4471a501a141ecf2c9b9d,2024-11-21T01:48:46.740000 +CVE-2013-1032,0,1,fabd8748ba99e4e780a5cf0baf21d17df3a6ef6bee380a5148c2201f97352b85,2025-03-20T19:40:50.973000 CVE-2013-1033,0,0,e73358e95ab324e57aa48dbf5ad73c4dc29456dae01f460dfbde201b21c2b98a,2024-11-21T01:48:46.867000 CVE-2013-1034,0,0,e9a7954be5778ad146227d4a06d0c0980410b59a0a37a997936907998074e54c,2024-11-21T01:48:46.980000 CVE-2013-1035,0,0,01cae7fd15c7daa823c2f64859ffb99e12837c972cb4149ddd371a8e25464b85,2024-11-21T01:48:47.100000 @@ -149381,7 +149381,7 @@ CVE-2020-14404,0,0,e83b67286c157aafe1f2a3553ee7a35cddc23734a821aed3ed1c2d71dcba6 CVE-2020-14405,0,0,1bd320d9cf90c991576fbf1f179ff887b64f703fbbece890826014a53054b3cb,2024-11-21T05:03:12.007000 CVE-2020-14408,0,0,a9e3d4bd2e598c8af92503bb6a4d5f5d3af82f662e8bc175c484d03593b3dde2,2024-11-21T05:03:12.177000 CVE-2020-14409,0,0,f70e07c113c64ef1cef1a87906f10aa32a78b5378a12744ec175072e17bc3711,2024-11-21T05:03:12.327000 -CVE-2020-14410,0,1,9ce2b3efe6b7ffb4579a5bb340901c18fdc06cebf461fcf459d95b92682a7356,2025-03-20T17:01:20.517000 +CVE-2020-14410,0,0,9ce2b3efe6b7ffb4579a5bb340901c18fdc06cebf461fcf459d95b92682a7356,2025-03-20T17:01:20.517000 CVE-2020-14412,0,0,c7e65f763949505d17883925fcefa1bf42aa25546a7f0a7ce420a9a887af7d06,2024-11-21T05:03:12.647000 CVE-2020-14413,0,0,1d84c54be8dbce99601c38bddf7ec4e958c11de29088f4e3f557414c7f9d9f9a,2024-11-21T05:03:12.797000 CVE-2020-14414,0,0,740f862a504b1c3dcf3a407278e50c49db76f89251bf677ecad02099f2ff792c,2024-11-21T05:03:12.940000 @@ -199686,7 +199686,7 @@ CVE-2022-31262,0,0,42ca01a8bd658b269cb8417bdc6d8ebe2cabaf6431c3911cee99c64c3b302 CVE-2022-31263,0,0,ef7693239843a7fec7d0ccb328a163ad95f0ff199672eb892d240b7653cc23d6,2024-11-21T07:04:15.190000 CVE-2022-31264,0,0,d6423499dcc43535c19bda9a0627bd875eb18bd9e1d39efe4359153799f40179,2024-11-21T07:04:15.337000 CVE-2022-31265,0,0,ed8efbba6115b30ea74179b5a9070c2c9e7becbdfad9b247877f351a40c359b8,2024-11-21T07:04:15.490000 -CVE-2022-31266,0,1,1be8cbb16d6c0909be7d36cdb8c77a7bec104f5f6afca384cc09c3291c252baf,2025-03-20T17:01:16.070000 +CVE-2022-31266,0,0,1be8cbb16d6c0909be7d36cdb8c77a7bec104f5f6afca384cc09c3291c252baf,2025-03-20T17:01:16.070000 CVE-2022-31267,0,0,d35e9c7df71c1a32bd05b1b2fc6914e9aed51e905b5f53607c748f7f66cf44c2,2024-11-21T07:04:15.803000 CVE-2022-31268,0,0,9612a7d76311e872bacd9e606a8a2f02cfaf6dfeac13939c74a0b8217793b7ed,2024-11-21T07:04:15.980000 CVE-2022-31269,0,0,cc92873c1d130a60c1c20d84f07315c31d9ecc9b9db0d4ca3d776dfbf80ca522,2024-11-21T07:04:16.123000 @@ -207424,7 +207424,7 @@ CVE-2022-41211,0,0,812f9684bea4455a57382c28306d28fbfe990a075bf9729485c93c11c61a8 CVE-2022-41212,0,0,e34d57829fc28983588a7e26bfd097eb3795c07f974334cd2578b0974c74dc72,2024-11-21T07:22:50.457000 CVE-2022-41214,0,0,9f96ad298571a3477080ce01d6bd3b6d9ff329c3fcb83e4015f9465f5b08d706,2024-11-21T07:22:50.617000 CVE-2022-41215,0,0,bdf81938c60a96433ed05a55127191aec8fd4a5b41684808ca769d8d25e4dd52,2024-11-21T07:22:50.783000 -CVE-2022-41216,0,1,b12a6e54560042154b5b556b0fddcb38378ecfab3090b85871b557126c985511,2025-03-20T17:01:12.887000 +CVE-2022-41216,0,0,b12a6e54560042154b5b556b0fddcb38378ecfab3090b85871b557126c985511,2025-03-20T17:01:12.887000 CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb69e2,2024-11-21T07:22:51.097000 CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000 CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000 @@ -207684,7 +207684,7 @@ CVE-2022-41540,0,0,0835f451e4365b2ba89b1d7b967d89d4dd5dc079f33fca09331bff3bc262e CVE-2022-41541,0,0,00e52175bebb5443f9ce3da1abf7765314cf802ecb11e4a93b1fe3d7e8087047,2024-11-21T07:23:21.950000 CVE-2022-41542,0,0,8fc7301d48c78688e1f0813f0699c56fa4214aeaacc0eee0cbdaeba78bf09c2b,2024-11-21T07:23:22.110000 CVE-2022-41544,0,0,1fe2c736ec60ca94bc01e4d892da5a8b005e452379dc8b2a17138c769a86955a,2024-11-21T07:23:22.273000 -CVE-2022-41545,0,1,2ca57bd36e23a7f6d797d20d750a7df1fc825ba3746def947c83a006ccc68f16,2025-03-20T17:15:36.803000 +CVE-2022-41545,0,0,2ca57bd36e23a7f6d797d20d750a7df1fc825ba3746def947c83a006ccc68f16,2025-03-20T17:15:36.803000 CVE-2022-41547,0,0,1d064e47065a065d677a23b5cabaadf74eb0a67a027ac98d2d0675b1107c294f,2024-11-21T07:23:22.430000 CVE-2022-4155,0,0,2d65b604119b329133f9f2c1484c9bf55ce99c29c3775bcdd528e10d29f39beb,2024-11-21T07:34:41.050000 CVE-2022-41550,0,0,3a6240656d5395b782af363482d974d3bf61a1eb38881afd5e24851fdc41727b,2024-11-21T07:23:22.563000 @@ -211375,7 +211375,7 @@ CVE-2022-4655,0,0,bd8d686155af4c551bf4bd1177c6f87f9389e165a383504576a9b00d293e08 CVE-2022-46550,0,0,bc5cc20200b63bba7cc7ce99207ee2a9f136ccba8514010e03709f485b043f79,2024-11-21T07:30:43.890000 CVE-2022-46551,0,0,779c0f14d348f2840326905acd59932a8ebbf1f2102078c30f0d03da86fdd8b8,2024-11-21T07:30:44.033000 CVE-2022-46552,0,0,5bffd6f496961f428fedf6678d6afda561e1d18f085e86afdac95451d78deb97,2024-11-21T07:30:44.173000 -CVE-2022-4656,0,0,85cced11b6cbe07f0f8ce78b6501fb9eaf3e0eab241add9b579d8be09507257b,2024-11-21T07:35:40.957000 +CVE-2022-4656,0,1,dd776d97609ea1ef5771e7e72750b582d3c181e7969fbc33786c9618261a9396,2025-03-20T19:15:17.370000 CVE-2022-46560,0,0,b653d84af1c4f2ddfb5e8e40038c6cfdcdbe27334cc10e0c753673304e6a8f13,2024-11-21T07:30:44.353000 CVE-2022-46561,0,0,4de83b71e7fff9a6487ed9eddcb6321da9b27da244d213752475711840116194,2024-11-21T07:30:44.510000 CVE-2022-46562,0,0,eea6bd8b8f388aef7b719fbfcf84d8f5c891f82a988f2a1cc464b3d6ff9eea5a,2024-11-21T07:30:44.673000 @@ -212987,7 +212987,7 @@ CVE-2022-48826,0,0,eb2c23661e650309111b6515f53a230ebe0f461e3609384a75f2ea2b7e892 CVE-2022-48827,0,0,59a6cad7f6f2d12d8ed70898fe02c3f7c8544fb257f311d73d4984a36e9b27a6,2024-11-21T07:34:09.767000 CVE-2022-48828,0,0,7a234af029357a827284fafcee560972937ab1d00a6901553e15bf06be0ae96b,2024-11-21T07:34:09.883000 CVE-2022-48829,0,0,23b069311a24aa387c6592becd0f69e4210410c11f95c41a93227a82c0aa2c1a,2024-11-21T07:34:09.993000 -CVE-2022-4883,0,0,6b3ec0770bafbae3d7857a6c6ebc0a3213d44a7651b41bcb1afb1ef8167e5c51,2024-11-21T07:36:08.230000 +CVE-2022-4883,0,1,0c4329ae6bc9d0dbc79b7d7f61f4292a76f5401a96b3839e9cf876c66ed4bb33,2025-03-20T20:15:26.757000 CVE-2022-48830,0,0,528e538a1cb5b7fc619709dd1a627afd309d21ad4886875ad2412a3af030b95a,2024-11-21T07:34:10.103000 CVE-2022-48831,0,0,05bb24217e56141a02362670e6855afe44bffe0bad1a2d46f283b17ecf64f728,2024-11-21T07:34:10.210000 CVE-2022-48832,0,0,412b19f2926396c16f14324151947f9bb5b297fa00c72ccfe19f1676fd085e12,2024-11-21T07:34:10.327000 @@ -213173,7 +213173,7 @@ CVE-2022-48996,0,0,9686d05352508e30fc721032036418ced38b8916ff2cb22a2ce43bc16a4f8 CVE-2022-48997,0,0,c858aed8817e6c8f6dfbe5a5273bb98e19a6979ae1d7f7e0dc809a5ffbe5100b,2024-11-07T17:07:08.743000 CVE-2022-48998,0,0,2c1f9fe825190c43dc9e67197af96eeeb70ff94bfa72c14ed327f606c897adc1,2024-11-07T17:08:38.677000 CVE-2022-48999,0,0,bfd4788ea0ad8062f15b99ea74b2e00619d8a7b5bb200452209f301bd9930769,2024-10-31T14:44:10.857000 -CVE-2022-4900,0,1,3af4b10afd60f3030ce01fdd39225663ba3c02bbb083212547aee201665e711f,2025-03-20T17:01:07.010000 +CVE-2022-4900,0,0,3af4b10afd60f3030ce01fdd39225663ba3c02bbb083212547aee201665e711f,2025-03-20T17:01:07.010000 CVE-2022-49000,0,0,074de9cfedf53a47701ebcc065a434c8d10e961fc91954754947b9c20f9a3d57,2024-10-31T14:56:17.890000 CVE-2022-49001,0,0,1f02fd5f40392abf91fb33deaf28ab3e2c4fbf66c45acd98125ce90ff8ed52ce,2024-10-30T18:58:53.863000 CVE-2022-49002,0,0,47fcf627e8c0a7e79a5f9cae8e7102bad582486003b5fc5433a6f9bf64f45800,2024-10-25T14:24:12.620000 @@ -214153,7 +214153,7 @@ CVE-2023-0173,0,0,1bd9d5abc484b52dfafa856f324d2c4bc56ac7d15f96cb08d9567aa6ba6920 CVE-2023-0174,0,0,d4822de47fa802dbe8a63dfef7d04d1e9ef5769f710525300c41a308c79a5372,2024-11-21T07:36:41.190000 CVE-2023-0175,0,0,f675b36a1edf72fa9629e908e8135656f624b1e3facf4fe662ec8f8ba7f94a2d,2025-02-26T19:15:14.847000 CVE-2023-0176,0,0,ab208036b5ce05ff3ba2c4791db7902088ad862128719de9d89ef8a8fa90cdc4,2024-11-21T07:36:41.397000 -CVE-2023-0177,0,0,7a479769cf37f732e23726d0f9c3bada7f65e6d47982b9aee83f0cce2875c9f8,2024-11-21T07:36:41.500000 +CVE-2023-0177,0,1,96612f0d6acc9356b7bef11758fc6250b99f39292144eec2d89a14d00f6db80e,2025-03-20T20:15:27.907000 CVE-2023-0178,0,0,7591c9272af0ccb8f87129805b1aab079536f995d2b21f00c0a538a499928daf,2024-11-21T07:36:41.600000 CVE-2023-0179,0,0,9877146175097de2cfaf24ea6f7e8489c6f5c588d2b6bdbf87553e381b048fdf,2024-11-21T07:36:41.697000 CVE-2023-0180,0,0,874d5347c225b067c1bec87c944f9e77ff0adec74cd6c76e1cda8afd708aa06f,2024-11-21T07:36:41.843000 @@ -215126,7 +215126,7 @@ CVE-2023-1190,0,0,21e7b9b87946764bf5762cb02d982c2b05ae52d87e460d7f0bb8b0a654f1c6 CVE-2023-1191,0,0,9d0a9a7523041486f7833fdfacdb5a5869d7eb6b1d33adf405d51270d67b5d7c,2024-11-21T07:38:38.440000 CVE-2023-1192,0,0,bfa8f5268ba2ac1bf29c3a44f8e698ecb3c10e88265d80473e4f4f400a814adf,2024-11-21T07:38:38.570000 CVE-2023-1193,0,0,e26a2390b19d99c4af76bf87860e924ddae19e1846826c12b2553b6dbfbe934f,2024-11-21T07:38:38.710000 -CVE-2023-1194,0,1,7c48265a74c0ed29d44b63bdc8f0c33c00a68ac73cee467e5f8fe8b0d6285d1b,2025-03-20T17:01:03.870000 +CVE-2023-1194,0,0,7c48265a74c0ed29d44b63bdc8f0c33c00a68ac73cee467e5f8fe8b0d6285d1b,2025-03-20T17:01:03.870000 CVE-2023-1195,0,0,29b38929299f0897a484042f918afd5cf90c7a0ac17260d6cb404e604cb89b2b,2025-03-18T19:15:40.697000 CVE-2023-1196,0,0,c8f5779968326d7d81a300e6402c218f9d3653bdc1028fe84c7e3255af4de629,2025-01-30T15:15:12.527000 CVE-2023-1197,0,0,86832f5d8e3d2f19e25d554307cda0a38f9c96d8816c29ad3985ff0868049cfb,2024-11-21T07:38:39.223000 @@ -215632,7 +215632,7 @@ CVE-2023-1724,0,0,31134df9a9cb5ad9f06e5890c78e3bf8dc817f3f4a915212061360ed51775d CVE-2023-1725,0,0,1288effa581beafdb9450bde3b3f32fd682403352c280c5c67244a1ebce26130,2024-11-21T07:39:46.540000 CVE-2023-1726,0,0,7fe9cd9345f7e9931cf0f62ff9bb89eee878166d348fc6ac03ed9b3d56c38ce2,2024-11-21T07:39:46.657000 CVE-2023-1728,0,0,981cd8e8adb9e3b1b6beb4084aec72e09c7d365a70973ab69ebd692e12b4e541,2024-11-21T07:39:46.773000 -CVE-2023-1729,0,1,1adfafbb5ae3b9388c628c02b9b75407909b63ca4410c3a301df27bd2ec0cd14,2025-03-20T17:01:00.757000 +CVE-2023-1729,0,0,1adfafbb5ae3b9388c628c02b9b75407909b63ca4410c3a301df27bd2ec0cd14,2025-03-20T17:01:00.757000 CVE-2023-1730,0,0,cbdc1cac0dced40449b83d7a491e74ada7c55bcf5cbaf87e5f190daa5b9af814,2025-01-30T15:15:13.767000 CVE-2023-1731,0,0,5784a0b3f79ad15253cc740ef758b35d7f8a3ec0b50d0b2952828f2881a1bfcd,2024-11-21T07:39:47.157000 CVE-2023-1732,0,0,de42651859dfb2e0d55178bb0ab9bd5f7a767963f3ffb908f0c2fe4c96f97b16,2024-11-21T07:39:47.283000 @@ -215725,7 +215725,7 @@ CVE-2023-1820,0,0,d1c5f13d5086f9871e48b1d63db9bb30e8f6cb0a831bda465e1cf30729515b CVE-2023-1821,0,0,c7e9eb5b9b1f750b590441dc1045c1dfb4147fb95ed189f46af058e8caed72c3,2024-11-21T07:39:58.230000 CVE-2023-1822,0,0,1d89820fa8a68cc27c376abdaa7bf928d158706c4d36f8eb74a36fc72f8cd6e1,2024-11-21T07:39:58.337000 CVE-2023-1823,0,0,75f24c1db07bcfa3a580c62c21ac38e4e438b8c5d9bb4bfeb58d05e3ab8baccf,2024-11-21T07:39:58.440000 -CVE-2023-1825,0,1,48a9345b33f104a211ba7aa39fb8ae8ba51ba77b38333d0e0587aad61c07bce7,2025-03-20T17:00:56.707000 +CVE-2023-1825,0,0,48a9345b33f104a211ba7aa39fb8ae8ba51ba77b38333d0e0587aad61c07bce7,2025-03-20T17:00:56.707000 CVE-2023-1826,0,0,d3a9813f5153a67f49a6a0b44f3bb150f778a089c87c51f79a3feff4168e2c48,2024-11-21T07:39:58.647000 CVE-2023-1827,0,0,cc5af9c7c80846df757fbf833648deac59981499b0bd92f531c80260339d2116,2024-11-21T07:39:58.760000 CVE-2023-1829,0,0,5783e4e630457d3111c317e2f170a261f434bc390c421d5e68251cb916a2cc28,2025-02-13T17:16:00.420000 @@ -216190,7 +216190,7 @@ CVE-2023-20274,0,0,75edd0ceb612ccd9577294f4cf61beb18460ef9c4bcf3ff217e08a8b5e60f CVE-2023-20275,0,0,ddf062ac6104930af03aec540250c90629eb40fe8fe574e062da78e3a29120e4,2024-11-21T07:41:03.457000 CVE-2023-2028,0,0,00f00ec076519f60ec3a14fda25fc78efbb9be545e3b50e543dbb3888c72ffeb,2024-11-21T07:57:47.387000 CVE-2023-2029,0,0,ba151be9f7ae969a9a0157d785c56b6d4e8ae0a9b47c84689d2c70b4386089ad,2024-11-21T07:57:47.487000 -CVE-2023-2030,0,1,f18cb69017291aa6926cead6c141bd141a290aa652301550c6b8ab7e44c3087d,2025-03-20T17:00:53.620000 +CVE-2023-2030,0,0,f18cb69017291aa6926cead6c141bd141a290aa652301550c6b8ab7e44c3087d,2025-03-20T17:00:53.620000 CVE-2023-2031,0,0,4d9ad115a9dcd7a3c0a7dcac165bc24a881d48c48905f292e24838d7b258ff5e,2024-11-21T07:57:47.723000 CVE-2023-2032,0,0,da29bb2cbb2751ed3fea0a67b9dacd9aede17b853d6e29bd913ee86e0124e640,2024-11-21T07:57:47.850000 CVE-2023-2033,0,0,782e2df4fe3f4f405f829652643b30d0c1337ec3cf8b7e241818b454a9c23752,2025-02-19T19:44:57.710000 @@ -218554,14 +218554,14 @@ CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a537141 CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000 CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee831,2024-11-21T07:58:20.323000 CVE-2023-22995,0,0,93e6265683ddad7b70d16ea39dd84aa9bcf8f539c4ef1ce28d88da0e81fedf71,2024-11-21T07:45:45.550000 -CVE-2023-22996,0,0,fe442cb87d4861b04715d9721093b1f2e793cffbe47ffe19ce9d81d6e93c6a1f,2024-11-21T07:45:45.700000 -CVE-2023-22997,0,0,ba7a171d88bdc94e6a16ad207cb397253f006e42152c29e3ad803f92ac423e0b,2024-11-21T07:45:45.840000 +CVE-2023-22996,0,1,e25b38188607ad82adeaa3e5fc2927767f1b99c04c678932009b45c69faac575,2025-03-20T20:15:28.137000 +CVE-2023-22997,0,1,176dbba2a3eee885cb5145bce397d689cea3e2f666028a506b2a5274252c23b0,2025-03-20T20:15:28.333000 CVE-2023-22998,0,0,89912e724c147c3e80fcb7b0e9bdd938e2e1aeaefe6425f222b6a1947881067e,2025-03-19T17:15:38.153000 -CVE-2023-22999,0,0,13d2ce31de8578a2b4f10df11670429bd319eae470d8665b2898bc8464a5b8f2,2024-11-21T07:45:46.130000 +CVE-2023-22999,0,1,5f6f3002e55c1bac4ce7850915a863c9d29cab265bbeae0a504fa36450960ce7,2025-03-20T20:15:28.557000 CVE-2023-2300,0,0,4d0333c0849a3394a36c01d24481b8468668f58f824a1f529b6407ef1a517a0f,2024-11-21T07:58:20.440000 -CVE-2023-23000,0,0,901761c6222d7d1188999afad6c3eac83b6ac8077a1f5a490e4484566401ed18,2024-11-21T07:45:46.280000 -CVE-2023-23001,0,0,d81737a6538c29931b09dd655876b2de82dac9cd1f641de7670cca8e4be0183f,2024-11-21T07:45:46.430000 -CVE-2023-23002,0,0,4db4148f492955f92921c06b74498ec3b6d9f21bfdb354bb740d79c41c0f4847,2024-11-21T07:45:46.567000 +CVE-2023-23000,0,1,c62dab0631b89badfe01a06fcd0d42c0f7d28501fc1a785f41cbce9d3e894dea,2025-03-20T20:15:28.737000 +CVE-2023-23001,0,1,fcb5e6ac9be72c23398386687a820d310659304ab08816ff6c9a775fc2c52a1e,2025-03-20T20:15:28.923000 +CVE-2023-23002,0,1,3c64b546d3fe4b03c960130bb90033a184c7dec3cebff0966eb368394bc9cbc5,2025-03-20T19:15:18.923000 CVE-2023-23003,0,0,c7d4db017b729054c472f568bd6847f893103ab2b72288053341ca86b48d91ef,2025-03-20T15:15:38.760000 CVE-2023-23004,0,0,14c7cafb414ec4cafc742b3ec3e79b05bd70465d365880d205377cdc5ee5bbb9,2025-03-19T20:15:17.083000 CVE-2023-23005,0,0,8ab9ad69a18fae36f57c98cdd07a95d2ee85900f71c27edd540e7f3c759e3b88,2025-03-19T19:15:38.563000 @@ -219444,7 +219444,7 @@ CVE-2023-24134,0,0,809bece53ee7c330a7e77dfeb1721c0025361158b77a2882013d33185518e CVE-2023-24135,0,0,e02b8aa8c04c0fe2f716f1ba8adf5bccc6034e31c925ec1433e4ccb50c87ef05,2024-11-21T07:47:27.530000 CVE-2023-24138,0,0,2f960e5834a56fcad4db440a2bee60c5f9c7c20734a7fde5930c38a5ea72208a,2024-11-21T07:47:27.777000 CVE-2023-24139,0,0,ab138865565b8503fbaa049189d49b5e1a38023dcceaef36db39da733bf01b67,2024-11-21T07:47:27.920000 -CVE-2023-2414,0,1,2ad853393992b90a594542d65475bab3d52d96ee5a2a794ec2f7b86b509f3752,2025-03-20T17:00:49.310000 +CVE-2023-2414,0,0,2ad853393992b90a594542d65475bab3d52d96ee5a2a794ec2f7b86b509f3752,2025-03-20T17:00:49.310000 CVE-2023-24140,0,0,551f397d53068862438e3515248d23272ee1ce7622da4dd76ac451e5536d3822,2024-11-21T07:47:28.067000 CVE-2023-24141,0,0,9d0227c07406dad4b159ec2220956ebd25435dbecd783d8cb6653d720840e7a3,2024-11-21T07:47:28.210000 CVE-2023-24142,0,0,20ab7be2ae29c77f98c99d5c28029b22bfba40393ed3adabc4a3db0eda9d50de,2024-11-21T07:47:28.367000 @@ -219464,7 +219464,7 @@ CVE-2023-24154,0,0,5ff152d5828ddc3dd8316398ece11ab45cf6f8502b4cfafa483c606a6b858 CVE-2023-24155,0,0,f59431cb91851a8a8cc97d44f9e8fae7d0cf1e7555b4cdb90b4b6502e9da042c,2024-11-21T07:47:30.243000 CVE-2023-24156,0,0,3898ff5e83abb031f4a38b40ab49666c3ad70063fce440d9c8f0f3c72b4a8dd9,2024-11-21T07:47:30.380000 CVE-2023-24157,0,0,a00b61f9298bd5abf5e527043ebc6defb9eddf15dc81f86f48e0b0234f0ec130,2024-11-21T07:47:30.517000 -CVE-2023-24159,0,1,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000 +CVE-2023-24159,0,0,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000 CVE-2023-2416,0,0,acdf5b4886c4297fef66ae568a61d37a4ec99430d66c160077e079aaabd2a5d8,2024-11-21T07:58:34.510000 CVE-2023-24160,0,0,da1c8c8cca0fcbf2d46f421b50f2117e9c18da196ac6cce2fe0feb0410d6370f,2024-11-21T07:47:30.800000 CVE-2023-24161,0,0,6817d1659b2d05ad2fd0200c8bad505e053540f7b2b34e6c886393d1e26487c7,2024-11-21T07:47:30.940000 @@ -219482,7 +219482,7 @@ CVE-2023-24180,0,0,69d9d468cd7c82959af84bfa8a0fcddf510b89e29b7e5a45e312f4898b30b CVE-2023-24181,0,0,7fea8471416a054f816e4bdaa57dd8e7c2b10116b9ce97f639a51afe4a1bea1f,2025-02-11T16:15:32.143000 CVE-2023-24182,0,0,ec6db6df69d66ec863303a9092dd450c76dc9ca16b1ac072202ee250c2a6dacf,2025-02-11T17:15:15.227000 CVE-2023-24184,0,0,dd43d0f074f93677bd22991ae6ce02dc978cfb537bcd89732f201ee955fb96aa,2025-03-14T19:15:41.630000 -CVE-2023-24187,0,0,effad80ab13286a3d2d5bd467532399e33b73b526a9aa1bd9c9b79d53f02bba9,2024-11-21T07:47:32.910000 +CVE-2023-24187,0,1,23641e20b158c982d0857ee62eafa8072448c44da9b0cf5ccecd2c9a19487421,2025-03-20T20:15:29.130000 CVE-2023-24188,0,0,00886fa8c63409cf1892c5def2555e3e76617440898c47fe95459cea57abc918,2024-11-21T07:47:33.070000 CVE-2023-24189,0,0,6ffac01c653490dd399421fbf388cd609977b649631695dcaedbac5a0e7db3f0,2025-03-12T15:15:38.790000 CVE-2023-2419,0,0,74acfccc65c3fd2455b482e9553b9e6576e555c882ef89aedad720207cf000cd,2024-11-21T07:58:34.917000 @@ -219974,7 +219974,7 @@ CVE-2023-24845,0,0,42391eca67d4dbb4f3b5ff3c17962f0027c205a652c13eba315a596812c2e CVE-2023-24847,0,0,c8e33bcb5ffba5ce28126f36d2c595e359612ce9205e780b1fcc0313955f8593,2024-11-21T07:48:31.053000 CVE-2023-24848,0,0,b3e6c820ed22ffb7a60a648810434210095f343f872f236d5dc17e31fc844914,2024-11-21T07:48:31.623000 CVE-2023-24849,0,0,35460a560a598e18fac294b0593e8d6524ad57427ce6468020be7a1bc10a513f,2024-11-21T07:48:32.047000 -CVE-2023-2485,0,1,db7705d2423f1fdd11674b1a0fc6ed1fa1d89a271d9a45dac8b5c2f878a8907d,2025-03-20T17:00:44.947000 +CVE-2023-2485,0,0,db7705d2423f1fdd11674b1a0fc6ed1fa1d89a271d9a45dac8b5c2f878a8907d,2025-03-20T17:00:44.947000 CVE-2023-24850,0,0,55e6d3d9a3beec66a2a32c4a7dbc5c81cb799b1c81180d86e3196816d307a687,2024-11-21T07:48:32.480000 CVE-2023-24851,0,0,3203531947e2874b353ef452a57b6830c1ab41c06ed6f856039f20e42ed5983d,2024-11-21T07:48:32.860000 CVE-2023-24852,0,0,dbe8a062db25cf95ed4303e40df75cb8dde28ce72e6c0bd78b31f458af936dd5,2024-11-21T07:48:33.207000 @@ -220262,7 +220262,7 @@ CVE-2023-25136,0,0,2afc3a70a5e06c0c69c3830dfff5a970668d068f38662a496adf67062392c CVE-2023-25139,0,0,c8c6816eb7d6fad0b1254d72563b0eca09c617cb1a12c92195044d95d483e510,2024-11-21T07:49:11.073000 CVE-2023-2514,0,0,c0a74aabdf612338b5c2bbf99973c4dcf772d38ab9efc3bea1b0156e23e9654b,2024-11-21T07:58:45.227000 CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b135,2024-11-21T07:49:11.220000 -CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000 +CVE-2023-25141,0,1,26abeae296d9927915c3ad0441e22235bc57bf9e7019a4e36e4c53d5d3062c1b,2025-03-20T19:15:19.913000 CVE-2023-25143,0,0,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000 CVE-2023-25144,0,0,31d1251f7c4c1c756ddbd5a92934728af4974392f21d4a2332ac16e23b56cf80,2025-03-06T16:15:40.503000 CVE-2023-25145,0,0,71e62e20409077ec917ec9a494564df62e5a03e10fab96fa74817a2db3525c8c,2025-03-05T21:15:16.993000 @@ -220711,7 +220711,7 @@ CVE-2023-25721,0,0,f81320c364560d2364a1f3ba19d0330f029ea11a50a94d0f9f6b4ead68d21 CVE-2023-25722,0,0,bca76e3911d579e248d877cdd35275de0ae46411c20589fc7ce57e1a3e928a08,2025-02-19T19:15:13.617000 CVE-2023-25723,0,0,20f2fc6614c9059512665f8d3df6c3e29f15e7937ee834ebb89d345e1d0306c8,2023-11-07T04:09:09.190000 CVE-2023-25724,0,0,0c7a768e6a065eac40dcf39f62eef73860051fe39586c15cabbe4da75e90f9b7,2023-11-07T04:09:09.223000 -CVE-2023-25725,0,0,31c2febd306b9096d501261e34cb11bc97f92d66e10d389c47e6a76639df287c,2024-11-21T07:50:01.400000 +CVE-2023-25725,0,1,a39fb7592f9e5fe41a1a54183abef5c2b427076b5687d53fdde686e349adc1ec,2025-03-20T20:15:29.773000 CVE-2023-25727,0,0,8538dabc87c744e9a98e98a576ec279d6c190e03ec34f39e5edcf93fcb11da7d,2024-11-21T07:50:01.577000 CVE-2023-25728,0,0,4211039e496116a7201ac7f89a1b7734321f950f96be01f7b1b7a4ce4c2525eb,2025-01-10T18:15:17.420000 CVE-2023-25729,0,0,f207cef64d9a7f8f5bfe80e8f93feeb0d8610e5fca946cd676ae496084f2932a,2025-01-10T18:15:17.783000 @@ -220746,7 +220746,7 @@ CVE-2023-25754,0,0,6cac97274c3d2a5f940d13bb3a09b2e99e223c4dd24429eb6f31b50e2e5b3 CVE-2023-25755,0,0,fafe966f65fe9437a0f9cb5781ba3e6b42751edc29650891eec5a3c52f1c15cd,2025-02-11T17:15:18.540000 CVE-2023-25756,0,0,a77d615d00ae80ecab7fe8723caf94403e0f93df79d4ce0214ae51e110ddce81,2024-11-21T07:50:05.327000 CVE-2023-25757,0,0,94512af5e117622087eb3a40cbb3a1131f1746a1ff8077f5ababdf8649b2a178,2024-11-21T07:50:06.530000 -CVE-2023-25758,0,0,e84eae33950eaa1d93c8f7b2b5977ec319809bf0df364ca076b5c69df8608435,2024-11-21T07:50:07.180000 +CVE-2023-25758,0,1,2c8ae79d765a9b8bb1324bbf330def513e2d023573299ad67d3c00c54f0361c2,2025-03-20T19:15:20.090000 CVE-2023-25759,0,0,0afeea35e5c6d06722ba61e897527acb356d67ad44e78789f4114028282d969d,2025-02-05T17:15:18.767000 CVE-2023-2576,0,0,b34673ecdfcf4f5d2e116af6c6f211e927a96092cbb5af029ee86fe3ded5e65e,2024-11-21T07:58:51.890000 CVE-2023-25760,0,0,45916bf9f2fe9896b4711de8c6c6bb92063846479311a8b431b74bae3ccc5c44,2025-02-05T17:15:18.933000 @@ -226035,7 +226035,7 @@ CVE-2023-3242,0,0,64607ec0679081d7acfb76b71f0c8aec43f19caa805def593fab31ef01d932 CVE-2023-32420,0,0,78945dca235dc25e80c2cfb8ec433c55079c2c188282dcadc5fc5d529647d6ea,2024-11-21T08:03:19.193000 CVE-2023-32421,0,0,d77d924a3f2984827f1e9563a2e4b6b5331da9100b5eceb620082e3d44ec5a14,2024-11-21T08:03:19.320000 