diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json index 20b1566676a..909b71ae035 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37037", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.080", - "lastModified": "2025-02-18T21:15:19.017", + "lastModified": "2025-03-18T14:15:36.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json index f16d4f1af2d..0f110d44f98 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42930", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.090", - "lastModified": "2024-11-21T08:23:32.203", + "lastModified": "2025-03-18T14:15:37.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json new file mode 100644 index 00000000000..60e209ea26e --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47539.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47539", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-03-18T14:15:37.830", + "lastModified": "2025-03-18T14:15:37.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-439", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json index c31c4e62d57..8c7ee255533 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20941", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:48.560", - "lastModified": "2024-11-21T08:53:28.627", + "lastModified": "2025-03-18T14:15:37.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json index c903b2d3803..458a4ecdacb 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21113", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:33.127", - "lastModified": "2024-12-05T15:16:15.940", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:38.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21760.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21760.json new file mode 100644 index 00000000000..77ebaeb7bab --- /dev/null +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21760.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21760", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-03-18T14:15:38.297", + "lastModified": "2025-03-18T14:15:38.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper control of generation of code ('Code Injection') vulnerability [CWE-94]\u00a0in\u00a0FortiSOAR Connector FortiSOAR 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow\u00a0an authenticated attacker\u00a0to execute arbitrary code on the host via a playbook code snippet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-420", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json index dc08104043e..1a94c28635a 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23786", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.727", - "lastModified": "2024-11-21T08:58:24.090", + "lastModified": "2025-03-18T14:15:38.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.8 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28069.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28069.json index 4ea4b0e8bb8..0048b082676 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28069.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28069.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28069", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-16T06:15:13.763", - "lastModified": "2024-11-21T09:05:44.903", + "lastModified": "2025-03-18T14:15:38.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad en el componente de chat heredado de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de divulgaci\u00f3n de informaci\u00f3n debido a una configuraci\u00f3n incorrecta. Un exploit exitoso podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial y potencialmente realizar acciones no autorizadas dentro del componente vulnerable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3172.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3172.json index 28275365555..7b5468dbce7 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3172.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3172.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3172", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:23.970", - "lastModified": "2024-11-21T09:29:04.223", + "lastModified": "2025-03-18T14:15:39.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json index 1cebcb1bfec..dda9a557dd0 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33601", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2024-05-06T20:15:11.603", - "lastModified": "2025-02-21T17:15:12.100", + "lastModified": "2025-03-18T14:15:38.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "nscd: la cach\u00e9 de netgroup puede terminar el daemon ante una falla en la asignaci\u00f3n de memoria La cach\u00e9 de netgroup del daemon de cach\u00e9 del servicio de nombres (nscd) usa xmalloc o xrealloc y estas funciones pueden terminar el proceso debido a una falla en la asignaci\u00f3n de memoria que resulta en una denegaci\u00f3n de servicio a los clientes. La falla se introdujo en glibc 2.15 cuando se agreg\u00f3 el cach\u00e9 a nscd. Esta vulnerabilidad s\u00f3lo est\u00e1 presente en el binario nscd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json index cc739f39d80..f3e04230ab7 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34091", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.590", - "lastModified": "2024-11-21T09:18:04.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T14:54:25.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.14.0.3", + "matchCriteriaId": "E4643898-6CFC-4F96-8564-BE6A46E7B75F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:2024.03:*:*:*:*:*:*:*", + "matchCriteriaId": "14B1EA5F-1E5D-4A30-88E5-4460188A7D19" + } + ] + } + ] + } + ], "references": [ { "url": "https://archerirm.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://archerirm.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json index 554ee19ab13..1e259573717 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40575", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:07.150", - "lastModified": "2024-11-21T09:31:19.820", + "lastModified": "2025-03-18T14:15:39.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json index 328ec51511a..52381e43bbe 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40789", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.270", - "lastModified": "2024-11-21T09:31:38.157", + "lastModified": "2025-03-18T14:15:39.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json index e14cef42df2..b11e034975b 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40792", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.670", - "lastModified": "2024-10-30T16:35:18.823", + "lastModified": "2025-03-18T14:15:39.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json index a37f815f71a..026aaa96c0b 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43765", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.690", - "lastModified": "2025-02-18T20:15:18.873", + "lastModified": "2025-03-18T14:15:39.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una forma posible de obtener acceso a una carpeta debido a un ataque de tapjacking/superposici\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de privilegios de ejecuci\u00f3n del usuario. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json index 8123c065ded..04b05c9804a 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43771", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.880", - "lastModified": "2025-02-18T20:15:19.043", + "lastModified": "2025-03-18T14:15:40.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En gatts_process_read_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44151.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44151.json index 3ed0b2808b4..60ae789d66e 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44151.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44151.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44151", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:50.717", - "lastModified": "2024-09-24T16:21:05.280", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:40.260", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45180.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45180.json index aa8ddb82107..7786456e046 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45180.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45180", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-03T20:15:08.097", - "lastModified": "2024-09-13T19:55:54.477", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:40.437", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46582.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46582.json index 31bf262a98a..f579c36bccc 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46582.