CVE-2023-32422,0,0,73d03fdf9e33246a7bce76c8257d96b2959f868905ce0c084bd026fd40188c02,2024-11-21T08:03:19.437000 -CVE-2023-32423,0,1,5ac574426d628b0d4d134786b8b784e9b610514d299167ff8b328ac1fbe2c169,2025-03-20T17:00:39.597000 +CVE-2023-32423,0,0,5ac574426d628b0d4d134786b8b784e9b610514d299167ff8b328ac1fbe2c169,2025-03-20T17:00:39.597000 CVE-2023-32424,0,0,683ff3dc266ba5113bf26052502eced1eeaa3aa9593de767afbcbc26a6c1779e,2024-11-21T08:03:19.700000 CVE-2023-32425,0,0,5d12e602e911c4507fec6203eb76478f80fb57b35ff46e09bf5daa53d5a2bd48,2024-12-12T14:26:18.893000 CVE-2023-32426,0,0,fd77e42b4f67240428062c33ae76dc6a71f3f5905a3245c0ec491d905903d45f,2024-11-21T08:03:19.950000 @@ -226769,7 +226769,7 @@ CVE-2023-33199,0,0,7baa0f06d2b3968d4b7475f40a030db780e356d6eb179003b91f97200f8e9 CVE-2023-3320,0,0,2c7e390a7abcdfdf430eaa55793c1bdd0e25b95825bd3da782d68bead2b5b8c2,2024-11-21T08:17:00.380000 CVE-2023-33200,0,0,de5c6c61a002e0a717b9ee310270f357a2fba6e60c65898d33bdd3bfcf6f34a4,2025-03-07T19:15:35.060000 CVE-2023-33201,0,0,46948cbfdecddf27ae9357173adcb832bd0a7c27ffbf7a2d7b96267b60b2c447,2024-11-21T08:05:06.870000 -CVE-2023-33202,0,1,72ae61bf5ae8a4c0b0959977c9da680b1f659c5d0c5ca2d1ba107f4c45533cdd,2025-03-20T17:00:27.223000 +CVE-2023-33202,0,0,72ae61bf5ae8a4c0b0959977c9da680b1f659c5d0c5ca2d1ba107f4c45533cdd,2025-03-20T17:00:27.223000 CVE-2023-33203,0,0,74e478a7f3e2b5250c04b4920837ca7ceba8b0a676ca8415788ae03fe1c180b1,2024-11-21T08:05:07.270000 CVE-2023-33204,0,0,cea2fde1a1ebbc478e53b25fcdce6e68b350a0b628a540cc4b97fe230433fa51,2025-01-22T15:15:09.430000 CVE-2023-33206,0,0,59ce158ed0055ec7cc71d8ed85e231647fdd939f2a653e9d867caea0c5474a9e,2024-08-19T19:04:03.527000 @@ -227031,7 +227031,7 @@ CVE-2023-33604,0,0,9226692a3dd315a1017ff5ed1441afdde1ea9512e7a0c2d0d0e313e547140 CVE-2023-3361,0,0,9ebef56d12e80daf97a750299f08bde92471b07cbe9f6a4eb2f93a79cb7a07a2,2024-11-21T08:17:05.957000 CVE-2023-33613,0,0,69674a4d7de030fa162d60d6bf2dc0f34a91d2ed6d4c5ba2840d8e060eee90c1,2025-01-08T17:15:12.537000 CVE-2023-33617,0,0,1d43005f87178c71ad723b5a992a4bf48d63ccefb8633fd2538922488208807c,2025-01-31T18:15:33.513000 -CVE-2023-3362,0,1,c6c2b4c927749b3261ceb4206dbb046375ddee8f7484493686c47eb8b71cbe36,2025-03-20T17:00:14.963000 +CVE-2023-3362,0,0,c6c2b4c927749b3261ceb4206dbb046375ddee8f7484493686c47eb8b71cbe36,2025-03-20T17:00:14.963000 CVE-2023-33620,0,0,b02d7e5f0ff254ae01b37e44be1679edb56401b0c7fb58e7a5c383191e2f912f,2024-11-21T08:05:46.033000 CVE-2023-33621,0,0,56dfc842c9ce8e64b000a4b4f820dc13e2c373a76fdb74314c9212013682289a,2024-11-21T08:05:46.173000 CVE-2023-33622,0,0,f929fed87e9f61aafa33c03babc48180bf1325276b2eb6164847e63968ab28ef,2023-11-07T04:15:05.950000 @@ -233807,7 +233807,7 @@ CVE-2023-42295,0,0,78fdaddf17673316050d94ecf48f4e22f5939229676b80860a38339eeb1c0 CVE-2023-42298,0,0,12a46d213e32df690be0aaadda6c8295bef1ce681653af4999fa64c565cfcc0b,2024-11-21T08:22:24.967000 CVE-2023-42299,0,0,42e6d0e90217ebd6897af35060870a789eeb3f84316d086cdc1d68c50431992c,2024-11-21T08:22:25.097000 CVE-2023-4230,0,0,9534782230cd0029822ce45f05cf5c34e400f785e0d37fc88e451b5d0ffb5aa0,2024-11-21T08:34:40.460000 -CVE-2023-42307,0,0,d7129d837cf9382d5da28d998ef01f5b491e48b1ec3a684e5e508fa934a38c43,2025-01-22T14:54:38.390000 +CVE-2023-42307,0,1,5abc8c2d768d30c304c016e53b5d9a49a6a92df0f5a6c59253e4f2c34e9253ea,2025-03-20T20:15:29.993000 CVE-2023-42308,0,0,5779b47b0b3c03d47a2d139bd688f9b5b10b3cfcfb042139000d5ced50d75bb1,2024-11-21T08:22:25.383000 CVE-2023-4231,0,0,d8a5cd6afa3860ab1c78883cf8bf20eccd0d6d00cd46736814e11d4097787654,2024-11-21T08:34:40.597000 CVE-2023-42319,0,0,80b696e6d91a3f59e80d731c4538ea95a74347144234efd042f13fab4e1d33a7,2024-11-21T08:22:25.583000 @@ -235403,7 +235403,7 @@ CVE-2023-44469,0,0,3a7e5554ebd31a58605734c9c1d3416b43fcd3b35655b4b171464d18e5837 CVE-2023-4447,0,0,5ebc889f5a16410a2878657ffcb887cca2a6e743290f302c4e9b4af068cb928b,2024-11-21T08:35:10.570000 CVE-2023-44470,0,0,2862b0f39081cef95b026f969894566de715746bb2ae433f03340b509155cdb1,2024-11-21T08:25:56.723000 CVE-2023-44471,0,0,4b4e635be95bff9ba7ad414d098654cf7f2eeb4ffc19f3af330d58eb7c8292ee,2024-11-21T08:25:56.843000 -CVE-2023-44472,0,0,c39cde08b62958f2bd5edd577d58f2b5de9c03c5e266ee64aea933a69e8d2547,2024-11-21T08:25:56.970000 +CVE-2023-44472,0,1,49d43556e9a19fa57e5f5eb03674809ae5de4fd9c61faa23b8b3dcd49b4987c1,2025-03-20T19:48:57.973000 CVE-2023-44473,0,0,8192a4726afc411a7fd89920a9d57564297ba07d91043853c19b27613d789141,2024-11-21T08:25:57.080000 CVE-2023-44474,0,0,cd759b60e27b01e8ea39431ff97fbdf5b5053f315aa832e5ed0e4a58f5f03437,2024-11-21T08:25:57.213000 CVE-2023-44475,0,0,89de910c63b6b608825810094c30ae563457d3ca6cccbaf219effd0c4c9c73a4,2024-11-21T08:25:57.333000 @@ -240818,7 +240818,7 @@ CVE-2023-52152,0,0,d90b884b4df8fa2f82c9afd892f8c7f8af0e4c159bc0aaca8de29e7610d72 CVE-2023-52153,0,0,001df9e63fe47924c9e8162d50af354279a6ea7743e428bc40c5ca75451bb1ec,2024-11-21T08:39:17.570000 CVE-2023-52154,0,0,1bd0a38f9e027d295f2b2f72b259b7d09dd7943bfbddd07ff8a8dbca376a0578,2024-11-21T08:39:17.807000 CVE-2023-52155,0,0,09695a779e319bbbc35b05e34baabc26e32dfd9e891c5a5fd294457036aaf4af,2024-11-21T08:39:18.010000 -CVE-2023-52159,0,0,fd26940a2bced0380b2139093c08979f229ca934313b436b7f8a1c6353b7341c,2025-02-27T14:05:57.350000 +CVE-2023-52159,0,1,02be5a5cc129ad29aca45223f166a0dc90b5f63bf8518d8597c0a8da82ea519d,2025-03-20T20:15:30.210000 CVE-2023-52160,0,0,19fb4e397a5f0157e35e2583548edfe6ba46e6d8b3d42ca883782c1d0672d7f7,2024-11-21T08:39:18.380000 CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 @@ -243936,7 +243936,7 @@ CVE-2024-0555,0,0,2fdd8669da78a91a3879aec40a3823b72d31fe91d028dafb6cda6274cf445c CVE-2024-0556,0,0,cf15a523ef94b1bea94765dab315dce31b345ca60277b621bbabc704b657aa82,2024-11-21T08:46:51.977000 CVE-2024-0557,0,0,aecc41d619149fdf2e4400ea3467b8bfad0477f06a442a6105a2ab42d5a6c547,2024-11-21T08:46:52.107000 CVE-2024-0558,0,0,6846d1ab5a0901d01d184c61cbfcb56ea8fdfeec2a4363d7444b04083c4063d2,2024-11-21T08:46:52.247000 -CVE-2024-0559,0,0,253bd84ce936e5a1cf5dd6741c4239b9e169e337de3a1811636e9bcdb9a57c01,2024-11-21T08:46:52.383000 +CVE-2024-0559,0,1,e45c0cd6f9ea9474de68fac072008f354796956a92a0fc1e756e979529e812e7,2025-03-20T19:15:20.330000 CVE-2024-0560,0,0,ffd9513eeb886c6125844de35aef65583ce26180ea7e800ddd6d52cc317eedfa,2025-01-21T18:31:10.947000 CVE-2024-0561,0,0,b57b90edfa2c529e52cee7072690edb8ad4f45c797711fa94ad178a7b75b55f0,2024-11-21T08:46:52.617000 CVE-2024-0562,0,0,37f2fb40883dea1b390b20b275df32e447bfa7c054bcf5c2561051e1ad9afaf6,2024-11-21T08:46:52.803000 @@ -244886,7 +244886,7 @@ CVE-2024-10562,0,0,797cf6d554ba2a4f7d13cc51d352a15019c8c3fe24a53e57cef8fc7c31733 CVE-2024-10563,0,0,4e593e37a3aa1652f5216139946bd89b7a3798f9797cb1cde919043c5c7de6a7,2025-02-26T15:15:20.480000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 -CVE-2024-10569,0,1,73c4e3748ebc7f72dd1c234f5f5e7a438cbbc6a29db86199f9b964863aa47080,2025-03-20T18:15:17.533000 +CVE-2024-10569,0,0,73c4e3748ebc7f72dd1c234f5f5e7a438cbbc6a29db86199f9b964863aa47080,2025-03-20T18:15:17.533000 CVE-2024-1057,0,0,82d074eff87805c0c8af6f292d67be991df4f6c4e8e298eece318c63dbd97000,2024-11-21T08:49:41.890000 CVE-2024-10570,0,0,d14f79535077a039c8f0d0d1b0a6c4a3ac35cc316f33ff69affb05a342db6337,2024-11-26T06:15:07.880000 CVE-2024-10571,0,0,f71ab1f371691490f777d99e9ef171c06da239e7fc0febb0c87d28cd50afda7c,2024-11-19T15:46:52.187000 @@ -245678,7 +245678,7 @@ CVE-2024-11360,0,0,659b24fc81e4938ca0374fdfc531183f0da8359af24c60f66cd39ca705cc7 CVE-2024-11361,0,0,a258bcb3f99fb669d7603f67eec83a19db748f78307acdbf1ea168f7db1a2de0,2024-11-23T05:15:06.673000 CVE-2024-11362,0,0,600c443b489e86c090d64bcffdb5d5e1bea467b36951abaa22635fe3a3274b4a,2024-11-23T04:15:08.617000 CVE-2024-11363,0,0,3d278edca29c5b7190896835b6870c778a4e33238dce13474ce4c1f942cd43b4,2025-01-07T05:15:11.713000 -CVE-2024-11364,0,1,4738b9b767d38e429adea8b5348a2f2d8a6c004df217036ecfccf86eb37e5797,2025-03-20T18:15:17.637000 +CVE-2024-11364,0,0,4738b9b767d38e429adea8b5348a2f2d8a6c004df217036ecfccf86eb37e5797,2025-03-20T18:15:17.637000 CVE-2024-11365,0,0,0e66126dac632663f20d3d9475ab7eeeaaf1783cab23902c99ae23613a9ecef6,2024-11-26T17:43:23.240000 CVE-2024-11366,0,0,eac89358fd6d61e1ab632fc5133430774b50e5a3fa0dd5cf3b695ea3fcce5bce,2024-11-28T09:15:04.313000 CVE-2024-11367,0,0,eea02b3c7a7e23b6b50200379882a96782686712f1c754d90239651a5f9c3034,2024-12-07T10:15:05.453000 @@ -247046,7 +247046,7 @@ CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4 CVE-2024-12755,0,0,b5362f9e3e31c0b57869006d2298d31591777230eca5ce4b5a5213307978f44c,2025-02-11T17:15:21.610000 CVE-2024-12756,0,0,2562079d9e4656b46db8a610d92e6c92943f02ef7d0890d38121747eb6e998b8,2025-02-11T17:15:21.730000 CVE-2024-12757,0,0,59b3c973befa30374ffcf1ab4161548d07f5e5492ef051981b9e84ee4f205c96,2025-01-17T18:15:24.690000 -CVE-2024-12759,0,1,271568bca63bfcd66a7fa724d715582cce39ca1bd84a3dd88f66e741a1d1c730,2025-03-20T18:15:17.887000 +CVE-2024-12759,0,0,271568bca63bfcd66a7fa724d715582cce39ca1bd84a3dd88f66e741a1d1c730,2025-03-20T18:15:17.887000 CVE-2024-1276,0,0,f50c16503844f6c3e1c1a0a387b576b44fb3755a2ee23646c803c74e182e6a73,2025-01-08T18:37:36.067000 CVE-2024-12760,0,0,5cc3ce2673c2d1426ddd564c6ce0bb3a774f48332bb2504d75f7a542dfc3f269,2025-03-20T10:15:29.750000 CVE-2024-12761,0,0,c81748a3b23c8ecd59e75d1e60fcfd8c0ad9dc35e8aaa3c1a185d074f4b9cb99,2025-03-20T10:15:29.873000 @@ -248112,14 +248112,14 @@ CVE-2024-13870,0,0,3cb87b62ec130122ba819c9d907ccf45e4d470775a7726fc8ca4fa815401f CVE-2024-13871,0,0,6914e75153aa8ac82856a10614a4ab71bf74b973b9197753b08e3467b50ff7e4,2025-03-12T12:15:14.087000 CVE-2024-13872,0,0,8441a8b9821b99dd5d66f21ca116b3982d70866c01c29996d1bcba8ba0374b87,2025-03-12T12:15:14.273000 CVE-2024-13873,0,0,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000 -CVE-2024-13875,0,0,4c4cecd6b115bd318fac78ba810a7e795d1c9ba3a8dc6f2ae96b08e6c9c2e698,2025-03-20T06:15:20.620000 -CVE-2024-13876,0,0,a6ebb82a1fbefbec5c14d68f2b73e5515e609b6de3baf8cad239c22497244595,2025-03-20T06:15:21.910000 -CVE-2024-13877,0,0,86f0106017c8b156183efc0f8f67c29d774d90ea066e396d3e86f4f2bc1d0895,2025-03-20T06:15:22.007000 -CVE-2024-13878,0,0,76be53f327d568ac30dae8c2a9f910a385d388d6c51d3af1e9b6d00145e8e707,2025-03-20T06:15:22.113000 +CVE-2024-13875,0,1,eed1475fc3ad0ba3139186dc609e61cb55e78e3583d6e02297b7a15ff3c86db8,2025-03-20T20:15:30.417000 +CVE-2024-13876,0,1,077b8628a5ab232a7caaf6c749dd7efecd91d02a271343f5b8cc6f19607bdda5,2025-03-20T19:15:26.637000 +CVE-2024-13877,0,1,9f36d0df7e7572c1745bc470ca475333b48a90c7d2df7242c6a99da04537fc22,2025-03-20T19:15:26.783000 +CVE-2024-13878,0,1,6dbe5f5a17593f38f541ee44b0bd7d7d86e03b8e939cc5d03b3cb0b86741d78e,2025-03-20T20:15:30.547000 CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 -CVE-2024-13880,0,0,f43a7abb0507806a71f44c2a191537323a6d4b532fc4e4c876f6db3e8144a038,2025-03-20T06:15:22.213000 -CVE-2024-13881,0,0,8b65cb8fa8cbde3862235205edca969a348d00c229e25f68f803d628efd02697,2025-03-20T06:15:22.317000 +CVE-2024-13880,0,1,0ff02498cff58878a8a5d5eb21d52bbff93dcdd8dcacbf3d082a3afacbdb3402,2025-03-20T20:15:30.667000 +CVE-2024-13881,0,1,b3bb8aa6726760916cc72878833d3b4c59620ca355d3faab7ed0f9e6a8cb9fdf,2025-03-20T20:15:30.790000 CVE-2024-13882,0,0,84433ff5336d8ffd4f3b9e1900997873e762c753471a7d076048637860bc8a15,2025-03-13T13:06:16.947000 CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000 CVE-2024-13884,0,0,a633c4be0fc2c6cc5ab3035b1404e8e38cf9bff027e285ddb96ab884f66c4960,2025-03-14T17:15:41.327000 @@ -248283,7 +248283,7 @@ CVE-2024-1521,0,0,b9e9b7158ea19eb6e0d034a7fbba1cb55281ba560e9c40fc45dc77953ecba6 CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000 CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000 CVE-2024-1525,0,0,c5719c2d073faeda894e23a5762be2b220de3339124866e59d0ff45c5692c966,2024-11-21T08:50:45.333000 -CVE-2024-1526,0,0,8162a28feb72019d8aa05d7943653cfea4933c2d9f1da50f316b5c17a44edd4d,2024-11-21T08:50:45.473000 +CVE-2024-1526,0,1,b1910ed68d0869a7c71dad1353cddec9f9c54026b468dab31049d015750ab308,2025-03-20T20:15:30.910000 CVE-2024-1527,0,0,4f84af9bdc73755ccd9a13376e3710553bc99de6dc5e52cccd42e867f6336abe,2025-02-26T15:38:35.823000 CVE-2024-1528,0,0,1dd5ad820052c35bdcb1b7660dc02c865100085e4531dd9d553af841cbad90f9,2025-02-26T15:38:21.990000 CVE-2024-1529,0,0,aab7bbafdc91a48d17256ed59302a6ee6323f3aa5031b78aaa16f56dd4941191,2025-02-26T15:18:02.950000 @@ -248497,7 +248497,7 @@ CVE-2024-1752,0,0,899790f65b6ea36fdaaec55cf9cba5c9e8120dada21d406f68487a9d2bb0a9 CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000 CVE-2024-1754,0,0,1a62e04cfc963db540100c68219b255ef7962cf0c80d59371fd17c6fd5a6366b,2024-11-29T18:15:06.763000 CVE-2024-1755,0,0,a7ea4e5076a3c70d07f1af2be88a686318f2826b2707f5d9b21f454fe91f58c3,2024-11-21T08:51:14.617000 -CVE-2024-1756,0,0,a55105396c0a5cfd03125dbd5666bd370a097913a79fb44905b745cf43bd3390,2024-11-21T08:51:14.803000 +CVE-2024-1756,0,1,1fee8b5c3ee36b111ee85a3b990a1a617db166801ae5311bd331c34be629666e,2025-03-20T20:15:31.060000 CVE-2024-1758,0,0,2090925a76f71054d14457b1c3ec5ca86bfd30edb93c5c434e97f472b358c692,2025-02-27T22:10:50.257000 CVE-2024-1759,0,0,c8ba467071cf346ec745a9e5d8e8597a923cfb677c329e24e430d58ed7e0f042,2025-03-05T15:16:02.960000 CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000 @@ -248768,7 +248768,7 @@ CVE-2024-20031,0,0,58d5bef62d94d1d53ca3eef063b6a3cdfd49f29000396cdda434d2619169a CVE-2024-20032,0,0,bba00a5fd9ccbaab108caed164f5598cfa855a4efcff2d554905754a727df31b,2024-11-21T08:51:51.373000 CVE-2024-20033,0,0,d0a5c719638e1d2034bceb7e751b62ec2e0248a2e58e9923563a9582339f0a41,2024-11-21T08:51:51.587000 CVE-2024-20034,0,0,ea13fe7679d8a745d5630ee5759a722bd681d4fde35550fbad78084bff2a2b0c,2024-11-21T08:51:51.773000 -CVE-2024-20036,0,0,1ffeddb424fbb13de4aa645ac80f6ce3d5c70bf462638aae4f5dfe94c572bef3,2024-11-21T08:51:51.970000 +CVE-2024-20036,0,1,e5aba01f1cf08794bea0c0245ea7260a653d40656878c3332f38b76b437196fa,2025-03-20T19:15:27.843000 CVE-2024-20037,0,0,3e0455015ea2766f4c4d4428104a9bd3381b755c62ac17d9617b8c76e6e21bc6,2024-11-21T08:51:52.160000 CVE-2024-20038,0,0,65da747c3f7585db9ad477391c6806598d1e3774fbcbae6ae8c69c3ac74e4b25,2024-11-21T08:51:52.357000 CVE-2024-20039,0,0,2b0fdb71275f49aeadf986dee4d38a4bf4c596bec19be53f8dd6bb9e1145f672,2024-11-21T08:51:52.523000 @@ -249607,7 +249607,7 @@ CVE-2024-21022,0,0,2f78adf409a130aaedfee1e6621bd5e964d4399619a87627dfa8a21677f34 CVE-2024-21023,0,0,e134b1853a8bf2832e8f1680cf05dedeeb47bd53257ea5153175eac9e1551b02,2024-11-21T08:53:38.303000 CVE-2024-21024,0,0,22798d4b68c52eb493cfe689aff459faaf8d179b78e934d2b2ef2680c2710f5b,2024-11-27T16:31:18.080000 CVE-2024-21025,0,0,cb940b17b62838bae7c7173612add05e07812946f7f9845c549dee6f7e994c8c,2024-11-27T16:31:12.720000 -CVE-2024-21026,0,0,499523ab9c42adbddcb9465d525bd64fdafa00b45a36fba8323a728fd7860532,2024-11-21T08:53:38.623000 +CVE-2024-21026,0,1,af98bfd86b849b352167b6e894321f80af9f7e3d7dfcb02d784c5c4744fef10f,2025-03-20T19:15:27.993000 CVE-2024-21027,0,0,a61ffe37c9f1d4a384893fde109de27008fa272fa0f6ae950bf7e6f33ee668bc,2024-11-21T08:53:38.737000 CVE-2024-21028,0,0,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bfaa1,2025-03-20T14:15:19 CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000 @@ -250740,7 +250740,7 @@ CVE-2024-22231,0,0,00d24777816f67af654168cfcd3ff75468e6779ec207c4463e3916155d2ce CVE-2024-22232,0,0,a58028fb899c58165e782bc20cdfb8e2eabeb083b6ccc045cb5ef6797325f51c,2024-11-21T08:55:51.217000 CVE-2024-22233,0,0,c0904394ccb963059089e9a753384d3810df74d9d9a397c3de8c3e0d3e800461,2025-02-13T18:16:47.227000 CVE-2024-22234,0,0,370cbc1e41eb8140045717f9aada40a681eece8ce2956c5ff9b56292c31bc0e0,2025-02-13T18:16:47.380000 -CVE-2024-22235,0,0,005a0b50c895e46cf18c49b9029038935bad06fd6e0d412045a501945d6825be,2025-02-12T16:59:46.897000 +CVE-2024-22235,0,1,57053475094df669980d237b32ab1c322552a37c9874381603f8aadf499f8bc8,2025-03-20T20:15:31.190000 CVE-2024-22236,0,0,7a7a3e4ac4db4b451767224de6cb82094287c63ab888364cf9711bfcc5f9020f,2024-11-21T08:55:51.770000 CVE-2024-22237,0,0,8988002ac236d4e397c5988a00f219e4b57a88835084054c4efc993ea2b0cf14,2024-11-21T08:55:51.907000 CVE-2024-22238,0,0,e6819e36f5374d23fb71e862817cd3a024dd1ba4a6dafba26ae763447bcf1c0c,2024-11-21T08:55:52.037000 @@ -251642,7 +251642,7 @@ CVE-2024-23517,0,0,a07da7f8ff74c07e3aafe68f2ec68f4874cf7345f49bddc3b7ceff7f2c49d CVE-2024-23518,0,0,3536980112272660cb2e5c6f499a750764ce48713e0c277c9ee2a48797df869f,2024-11-21T08:57:52.507000 CVE-2024-23519,0,0,1ea214d5503ad45ce590c4615c30761c36942dab36a632af4bf1fde9401787f8,2025-01-08T17:10:44.600000 CVE-2024-2352,0,0,df92827104001af3b64684366248c2c076c3753e8ca09840742673159a5417f2,2025-02-05T13:55:32.650000 -CVE-2024-23520,0,0,2a224669f65b031e874f35d3255621eb3e7a990714db584111418c730d11b0cb,2024-11-21T08:57:52.773000 +CVE-2024-23520,0,1,978a9e625a47f4849e1edf5d79b0f29fc62befa2eb0581584fc5e706885a590a,2025-03-20T19:47:41.243000 CVE-2024-23521,0,0,57d58ffb0b9d9efecde4d13454097fc5a706b8ca84a89b6c40b02bdc1acf2c89,2024-11-21T08:57:52.917000 CVE-2024-23522,0,0,e9199f7cbcff6af01d20d297fe947b7685cc900555c843ba08ab65ddfafffb61,2025-02-03T16:20:24.827000 CVE-2024-23523,0,0,6b732971a9009d9924469952ccdd7773f23afdb9ca508585f57f299b77cef45d,2024-11-21T08:57:53.177000 @@ -252809,7 +252809,7 @@ CVE-2024-25139,0,0,fdeb3d927e69c956014f96de124a68cf6bb51b7f07318e0d74877516eaff6 CVE-2024-2514,0,0,5200b1b4abdb8003a23e080265b9e49d8c4e2348a39e99585227acbc3947cae7,2025-03-03T16:40:27.943000 CVE-2024-25140,0,0,4ce38a5e52087d3f6ac88d58a99d775b8a3a482d26af7aec3ecdd9c1eb0cc9f2,2024-11-21T09:00:19.800000 CVE-2024-25141,0,0,569d4c84f026c7313d1be9b590a56d17544ba69d3b1c743c7f697b7d4b70ae6e,2024-11-21T09:00:20.073000 -CVE-2024-25142,0,0,db42fdc65111e68e257774ac0212736096b6a80463cfaa3d305c8c982827e10b,2024-12-11T15:37:21.737000 +CVE-2024-25142,0,1,feac64567aaed87167735678d19bd3968e44056efd7705214426bccb3f7ff079,2025-03-20T20:15:31.320000 CVE-2024-25143,0,0,135ee95864ec141ebde7278cc8981689253a34523b9fcac1e5d724866576b291,2024-11-21T09:00:20.390000 CVE-2024-25144,0,0,3dc63c0585af532961c0fe1fa86b66af7267847e46b9d7544e9152bc733b0db0,2024-11-21T09:00:20.550000 CVE-2024-25145,0,0,dbee4a8aa2955d24baa6ce590f567fd8a044639487641fff575b69d6b04e2e77,2024-11-21T09:00:20.713000 @@ -253807,7 +253807,7 @@ CVE-2024-26566,0,0,17fcdac1abfd469cf3ffd2a7711c92e40eda453c6c83e0105c8a9c787273b CVE-2024-2657,0,0,0a4026599cc8f564da68adf5d96fb16ac5a93f2d83477b37500b3fcf5ca350a2,2024-11-21T09:10:13.690000 CVE-2024-26574,0,0,c9911895eba0376ea8a04813b72831a135e34cb8219fef4dc4368d52d0492aa2,2024-11-21T09:02:34.080000 CVE-2024-26577,0,0,b31cfe48a896bbe0069a91709f0e0fcdcc1053cc2c31cf21b6fc4d7e6e447649,2024-11-21T09:02:34.307000 -CVE-2024-26578,0,0,e55b6ec34e756c1aeae752503ce62c66f3ff363167510aa6afc587c4141bd771,2025-02-13T18:17:19.373000 +CVE-2024-26578,0,1,b3a8ead68e9b1ae0b466e127a1444d13593e44647cd1512e86348375ea067826,2025-03-20T20:15:31.513000 CVE-2024-26579,0,0,ea464ed8b9f745cfdecb5909e358e6730f50b02bf26d73cd2c6f7fde3e39caa6,2025-02-13T18:17:19.517000 CVE-2024-2658,0,0,907d36c5e2209ca32f5558db3fc2ea0837a4c01cd3782354e142d39e1f9b95af,2025-01-30T17:15:17.670000 CVE-2024-26580,0,0,94bf37febb15cb97c6bc7c6b5ab4ae1ac2c08fda754ee5101431258fe0b07658,2025-02-13T18:17:19.673000 @@ -254412,7 +254412,7 @@ CVE-2024-27132,0,0,97112c2430a1efdd24acd2d9a19461523930f5b80f33a45ebf983e3f77055 CVE-2024-27133,0,0,0bc1efdc0e9ed092d39790d962760e4b53b0fb29de201e5b7a8c363318010504,2025-01-22T13:46:56.667000 CVE-2024-27134,0,0,43c47d7561ac0b1c99cf22d9f7d4bfc185fca5cbaa5e50446a0cf04563788920,2025-02-03T15:05:50.187000 CVE-2024-27135,0,0,c5f534ef88a9e9eaff155842f87322112e99c356c54f6c71684987225cd7fa85,2025-02-13T18:17:19.870000 -CVE-2024-27136,0,1,13e529133b2e84a6c8cfdf5f9c2ff115f3523ac3086bae852c1f8c40e326704b,2025-03-20T18:15:17.993000 +CVE-2024-27136,0,0,13e529133b2e84a6c8cfdf5f9c2ff115f3523ac3086bae852c1f8c40e326704b,2025-03-20T18:15:17.993000 CVE-2024-27137,0,0,406ba8cc1005b2f95b39ccb2925e400d63ab30eca0da28ad8c183d1a82564e36,2025-02-15T01:15:10.420000 CVE-2024-27138,0,0,a1f246d3f04fa003abe3c6091fd793bedb6f5dde95bf6dd32eacf1451a4a5a52,2025-02-13T18:17:20.050000 CVE-2024-27139,0,0,0ff86b04adb0fc7c1c33cb6bd863a62db5b9916e1f7bb82deb2ed5771b9ccaa6,2025-02-13T18:17:20.287000 @@ -254670,7 +254670,7 @@ CVE-2024-27386,0,0,1b64d665730a7687a332bebc6b1e44f0548d458eb827204a2ee1cc939a731 CVE-2024-27387,0,0,f80b391b77c2a4e04325f2fd0a86e21edb07988c6c2cd77439241176d0ef14dd,2025-03-17T16:15:21.177000 CVE-2024-27388,0,0,98453ba7ddab0d75275ebcbe2cf9adcd01c61d4c18396a578a59da147f49ad6d,2025-01-14T14:56:08.617000 CVE-2024-27389,0,0,c217d6184563415f226e9a80f037b8d7514915a86c3207640b24918bb7cb55bd,2024-11-21T09:04:30.670000 -CVE-2024-2739,0,0,f4d65d5336ee215a214a5da90ed0322790b7be3ef272f9615bf61860991305e8,2024-11-21T09:10:24.570000 +CVE-2024-2739,0,1,bbf7d706016e4b5d6720a148e492ec8c2b85ab75b873dcf890b3a36ec5799cb7,2025-03-20T19:15:28.933000 CVE-2024-27390,0,0,7780428a286bfe2ad84944e0e3c56b2f0984a92e2b031a42317e22e477ac14fc,2024-11-21T09:04:30.793000 CVE-2024-27391,0,0,74e7ba782a652174d6e44269cc22f7e3eae02e2f8b1404503a1469482e17c178,2024-11-21T09:04:30.910000 CVE-2024-27392,0,0,51788877a716c0011203ead65a89d91afe3ce071b5d9cd963e34730d678899ad,2024-12-26T20:32:43.923000 @@ -255167,7 +255167,7 @@ CVE-2024-28051,0,0,de198a0eafa66377d1b1913e11ab30e60d08fcf78e4d7e0f859604a31b006 CVE-2024-28052,0,0,c091e5a10488583b0029fed7f1a8e4d1e6cdb2795bd026298532c166c3b5f4bd,2024-11-21T09:05:42.417000 CVE-2024-28053,0,0,9d049b1d60f930519827e1044a4f3fd31b9f0d3b4e2dc36c85f114fc799f4e7b,2024-12-13T17:04:25.663000 CVE-2024-28054,0,0,f7902a4e1dcfe1ea2bc306c225534b3576e6f1ffdf71e6263a949c5650629eb0,2024-11-21T09:05:42.750000 -CVE-2024-28056,0,0,6fd54e5fa7e64f2763a8dc40c2e6642daefeeae692ef449582209ac5afceeed1,2024-11-21T09:05:42.933000 +CVE-2024-28056,0,1,54ec43d2bd6a1e03728ecaf459c1f7b68dccb34954269202c18491a26f12d2d7,2025-03-20T19:15:28.160000 CVE-2024-28058,0,0,787a78d70d26214b6983cf8dcf8276db60e674f375fc2818e93317905b7a88a2,2024-11-21T17:15:12.207000 CVE-2024-2806,0,0,4d6f6543e89281b6263f8cf8af7cacf5366694bd179ef044fb7a7b3d27de5f3b,2024-11-21T09:10:33.937000 CVE-2024-28060,0,0,9bfbbaa68ed068094ccddcb16884f43056a85e0253067a28036cbb9bd9f05248,2025-03-13T14:15:24.730000 @@ -255180,7 +255180,7 @@ CVE-2024-28067,0,0,3565fd0ada2e0c321bb115af4a670e45b532df6130e88a302b617be4c5f9f CVE-2024-28068,0,0,4ad18e3fac7a71a575f477d531a4c0047d3a9eba63b8ba6967e711d0116faaae,2024-11-21T09:05:44.713000 CVE-2024-28069,0,0,efb0a27d12fc8c409138d4cb99523efd1ff8eff144f8315bf517a3e7f24c3984,2025-03-18T14:15:38.693000 CVE-2024-2807,0,0,d5df072d14c63a150df30c06942ef8b1a4196e073cd023f9b3c41b08dcfaef61,2024-11-21T09:10:34.117000 -CVE-2024-28070,0,0,636e2a0fb0d0c0f843795bd2fc360a9b786d38874ab72d393604ed9b95733d95,2024-11-21T09:05:45.067000 +CVE-2024-28070,0,1,4d741f4953d0f9972179ddf663fa4491f9af71af0d4d20e6e109cc78b63386f1,2025-03-20T20:15:31.707000 CVE-2024-28072,0,0,4c08f86186600b9b3288b9e0c28e7c3bbf121b9a165ab22ed55189c2b2697fdf,2025-02-25T17:12:45.987000 CVE-2024-28073,0,0,9e93116ea0a1164669b0a89f103bcb752560d58559173a183331a8d5e18ea3e9,2025-02-10T22:38:47.683000 CVE-2024-28074,0,0,3d38a6fb7b33bb44728bf0324460e801275e73fa7b2b344069badf98dbf71eb9,2025-02-26T18:44:42.420000 @@ -255189,7 +255189,7 @@ CVE-2024-28076,0,0,c750b38ea0f2fa1e6ffa55b768ff6e9b1fa3846fbd02975be2ad3d9116399 CVE-2024-28077,0,0,ab6e8f4dc04fc1973b120a7e710381163bb4c8657a409fb2b83070ea1d7ab3ff,2025-03-14T14:15:14.653000 CVE-2024-2808,0,0,929e834e70a4305880128a178e107c6fe817020c4a8d1b390bde853ff35341d0,2024-11-21T09:10:34.280000 CVE-2024-28084,0,0,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000 -CVE-2024-28085,0,1,3da950b9a75ec6fd2241d16d485379e7b353a6b1bd707e00202deb8cb179e429,2025-03-20T17:58:00.680000 +CVE-2024-28085,0,0,3da950b9a75ec6fd2241d16d485379e7b353a6b1bd707e00202deb8cb179e429,2025-03-20T17:58:00.680000 CVE-2024-28087,0,0,1cf2c29c3a52af51eece9d14d776aa50c22fd39822de195a1746d467e8c2dafb,2024-11-21T09:05:46.523000 CVE-2024-28088,0,0,1cb8a1d0b63338fd18325d3f75eb7b62999e851ce9d7f91a18ce7885b3c5b7b8,2025-01-08T16:13:57.860000 CVE-2024-28089,0,0,49f0aa6513ba2ab4d442d451601a63c564c42eeec06484d5925e65cddbb914d3,2024-11-21T09:05:46.980000 @@ -255233,7 +255233,7 @@ CVE-2024-28123,0,0,5099212f57d318f83757e71a466b9bdf4be2bbcb864e78e89326cbc09e003 CVE-2024-28125,0,0,a964f3be7fbf693cabfab1cab21a25243643637360f3b4dfc76dfcb0e2a98c0a,2024-11-21T09:05:52.107000 CVE-2024-28126,0,0,bdca6710977b6c4816da9b6611740c12aabc24c1dc8b3f05e1f936957ab23ed5,2024-11-21T09:05:52.337000 CVE-2024-28127,0,0,77e8cab03528d8443539f421af735f4841e64e2500d965d208c91c76c1e365e8,2025-02-12T22:15:32.137000 -CVE-2024-28128,0,0,f9355c801ef68e3da3d56c4e8f27ae1b829dadb3d59cdd33587b81468dd75195,2025-03-04T18:29:34.530000 +CVE-2024-28128,0,1,3902b762ca50352e1553f0e963e15d5f43b1b39e4e02a9982674db458e936006,2025-03-20T19:15:28.360000 CVE-2024-2813,0,0,f6cf44b143c45f427a4e19d3a3c84fafa892be9cdc350a85d194bce1d00ab565,2024-11-21T09:10:35.157000 CVE-2024-28130,0,0,69640234ddd8399b998b711ea548de6aa4b7b8289789fb11379a6d5513f1b0f0,2024-11-21T09:05:52.640000 CVE-2024-28131,0,0,ac6341de81d38b323cb8d4155aaff35dcc48c0fd487702b27be5fe24c82bdc12,2024-11-21T09:05:52.790000 @@ -255567,7 +255567,7 @@ CVE-2024-28740,0,0,59845f313cbdf7224a1102cca1548a45ffb7fb3b8466fe620d06a97690098 CVE-2024-28741,0,0,335d1d75b1ec6bbbe9be7839da86be48fa75d600721df7343911718962694585,2024-11-21T09:06:51.950000 CVE-2024-28744,0,0,d80a636691f100f09a75e0a042c51fb3034a953b6a967d3f70a481b8b5994955,2024-11-21T09:06:52.213000 CVE-2024-28745,0,0,91ef1325c98edf70fcbf24b65ae735057caef5c58bbed9642397279a120b86d5,2024-11-21T09:06:52.440000 -CVE-2024-28746,0,0,fa79e63f9a13c9245682e21c25ea4382f4071d37aa94937e2349cca04cfd1cb2,2025-02-13T18:17:48.710000 +CVE-2024-28746,0,1,2b09f47274fb34324f60836312e865700a7778fef29348b664c0c6feeaadc7b3,2025-03-20T19:15:28.523000 CVE-2024-28747,0,0,444e0665e0fa4bc7a9eed21e96c1f26d12d34db5f4f03af83617f9af0cdac9dc,2024-11-21T09:06:52.760000 CVE-2024-28748,0,0,986bd0b3a8d13558908b2e1a62f8fe2184ce6b09035b5249a0a0f5b6201e3950,2024-11-21T09:06:52.890000 CVE-2024-28749,0,0,d82cd3742eadfa7bf824ee31dfa37098b1ae1737e1fa93022ca9f93753fa6a44,2024-11-21T09:06:53.027000 @@ -256126,7 +256126,7 @@ CVE-2024-29455,0,0,c5766b7ace224fe7d010005c23caa8535593f35607a7498893863c39faace CVE-2024-2946,0,0,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941f1,2024-11-21T09:10:54.347000 CVE-2024-29460,0,0,8d92453cad8a8393fa15cddde56132ecc5c7ca6e2ee3a6965bdc21d4886ca532,2024-11-21T09:08:02.840000 CVE-2024-29461,0,0,6784514e8f6ad0fcfc7af2e2ecc7f7e5ac701f479b42634f80923d877f6e76a5,2025-03-17T16:15:21.387000 -CVE-2024-29466,0,0,dfd330dba5d7fba0202d1e5874291f2f8ef3b988243824c2ad389998fb4c34d7,2024-11-21T09:08:03.290000 +CVE-2024-29466,0,1,d1c8dd4175f772e9684f7c0531d839c45304893b8eb7f47c0e48698c58964c2e,2025-03-20T20:15:31.863000 CVE-2024-29469,0,0,b4ff7e7dd0886c37f289432ddc27d014390f9ccece3870733ae3b10ba447da3a,2024-11-21T09:08:03.500000 CVE-2024-2947,0,0,a2260296cea0a8b0297fccf6e19d9b38e7eac981b1298727580d42f3bdd9e8c4,2024-11-21T09:10:54.473000 CVE-2024-29470,0,0,75cc4ff47ee046b1275e5889318f83247d27860717755453f2a30467ae3c8e1c,2024-11-21T09:08:03.713000 @@ -256146,7 +256146,7 @@ CVE-2024-29504,0,0,53fc663b9e6d96ca964c735e36e903d675794b657641161dbc25730d9236f CVE-2024-29506,0,0,33bf7b54456a7e4cb2ab4766502f70f6f853d9cd67666f22c7f233033f9462b7,2024-11-21T09:08:05.937000 CVE-2024-29507,0,0,93542c862056d4c35a631847c41896c490e01aa3d0b341ed0eed1882aed2d1c0,2024-12-03T16:15:21.343000 CVE-2024-29508,0,0,536c14ce04e18fa15e83ca5caa40460bc2de5ae8a8a60dacf4644cfd33c2babf,2025-03-17T14:15:17.610000 -CVE-2024-29509,0,0,cba223f5b31c075d11c5e083750eaa458611f671573da4d965e953347f673d0f,2024-11-21T09:08:06.510000 +CVE-2024-29509,0,1,a40a88812b5e1bf1cab0d69ac540979ac1d8459d045e60795627cf2b63c8441f,2025-03-20T19:15:28.703000 CVE-2024-2951,0,0,0af750d8fa5d6660d81b92e4090fc96c2f893ae32a136d6454a0eb8dec22afe3,2025-02-04T20:04:27.787000 CVE-2024-29510,0,0,71fa9c4217e55bccbf9dba63ba481f89e84e04df22cc0bee2642be0dadc7e1f0,2024-11-21T09:08:06.683000 CVE-2024-29511,0,0,f503ca214959d203d9368135993dc7a9ebdc879e2158b2031d72f5741e70c7e0,2024-11-21T09:08:06.910000 @@ -257656,7 +257656,7 @@ CVE-2024-31395,0,0,498c699ad6f6133b9a6c980f060666b9935640028a78396956f06a774e504 CVE-2024-31396,0,0,12070261c9f4beb75949d082f0abbcd14c87a6065f52201897e85d31060408bc,2024-11-21T09:13:26.830000 CVE-2024-31397,0,0,4669b8c9ee6bff7627f3fabe734097169262ab8e925a351364e2643d116f2d6e,2024-11-21T09:13:27.013000 CVE-2024-31398,0,0,f9ba4ee0ae0c258a49a7910bb595cf20c4cf6f225c058b34ebadd3f2c4800a6d,2025-03-13T14:15:25.450000 -CVE-2024-31399,0,0,69c671b3f2b9824d1d3b88c3a428d3e5889527feac06c7757b6605ccc0413fd9,2024-11-21T09:13:27.323000 +CVE-2024-31399,0,1,4f7d37c9735641a5b4bf04f3f5e2ffc159c3cb35dd068f7581dbcac7ed868af0,2025-03-20T19:15:29.070000 CVE-2024-3140,0,0,581a061887974455c3125abcbc00c0e0813a872379e447821195f0f7416d7105,2025-01-24T16:30:02.737000 CVE-2024-31400,0,0,7e4080f10aa278ce8df7d9488317404c2dff8e1c3510182a88eb3f049386223f,2024-11-21T09:13:27.470000 CVE-2024-31401,0,0,d23bc7e26f4f52e4438758e09d0f4ed266aeb8096cfa9dc7f40d19524690ebfb,2024-11-21T09:13:27.653000 @@ -257760,7 +257760,7 @@ CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916 CVE-2024-31502,0,0,e1a3371156b5bfc652018b1d8fcd99dd9bbdd2be7fa3fdac29255561faa54a60,2024-11-21T09:13:39.480000 CVE-2024-31503,0,0,518cd08ef865de234cd65cfcb97b45b19d6b39872e738ecf53628254de118758,2024-11-21T09:13:39.700000 CVE-2024-31504,0,0,e609fdd3d56331d45ea8d49c7af4d1de4b29d053dc7ca378918a58ec72a1ae55,2024-11-21T09:13:39.917000 -CVE-2024-31506,0,0,80ac2e133d5b6ca9e826e6ab048945a8a63c37a803fc401a9799099da94a0777,2025-02-18T17:23:42.777000 +CVE-2024-31506,0,1,616284889025843c021b0726709d0c2938adbe743bbeef4b239aedaa6c11d52a,2025-03-20T19:15:29.227000 CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7bc74,2024-11-21T09:13:40.310000 CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 @@ -258559,7 +258559,7 @@ CVE-2024-32677,0,0,8bdad575f926c579b11688030195f9809fc141578e312d6097cd2363ccae4 CVE-2024-32678,0,0,7641fbb4727f544a250314692648516c0791c5bc4f107a1e7d58c2e4f6886929,2024-11-21T09:15:27.540000 CVE-2024-32679,0,0,fe54e15dc839123d941b045ae3670b09750598217110f0f298a92e4fd577034e,2024-11-21T09:15:27.677000 CVE-2024-3268,0,0,fa062da5a5c790a6c85ad001c3a8b10ed479217119275462adc152f1cd898a91,2025-02-07T19:09:39 -CVE-2024-32680,0,0,9104a30edc369acfc16f699f62a6368a787d631448c90db08075ca5c9799eb0e,2024-11-21T09:15:27.820000 +CVE-2024-32680,0,1,6e2e3b2acba5b99a3fe453c3823e5d963fc6dd7a378c9230f6b759468a07f31f,2025-03-20T20:30:34.187000 CVE-2024-32681,0,0,476cba4d3d7c527b8043035a88ce8d1329415a651c248f4e6b1c4a0a70da8d5e,2025-02-04T15:39:14.603000 CVE-2024-32682,0,0,dda0b3bf8b170e0ba23d37939705048be89c9fc3b986eb82eaf0cb6655f5bc88,2025-02-04T15:39:56.673000 CVE-2024-32683,0,0,87e1f98f78a45788abe89da295923c2ed31865ac9a541672d43e8ad385cc7bc2,2025-02-09T20:41:17.927000 @@ -259187,7 +259187,7 @@ CVE-2024-33527,0,0,42ad52099aefcc1d479ba3c2bbb11a46146a451c9515db86076b0e7109d8d CVE-2024-33528,0,0,3ef708f0931fddeaa9dc2c249699d63ce59b50eeefc94306f0c7fb3099eca687,2024-11-21T09:17:05.203000 CVE-2024-33529,0,0,9ccea370b311827244483b8d3a5b4fce82fdf29737450b34d7509800bf469768,2024-11-21T09:17:05.423000 CVE-2024-3353,0,0,84b8c35d9d97520b749eee4f385a73c73e885409dee0b31e90e92164a8e95f9f,2024-11-21T09:29:26.490000 -CVE-2024-33530,0,0,06ed9825ee44d1c3dd0ab66b9ffecff56f97ead6360b88c15483d7aa0c08c3db,2024-11-21T09:17:05.633000 +CVE-2024-33530,0,1,3ed871e25917a3c4ff7ee3df60bfb7ff841a2d395fbf26c4acb34636d8639252,2025-03-20T20:15:32.063000 CVE-2024-33531,0,0,262242f7bd00faa1f7027987397179788d798256dcddf77c1b4715bdd63dfc24,2024-11-21T09:17:05.840000 CVE-2024-33533,0,0,e32840d76d884c13aec64f943949b9fac773afd5e616c993172d8a3981d14215,2025-03-13T21:15:39.390000 CVE-2024-33535,0,0,826004417867806f1c335a653ab9d98379936988b9d0ce12e83904f8bc15b350,2025-03-19T16:15:24.753000 @@ -259919,7 +259919,7 @@ CVE-2024-34443,0,0,5b9baa6cec14c8026b07e62429cfda558b9dc0d4a87372176248e3e0814e9 CVE-2024-34444,0,0,cc355ac27b16de5a6fcd556e1c85c97b239311f2ddd889289393e1d51bb6bc11,2024-11-21T09:18:41.050000 CVE-2024-34445,0,0,32e8e93c53ca27a2e173e4c572f2a16fe70bee7845096ff3013e668cb5325e04,2025-03-07T15:30:22.937000 CVE-2024-34446,0,0,5cac8b3c02517797194e9908657ec718d8fa3cf52cee0d279404b32b8419138c,2024-11-21T09:18:41.320000 -CVE-2024-34447,0,0,6fad62f8e404336575fc5f7b5de6337fae8ff1610f49277f92c483c228065a2f,2024-11-21T09:18:41.543000 +CVE-2024-34447,0,1,b00738c6531356ed0aa02120777a94355cde344072d753506aa23afe7f8e0512,2025-03-20T20:15:32.217000 