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46582", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:17.680", - "lastModified": "2024-09-24T16:41:29.377", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:40.643", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json index 56a0f72bac9..9bd01a2bf88 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5529", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-22T06:15:02.520", - "lastModified": "2024-11-21T09:47:52.530", + "lastModified": "2025-03-18T14:15:41.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json index 015b9d47fc0..09d69a04698 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56313", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T22:15:06.540", - "lastModified": "2025-01-14T17:15:19.187", + "lastModified": "2025-03-18T14:15:40.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en la funci\u00f3n Calendario de REDCap hasta la versi\u00f3n 15.0.0 permite a los usuarios autenticados inyectar secuencias de comandos maliciosas en el campo Notas de un evento del calendario. Cuando se visualiza el evento, se ejecuta el payload manipulado, lo que potencialmente permite la ejecuci\u00f3n de secuencias de comandos web arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json index 0d70d9a77ea..d9d44c12159 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57015", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.403", - "lastModified": "2025-03-10T17:22:42.443", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:41.020", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8997.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8997.json new file mode 100644 index 00000000000..afb763d00a5 --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8997.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8997", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-18T14:15:41.400", + "lastModified": "2025-03-18T14:15:41.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vestel EVC04 Configuration Interface allows SQL Injection.This issue affects EVC04 Configuration Interface: through 18.03.2025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0070", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20634.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20634.json index 82ae4b18957..49bf6e23b05 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20634.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20634.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20634", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:08.423", - "lastModified": "2025-02-18T19:15:24.690", + "lastModified": "2025-03-18T14:15:41.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json index df614929e4a..ca5f0333501 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21546", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:20.987", - "lastModified": "2025-02-18T21:15:26.057", + "lastModified": "2025-03-18T14:15:41.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json index 1b02c9c6b66..8f9728463dd 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21548", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.240", - "lastModified": "2025-02-18T21:15:26.297", + "lastModified": "2025-03-18T14:15:42.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22954.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22954.json index c1642f4425d..1a8ffc67d4e 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22954.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22954.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22954", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T15:15:39.700", - "lastModified": "2025-03-13T04:15:22.230", + "lastModified": "2025-03-18T14:15:42.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 5.0, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 1.6, - "impactScore": 3.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json index 4d91d0251b2..7da838c61f7 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24108", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.263", - "lastModified": "2025-03-04T15:25:43.983", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:42.627", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json index e1574384815..f550f3cd711 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24118", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.033", - "lastModified": "2025-03-04T15:15:49.937", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:42.797", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json index edb46e08092..39676e40c6d 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24174", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.547", - "lastModified": "2025-03-03T22:47:07.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T14:15:43.020", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json index 1a962c996cd..ba081702d7c 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24813", "sourceIdentifier": "security@apache.org", "published": "2025-03-10T17:15:35.067", - "lastModified": "2025-03-17T16:15:25.343", + "lastModified": "2025-03-18T14:15:43.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,34 @@ "value": "Equivalencia de ruta: 'file.Name' (punto interno) que conduce a la ejecuci\u00f3n remota de c\u00f3digo y/o divulgaci\u00f3n de informaci\u00f3n y/o contenido malicioso agregado a los archivos cargados a trav\u00e9s del servlet predeterminado habilitado para escritura en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.2, desde 10.1.0-M1 hasta 10.1.34, desde 9.0.0.M1 hasta 9.0.98. Si todo lo siguiente fuera cierto, un usuario malintencionado podr\u00eda ver archivos sensibles de seguridad y/o inyectar contenido en esos archivos: - escrituras habilitadas para el servlet predeterminado (deshabilitado por defecto) - soporte para PUT parcial (habilitado por defecto) - una URL de destino para cargas sensibles de seguridad que era un subdirectorio de una URL de destino para cargas p\u00fablicas - conocimiento del atacante de los nombres de los archivos sensibles de seguridad que se estaban cargando - los archivos sensibles de seguridad tambi\u00e9n se estaban cargando a trav\u00e9s de PUT parcial Si todo lo siguiente fuera cierto, un usuario malintencionado podr\u00eda realizar una ejecuci\u00f3n remota de c\u00f3digo: - escrituras habilitadas para el servlet predeterminado (deshabilitado por defecto) - soporte para PUT parcial (habilitado por defecto) - la aplicaci\u00f3n estaba usando la persistencia de sesi\u00f3n basada en archivos de Tomcat con la ubicaci\u00f3n de almacenamiento predeterminada - la aplicaci\u00f3n inclu\u00eda una biblioteca que se puede aprovechar en un ataque de deserializaci\u00f3n Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.3, 10.1.35 o 9.0.98, que corrige el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2419.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2419.json index 10f62ffe6f7..0fbcb8d4ab2 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2419.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2419.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2419", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T22:15:15.450", - "lastModified": "2025-03-17T22:15:15.450", + "lastModified": "2025-03-18T14:15:45.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /InsertFeedback.php. The manipulation of the argument txtName/txtEmail/txtMobile/txtFeedback leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Real Estate Property Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /InsertFeedback.php. La manipulaci\u00f3n del argumento txtName/txtEmail/txtMobile/txtFeedback provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.516999", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/heiheiworld/cve/blob/main/cve-h.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2420.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2420.json index a37a8fbb076..88bfa8fc035 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2420.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2420.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2420", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T23:15:18.723", - "lastModified": "2025-03-17T23:15:18.723", + "lastModified": "2025-03-18T13:15:37.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in \u732b\u5b81i Morning up to bc782730c74ff080494f145cc363a0b4f43f7d3e. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en ??i Morning hasta bc782730c74ff080494f145cc363a0b4f43f7d3e. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n provoca cross-site request forgery. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.517009", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/morning-pro/Morning/issues/IBRVMX", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2449.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2449.json new file mode 100644 index 00000000000..b7613f0062c --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2449", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-03-18T14:15:45.670", + "lastModified": "2025-03-18T14:15:45.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-146/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2450.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2450.json new file mode 100644 index 00000000000..076fbf3ee30 --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2450.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2450", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-03-18T14:15:45.850", + "lastModified": "2025-03-18T14:15:45.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI Vision Builder AI. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of VBAI files. The issue results from allowing the execution of dangerous script without user warning. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22833." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-356" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-147/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2490.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2490.json new file mode 100644 index 00000000000..108d04ba72e --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2490.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2490", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-18T14:15:46.250", + "lastModified": "2025-03-18T14:15:46.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Dromara ujcms 9.7.5. It has been rated as problematic. Affected by this issue is the function uploadZip/upload of the file /main/java/com/ujcms/cms/ext/web/backendapi/WebFileUploadController.java of the component File Upload. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dromara/ujcms/issues/12", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dromara/ujcms/issues/13", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299996", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299996", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.517267", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json new file mode 100644 index 00000000000..20dd7c12ee3 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25500", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T14:15:43.493", + "lastModified": "2025-03-18T14:15:43.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/CVEProject/cveproject.github.io/blob/gh-pages/requester/reservation-guidelines.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json index b2048393d7c..c59aada1ea5 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25898", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.867", - "lastModified": "2025-02-18T18:15:35.503", + "lastModified": "2025-03-18T14:15:43.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json index 633a9618012..05be82226f5 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29909", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T22:15:14.657", - "lastModified": "2025-03-17T22:15:14.657", + "lastModified": "2025-03-18T14:15:43.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a heap buffer overflow vulnerability in CryptoLib's `Crypto_TC_ApplySecurity()` allows an attacker to craft a malicious TC frame that causes out-of-bounds memory writes. This can result in denial of service (DoS) or, under certain conditions, remote code execution (RCE). Any application or system that relies on CryptoLib for Telecommand (TC) processing and does not strictly validate incoming TC frames is at risk. This includes satellite ground stations or mission control software where attackers can inject malformed frames. A patch is available at commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc." + }, + { + "lang": "es", + "value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales (SDLS-EP) del CCSDS para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. En las versiones 1.3.3 y anteriores, una vulnerabilidad de desbordamiento de b\u00fafer en la pila de `Crypto_TC_ApplySecurity()` de CryptoLib permite a un atacante manipular una trama TC maliciosa que provoca escrituras fuera de los l\u00edmites de memoria. Esto puede provocar una denegaci\u00f3n de servicio (DoS) o, en determinadas circunstancias, la ejecuci\u00f3n remota de c\u00f3digo (RCE). Cualquier aplicaci\u00f3n o sistema que dependa de CryptoLib para el procesamiento de telecomandos (TC) y no valide estrictamente las tramas TC entrantes est\u00e1 en riesgo. Esto incluye estaciones terrestres de sat\u00e9lite o software de control de misi\u00f3n, donde los atacantes pueden inyectar tramas malformadas. Hay un parche disponible en el commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -81,6 +85,10 @@ { "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-q2pc-c3jx-3852", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-q2pc-c3jx-3852", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json index b91fc7cbaa0..f3ff2bb85b7 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29910", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T22:15:14.810", - "lastModified": "2025-03-17T22:15:14.810", + "lastModified": "2025-03-18T14:15:43.913", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A memory leak vulnerability was identified in the `crypto_handle_incrementing_nontransmitted_counter` function of CryptoLib versions 1.3.3 and prior. This vulnerability can lead to resource exhaustion and degraded system performance over time, particularly in long-running processes or systems processing large volumes of data. The vulnerability is present in the `crypto_handle_incrementing_nontransmitted_counter` function within `crypto_tc.c`. The function allocates memory using `malloc` without ensuring the allocated memory is always freed. This issue can lead to resource exhaustion, reduced system performance, and potentially a Denial of Service (DoS) in environments where CryptoLib is used in long-running processes or with large volumes of data. Any system using CryptoLib, especially those handling high-throughput or continuous data streams, could be impacted. As of time of publication, no known patched versions are available." + }, + { + "lang": "es", + "value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales CCSDS - Procedimientos Extendidos (SDLS-EP) para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. Se identific\u00f3 una vulnerabilidad de fuga de memoria en la funci\u00f3n `crypto_handle_incrementing_nontransmitted_counter` de las versiones 1.3.3 y anteriores de CryptoLib. Esta vulnerabilidad puede provocar el agotamiento de recursos y la degradaci\u00f3n del rendimiento del sistema con el tiempo, especialmente en procesos de larga duraci\u00f3n o sistemas que procesan grandes vol\u00famenes de datos. La vulnerabilidad est\u00e1 presente en la funci\u00f3n `crypto_handle_incrementing_nontransmitted_counter` dentro de `crypto_tc.c`. Esta funci\u00f3n asigna memoria mediante `malloc` sin garantizar que la memoria asignada siempre est\u00e9 libre. Este problema puede provocar el agotamiento de recursos, la reducci\u00f3n del rendimiento del sistema y, potencialmente, una denegaci\u00f3n de servicio (DoS) en entornos donde CryptoLib se utiliza en procesos de larga duraci\u00f3n o con grandes vol\u00famenes de datos. Cualquier sistema que utilice CryptoLib, especialmente aquellos que gestionan flujos de datos continuos o de alto rendimiento, podr\u00eda verse afectado. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +77,10 @@ { "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-p38w-p2r8-g6g5", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-p38w-p2r8-g6g5", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json index d7305f46c32..730a5ab879e 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29911", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T23:15:18.293", - "lastModified": "2025-03-17T23:15:18.293", + "lastModified": "2025-03-18T14:15:44.