CVE-2024-34448,0,0,a63e9b8a89308818ad1b8e31075a67350d1a77473d68ddf936398fbf4ac2458d,2024-11-21T09:18:41.693000 CVE-2024-34449,0,0,d6456bfb6470cf11f1446051cd51b1857ba93755947121f19b6007a09938d3d0,2024-11-21T09:18:41.930000 CVE-2024-3445,0,0,717d90d174f4f52786f60564e0abcaedf11c5a0a90ff057fa975c5bd1b8778f0,2025-01-17T13:48:36.867000 @@ -260001,12 +260001,12 @@ CVE-2024-3455,0,0,d0c3e35ccc3cfa5e656d5aa96bd49d9a0f99e3fbd6e4a8e1e0c833a395b1fa CVE-2024-34550,0,0,0700edb8b92fd07441e6badd1d492d48685013af01073aa188bbfd599d709ff5,2024-11-21T09:18:54.950000 CVE-2024-34551,0,0,6612836e0e45ff6a1e9880d2d75602246dbdb39ebeafb01297804784dc0544c5,2024-11-21T09:18:55.070000 CVE-2024-34552,0,0,0fad81b75ba569b15a89d0ffe9f848fad7399e399b280209382812a08fdda8df,2024-11-21T09:18:55.193000 -CVE-2024-34553,0,0,e58ae3e9e3b7d05657ba135ba694d4e7bae28d58e52bbdd9a54c32b8cf1642ec,2024-11-21T09:18:55.320000 +CVE-2024-34553,0,1,94c322ccf141cfb4893f714aab5e64c1461dc48ec28d181484f89f432269e18d,2025-03-20T19:59:34.887000 CVE-2024-34554,0,0,bc1f90c1d4c895b197b3772a0f50f08e8a04a047df5503fe86ef42a2003f5fc2,2024-11-21T09:18:55.443000 CVE-2024-34555,0,0,d0f12bcb4d82d389afcaf5f848324c07ad65c55020ea7b0ba0595ae190522526,2024-11-21T09:18:55.600000 CVE-2024-34556,0,0,b3bd7f24a1abffed6d6ca0477755f5eec82bd5f606a7996fb3f5000d4763eaa8,2024-11-21T09:18:55.723000 CVE-2024-34557,0,0,08e414eddf080cbd1e3e8cced93798817c4e1e0dc992489267147d99cc87b886,2024-11-21T09:18:55.843000 -CVE-2024-34558,0,0,8e0b82ac1ea139a4c72e01c2b6b11c3839e1b37fc1dd7c00d8b120e3dd8b4e9f,2024-11-21T09:18:55.970000 +CVE-2024-34558,0,1,eb44a078123dcf2b7805bcf08953a8369023cd109cb4190c74ed22b304b2129d,2025-03-20T20:01:44.623000 CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3d89,2024-11-21T09:18:56.103000 CVE-2024-3456,0,0,51bde53e86fc8b65bd9d43789099dfe998c3f7f2ca3c02d36838cf21eba463cc,2025-02-07T15:10:05.373000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 @@ -260272,7 +260272,7 @@ CVE-2024-3481,0,0,21441da3ee3d7342e7c1bd8558189b4ec572165ab4d93e0a1b2dd42d65b5a2 CVE-2024-34811,0,0,882adddb7344917499b2046cc8c91a0b1880bc5a2f247847c883852769f68a4e,2025-03-19T18:52:08.760000 CVE-2024-34812,0,0,7d78e169d7d75ab3c581e8d7397e7b1ac81ce93b9eb08c1119bef68e9fbf19ca,2024-11-21T09:19:26.867000 CVE-2024-34813,0,0,584847820bfe3d61f857e727c2ed893dba1c5333c3b8db21fd5d36e9ebfa09ec,2024-11-21T09:19:26.980000 -CVE-2024-34814,0,0,5592c28bc61ee507ca9c95f71fb8edbe8b60ab4e32dc3d21230914ce0f5e8326,2024-11-21T09:19:27.107000 +CVE-2024-34814,0,1,cea73c9ee7cd1afcd6ca5a44d2c50b3a6d09b78f1ff73f9d91349b95d6f3c246,2025-03-20T20:09:07.020000 CVE-2024-34815,0,0,5c0b413c3f5d289f0d9534a9e32dc9f99c078cf11a471548d8f5fd63fdb8f901,2024-11-21T09:19:27.227000 CVE-2024-34816,0,0,2afbda5c9a63b0d75ca157fabb7a95c1885d0c2a007b8157e79785b829a37cb4,2024-11-21T09:19:27.347000 CVE-2024-34817,0,0,10bcc606befb88acf1c84aa3240f06ef5dafb9c661f891bfea7356edd3ac2d07,2024-11-21T09:19:27.470000 @@ -261078,7 +261078,7 @@ CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883 CVE-2024-35937,0,0,20787b5ab1b729218c6f7e48793441c785c51814f8922ce266d448a8a410017a,2025-03-06T12:58:06.400000 CVE-2024-35938,0,0,2efeaa65672def64c85e39f960d3d01dbf5533390de3d3f54f180152cb69f5c5,2024-11-21T09:21:14.773000 CVE-2024-35939,0,0,b275ecea9c74fd7d5d66bfdbd96bb842e1b97b53f548850ac73334b3c0feb367,2024-11-21T09:21:14.910000 -CVE-2024-3594,0,0,55e7aa826fd5ac5a92668a76380c7410f96136b5e95724eafd64e2c8b6da6f6b,2024-11-21T09:29:56.900000 +CVE-2024-3594,0,1,fac65e3c9a1ec4d365c0ad855597ab4f608d5c24a71b09853c3e37d677810290,2025-03-20T19:15:29.977000 CVE-2024-35940,0,0,e90a1a680c9541cde1f3aa3565e11be38a3e705279a6470dafd48d67340bebfb,2024-11-21T09:21:15.043000 CVE-2024-35941,0,0,ba407971e3e616405717173ba5f7515a688bcbca7a950312e8dced7df30c0709,2024-06-04T13:15:52.613000 CVE-2024-35942,0,0,7b996200c19ab3a598e5c796589ca577e75a77d2fc1be95b3d93a8b884efad3e,2024-11-21T09:21:15.287000 @@ -261396,7 +261396,7 @@ CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 CVE-2024-36262,0,0,05824daa48c4318e8d4a5a52b3f1e0034cc48ef3f506393164d29adb59c57dfb,2025-02-12T22:15:34.110000 CVE-2024-36263,0,0,f09e8a3287eddd607f9d6f0d56f84686a478025a137c31455da3455bd15eb63c,2025-02-13T18:18:06.243000 -CVE-2024-36264,0,0,1183540ced40f2999375d457c8902ecd0c4e6588a721ea9cf51f8e304905c117,2024-11-21T09:21:57.363000 +CVE-2024-36264,0,1,04e1bcd76c02069965e737d507ebf01626021e491f1525cc652573bb10ac3645,2025-03-20T19:15:29.423000 CVE-2024-36265,0,0,82ed32b9f7b890ab4fa36735b417a501eb319f0ba86a270440296a771ca098eb,2025-03-19T21:15:36.027000 CVE-2024-36266,0,0,a6eaa23936f4c045e39e2f0a9cbe9efabaae78105eb4d2322e7417e1acb1deea,2024-11-21T09:21:57.640000 CVE-2024-36267,0,0,3648137b8a65567f0be472a89c4c19f9f4b7a0248bb8012d2cfb3977e6c54cc8,2024-11-21T09:21:57.790000 @@ -262501,7 +262501,7 @@ CVE-2024-37623,0,0,2bfb87c9130a0b05a93225a2e34c2ade6091e15037de573304fad9fbf815e CVE-2024-37624,0,0,7db8ec2d9939b5d31556c18b569c40c9ee3d2a78e40c1656f440d13813296a68,2025-03-17T22:15:12.450000 CVE-2024-37625,0,0,f458095ad6fd7133034173ff0c45e670bfe51c5cb0b07e4953c85de52169fd33,2024-11-21T09:24:07.870000 CVE-2024-37626,0,0,0270b51ea0f83caa7b336461c7e27dda1fcb2c1add9c3873485df2b3daab9ea1,2024-11-21T09:24:08.087000 -CVE-2024-37629,0,0,f3060b80283030da9edba5253b3386a49b066edf49cba675ae668286a6fa671c,2024-11-21T09:24:08.307000 +CVE-2024-37629,0,1,74cfdf69f35d769a178cb9206473b8c38cbb85f7397ecd45340820c731d4e2f4,2025-03-20T19:15:29.613000 CVE-2024-3763,0,0,be5c1611badb1b9e8200bfc0571801fcda94ace038ecdadc61d82b5039ef91cb,2025-03-05T18:39:15.987000 CVE-2024-37630,0,0,5345569b39c659d212f227a8673a6148991560e60d341445685034dcbe85fe68,2024-11-21T09:24:08.467000 CVE-2024-37631,0,0,b94172250324e8145a5270c8aeb579076121342f0c3d04531f4eca530cc0a146,2024-11-21T09:24:08.680000 @@ -263513,7 +263513,7 @@ CVE-2024-38765,0,0,45b024f9c43bfe47a4a4716b5c6e2cfd83a268c867cdb7c9b65775b0a2295 CVE-2024-38766,0,0,8c7b8ba00d9d03d5710b03920d96ecdaee1da3dd08661f9ae5ffbc66e9a580a4,2025-01-02T12:15:23.487000 CVE-2024-38767,0,0,fbf72db56b2c3319d2ba5902f993c4818e7574fe761f64435b5a8fda9e194b17,2024-11-21T09:26:47.073000 CVE-2024-38768,0,0,1781e9cdce247930168e6c5b1c9c0f37c8e6be3f68f19088409e9a79f49dba3e,2025-01-22T22:08:45.223000 -CVE-2024-38769,0,0,a8d64d7ebe5f6430e49acf0d9f0c93cbea46e0e66e09af8c860b101b53c3f314,2024-11-01T20:24:53.730000 +CVE-2024-38769,0,1,b87d8cd55391e6f3aa3dde777e288dd5c5978f03583d9c629b55b80c3f5b38b5,2025-03-20T20:47:44.543000 CVE-2024-3877,0,0,7dc053b251c7f8e4c852bf34c6e8a9142b79d84ac3f1a22d95dc5dcefec80237,2025-01-21T16:34:51.410000 CVE-2024-38770,0,0,0c9e03582a12319870a45ae32b8320368f33ad592fdd5a171772f822ee858897,2024-08-02T12:59:43.990000 CVE-2024-38771,0,0,27b468612455a91733eb84f694387c7d5325ed26015a10d165eca1c1b024222f,2024-11-01T20:24:53.730000 @@ -263528,7 +263528,7 @@ CVE-2024-3878,0,0,cf8c5000e1e69ee2cc3732767f8c87bceb9cec1cb07ce8c3b54e41ae6e97a2 CVE-2024-38780,0,0,59b516bf2edeec5bd5de1b6b25f5c18b14158969877e153ee0fa0692d018e06a,2024-11-21T09:26:48.823000 CVE-2024-38781,0,0,0dc3c569223570b22ffc9a0a837f27528b499c6a7317b28bfc390c2a6de9946a,2024-11-21T09:26:49 CVE-2024-38782,0,0,01160802fd0f189b240fc641a37384c195bc1f20e754065643d1aa6713819e12,2024-11-21T09:26:49.157000 -CVE-2024-38783,0,0,0dde7c0160ca51851942083ed33c6886c2aa6968a581be470cfbb4209946be7c,2024-11-01T20:24:53.730000 +CVE-2024-38783,0,1,27c54f46434013b011de48a5be410f75d192b34aa93a6b65650dadae01290383,2025-03-20T20:52:23.083000 CVE-2024-38784,0,0,03addd84db3add4831a4f6d50e89fdb195a454b99cfeda4c4ca8cd5939fd881c,2024-11-21T09:26:49.410000 CVE-2024-38785,0,0,07037cb16ba94bd50736745d5c922040bc2ce584dc2d1b68e039c17ff796ae63,2024-11-21T09:26:49.540000 CVE-2024-38786,0,0,a3945d26053fac2588fcb2b904e0a138f2d9f54dc61623305952d8af8bf018ef,2024-11-21T09:26:49.673000 @@ -263682,7 +263682,7 @@ CVE-2024-39021,0,0,11243a89cd810fa9f40502d7a6088dd9863c3f7fc91630ad32ec0f69b555c CVE-2024-39022,0,0,cb16d1ad13e2952d225baf2cda88f3ff5a016f7c149d54433dae120ec9dc1c12,2024-11-21T09:27:09.260000 CVE-2024-39023,0,0,039108ecc27c1c4a0e76e0ebc3532177c569c3855e36d6bb92a8cfcf57e2b28d,2024-11-21T09:27:09.487000 CVE-2024-39025,0,0,33dbeb8502b67b9ad343051b8ad016669a09277c4c096b1b3abccb81c6e91220,2024-12-31T19:15:46.260000 -CVE-2024-39027,0,0,9c0579dae898d595139f332264c60946a6305463079e5e828b96e35983d71d37,2024-11-21T09:27:09.693000 +CVE-2024-39027,0,1,4868f070d721ef22410d3100198f6df29364aaf8f7c9d2e8b6a388aa7c302a0d,2025-03-20T19:15:29.797000 CVE-2024-39028,0,0,655f86c8b3e4e1291e9d2943922a75fa2fc9393ff19cad0b2a5dbdcb29dc16b3,2024-11-21T09:27:09.863000 CVE-2024-3903,0,0,3abc3093808cbf33494e777ab78a2a1f0d0a381b5e414e8aae50b0d04cda30b0,2024-11-21T09:30:39.727000 CVE-2024-39031,0,0,31600cbde8bea78bc56e4a9598adfa8ee74fe57d43a5d0365ca0ab764476d743,2024-11-21T09:27:10.103000 @@ -265777,7 +265777,7 @@ CVE-2024-42049,0,0,2f2061195cf6b6e353b632fe7686cc3dd9d36632ef0acd4ff2b1ad609a60d CVE-2024-4205,0,0,2d7cb30d6c61713f00e4f807236cca9bbb0876c70c39eb88cce19c5cffe36039,2025-01-15T17:50:27.377000 CVE-2024-42050,0,0,6003ac0a89c7c840174fb1295d5ef8342ba916cc8f162b75a24b06a6577c836c,2024-11-21T09:33:28.860000 CVE-2024-42051,0,0,2730aae26f99ac5f7900b43db362b44d33bfe3433539fad97e27256323563208,2024-11-21T09:33:29.003000 -CVE-2024-42052,0,0,048e7839e9c33ed87c5062dd18363e225f193d67d47be0a2ea415c5adeb1aa64,2024-11-21T09:33:29.153000 +CVE-2024-42052,0,1,b283bb2f2713b2592eafc0b73a133d141debcac5f22d979dcea8b268bf65465d,2025-03-20T19:15:30.127000 CVE-2024-42053,0,0,9d13c0ff617c7c3c795a4eaa9fec7d34dfca49b767cd24dbc4c0dff03b9b5154,2024-11-21T09:33:29.300000 CVE-2024-42054,0,0,b45b1bd1c65342af971601ff9140185665ddf0eb01df181848fd7ea09b591896,2024-11-21T09:33:29.453000 CVE-2024-42055,0,0,31d6dc4d04e0788a23fbb045a1587b56d304d119f98f6569d134d9c64737777d,2024-11-21T09:33:29.683000 @@ -267455,7 +267455,7 @@ CVE-2024-43996,0,0,844ee29b58ab633f072665fd41d2e688e12b259d5dc7abdd9b55f7b7131ec CVE-2024-43997,0,0,e931018cc34ba0edfc8c2590b7469ab9b1bb6fcec646eaeb92588c30192c3f92,2024-10-18T12:52:33.507000 CVE-2024-43998,0,0,aa13d8b779d2439b4ceb62964005ff000587152001c076d770f87fe671d46c03,2024-11-08T21:11:32.880000 CVE-2024-43999,0,0,d389f9e09f0122e270b929ec3a2d44dbd6496c0a503dd335f2c7a2d8dd2783e7,2024-09-25T15:15:43.683000 -CVE-2024-4400,0,0,1ea5c2411de52e63137dd6220f7c20dcda7b09b5068e075a3a1db29184cb35d3,2024-11-21T09:42:46.247000 +CVE-2024-4400,0,1,16854314b584937b52a73b92e8de02018f5897339c42dc0797bfb3a42c5702cb,2025-03-20T20:10:54.077000 CVE-2024-44000,0,0,9b74b38a7c82bdecc24426288bc00766e3e7bcf2f51e8c9a527feca4232e159f,2024-10-23T14:16:02.973000 CVE-2024-44001,0,0,175a5c76eaa0c47ffbee0289add49207844bb4c67d99ffcbaaa126343821bb04,2024-09-25T20:13:04.160000 CVE-2024-44002,0,0,fb0f9d9f4deabfd4ae1435b962e7db8b5241e501eddbb5d325e8dc3232296abc,2024-09-25T20:06:13.100000 @@ -269041,7 +269041,7 @@ CVE-2024-46592,0,0,4ef6dc7291da4fd516866b0b42d4dbf8a48ada1234b72ff1e77bd23f5ef5f CVE-2024-46593,0,0,e27feee37d3b36b7b0adf0271561a5eecf1408b2b98ffac7d2de2274061a26ee,2025-03-17T18:15:18.413000 CVE-2024-46594,0,0,9009d93625479a510623ca9f6658d3e091f92d0bd82e931c83bf120351b2469e,2025-03-19T16:15:28.040000 CVE-2024-46595,0,0,5fa35ad3466891c938fe0f9ea0c762d223ab31c3f74722a9f8c158af604c27f5,2025-03-13T19:15:48.263000 -CVE-2024-46596,0,0,aa55eaec3eb4aedd1fefd5ca684ee59ae098e852d184a578731a56825f726fbd,2025-03-17T19:15:22.790000 +CVE-2024-46596,0,1,917725ef8236e5ade29f42ea5ae9d5e2c579d53dbf858a1e261387da19b31e17,2025-03-20T19:15:30.293000 CVE-2024-46597,0,0,a50703865ba3a0c2967df5236a7842ba7e0c172106f668ce2ee55b7bac3eefab,2025-03-19T16:15:28.327000 CVE-2024-46598,0,0,9494d7319834b8a66a5df492839fcd1d2e1166a773222ec5cd24bcc96064b3ba,2025-03-18T15:15:55.530000 CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000 @@ -274585,7 +274585,7 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 CVE-2024-54015,0,0,15d5e1f3ec3d810c595ec1f32b64edabb37773d7fc12e946dfae697ba0178074,2025-03-11T10:15:15.450000 -CVE-2024-54016,0,0,7a205ce710088d61d58d73fe63036b1c246fc24d66713845fb02b849475ad172,2025-03-20T09:15:12.963000 +CVE-2024-54016,0,1,6a8a3bea935b0573efb05e8b510b8a8ca4249effaf676e757e0c1f5d159956d4,2025-03-20T19:15:30.597000 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 @@ -276494,7 +276494,7 @@ CVE-2024-57437,0,0,55a481f741905a7b3529d8872203a5e96d5aa22ae442a522f6171609f0f64 CVE-2024-57438,0,0,292c153a266ebc62026bffb3e4c8820913e5e3d5c932130e53e50995b3f3b186,2025-02-06T16:15:40.660000 CVE-2024-57439,0,0,6e64e016f192ab733e54f5a3035d1b158d0cb22bcd6abee8112395eba7b199b6,2025-01-29T17:15:28.650000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 -CVE-2024-57440,1,1,8cd283378632fc0fd54754e2430ddde495f8c2074e10bb7cffcce856ce47357a,2025-03-20T17:15:37.550000 +CVE-2024-57440,0,0,8cd283378632fc0fd54754e2430ddde495f8c2074e10bb7cffcce856ce47357a,2025-03-20T17:15:37.550000 CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137ddf,2024-11-21T09:48:16.423000 CVE-2024-57450,0,0,d39c86b260ea84f1a2f257f30527cffe772404e6d44d8d70c9ac83512b1d5bb2,2025-03-15T16:15:13.963000 CVE-2024-57451,0,0,2db3406871d80bd68bbad68d68fa327b18fbac1129e57466460b4f3ccd88e278,2025-03-19T14:15:38.187000 @@ -277346,7 +277346,7 @@ CVE-2024-6227,0,0,a7ea89dc0eaf11606799b812c0ce67508e339056cf2f1b2dd09bc1aa10c95a CVE-2024-6229,0,0,c8984b0e1608078abc90f99d19b11fea563993e21219310e678506a23e674ab9,2024-11-21T09:49:14.513000 CVE-2024-6230,0,0,376aaabacb34dab7cc316ce0991ed1c4a34ec05964c83b2ddb04888b10330ab9,2025-03-14T16:15:38.340000 CVE-2024-6231,0,0,e0042db0af24bf00a170ca021a174378b41b303eec11c1206de1f1c60d2f4f4a,2024-11-21T09:49:14.733000 -CVE-2024-6232,0,1,3c57f72839de7a6ce60aa8101fbe572f19dcd9de326f2f4d9acedbe78b53dea6,2025-03-20T18:15:18.197000 +CVE-2024-6232,0,0,3c57f72839de7a6ce60aa8101fbe572f19dcd9de326f2f4d9acedbe78b53dea6,2025-03-20T18:15:18.197000 CVE-2024-6233,0,0,4bbca18d3f336296f26771ea45741081bf89a79a8a0061f18ec10c1c6fe49357,2024-11-22T20:15:11.437000 CVE-2024-6235,0,0,2544a44e15d49accde0b3fd8986478883c178b73f55b202b706484d412b9b932,2024-11-21T09:49:15.053000 CVE-2024-6236,0,0,3d351b3b631ecd25faf9293652a75711a02ef3cbaf224ee71461b8001e1832e5,2024-11-21T09:49:15.173000 @@ -278606,7 +278606,7 @@ CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 CVE-2024-7595,0,0,ca596e727ab88080c548a2842775a2e705df99f31ed7841971376d36a71e8900,2025-02-06T22:15:39.717000 CVE-2024-7596,0,0,ec112e0bdbffb5869ed24f4d75dd1e03d8b377de45b4da419245dd3e04ffa45c,2025-02-06T22:15:39.853000 -CVE-2024-7598,1,1,80892d37fb77b186e3a0de8e6d3f157f5199638f2849666750d75bbb6ae8fd06,2025-03-20T17:15:37.707000 +CVE-2024-7598,0,0,80892d37fb77b186e3a0de8e6d3f157f5199638f2849666750d75bbb6ae8fd06,2025-03-20T17:15:37.707000 CVE-2024-7599,0,0,72cd50d41050beabf75c41eb70dc5180e8f76ad0927504bdf008f5b3f70870db,2024-09-26T16:45:58.507000 CVE-2024-7600,0,0,34b4914eedc647ff0a0d5a284f0b5d05eddd5cf8a511f0ca9df95820d310e297,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,3abc93709b908f4d7ee1f44c6b4ea7404a5a295ad0d93da10509fdc9a72448e0,2024-08-23T16:35:52.383000 @@ -279793,7 +279793,7 @@ CVE-2024-8893,0,0,10c3398d772121e7475ccd680b6df536743951693ee8b015e1bf7fec12dffe CVE-2024-8894,0,0,fb1e4c8ff215f6cea325827658733789bbe3a555959993a3bd1b321b279338bd,2024-12-04T12:15:20.763000 CVE-2024-8896,0,0,15db3dca334d16efce2b5cc93aa60cd50f1976bd9a02ff816eabd5e356b493e7,2024-11-01T16:27:16.693000 CVE-2024-8897,0,0,da3666e79ca1de5716d899743ac45421b1f79a22d618f26559e700a855bb75ae,2025-03-19T16:15:30.260000 -CVE-2024-8898,0,1,adb1d4765a21d80bb9765699f8b3ab53bd3b025f1040287f1ce8dff7fc4edcb6,2025-03-20T17:15:37.863000 +CVE-2024-8898,0,0,adb1d4765a21d80bb9765699f8b3ab53bd3b025f1040287f1ce8dff7fc4edcb6,2025-03-20T17:15:37.863000 CVE-2024-8899,0,0,d4d2e6da4e618e821cb5129e519082f71d663f816a3adbdb6b5ea787e5713422,2025-01-09T20:28:09.003000 CVE-2024-8900,0,0,79f5bab1a4a7f5f7836695aad8ffafa8793cbcaf4ec84066c23218ef59bb7f02,2025-03-18T21:15:32.470000 CVE-2024-8901,0,0,37b57ce85502246496166a4124366df28976dc4959a1adb0fa33a00be519a6f2,2024-10-23T21:15:14.950000 @@ -279845,7 +279845,7 @@ CVE-2024-8949,0,0,cb612245e99b8d606def23323ec820c08f81a2daa792e1df276280bf7d5eeb CVE-2024-8950,0,0,05834206f031f701650d0558ab67096fa9ebd2a196c70c84fdd0f78816aaa1a7,2024-12-25T13:15:19.057000 CVE-2024-8951,0,0,466b278b6ab9f9a4908bf97b0b6e2a9e881123904144558764a16605e53e27fd,2024-09-23T18:12:37.380000 CVE-2024-8952,0,0,9fc080e764a1ebb84b6df564f797b437ed13f50192a4757077b3f872b7bf51cf,2025-03-20T16:15:14.620000 -CVE-2024-8953,0,0,f92952dd4b4e63f42941932a694bd9a2377cbf8e4dc6658b88595d0b254c716e,2025-03-20T10:15:44.843000 +CVE-2024-8953,0,1,075f7fdf877a59de339b3ea5ab92a2c88c2f378753f49f027af07bdcee94ddce,2025-03-20T19:15:33.943000 CVE-2024-8954,0,0,136495b47853816b760c8cf66770d1244c15457a64f73fdd74da85e3de78f69c,2025-03-20T10:15:44.967000 CVE-2024-8955,0,0,c1b148cfa42004d4dab2e8f83a4423b2660db66669b816680c4531b1a960905c,2025-03-20T10:15:45.087000 CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000 @@ -280742,7 +280742,7 @@ CVE-2024-9949,0,0,a0581706a8cc1dc15b51dd23659b265a8c272bbff8c1acb976ae9b1797f390 CVE-2024-9950,0,0,26453476d613485a16e471025364681be19c5178f0ab51f0703be58e5e0cb276,2025-01-02T16:15:08.930000 CVE-2024-9951,0,0,d292cfbcf3e6f6345fd4680a1945f2e8d8915fd71871c7419d041169345571de,2024-10-18T12:52:33.507000 CVE-2024-9952,0,0,54fa7bd21864458c3768a23c75a74b10b5dda23a9cf30ce6f48fcefeab4b0488,2024-10-16T15:05:13.467000 -CVE-2024-9953,0,0,ed020c158bfe5b15d8e014a7689776d43a7df47d67a46968cabcbd71eb079885,2024-10-17T20:59:01.940000 +CVE-2024-9953,0,1,44dc851f9d17766bbac8b78d6cfcde1a2398329e2cbf535e17f4652ae22ed2a2,2025-03-20T19:15:36.063000 CVE-2024-9954,0,0,3e30a77e87df301b889ce21a2f3eb854e0f4066ff190b30fa46e6b513e2d6399,2024-10-22T20:35:17.400000 CVE-2024-9955,0,0,c2cd3a4e518ccae1966c72ceef59885fae4f69df0a2bad3603715ef6d7fe85fe,2025-01-02T16:01:37.567000 CVE-2024-9956,0,0,c2942040c7fa6e011c8efe98064e794ed571a061c355f9689a06d2e8b1781658,2025-03-19T21:15:37.913000 @@ -282114,7 +282114,7 @@ CVE-2025-20172,0,0,72c22dd5d14846bdf1dace189d990f7dd29c87ae0523b78277f3576c0ed73 CVE-2025-20173,0,0,7933686ccc0569bd6dc610b5aa8761d683d1800e3fa292104399a57396c1c7b1,2025-03-13T13:15:47.480000 CVE-2025-20174,0,0,9c2faf89fb30323fcadcc335c194ab7b928be534d0c1521a8fd636ae0c7d33ce,2025-02-05T17:15:24.513000 CVE-2025-20175,0,0,d262bd7148a5fa3d37c356b0b033b1ce0b6ebb7963aa480d8fd784ab319f903f,2025-02-05T17:15:24.720000 -CVE-2025-20176,0,0,a2fa419d9ebc99b5ee2146314171d240a66f6d208faa37e0b22398f258f842d6,2025-02-05T17:15:24.997000 +CVE-2025-20176,0,1,2070cc7eee739e56303d3a360b91fc06133aa46cb70c03de7cc66133720a00f5,2025-03-20T19:15:37.083000 CVE-2025-20177,0,0,b94534d03dcde9e51e220f2e02de3f2c5480d55c5bd5366268bbaa3e28019d67,2025-03-12T16:15:22.347000 CVE-2025-20179,0,0,0aec4ef246f2c607f83340c522f87121c03b5603860b31d10cb764e695295cde,2025-02-05T17:15:25.210000 CVE-2025-2018,0,0,fcbd3484e73526c449ce0a8e306440859256a59acc005b336b5f634c4f5c8a05,2025-03-11T21:15:53.197000 @@ -282199,7 +282199,7 @@ CVE-2025-2065,0,0,c289f628ef02afbd68c3c371d103499f2c6444f60c8e676344691e8994ad7b CVE-2025-20650,0,0,4839c3a5cbb4aeb9330b5312101e579111320a345dc24a6ab22be3803767178c,2025-03-04T17:15:17.287000 CVE-2025-20651,0,0,ceca1abbe321244e95f52f7c0e364b2a5ac98d67119c4a4a7e3366e47c16ab0a,2025-03-03T19:15:34.823000 CVE-2025-20652,0,0,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458755,2025-03-04T17:15:17.497000 -CVE-2025-20653,0,0,10a8cea4b8c1ccc068072024007c444ff7d2ceef126747513723a7cf953de00b,2025-03-03T03:15:10.170000 +CVE-2025-20653,0,1,50d853eb215922ff4e0114da3bc24d2a38f72d15c38383615dd0616a498c1d6f,2025-03-20T19:15:37.333000 CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000 CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000 CVE-2025-2076,0,0,b3146ea9f6ce961cd1f7fcf5a6044868da4a1ed3be81e1fac6e72e9811675f5f,2025-03-12T04:15:18.800000 @@ -283023,7 +283023,7 @@ CVE-2025-22222,0,0,58fbf61f1e86261177996a1b70d050ee1228a83c36092ff3d83feec937c30 CVE-2025-22224,0,0,0c0906335b7f86da24b3fde710fab603a9c0fb60b93cf41fdeb4c7c486105569,2025-03-05T16:18:36.103000 CVE-2025-22225,0,0,3e24abbf0adc5a228537b56235fd143ccfc793c2f301e3da3c6a729ab38579e2,2025-03-05T16:21:26.263000 CVE-2025-22226,0,0,082732854e25a0da9d3d2451729acf57e56fc1a000d9bb5bff3b534351f8cdf6,2025-03-05T16:22:52.433000 -CVE-2025-22228,0,1,9ab081277b86ea484b7300a71c6fd09a93a5d5d5ad91142cd5b4e2e14dc23c60,2025-03-20T18:15:18.663000 +CVE-2025-22228,0,0,9ab081277b86ea484b7300a71c6fd09a93a5d5d5ad91142cd5b4e2e14dc23c60,2025-03-20T18:15:18.663000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -283576,7 +283576,7 @@ CVE-2025-23116,0,0,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa14071 CVE-2025-23117,0,0,3b650561fcfb78dd195d3496b028d41feef3a20547a31675fb51a8efff748de1,2025-03-05T16:15:38.340000 CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000 CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000 -CVE-2025-23120,0,1,786901c1b6dfcccd7aa7dcc80f4beeaea78d678a2d431ebac0c0a5cc865fdfa7,2025-03-20T17:15:37.973000 +CVE-2025-23120,0,0,786901c1b6dfcccd7aa7dcc80f4beeaea78d678a2d431ebac0c0a5cc865fdfa7,2025-03-20T17:15:37.973000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000 @@ -283638,7 +283638,7 @@ CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73 CVE-2025-23359,0,0,078a2b254b9542e7cfbdc0b2539045b6c597acb96680d65380627cec160e1602,2025-02-12T01:15:09.230000 CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1c40,2025-03-11T20:15:16.633000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 -CVE-2025-23363,0,1,b9bdb2f5570a42ae3d8b5d6f5614156fb3bb4c04b93a61bb990c205c4501f432,2025-03-20T17:15:38.153000 +CVE-2025-23363,0,0,b9bdb2f5570a42ae3d8b5d6f5614156fb3bb4c04b93a61bb990c205c4501f432,2025-03-20T17:15:38.153000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 CVE-2025-23368,0,0,9c664fc0f9e7b340d6131cc859aefb9e94f28c0c73f7486f5208547e13f4025a,2025-03-04T16:15:39.270000 @@ -284725,7 +284725,7 @@ CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7 CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000 CVE-2025-24796,0,0,a9610c1be84a5c4d5741f879bb27b31db5774f479b1300b84fcf068018c2ff21,2025-03-06T19:15:26.953000 CVE-2025-24799,0,0,de84e2ffeca97627c636e1e67e0f8d5c8a536e58faf38e3ad8ab702cd7a18a0f,2025-03-18T19:15:48.927000 -CVE-2025-2480,1,1,ddf630a99970c4d11bf1be009edc9994c5987e78dd6bf8698fc15da14ed7dee6,2025-03-20T17:15:38.523000 +CVE-2025-2480,0,0,ddf630a99970c4d11bf1be009edc9994c5987e78dd6bf8698fc15da14ed7dee6,2025-03-20T17:15:38.523000 CVE-2025-24800,0,0,7ed7267931cd5ab7815e3084be7a388ce38e4d4a267ef28098f1d5b3017953e4,2025-01-28T16:15:45.063000 CVE-2025-24801,0,0,e526bcdde4c1d8c8abe9f2882687abddc9602eb37b409289035cc368e12f958b,2025-03-18T19:15:49.110000 CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320ad5,2025-01-30T20:15:51.010000 @@ -285075,13 +285075,13 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-2548,0,0,820eb17598fa2a53729453e1614a812327bafdfcc3ccf5de79b1fdafc87d0a1f,2025-03-20T16:15:16.810000 -CVE-2025-2549,1,1,07ea4c183686ede8e8cde11c83c64bce42558bd69b20352dd7255f76e9ad1339,2025-03-20T17:15:38.693000 +CVE-2025-2549,0,0,07ea4c183686ede8e8cde11c83c64bce42558bd69b20352dd7255f76e9ad1339,2025-03-20T17:15:38.693000 CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000 -CVE-2025-2550,1,1,3630407b3887e32c54506036a88f66ef6d5d7d82a918aaa8dca997d68bfd17fc,2025-03-20T17:15:38.903000 +CVE-2025-2550,0,0,3630407b3887e32c54506036a88f66ef6d5d7d82a918aaa8dca997d68bfd17fc,2025-03-20T17:15:38.903000 CVE-2025-25500,0,0,da1c898cfcbd810f078b7294d1eec0d9905e50224c954d32d8cd7908e965ddf3,2025-03-19T14:15:39.033000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 -CVE-2025-2551,1,1,844d6225efdc95da45c2cc801bb8728f4afaa4834230837d5f40e938b5a8666f,2025-03-20T17:15:39.090000 +CVE-2025-2551,0,0,844d6225efdc95da45c2cc801bb8728f4afaa4834230837d5f40e938b5a8666f,2025-03-20T17:15:39.090000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 CVE-2025-25513,0,0,8162e2be684a72798c0754d951e189663ee35bc02f8b0275a49b748fc819db60,2025-03-14T17:15:51.350000 CVE-2025-25514,0,0,617e4a6ef407d85f550869e4d2690c93c017af8d1a1803140af567fdeb25478b,2025-02-28T22:15:39.473000 @@ -285089,7 +285089,7 @@ CVE-2025-25515,0,0,b55809ed8be4e056eed339e65fd6c6d32af10fd4b51bbed182e22a7f91d50 CVE-2025-25516,0,0,23bba78be49e10039f4b6bf8592c9ac6aac3a9970bcaf7fb58095303adfe6b6b,2025-02-26T15:15:25.507000 CVE-2025-25517,0,0,c4e74b1e4b5e3bdb91600ba3c3c11c0da302d25b6674e8e626555ebe3c325a78,2025-02-26T15:15:25.680000 CVE-2025-25519,0,0,017dcef3c55881366215606b5780e4f44a536d0b3b4808b6c941ffb0335bb098,2025-02-26T15:15:25.867000 -CVE-2025-2552,1,1,ca8e2b5f4256e1def1bd3aaa95df0ad2f1af58a4f296a8bfb3745beb972eff8d,2025-03-20T17:15:39.283000 +CVE-2025-2552,0,0,ca8e2b5f4256e1def1bd3aaa95df0ad2f1af58a4f296a8bfb3745beb972eff8d,2025-03-20T17:15:39.283000 CVE-2025-25520,0,0,d82d358d853245c9f484d3961777a5c8466060073bf3f6d3002c80d6ba9dfb8f,2025-02-26T15:15:26.053000 CVE-2025-25521,0,0,2d7d4f7cf15635a2b9322e7cd1d8a6adf400200c0e48cfe136bcb6c0a110244c,2025-02-26T15:15:26.240000 CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000 @@ -285100,14 +285100,15 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673 CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 -CVE-2025-2553,1,1,f17596d7d58a3d63fc65f27b70f096e7804eb7f8775c0edc88bea3a3ba92b419,2025-03-20T18:15:19.973000 +CVE-2025-2553,0,0,f17596d7d58a3d63fc65f27b70f096e7804eb7f8775c0edc88bea3a3ba92b419,2025-03-20T18:15:19.973000 CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 -CVE-2025-2555,1,1,82e0b76b5abf5ba0503503e013803f3762aff676e21dc365217c1a86519b77f2,2025-03-20T18:15:20.197000 -CVE-2025-2556,1,1,bb8e49e7deb44769d49bbc566fa9acfa4e6f92358081d1d4651c74ca143e7b14,2025-03-20T18:15:20.400000 +CVE-2025-2555,0,0,82e0b76b5abf5ba0503503e013803f3762aff676e21dc365217c1a86519b77f2,2025-03-20T18:15:20.197000 +CVE-2025-2556,0,0,bb8e49e7deb44769d49bbc566fa9acfa4e6f92358081d1d4651c74ca143e7b14,2025-03-20T18:15:20.400000 CVE-2025-25565,0,0,aed7dd17dbf28583bae9e4477af32eb7841693da51bacd50a0f71fb7dd9a526b,2025-03-19T19:15:44.520000 CVE-2025-25566,0,0,5d534d6b0fe1f7902c1dc640fde2534ed23638ce1e46237376fc281c161dcaba,2025-03-12T18:15:25.943000 CVE-2025-25567,0,0,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4ac5,2025-03-19T19:15:44.653000 CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000 +CVE-2025-2557,1,1,22b9b8b982dd84abb1a4d1cac3a310bc5904032ff4b08e9bf944aad086f4463e,2025-03-20T19:15:38.220000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25580,0,0,941c7d6e375f6e8f2e78c34c089b4cbbef58efa7cd40d265b4e4698250537356,2025-03-19T19:15:44.917000 CVE-2025-25582,0,0,6699522d6c3e7f389a44bd31516f417c7bcd0ddceffa4e13690c9b15efbe69b0,2025-03-19T19:15:45.050000 @@ -285133,7 +285134,7 @@ CVE-2025-25625,0,0,e0547341df4ce936716abc6a4864109b198cd9c3ef7a0c0ef8ebe81a78ba2 CVE-2025-25632,0,0,1ceebf9a7f4f0a07c0d7243ce1a1b61926f60bcdd3649b2e6df48cfbf3246b4c,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,7d5efbb3a02c594499ed06a9a27e13e1f935c77ecfc5e148d76deae63172e1dc,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 -CVE-2025-2565,1,1,038028c887e944041a59c5269d8c669a942d8281a84c955ac1c691f1fdc63f33,2025-03-20T17:15:39.450000 +CVE-2025-2565,0,0,038028c887e944041a59c5269d8c669a942d8281a84c955ac1c691f1fdc63f33,2025-03-20T17:15:39.450000 CVE-2025-25650,0,0,70ecf06880b4929e5c513a2918fa826b8f349cb5d8c6a838be654946b1198891,2025-03-19T19:15:45.910000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6bbb,2025-03-17T15:10:12.850000 @@ -285504,6 +285505,8 @@ CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430 CVE-2025-26816,0,0,a0a2a954fd2e14cf689b2e2432e04723267ead6673882ee3c0b68e55064bd72f,2025-03-19T21:15:38.977000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000 +CVE-2025-26852,1,1,c6388e8297585d6dd4e6f2687af10aac75a65ebbaaa9551f9ca9209d393ed217,2025-03-20T20:15:32.497000 +CVE-2025-26853,1,1,8c8e828e73f779a1f50cad0bd3a155204dbc5896a884b88c242b6d64c0e1f1fa,2025-03-20T20:15:32.640000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 CVE-2025-26865,0,0,392cafa9196f9e16f10dbe623eb410cd729a2dc1013d61e7dc7061610b7c87ad,2025-03-11T20:15:17.917000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 @@ -286004,11 +286007,13 @@ CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bde CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 CVE-2025-29101,0,0,18d2cbad5c8b235e8ef9b9169f1b067dec1f11f872a8278319bf676efb28f716,2025-03-20T13:15:36.467000 CVE-2025-29118,0,0,544cc61f27b329117a892d08f384d5737c3e9c8a3738f1368db354f799c3eaf0,2025-03-19T19:15:48.220000 -CVE-2025-29121,1,1,9dea89c2d4f5a24db1c64119c37bc31d3dc1e6647c25b7da1c3a5b0d8416302f,2025-03-20T17:15:38.267000 +CVE-2025-29121,0,0,9dea89c2d4f5a24db1c64119c37bc31d3dc1e6647c25b7da1c3a5b0d8416302f,2025-03-20T17:15:38.267000 CVE-2025-29137,0,0,60d01c1f2ea1a4852779ae5347a42a9c78e823ee0ac7de08f61d7134be2334df,2025-03-19T21:15:41.063000 -CVE-2025-29149,1,1,6ec561e0a7090a608939176c6832e689971c88c5fe8d169ffdf2882c16560ad5,2025-03-20T17:15:38.383000 +CVE-2025-29149,0,0,6ec561e0a7090a608939176c6832e689971c88c5fe8d169ffdf2882c16560ad5,2025-03-20T17:15:38.383000 CVE-2025-29214,0,0,bf89aef59897f1829175899995ba46cfc5fab47fdfdd0072b1a12cfa96388813,2025-03-20T16:15:16.493000 -CVE-2025-29215,1,1,53e5e4efbad89cccea895c5e3e949d5806b9484cd02f2bc2010b7d2abb78efb0,2025-03-20T18:15:18.790000 +CVE-2025-29215,0,0,53e5e4efbad89cccea895c5e3e949d5806b9484cd02f2bc2010b7d2abb78efb0,2025-03-20T18:15:18.790000 +CVE-2025-29217,1,1,e06cc1637fd460717f60c70fbebf09978f14ead8ce48c9ea810f1b51be51677f,2025-03-20T19:15:37.680000 +CVE-2025-29218,1,1,5936525c24fa1034cc8a62df0570d4c83e51b57dc959c8e7fe141122ea068531,2025-03-20T19:15:37.790000 CVE-2025-29357,0,0,ddd0f218f7f0a63a4864093fc2a3ded7f064b1382e370d0ee41cc0a1c1a3ddb4,2025-03-19T15:15:54.690000 CVE-2025-29358,0,0,a8d36a5564152d109431aa78a5e6e1517012072c02c933f71eaf5428f38f12d6,2025-03-19T19:15:48.350000 CVE-2025-29359,0,0,eb4d89bfed21500a3b4ef12a77f1e825f418222c50327ada53f234cba0318903,2025-03-19T19:15:48.480000 @@ -286056,13 +286061,14 @@ CVE-2025-29910,0,0,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e7 CVE-2025-29911,0,0,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000 CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000 -CVE-2025-29914,1,1,304f226f813575123653341302dfc8fb9577453250dac3b102fee574a37b87ec,2025-03-20T18:15:18.907000 -CVE-2025-29922,1,1,7df9e2d19163a398d955eb888bd1daed93221137a62907c889deda59d873e937,2025-03-20T18:15:19.063000 -CVE-2025-29923,1,1,3362abbd750f7b790d16191d0d8040649a5ca7563320c75b5bda4387b223efce,2025-03-20T18:15:19.230000 +CVE-2025-29914,0,0,304f226f813575123653341302dfc8fb9577453250dac3b102fee574a37b87ec,2025-03-20T18:15:18.907000 +CVE-2025-29922,0,0,7df9e2d19163a398d955eb888bd1daed93221137a62907c889deda59d873e937,2025-03-20T18:15:19.063000 +CVE-2025-29923,0,0,3362abbd750f7b790d16191d0d8040649a5ca7563320c75b5bda4387b223efce,2025-03-20T18:15:19.230000 CVE-2025-29924,0,0,144c6a2660455b1f253f9aadb201339714009ce79d893f84962fb363a05053af,2025-03-19T20:15:19.873000 CVE-2025-29925,0,0,44742be734caa9caef9b9aaba97eddda2c35d6797d9ecbe54f4e1154adb27dd3,2025-03-19T20:15:19.987000 CVE-2025-29926,0,0,8edcd57d277a505ecc1c9860fe5fd2d32f5076eda269137302dad9127b412d53,2025-03-19T18:15:25.770000 CVE-2025-29930,0,0,043c0e785a0aabbc6bfcf85120363cc130dd1f21008fcd0b8d28454bb9969779,2025-03-18T19:15:51.340000 +CVE-2025-29980,1,1,c7f6ce5b394959819da70997217debc8b55211670631c86d4d8a8393401fb11c,2025-03-20T20:15:33.233000 CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000 CVE-2025-29995,0,0,1eda4649249475136c84dfa6531f2cd362c980551d78393b70706d408af51d69,2025-03-13T12:15:13.830000 CVE-2025-29996,0,0,5a028c0824c2542a10ce116c608912fe4301f96b5ba2d38f7cdf305f3c1269bc,2025-03-13T12:15:13.980000 @@ -286099,6 +286105,7 @@ CVE-2025-30144,0,0,eadbdc190742f7a93e3538055970f46f2818fd65dee99f9e0a20462306980 CVE-2025-30152,0,0,5a7eab66783fd2d319bafd0f1c673478aad943e2df1f75b7abb21544f6f08103,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,484948c7f744290e7a02287419922c094482e0689385c16ab8c140184f1e1282,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f6cc7091f847e815931af88c72ad16add8c0de970642a951328dd4efe9bf626d,2025-03-19T16:15:33.780000 +CVE-2025-30160,1,1,dd643cf1294e71b82d80714ead10fbb05747f64e5a1f9cbfa90f7d58cfc07ea7,2025-03-20T19:15:38.383000 CVE-2025-30196,0,0,537f7952f6d3af6aefbbf4efaf23170a83a6fde6ef7f3e4f5c50b3449896a436,2025-03-19T19:15:50.980000 CVE-2025-30197,0,0,a82f323b63a4db12d5fa6c176bc294c5b0c209c57d5589e96e23573743d6643e,2025-03-19T16:15:34.060000 CVE-2025-30234,0,0,2b5c58b261698db3654a8d87fafd123300be7c95ea66a06456456707d9ebfedd,2025-03-19T05:15:41.353000