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A critical heap buffer overflow vulnerability was identified in the `Crypto_AOS_ProcessSecurity` function of CryptoLib versions 1.3.3 and prior. This vulnerability allows an attacker to trigger a Denial of Service (DoS) or potentially execute arbitrary code (RCE) by providing a maliciously crafted AOS frame with an insufficient length. The vulnerability lies in the function `Crypto_AOS_ProcessSecurity`, specifically during the processing of the Frame Error Control Field (FECF). The affected code attempts to read from the `p_ingest` buffer at indices `current_managed_parameters_struct.max_frame_size - 2` and `current_managed_parameters_struct.max_frame_size - 1` without verifying if `len_ingest` is sufficiently large. This leads to a heap buffer overflow when `len_ingest` is smaller than `max_frame_size`. As of time of publication, no known patched versions exist." + }, + { + "lang": "es", + "value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales CCSDS - Procedimientos Extendidos (SDLS-EP) para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. Se identific\u00f3 una vulnerabilidad cr\u00edtica de desbordamiento del b\u00fafer de pila en la funci\u00f3n `Crypto_AOS_ProcessSecurity` de las versiones 1.3.3 y anteriores de CryptoLib. Esta vulnerabilidad permite a un atacante activar una denegaci\u00f3n de servicio (DoS) o, potencialmente, ejecutar c\u00f3digo arbitrario (RCE) al proporcionar una trama AOS maliciosa con una longitud insuficiente. La vulnerabilidad reside en la funci\u00f3n `Crypto_AOS_ProcessSecurity`, espec\u00edficamente durante el procesamiento del Campo de Control de Error de Trama (FECF). El c\u00f3digo afectado intenta leer del b\u00fafer `p_ingest` en los \u00edndices `current_managed_parameters_struct.max_frame_size - 2` y `current_managed_parameters_struct.max_frame_size - 1` sin verificar si `len_ingest` es lo suficientemente grande. Esto provoca un desbordamiento del b\u00fafer del mont\u00f3n cuando `len_ingest` es menor que `max_frame_size`. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +77,10 @@ { "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-7g6g-9gj4-8c68", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-7g6g-9gj4-8c68", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30106.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30106.json new file mode 100644 index 00000000000..6e55a0b9e31 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30106.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30106", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T14:15:46.480", + "lastModified": "2025-03-18T14:15:46.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On IROAD v9 devices, the dashcam has hardcoded default credentials (\"qwertyuiop\") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://iroad-dashcam.nl/iroad/iroad-x5/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2395471c4a8..f828464a414 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-18T13:00:19.684554+00:00 +2025-03-18T15:00:19.408688+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-18T12:34:33.997000+00:00 +2025-03-18T14:54:25.830000+00:00 ``` ### Last Data Feed Release @@ -33,36 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285584 +285592 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `8` -- [CVE-2024-23942](CVE-2024/CVE-2024-239xx/CVE-2024-23942.json) (`2025-03-18T11:15:38.777`) -- [CVE-2024-23943](CVE-2024/CVE-2024-239xx/CVE-2024-23943.json) (`2025-03-18T11:15:39.090`) -- [CVE-2024-41975](CVE-2024/CVE-2024-419xx/CVE-2024-41975.json) (`2025-03-18T11:15:39.247`) -- [CVE-2025-0694](CVE-2025/CVE-2025-06xx/CVE-2025-0694.json) (`2025-03-18T11:15:39.400`) -- [CVE-2025-1468](CVE-2025/CVE-2025-14xx/CVE-2025-1468.json) (`2025-03-18T11:15:39.553`) -- [CVE-2025-2489](CVE-2025/CVE-2025-24xx/CVE-2025-2489.json) (`2025-03-18T12:15:15.770`) -- [CVE-2025-2493](CVE-2025/CVE-2025-24xx/CVE-2025-2493.json) (`2025-03-18T12:15:15.950`) -- [CVE-2025-2494](CVE-2025/CVE-2025-24xx/CVE-2025-2494.json) (`2025-03-18T12:15:16.090`) -- [CVE-2025-2495](CVE-2025/CVE-2025-24xx/CVE-2025-2495.json) (`2025-03-18T12:15:16.227`) +- [CVE-2023-47539](CVE-2023/CVE-2023-475xx/CVE-2023-47539.json) (`2025-03-18T14:15:37.830`) +- [CVE-2024-21760](CVE-2024/CVE-2024-217xx/CVE-2024-21760.json) (`2025-03-18T14:15:38.297`) +- [CVE-2024-8997](CVE-2024/CVE-2024-89xx/CVE-2024-8997.json) (`2025-03-18T14:15:41.400`) +- [CVE-2025-2449](CVE-2025/CVE-2025-24xx/CVE-2025-2449.json) (`2025-03-18T14:15:45.670`) +- [CVE-2025-2450](CVE-2025/CVE-2025-24xx/CVE-2025-2450.json) (`2025-03-18T14:15:45.850`) +- [CVE-2025-2490](CVE-2025/CVE-2025-24xx/CVE-2025-2490.json) (`2025-03-18T14:15:46.250`) +- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-18T14:15:43.493`) +- [CVE-2025-30106](CVE-2025/CVE-2025-301xx/CVE-2025-30106.json) (`2025-03-18T14:15:46.480`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `34` -- [CVE-2024-13564](CVE-2024/CVE-2024-135xx/CVE-2024-13564.json) (`2025-03-18T12:34:33.997`) -- [CVE-2024-21752](CVE-2024/CVE-2024-217xx/CVE-2024-21752.json) (`2025-03-18T11:53:39.520`) -- [CVE-2024-24835](CVE-2024/CVE-2024-248xx/CVE-2024-24835.json) (`2025-03-18T11:37:45.627`) -- [CVE-2024-27952](CVE-2024/CVE-2024-279xx/CVE-2024-27952.json) (`2025-03-18T11:07:04.300`) -- [CVE-2024-29117](CVE-2024/CVE-2024-291xx/CVE-2024-29117.json) (`2025-03-18T11:54:32.273`) -- [CVE-2024-29928](CVE-2024/CVE-2024-299xx/CVE-2024-29928.json) (`2025-03-18T11:33:47.187`) -- [CVE-2024-30549](CVE-2024/CVE-2024-305xx/CVE-2024-30549.json) (`2025-03-18T11:33:13.290`) -- [CVE-2025-24093](CVE-2025/CVE-2025-240xx/CVE-2025-24093.json) (`2025-03-18T12:15:14.730`) +- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2025-03-18T14:15:39.260`) +- [CVE-2024-40789](CVE-2024/CVE-2024-407xx/CVE-2024-40789.json) (`2025-03-18T14:15:39.473`) +- [CVE-2024-40792](CVE-2024/CVE-2024-407xx/CVE-2024-40792.json) (`2025-03-18T14:15:39.723`) +- [CVE-2024-43765](CVE-2024/CVE-2024-437xx/CVE-2024-43765.json) (`2025-03-18T14:15:39.920`) +- [CVE-2024-43771](CVE-2024/CVE-2024-437xx/CVE-2024-43771.json) (`2025-03-18T14:15:40.117`) +- [CVE-2024-44151](CVE-2024/CVE-2024-441xx/CVE-2024-44151.json) (`2025-03-18T14:15:40.260`) +- [CVE-2024-45180](CVE-2024/CVE-2024-451xx/CVE-2024-45180.json) (`2025-03-18T14:15:40.437`) +- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2025-03-18T14:15:40.643`) +- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2025-03-18T14:15:41.210`) +- [CVE-2024-56313](CVE-2024/CVE-2024-563xx/CVE-2024-56313.json) (`2025-03-18T14:15:40.837`) +- [CVE-2024-57015](CVE-2024/CVE-2024-570xx/CVE-2024-57015.json) (`2025-03-18T14:15:41.020`) +- [CVE-2025-20634](CVE-2025/CVE-2025-206xx/CVE-2025-20634.json) (`2025-03-18T14:15:41.747`) +- [CVE-2025-21546](CVE-2025/CVE-2025-215xx/CVE-2025-21546.json) (`2025-03-18T14:15:41.940`) +- [CVE-2025-21548](CVE-2025/CVE-2025-215xx/CVE-2025-21548.json) (`2025-03-18T14:15:42.087`) +- [CVE-2025-22954](CVE-2025/CVE-2025-229xx/CVE-2025-22954.json) (`2025-03-18T14:15:42.213`) +- [CVE-2025-24108](CVE-2025/CVE-2025-241xx/CVE-2025-24108.json) (`2025-03-18T14:15:42.627`) +- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-03-18T14:15:42.797`) +- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-03-18T14:15:43.020`) +- [CVE-2025-2419](CVE-2025/CVE-2025-24xx/CVE-2025-2419.json) (`2025-03-18T14:15:45.067`) +- [CVE-2025-2420](CVE-2025/CVE-2025-24xx/CVE-2025-2420.json) (`2025-03-18T13:15:37.770`) +- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-18T14:15:43.253`) +- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-03-18T14:15:43.617`) +- [CVE-2025-29909](CVE-2025/CVE-2025-299xx/CVE-2025-29909.json) (`2025-03-18T14:15:43.803`) +- [CVE-2025-29910](CVE-2025/CVE-2025-299xx/CVE-2025-29910.json) (`2025-03-18T14:15:43.913`) +- [CVE-2025-29911](CVE-2025/CVE-2025-299xx/CVE-2025-29911.json) (`2025-03-18T14:15:44.023`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dca5e54721b..2cc32d25a4a 100644 --- a/_state.csv +++ b/_state.csv @@ -229539,7 +229539,7 @@ CVE-2023-37033,0,0,4d19abd7a4b0679c963f8ae0666794b729ae8b36c669ea355e198e5d10e5d CVE-2023-37034,0,0,fa5a5e09d8d78e10a9175b15b4767670b021a7f2fdabb4036e210e9d3e979a0d,2025-02-18T21:15:18.657000 CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000 CVE-2023-37036,0,0,6121be02129a87ac19af9dbdfa88faf71a80c89697c7eb9824b19b67281e7fe1,2025-02-18T21:15:18.833000 -CVE-2023-37037,0,0,955cf823798334850c56511cc5d4474f00db6322afdf539bfc2d9677a497adbc,2025-02-18T21:15:19.017000 +CVE-2023-37037,0,1,4288177fbb520d26843219d9c7439a4ea638bd90dd89bfc8efaa2edd3b8881c9,2025-03-18T14:15:36.540000 CVE-2023-37038,0,0,5bdea00602f2b8731b2d9fe065f617cd5b02fe40112461fb0ca64d4e532a3476,2025-03-13T20:15:15.297000 CVE-2023-37039,0,0,593095538e0a058f3185841ec48dc68f11660c8bdecf3a52a3448a987f5b7338,2025-03-14T18:15:26.553000 CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000 @@ -234309,7 +234309,7 @@ CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221f CVE-2023-42928,0,0,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000 CVE-2023-42929,0,0,22e391c78b0bc708ad36e097e0efa7984486dffc0ca1c4dde9bea2af85485826,2025-01-27T18:15:36.240000 CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589dbd9,2024-11-21T08:34:47.947000 -CVE-2023-42930,0,0,c3000d0710eca7fcac206d7d07f55ef71a49336e4e8eba7db72184c755d073fa,2024-11-21T08:23:32.203000 +CVE-2023-42930,0,1,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000 CVE-2023-42931,0,0,1f1699814f13af297276399444ed2998af062ed9a892f7f5fa3b5215b4d8431f,2024-11-21T08:23:32.337000 CVE-2023-42932,0,0,0fa8aee74d53ff347eeb67002789734567a456a1e02e04a09f94fc7aac778003,2024-11-21T08:23:32.547000 CVE-2023-42933,0,0,19e86fdfeca504e0149a8d635152cff97edbafa25dc596c6f832b0f0e3718e0c,2024-11-21T08:23:32.693000 @@ -237473,6 +237473,7 @@ CVE-2023-47534,0,0,156d1827eb4da96dc3cd2d8629999ea2e2fa724590606a3354fde4b400d38 CVE-2023-47535,0,0,f2482cd2a126c874431de1486430d927e5d2fe9233f7e6e04b7ad66b435fbddd,2025-03-17T23:15:16.877000 CVE-2023-47536,0,0,d84d72a63721689042d4832177b8ed0c4a9d504fac28b204af3cc47b40f30f39,2024-11-21T08:30:24.973000 CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66e1c,2024-11-21T08:30:25.100000 +CVE-2023-47539,1,1,54596679236b300e906d331306b91f51f0b380b77c51cf9b8078260a43a824d0,2025-03-18T14:15:37.830000 CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000 CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000 CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000 @@ -247672,7 +247673,7 @@ CVE-2024-13560,0,0,bc3576a3348779a87640a25b38dfdb4ea2739f3634c8fab6266670a556723 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13563,0,0,7afda43f88427dad437c50be6603e252baea46e3fdf123d9d97727e766d854d8,2025-02-28T22:08:41.383000 -CVE-2024-13564,0,1,b852ed41c482550afe0a693c7be7c11cdc0c6f8336e2a90e2b042aa465b4bef9,2025-03-18T12:34:33.997000 +CVE-2024-13564,0,0,b852ed41c482550afe0a693c7be7c11cdc0c6f8336e2a90e2b042aa465b4bef9,2025-03-18T12:34:33.997000 CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-13568,0,0,9e74afb56722f02929d754afa7c3b344f0fb3d262b0b29f693d93e682755b19b,2025-03-01T05:15:14.883000 @@ -249339,7 +249340,7 @@ CVE-2024-20937,0,0,9f7a5f5a131093c9b119dbd0de8a4ddc6a0c065a2d2291ce3b1d58ce46223 CVE-2024-20938,0,0,6fe21b52aad41d5c17bb42ae4439eea9ca26609905457e042a739e5c570e5ae2,2024-11-21T08:53:28.290000 CVE-2024-20939,0,0,a61ef26bf2d0edb06b899a122ed306c452492ece485364c57e14dc58ca287a91,2024-11-29T14:08:10.783000 CVE-2024-20940,0,0,2eef388a674fa50646c1a9e94e9cc85f45f15970a44431d112399a9bcd04b4bd,2024-11-21T08:53:28.510000 -CVE-2024-20941,0,0,ade6083dca081c447e1ccb896e38e59717d8aebeb9ead99ebd48803f468a3714,2024-11-21T08:53:28.627000 +CVE-2024-20941,0,1,979ab879e23ba3c79bea46ae3f7a52ecf257a8180aebfc1872017418c29dd488,2025-03-18T14:15:37.983000 CVE-2024-20942,0,0,2598677f0c454ed9ee0ba0704705d6276c039cbd72f273ab754a1b849ce636d5,2024-11-21T08:53:28.740000 CVE-2024-20943,0,0,0335ec4dd85ba21cfc62e7df0256bca3d058de7a66f986149db911f3e2f03ed7,2024-11-21T08:53:28.860000 CVE-2024-20944,0,0,431d40edb070cddbf02cbf85d009e07a3054fa640a623707fd6570608afaa9bf,2024-11-21T08:53:28.977000 @@ -249521,7 +249522,7 @@ CVE-2024-2111,0,0,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5 CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000 CVE-2024-21111,0,0,ce04902122edd823f80a1fc79ecddd6498bfae611dda514cff0b08c3d5f73631,2024-12-05T15:16:10.643000 CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f6d9,2024-12-05T15:16:13.397000 -CVE-2024-21113,0,0,86df7db11640cede427be4212b6b270c53dafd862acd12cf7bd5eaf6600225ed,2024-12-05T15:16:15.940000 +CVE-2024-21113,0,1,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000 CVE-2024-21115,0,0,c8b5f110fee1084e3e4bbd02d3f1664b03293a1da68e5246ef4334e81776ca1c,2024-12-05T15:16:18.327000 CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327923,2024-12-05T15:16:20.707000 @@ -250143,7 +250144,7 @@ CVE-2024-21749,0,0,854c07ea14d44f1a6f258b4195b384ea52b627e1c7fb4eba6779b50701ad8 CVE-2024-2175,0,0,f23583a5f89b3c048c3a390c725234de0385c846391e27a731d22c7274e14129,2024-08-19T13:00:23.117000 CVE-2024-21750,0,0,34ac4bf556abed3b579ceb283a732cbafac6840724519bcf2f9521daaba609b5,2024-11-21T08:54:56.420000 CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5b57,2024-11-21T08:54:56.547000 -CVE-2024-21752,0,1,b41317b4648baf91dd8a72a1931732fd9edddef7552ed76b1d7821ff0695a95c,2025-03-18T11:53:39.520000 +CVE-2024-21752,0,0,b41317b4648baf91dd8a72a1931732fd9edddef7552ed76b1d7821ff0695a95c,2025-03-18T11:53:39.520000 CVE-2024-21753,0,0,45b065c6167769cb16d64a10ec6f37b04b38c9a33361a88b58e0222b96c5fb44,2024-09-25T18:36:45.307000 CVE-2024-21754,0,0,6726148c9c00979954f8e0e43980573889b19508b76c8b84b92cd601e38d1fce,2024-11-21T08:54:56.877000 CVE-2024-21755,0,0,3db688cacd77dd473c848be3e1117c1b29b56eeefd4b3b05f3fefc4fcada771b,2024-12-23T14:58:10.797000 @@ -250152,6 +250153,7 @@ CVE-2024-21757,0,0,2977bcabeb1633cac10a5d2b68ce6f1b718f97760675ba593569c66c881c2 CVE-2024-21758,0,0,ad55d9c19835721bfd9ae203af7dd8f725eb80a82daed984b63908fd7c66e709,2025-02-18T22:15:10.317000 CVE-2024-21759,0,0,c7b87faa73119d13eeff29f1fcc441192710ec05905507e64f7a792b951b9ab6,2024-11-21T08:54:57.347000 CVE-2024-2176,0,0,1aeee7ae52b7f70f1b987c126ac25fd385f727623c97d4e6f5fec3aa0f1aa936,2024-12-19T20:23:37.707000 +CVE-2024-21760,1,1,5bf0812dffd441322935e13797b30b53547dc7e04046b1be46dc81bb07bb7a33,2025-03-18T14:15:38.297000 CVE-2024-21761,0,0,82642bae2920dd7ff8b514e57bc1c1f5d6d71d9ec15a1b10f21b90ef60b69c46,2024-11-21T08:54:57.477000 CVE-2024-21762,0,0,46f8e56aa266e45cbb4ef8c12ef0ba4149aa340cd2149bb68f1bc655d5d263af,2024-11-29T15:23:32.167000 CVE-2024-21763,0,0,5aa1c67876a3611f6d45b29da83d05776ea7bdb28478c851cf0e3e3d1d0a0b00,2024-12-12T19:12:18.580000 @@ -251685,7 +251687,7 @@ CVE-2024-23782,0,0,c911c68bede1e979645b4c4cd33b7976d93900d1c38c4a770496a15f35fa8 CVE-2024-23783,0,0,3fa853eaf8b1055bdba72d2ea33e9c04fa8b0c3f0b50310fa2ab86ce2a523288,2024-11-21T08:58:23.570000 CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9f5c,2024-11-21T08:58:23.717000 CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000 -CVE-2024-23786,0,0,a322be34f5f40052b238177f89944db1eaac600cbfa145099e1d8ae5dcd93c7d,2024-11-21T08:58:24.090000 +CVE-2024-23786,0,1,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000 CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000 CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000 CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000 @@ -251844,8 +251846,8 @@ CVE-2024-23938,0,0,5569f095c88d3edc91da7b05d4b47aad5d8c07d6eab7699149a618af2c5b0 CVE-2024-2394,0,0,ddcb12447d50a725981acd1252ac2e6f9236d64850dd4bb1a3a73b4edbe397ae,2025-02-26T16:21:37.120000 CVE-2024-23940,0,0,06d04c2e3a7f29a0e7a62a5331ae3d9d5c7acce3a81c480978850a16e4f0b74a,2024-11-21T08:58:43.807000 CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22ca1,2024-11-21T08:58:43.940000 -CVE-2024-23942,1,1,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000 -CVE-2024-23943,1,1,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000 +CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000 +CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000 CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000 CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000 CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000 @@ -252362,7 +252364,7 @@ CVE-2024-24831,0,0,79b53e3f2f08a9fcc2402c1ea185326b8812ae4c17ad199e9ba39e8d04543 CVE-2024-24832,0,0,785e2e692844876097d5d0266121b6c22b06e57908a170a654e785da1f3b18b9,2025-02-04T20:58:05.637000 CVE-2024-24833,0,0,0b569d5f030fc8d02fc4bcbaf8e65596ac662168b819175c4ff05ff2c74c4386,2025-01-08T17:14:47.103000 CVE-2024-24834,0,0,2b55d088597fc3ebc5386acef715e319fba0648d90a9c27dfb74125fc7cf22eb,2024-11-21T08:59:49.053000 -CVE-2024-24835,0,1,7b3f8232aba032051f60d0f3e962cf9a4ea465f4c4e03b757da7b5787e1829a4,2025-03-18T11:37:45.627000 +CVE-2024-24835,0,0,7b3f8232aba032051f60d0f3e962cf9a4ea465f4c4e03b757da7b5787e1829a4,2025-03-18T11:37:45.627000 CVE-2024-24836,0,0,0468b6ec04583463bff3590023f79b4c3fdc144c9a581e1e17284b820318e242,2024-11-21T08:59:49.317000 CVE-2024-24837,0,0,7ad01e4d66bd18540fc4a1df9e3655e1c4a199a45b0859636572272be2977ddb,2024-11-21T08:59:49.447000 CVE-2024-24838,0,0,8e4d815e4da317a92180027f298a62e47e86b6f757666b5c0dfaf2710c513fa3,2024-11-21T08:59:49.593000 @@ -254882,7 +254884,7 @@ CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9eb CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000 CVE-2024-27950,0,0,53da77641072875e4be7a331920e4e65f0eff4f0d2cd1d57778fc38818e7c955,2024-11-21T09:05:29.223000 CVE-2024-27951,0,0,4d2ba26a6032e03de2aff525cd262e98565b7fc7badd9cb2f91868dd9835e904,2025-02-07T16:59:17.713000 -CVE-2024-27952,0,1,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000 +CVE-2024-27952,0,0,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000 CVE-2024-27953,0,0,c5d16c193543fca46282ab3c8cd23ba2c5868bd65b0e219f002c47b9928a9bbd,2024-11-21T09:05:29.663000 CVE-2024-27954,0,0,868051cf140aca79ae18199226f95ebe38588b4710d77e4adca2895e0f6050b2,2024-11-21T09:05:29.807000 CVE-2024-27955,0,0,68f1b654e856ea89e2c3920d06b20f4b15b70ed46da32e67660258ac4409cc1b,2024-11-21T09:05:29.957000 @@ -254995,7 +254997,7 @@ CVE-2024-28065,0,0,29c965c618b196a2a981aebc47585c814c9fb99e0a8627060db88187d466b CVE-2024-28066,0,0,d0dd8700e3d67194ced6e44b8a1aa15edc2e5058e4dc671b0d3ef7a28fb38999,2024-11-21T09:05:44.270000 CVE-2024-28067,0,0,3565fd0ada2e0c321bb115af4a670e45b532df6130e88a302b617be4c5f9f12f,2024-11-21T09:05:44.517000 CVE-2024-28068,0,0,4ad18e3fac7a71a575f477d531a4c0047d3a9eba63b8ba6967e711d0116faaae,2024-11-21T09:05:44.713000 -CVE-2024-28069,0,0,d642acf4387334ccc7ddc0fefc11a659d84d992af74df5733fb79a2023dc48aa,2024-11-21T09:05:44.903000 +CVE-2024-28069,0,1,efb0a27d12fc8c409138d4cb99523efd1ff8eff144f8315bf517a3e7f24c3984,2025-03-18T14:15:38.693000 CVE-2024-2807,0,0,d5df072d14c63a150df30c06942ef8b1a4196e073cd023f9b3c41b08dcfaef61,2024-11-21T09:10:34.117000 CVE-2024-28070,0,0,636e2a0fb0d0c0f843795bd2fc360a9b786d38874ab72d393604ed9b95733d95,2024-11-21T09:05:45.067000 CVE-2024-28072,0,0,4c08f86186600b9b3288b9e0c28e7c3bbf121b9a165ab22ed55189c2b2697fdf,2025-02-25T17:12:45.987000 @@ -255728,7 +255730,7 @@ CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4e CVE-2024-29114,0,0,99f225b963c90ecffa853266e83fb15bb853d6b76b2d94ce806d76cd9c3001de,2025-03-12T14:27:28.637000 CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000 CVE-2024-29116,0,0,26937c2303a397b0e754f86089c4e82794a9c01028d4fbb39ff77bb5a452c1e2,2024-11-21T09:07:35.393000 -CVE-2024-29117,0,1,378efc3eed009982f9306687c76babb39f8ff6381283278b008e12d0df4c7a03,2025-03-18T11:54:32.273000 +CVE-2024-29117,0,0,378efc3eed009982f9306687c76babb39f8ff6381283278b008e12d0df4c7a03,2025-03-18T11:54:32.273000 CVE-2024-29118,0,0,53699996adc37bf116f2e52d3369de9629ce479b5ba3d2e23b9e661ea562289d,2024-11-21T09:07:35.673000 CVE-2024-29119,0,0,3e47302e9e5c8f054b0ee0d042cd0bc0fe30b4364065a6dc24b1ebc8e9381bf0,2024-11-15T22:50:03.257000 CVE-2024-2912,0,0,37e835e5c308fa0aa260f2c273bc0161a037279353c9b0757bd2ac8975389355,2024-11-21T09:10:49.283000 @@ -256221,7 +256223,7 @@ CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045 CVE-2024-29925,0,0,9f6f6bdb0aca7932365f9103015a6a17d3f538ddfd9757873407ebac9569a669,2025-03-10T16:12:06.027000 CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000 CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000 -CVE-2024-29928,0,1,c62f5222b2d74d45f1365ec96af19b9a66ced9d160a0323e02d9cd8f7ed96939,2025-03-18T11:33:47.187000 +CVE-2024-29928,0,0,c62f5222b2d74d45f1365ec96af19b9a66ced9d160a0323e02d9cd8f7ed96939,2025-03-18T11:33:47.187000 CVE-2024-29929,0,0,f91bd0d65bfbafabbfd1e47fc42f253445f71d47c1a395703c4c93c760349825,2024-11-21T09:08:38.430000 CVE-2024-2993,0,0,ca085be1f41ce1cdb604449d670421536b9009a843dba261ec4149fee50495e0,2025-01-15T18:21:04.553000 CVE-2024-29930,0,0,9749f3c46d5ed598350d72b277cf5b80576c9e694bfca9cc9de48ba3f3758cda,2024-11-21T09:08:38.547000 @@ -256844,7 +256846,7 @@ CVE-2024-30544,0,0,000812eb578004fba324ad62ebd495504e2212c19a4b0b0e0a7882f2e09d5 CVE-2024-30545,0,0,9fc1519b1df9cef49e003c31844226b87a8a0876e6364f49bd01371911facd15,2024-11-21T09:12:08.943000 CVE-2024-30546,0,0,682d8bf45e6a08218a5a3a2da6b1491ce652cde21b3fc1369e6ec13bc346b6de,2024-11-21T09:12:09.073000 CVE-2024-30548,0,0,f693c6a877ff0dcdf6fe4ef2a958123b8947204e837af80130e7a6521588b872,2024-11-21T09:12:09.200000 -CVE-2024-30549,0,1,e0aaef9d1124e68820ae2a631987df8341a68ae1335bb73b4b302dacd497888f,2025-03-18T11:33:13.290000 +CVE-2024-30549,0,0,e0aaef9d1124e68820ae2a631987df8341a68ae1335bb73b4b302dacd497888f,2025-03-18T11:33:13.290000 CVE-2024-3055,0,0,80848d3ebe6c9d2dc11053b924adec8e053b2e76ed033beed24a77e64207f08e,2025-01-30T16:11:40.940000 CVE-2024-30550,0,0,b1012a09324820a2f5d1c5129a5f2c426e3a5ba9be88ba49aab751fbaf16a1e5,2024-11-21T09:12:09.457000 CVE-2024-30551,0,0,1e6b51a7a6c6332aac1197822ceff35a8c0ec56590e5297f09a269ea4cdb1fbc,2024-11-21T09:12:09.580000 @@ -257660,7 +257662,7 @@ CVE-2024-3170,0,0,596b407001ba195a8504d94c79f88526c2eece1c3e7d3022e47196ebfd910e CVE-2024-31705,0,0,21247aa945114616d9153c9180448ea2a0d6f5ce37586d25ca792bc45b7033bd,2024-11-21T09:13:49.640000 CVE-2024-3171,0,0,108508cc36c17f228cb917c4d635ba896d2a5833ac43ebb73307bfb04cf1f223,2024-11-21T09:29:04.030000 CVE-2024-31714,0,0,c0c6c7dc373b518d20be2543032a1d9a7a5244f08d272e125525335f6445b03a,2024-11-21T09:13:49.853000 -CVE-2024-3172,0,0,c1460d40cc9eea526b6df59e9edd0f9182f07455da127b2ba1ce98ea539ab234,2024-11-21T09:29:04.223000 +CVE-2024-3172,0,1,dde72649434996b3abc723061a7ec4be1a77c166c4b1e520c485e0c7af55195d,2025-03-18T14:15:39.083000 CVE-2024-3173,0,0,66654af0a9b3693e714ed54dab6b753d23bb29503cbcc422c776834c0881735a,2024-11-21T09:29:04.353000 CVE-2024-3174,0,0,01b42bbeb78c5debdb12591a172fa4a735cab4eecdab161d70a702f00cb1c20f,2024-11-21T09:29:04.553000 CVE-2024-31741,0,0,6f9f2f7a1a9d031b20435c4525b96bae952709f51b2ddf9cec9e16a72c5cc2ab,2024-11-21T09:13:50.067000 @@ -259080,7 +259082,7 @@ CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce12426 CVE-2024-33599,0,0,7562b04f66c6d54d64426cb393ec1c5ece9c8a879f7afa7f5dac99b57a77072d,2025-02-13T18:18:03.513000 CVE-2024-3360,0,0,cc6d76ae5db0ce9bab65b748413469a70f295699df8c796e1ea5796d4203b12e,2025-02-10T23:10:22.100000 CVE-2024-33600,0,0,e7823dcd14d5bdee96702b4a26e8a35b47f7712e7aac9f5d7aaf271585ac0d3b,2025-02-13T18:18:03.643000 -CVE-2024-33601,0,0,52eea2a235b9d6ab4f411c5b985e9ac6eee2f6b4710c12580c23463499fb4aa3,2025-02-21T17:15:12.100000 +CVE-2024-33601,0,1,12ad9e6fcf3b3b809eafc59904f4de659a65110943d6a70c17288cb40c56d749,2025-03-18T14:15:38.867000 CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79698,2025-02-13T18:18:03.950000 CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000 CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000 @@ -259471,7 +259473,7 @@ CVE-2024-34087,0,0,ad0eecbb0612f719db7e23c85ea2351d6bc1b74c0c7f2f45f413d40049f7b CVE-2024-34088,0,0,29ed9bff3f7a8aac8372db6383813d7ff3a9c10604e1b9decbbfa535edc1d6bc,2024-11-21T09:18:04.130000 CVE-2024-34089,0,0,e3ae5d593727aa9f206992806888f8b4a259e5a9864ac8d8f3c293e89b791320,2024-11-21T09:18:04.370000 CVE-2024-34090,0,0,31102a35767023992cf7abe1dae1bacab87f9368efd50ab8a275c9015b8dc10b,2024-11-21T09:18:04.523000 -CVE-2024-34091,0,0,3769ba6d54384558d77e36358ef3bba573b8494db22e5f01d29af2b7cfccabee,2024-11-21T09:18:04.670000 +CVE-2024-34091,0,1,519e69cce22b8c1316311fb4d4cc72759f50566992d370704c56d265bc32e1e8,2025-03-18T14:54:25.830000 CVE-2024-34092,0,0,0ba3d8ee6d8ef468c315a26baac7305fb679ceec5f971590e1392c655be9203a,2024-11-21T09:18:04.823000 CVE-2024-34093,0,0,0044f6cc121a6c9932833585ba18469e879c95b0ba2c45398dfb0161e5fcde00,2024-11-21T09:18:04.953000 CVE-2024-34094,0,0,78482e61bb057c4647bccd2a377fb3babc1863668db96b03b61e65a54b85b0db,2024-12-02T21:22:17.230000 @@ -264444,7 +264446,7 @@ CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c355 CVE-2024-40560,0,0,4df2ceb4f41adf8cf666410bb966237766648fac71bacffbfa433d4c66c2109b,2024-11-21T09:31:19.433000 CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000 CVE-2024-4057,0,0,a8ad6ccfc0806ad96a1cb2ac3bade2f19ae5a39ef55d50ae8d2c9b80f3c0a3fc,2024-11-21T09:42:06.090000 -CVE-2024-40575,0,0,a8f75e8e17d1ca3c5cff90298c3440e183032e028e89b6cd5ddda7707efd73e5,2024-11-21T09:31:19.820000 +CVE-2024-40575,0,1,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000 CVE-2024-40576,0,0,8cfb8bd5f4a4277303f3ae5754ca38f6c2227922febe0cad08d341d6250d63a0,2024-11-21T09:31:19.970000 CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da18dd,2024-11-15T19:35:07.323000 CVE-2024-4058,0,0,320f03165657b376b0f731f9e1bae79a3d28f3ea9d5ed14ae2ced412f995a064,2025-03-14T15:15:44.400000 @@ -264622,11 +264624,11 @@ CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fc CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000 CVE-2024-40787,0,0,ff74f1131bab9fe9382a9a7c925dfc41da9f84275eff94b172d96b4b7683c6dd,2025-03-13T19:15:45.973000 CVE-2024-40788,0,0,74fefda30f0aab4e09f30ade87f11c85de3de9a6b1f0932eeb0d9ad4ea247f18,2024-11-21T09:31:37.927000 -CVE-2024-40789,0,0,09922067eab122d58f2041478004e6ceb9a6e92293c6b9c2846852ea928f88b1,2024-11-21T09:31:38.157000 +CVE-2024-40789,0,1,5a1885ade6f38c7b1421a592f3c0fe5196df044653ca548723a01f9980a37f3a,2025-03-18T14:15:39.473000 CVE-2024-4079,0,0,d013459ffe1c358bbcd1714666185ba7ca2c58f58c35e2f334f09e957ec7acbf,2024-11-21T09:42:09.197000 CVE-2024-40790,0,0,d7d54daabba8d3f137709427c636b535799803d2811813d32fd0485b74b32f47,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,61e585f5c7e9e7a003c2692a4c8aea66b3ee7f0772ae5577a1ff0301d3e7d423,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,0,0f479bdbfe1e90d04903650eb8df12de4ee4867b141b46a2b1e465bf58a267c6,2024-10-30T16:35:18.823000 +CVE-2024-40792,0,1,400b069248cc8e9a30005addff3f79008090c1530afbf824d829a23243885942,2025-03-18T14:15:39.723000 CVE-2024-40793,0,0,8e8c7f5f0283a5dfa91b2c2375ff0a12e95b20686971bdae8a146cfd87e7ca01,2025-03-14T16:15:33.573000 CVE-2024-40794,0,0,1c884dad1bfb64c4327882aaba41854cdcb1933185fad999593f033dbaf2fcc3,2025-03-14T19:15:46.877000 CVE-2024-40795,0,0,054a23cd21201389beb5d30170b0d11407f666b940f4c135b0ceb5b20c8a9212,2024-11-21T09:31:38.810000 @@ -265531,7 +265533,7 @@ CVE-2024-41971,0,0,668696cf9bc6f97dc564ddb2c3e45d63d066756411ea26f564fd9a1237b11 CVE-2024-41972,0,0,c459471151fc935a231b96b6afcfc6a69eba9b082b5fb25895b45b1b59391a2e,2025-02-03T18:15:34.740000 CVE-2024-41973,0,0,dc9d64c3e6dfe723790f5a90a004f72267aa8f02bf1b1695a1611a0101ebbdbe,2025-02-03T18:15:34.957000 CVE-2024-41974,0,0,25b72947bf98e5166cff2bb22cc778f589bed5c7a3ddc111764330188f4906ec,2025-02-03T18:15:35.163000 -CVE-2024-41975,1,1,eed825352ad264dc6fd1064ead32010512a974bbd6d64dd3e64013788bc11967,2025-03-18T11:15:39.247000 +CVE-2024-41975,0,0,eed825352ad264dc6fd1064ead32010512a974bbd6d64dd3e64013788bc11967,2025-03-18T11:15:39.247000 CVE-2024-41976,0,0,f8b19c02d108c2efe1d1ed401da5afe56ace8fd66d8eeddc91dea5ff2017c891,2024-08-23T18:40:16.173000 CVE-2024-41977,0,0,e19ff7a98e8eabdef3aae087b2686fed5e6936d4bc074b253e276f488c80402e,2024-08-23T18:39:13.990000 CVE-2024-41978,0,0,723389e61d01e198249e5575d29386b8bd5defd3fd47f1e14f8d09063bbeea65,2024-08-23T18:34:36.283000 @@ -267018,13 +267020,13 @@ CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e0401 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 CVE-2024-43763,0,0,3de4617186aced8f7b3d48e3a710fa14a6fbbe2a4553f4d993ab1ba76d0b7f88,2025-03-17T17:15:29.567000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43765,0,0,0014a167ec18be31477f920e29d11f99a65e237b3783e3ef37ec168ee876e0b5,2025-02-18T20:15:18.873000 +CVE-2024-43765,0,1,e4250b40f4dc95af7fc01ebf26e3930da768b2af1b961aea947f144984b764a8,2025-03-18T14:15:39.920000 CVE-2024-43767,0,0,ea82ffa7edbe86b0487005b635a9495ff275642644aff14bb80ea65b81b8feec,2025-02-18T22:15:11.020000 CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 CVE-2024-43769,0,0,2589038c48c31a391cd992614c4f3cec964d236c9a07eb46302073ef1c3a63da,2025-03-13T15:15:47.617000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 CVE-2024-43770,0,0,f01b43d491e44ad66b34234f220434dd71c1e3e43453bafc93ae111fc58bf574,2025-02-18T20:15:18.960000 -CVE-2024-43771,0,0,ce3fb2ac81dbbd5a60c46b9a065a33126ec30db676ce372723a5045ddc3e26c4,2025-02-18T20:15:19.043000 +CVE-2024-43771,0,1,a4e7cb77edf20f08130c4e5aa48e2f2017a283a33ff6368994d069da352537ab,2025-03-18T14:15:40.117000 CVE-2024-43772,0,0,1ec9a5f39a4ef31a76fb428e7b3fe8d8c7cda3e7616b1dfc52864acd3e1bbbdb,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,2ee2804dd1e6aeea0733948db3d41a2e2f68fd10b6eded825d34c62d3248e740,2024-09-04T12:26:08.270000 CVE-2024-43774,0,0,dc2b3ecb213be315188d094eacf95425288510151e247e800354d794585eef91,2024-09-04T12:26:42.387000 @@ -267407,7 +267409,7 @@ CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940 CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70846,2024-12-12T15:04:03.623000 CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000 CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000 -CVE-2024-44151,0,0,d47615a8526957c995af9749974971566bdfea864db32edef160569f5c47dcf0,2024-09-24T16:21:05.280000 +CVE-2024-44151,0,1,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000 CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,8eadcc80f1753ce98600c5eb27ec23345023d248570d997f1192f7f23aac15e0,2024-09-24T16:16:39.947000 @@ -268021,7 +268023,7 @@ CVE-2024-45177,0,0,02e142914736a4d131e4e16ca54722d87db4be6796c690673dca68516f304 CVE-2024-45178,0,0,8683dd9a5cab4c34e39db0f407397a6453188323835c56f9f445f0b82747621c,2024-11-21T09:37:25.490000 CVE-2024-45179,0,0,f8a1e2d319c21f7b4d285e70a197aede9c3922e9add55bf81285495cf99880f9,2024-11-21T09:37:25.703000 CVE-2024-4518,0,0,07158500cac1dd7872433e30649263fdac5b4c1a9d1b0e56782e807a24814381,2025-02-19T18:00:39.067000 -CVE-2024-45180,0,0,e25190523b6cc0290f39680e23c27065d57129d38d1a2d45683d50e8b98b8bd5,2024-09-13T19:55:54.477000 +CVE-2024-45180,0,1,21b07801d36cc3d756204c3207b5af3e7b329356676c352984cb9362561c3bbb,2025-03-18T14:15:40.437000 CVE-2024-45181,0,0,d85fe8450b776dd12e0896d567762d1e44709075751ae449df1ef8eef94490fd,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,744b0118419398ffc2eda737132cfe2e67a6694bc69f7527796471f039572fdd,2024-10-29T21:35:21.720000 CVE-2024-45184,0,0,5fe4e4003083a04b0eeb7a50ac75543168b7fbcd018d5a6c487cac1cdc809531,2024-11-06T17:35:34.223000 @@ -268840,7 +268842,7 @@ CVE-2024-46571,0,0,d2aefd540d7a3f69a6c63893a70408e771411a89c3ea4f3a40ecac30e52b1 CVE-2024-4658,0,0,8e8551e2dad8544932822e63f34e98151cdfa3d6ca2a97c2637382b0eddb6d52,2024-10-15T12:58:51.050000 CVE-2024-46580,0,0,57ce23079d22c520f558cf33d89b6b4b97b97ee6fc7acbd2cbcf182fb2bd3f83,2025-03-14T15:15:42.990000 CVE-2024-46581,0,0,5462b101fb440bc501a98cc921603a2137f1839db74d9038e8e4ca66f70ebf73,2024-09-24T16:41:36.533000 -CVE-2024-46582,0,0,1b8144bd030454843ac8c6a6ad66282bbf8e59b632d02a0e7a976a686d4f89f8,2024-09-24T16:41:29.377000 +CVE-2024-46582,0,1,866617c11a3fc07efe3a2534ae130fa8c5d8346f75b270945cef757d5c5a133b,2025-03-18T14:15:40.643000 CVE-2024-46583,0,0,cf382f8da6cf6ab76f4c4d49ea272d0b3efa763944ca8b322f6d82dbef52da5f,2024-09-24T16:40:48.437000 CVE-2024-46584,0,0,08f29613e1e223adeeb5f6aff9b13cd88155533380249640b96e771274344e9f,2025-03-14T16:15:36.087000 CVE-2024-46585,0,0,dc7ee54543f1dde85b7ec955c3e56c63aab70e8f4e8f2066fc5d9912f9a62f8c,2025-03-17T15:15:41.990000 @@ -275089,7 +275091,7 @@ CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad5 CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000 CVE-2024-55272,0,0,6e108f0e2cf675b62abdd4438f3d6786bca417f797f9b02de67c6172540f9241,2025-03-15T16:15:13.813000 CVE-2024-5528,0,0,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000 -CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000 +CVE-2024-5529,0,1,095ee1b4a7c2e06520a57f410df528bd70394e4035579229461d97ba32a6aca4,2025-03-18T14:15:41.210000 CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 CVE-2024-5532,0,0,23c4978c8c684edaa8b0b6827b3bbdb5dca4d9ba0bc473042cb29ea594ed00d8,2024-10-29T14:34:50.257000 @@ -275604,7 +275606,7 @@ CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc7954 CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000 CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000 CVE-2024-56312,0,0,a105d2d2c496ae4a31974572451f1a2391cb63512239c561ea05256145cfc002,2025-01-14T17:15:19.057000 -CVE-2024-56313,0,0,5f9fbb8f2eda640c1b051bfdc491a6a52b895e91ada0d44715e60ffa8a2b7b44,2025-01-14T17:15:19.187000 +CVE-2024-56313,0,1,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000 CVE-2024-56314,0,0,2ec81e76657f1aae1b2ad4a137a9dbaba36a59900a9638d6a55212d105f32134,2025-03-17T17:15:34.553000 CVE-2024-56316,0,0,cbe94587bc0fb5b8589f39655433a6e6725350771ffdee3bdca651a1d62b333a,2025-01-28T20:15:51.320000 CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 @@ -276114,7 +276116,7 @@ CVE-2024-57011,0,0,00d9ca4de5bb838925ec85abe37499c50478611ba15145e710280c1c3635e CVE-2024-57012,0,0,d12240ef1721114c58f109c402370244e27f23301561d4b425a46b9b4be84383,2025-03-14T16:15:37.603000 CVE-2024-57013,0,0,6e08c562bc43fbe99d8ca48ade9028273e79bb54bf7163d05964ffad7c768b3e,2025-03-13T15:15:49.867000 CVE-2024-57014,0,0,de4aa7a9315f76bdfcffe2092ed70c917442fbca43db8473f76cf25db406bb89,2025-03-10T17:22:31.577000 -CVE-2024-57015,0,0,5e4e1bb49198f36a4dd84b451778f8aef129d4b4f841c347f59c5c6393f2c764,2025-03-10T17:22:42.443000 +CVE-2024-57015,0,1,559c1f41db4b07569fd8f34461ee4cc0ab9cf8abb8f4d26444e2fdab359ec49f,2025-03-18T14:15:41.020000 CVE-2024-57016,0,0,850796e338f48f156536ab37f7c45119c2b091d349009a63d7b83d5a0edc22f7,2025-03-10T17:23:48.830000 CVE-2024-57017,0,0,54624e242a7ea72e546dbcbe3522ad91dfa297cefabac8b613307955396e3be0,2025-03-13T15:15:50.090000 CVE-2024-57018,0,0,88513ced169b42c06a35f5f3dad8af71ece115206cec42a161e21a49cc4393f2,2025-03-13T15:15:50.280000 @@ -279567,6 +279569,7 @@ CVE-2024-8992,0,0,40a7a4df2932aada5d7ea8c618dc82aaa0081f2be58f5119fc917cca09bcb2 CVE-2024-8993,0,0,487588ac277153038a2522d3764ca3b3260ed861cecc57e6ed018cb6e09dc0f5,2024-12-26T17:15:08.387000 CVE-2024-8994,0,0,7eca867f48fcdffebd158a97c0fe53b92cc08cdc8d3d21178ec4fe0fdfa0f86b,2024-12-26T17:15:08.500000 CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000 +CVE-2024-8997,1,1,00b0461a23030a123156b2802fc43242a67f87ebc4d8d4708eeaf4fcf436f742,2025-03-18T14:15:41.400000 CVE-2024-9001,0,0,5445fb18419bcdf5da336d1b9dfc0c76a605d0071a53e5a9fa7d6b57bf4501c5,2024-09-24T16:14:30.190000 CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000 CVE-2024-9003,0,0,675933072dcb8d03bba7ba12042ea7e3d3a6b4bf04af01f6a5d3444f949fe1cf,2024-09-25T17:18:44.523000 @@ -280829,7 +280832,7 @@ CVE-2025-0689,0,0,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c43 CVE-2025-0690,0,0,bbbcb650d9130b5dd35bdfc4d8287eb5fdbb2a723c8cda9af36e91d7165433a0,2025-03-05T21:15:19.603000 CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000 CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000 -CVE-2025-0694,1,1,0ebe346a768e84281ec739137f12b69557526a2995b9e16a5df0c6282776dd55,2025-03-18T11:15:39.400000 +CVE-2025-0694,0,0,0ebe346a768e84281ec739137f12b69557526a2995b9e16a5df0c6282776dd55,2025-03-18T11:15:39.400000 CVE-2025-0695,0,0,5a6f397a6b64075e37b58670bef347904c3201da024fb297d91e9e2cec2630c8,2025-01-27T11:15:11.087000 CVE-2025-0696,0,0,8bb1aa81d5469057848d400dac8fd3ed60fd05dfdf66155ab4dbeb5d35fb6ddc,2025-01-27T11:15:11.267000 CVE-2025-0697,0,0,0025729b7a8c8dfb3fb7c692492d826032ac90e2b3af69745256c93d5b68ecb8,2025-01-24T15:15:12.130000 @@ -281325,7 +281328,7 @@ CVE-2025-1463,0,0,2a489d18ab145c49d92d5d5423e0c75c250fe44656454c4f0f8f5922284899 CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000 CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000 CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000 -CVE-2025-1468,1,1,e5d9bb0ea811bc8078fdab0c492e5a2dd263c632b7b907f43a1fa6ad74bb9cb1,2025-03-18T11:15:39.553000 +CVE-2025-1468,0,0,e5d9bb0ea811bc8078fdab0c492e5a2dd263c632b7b907f43a1fa6ad74bb9cb1,2025-03-18T11:15:39.553000 CVE-2025-1470,0,0,e01b0f1bb79b7b859b47b359ce0cf41f9e90ba4e1803b43806d897949049f289,2025-03-05T19:18:19.887000 CVE-2025-1471,0,0,e9367bf2e65ca51cc57b591138b8194302d48e60fcb8c0503d4b9dd9d0af3110,2025-03-05T19:06:42.290000 CVE-2025-1475,0,0,dc71c83df2dea22fb2355bdce40ab12e4f98ce7aad24f8511146bb81157cc42d,2025-03-07T07:15:23.343000 @@ -281779,7 +281782,7 @@ CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78 CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000 CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000 CVE-2025-20633,0,0,38e2a030fd0d7f547703f3781e9e02df03269c9ee8f44017e895217aa066b8bb,2025-02-18T19:15:24.563000 -CVE-2025-20634,0,0,b403d84e0221b3268f60e8ecac060161651ab801a15d09c6d731a484c65ed499,2025-02-18T19:15:24.690000 +CVE-2025-20634,0,1,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 CVE-2025-20636,0,0,53b7c37fe38dde7172ef3ef0f4e80e1b55d45c79cbcdafad69f9ad23a7de5c5b,2025-02-18T19:15:24.960000 CVE-2025-20637,0,0,c98f77253202c98cc20372cd8c54d3277c2b4473b3f20cbc97ddd00be7dce7b1,2025-03-17T15:15:43.697000 @@ -282245,9 +282248,9 @@ CVE-2025-21542,0,0,c95405cb76e935b1424e2221df18a531e8229b571e27c205ad993787b875b CVE-2025-21543,0,0,53374fe0ecf629c278210d26d1681ca091ab0395a1fe0f57b870ba5811f37636,2025-01-22T19:15:13.060000 CVE-2025-21544,0,0,980b23066e2438b2ca08079f7db43e8e73ce5aa9b8984f4251d41d219739f055,2025-01-22T18:15:20.993000 CVE-2025-21545,0,0,ae165462504507994171914dc95c399eec9b17a232b15512feb5d6c34ad5b418,2025-03-13T21:15:43.297000 -CVE-2025-21546,0,0,32a5341b789eda11ce19a4c5f9d800ff1dc21d315da1a67a68f9337da9d6eae6,2025-02-18T21:15:26.057000 +CVE-2025-21546,0,1,1bc75ca469036c8c2de838e6459d5f4afe6abaec51522949c6e58c0c18f31efb,2025-03-18T14:15:41.940000 CVE-2025-21547,0,0,017438336a031ecfeb419dddba734aad9917fddf073391ba67ba0a836c8e9c64,2025-02-18T21:15:26.180000 -CVE-2025-21548,0,0,3f89792c64b7a6cab787d6ccadaaf5c9faf61cdf4e0ea030114a832c7435a58e,2025-02-18T21:15:26.297000 +CVE-2025-21548,0,1,2356141980923b17add14f81c695e4cf913f4da3b633ff33eaa98cfadd55cdd1,2025-03-18T14:15:42.087000 CVE-2025-21549,0,0,b2a50028e1bcc49830245cddba3f2301a2c50c551db0641ba7ec8ccc88064540,2025-03-13T19:15:51.240000 CVE-2025-21550,0,0,e5b6aaf4a7d686aaab6f9ee2b427fd22c3f2ad68b4a328f360cd3d2ca4ff7acb,2025-03-13T15:15:51.980000 CVE-2025-21551,0,0,e440132bbc6782c14199732060271cc8dd08332646e455cc162209755bb4029f,2025-03-13T16:15:26.693000 @@ -283071,7 +283074,7 @@ CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2ca CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-2295,0,0,cbcc0c56a80887c639b1c020a9e0d32dcb46e1863cdf480258408f53dac0d5c9,2025-03-14T22:15:11.600000 CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 -CVE-2025-22954,0,0,5a3750f9d09835146f3b5bfdf4182b3abbd7b051e3f216b3c4f1cf11622c37e6,2025-03-13T04:15:22.230000 +CVE-2025-22954,0,1,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000 CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000 CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000 CVE-2025-22961,0,0,c2a3aa8716f6cada0d8a53e343e519973bc28bf36e56486c654940da963b9795,2025-03-12T19:15:38.433000 @@ -283909,7 +283912,7 @@ CVE-2025-24085,0,0,10be84b7c6e6cef127d29aae2d31008399360c31674450bd2bdb82cd6d941 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 CVE-2025-24092,0,0,3aa2d06d87ef3fdeeea46531ff97ecfdcf2ce3948ca55a1ae44601e8047b47d4,2025-02-18T20:15:29.027000 -CVE-2025-24093,0,1,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000 +CVE-2025-24093,0,0,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 CVE-2025-24099,0,0,9ac733c66f981521044d55991b68403f81f4b4ece5888bc69708355b0385700d,2025-01-30T22:15:10.160000 @@ -283920,7 +283923,7 @@ CVE-2025-24103,0,0,121f97805b28c552314d84eeaeab6e5c8e1907de50e8d236950d546904b71 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000 CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 -CVE-2025-24108,0,0,6be344d04ecaf8dd475407eee25414a45cdc991079dd56d6cd8f3decd1cd8a55,2025-03-04T15:25:43.983000 +CVE-2025-24108,0,1,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000 CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000 CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000 @@ -283928,7 +283931,7 @@ CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf3545 CVE-2025-24115,0,0,15c49b282394a28d48f09f708393e8923948b48fe70b3e10a8d648cbaa5dc78b,2025-03-04T15:15:15.310000 CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000 CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000 -CVE-2025-24118,0,0,bbf8ee1869f2b761d69d721d5372fa34230ee456a63911e31d2d0c2ea9869893,2025-03-04T15:15:49.937000 +CVE-2025-24118,0,1,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad43a7,2025-03-18T14:15:42.797000 CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 CVE-2025-24121,0,0,3147f918c1f3d7a66c464fe94f2778628efbf774801d0ad4400d3a98a4740b5a,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,63629b839b402edeef408de5ba24f2cb0ef35ef076785a337d7d7055ccc840b7,2025-03-04T15:16:52.190000 @@ -283966,12 +283969,12 @@ CVE-2025-24162,0,0,03df16b2a66f8e69446966c3b753618fdfe5b4bbe0f6817c504bf02cea467 CVE-2025-24163,0,0,41a251fbd8e3fd1ad37794819de1e745b68c6aee16567b6569d089e58ae56145,2025-03-03T22:48:32.503000 CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000 -CVE-2025-24174,0,0,663a91769a390a4d68add5caaf84637971f26aac3721aa5e89739580b02eaf92,2025-03-03T22:47:07.577000 +CVE-2025-24174,0,1,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 CVE-2025-24176,0,0,8a151411616e238cc2afeabee27a87a9c1b6ac9dd5553369acab3c240b386505,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24185,0,0,780ce933a4599922763fb258510562036511606364e33341b032c72a71c2a6a3,2025-03-17T20:15:13.907000 -CVE-2025-2419,0,0,8c988bbf24e798e007d0f5fb4500bf48e163fc935837eed17f7686360e365037,2025-03-17T22:15:15.450000 -CVE-2025-2420,0,0,6cf9e237f7a2ee37abcfa838f9567dea6ed7f9da1ca13895b8ccedcfac01f783,2025-03-17T23:15:18.723000 +CVE-2025-2419,0,1,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000 +CVE-2025-2420,0,1,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000 CVE-2025-24200,0,0,0f6f41d17b1c80c9261ddc7d6ef23ac7e19cbdbd2c08a07eed9362b293d75967,2025-03-07T17:12:01.477000 CVE-2025-24201,0,0,ce749944f29eb7a58a39f521ebc27f910b93ce1f347524410204067e6a960180,2025-03-14T20:35:27.923000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 @@ -284076,10 +284079,12 @@ CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca169e2,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 +CVE-2025-2449,1,1,097d8c56f0ba970961941521f178c20e7f071b70e485a5d69566fc048fc66802,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 CVE-2025-24494,0,0,6cea07cccfd63e3e21e6431433f0fa67be526715b4452d5100ebbf4b4cf3063a,2025-03-05T16:15:38.937000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000 +CVE-2025-2450,1,1,6cb1f4ef146253bb9ef2f720730f4941556b5180307da35c3787fcbf4dae8ed4,2025-03-18T14:15:45.850000 CVE-2025-24500,0,0,47c4210aba4fa86ebb74871db3d78a27e196e119ac830b73a53d16e817dd5895,2025-03-13T14:15:35.930000 CVE-2025-24501,0,0,805ef05e75b283fb4d87128106cf95e77b6a4387edac60027da256d1e053a956,2025-02-05T05:15:11.197000 CVE-2025-24502,0,0,faeb6d58a720f7df24146e060ac5b9ad3285f3857cadba89f24692133122cb1d,2025-02-05T05:15:11.300000 @@ -284324,7 +284329,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 -CVE-2025-24813,0,0,74bcac62d22f1d058b2204263a509205db746b39180a79515430c5f759c43dec,2025-03-17T16:15:25.343000 +CVE-2025-24813,0,1,207ab702a4c69496b55cb9cbff31ce62e3ea99cde099bf79ba109d3afc178ec4,2025-03-18T14:15:43.253000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 @@ -284361,7 +284366,7 @@ CVE-2025-24885,0,0,809790028ca7e0dfec81701f262fd0f27740a460115b7bfa09e52c5dd0783 CVE-2025-24886,0,0,324d35c8722e17c18be480ab82b55101915c4949700cace26a13a2f1b626ed6b,2025-01-30T23:15:08.990000 CVE-2025-24888,0,0,b9ca9ab88f1cc9fd6807e407a101d4c9bd1a79c9adcc6d693619e4b5c638a59b,2025-02-13T18:18:23.047000 CVE-2025-24889,0,0,8300133ae2aedfb9f0174d2f87f5427533837a07fb360e45d39fb7eb96487cb4,2025-02-13T18:18:23.240000 -CVE-2025-2489,1,1,ea985209b68962991b2177d10de12e123d562ae17eda9bc690081c74d6982ff9,2025-03-18T12:15:15.770000 +CVE-2025-2489,0,0,ea985209b68962991b2177d10de12e123d562ae17eda9bc690081c74d6982ff9,2025-03-18T12:15:15.770000 CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34ba85,2025-01-31T23:15:08.457000 CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000 CVE-2025-24893,0,0,14aab4eb42250523172f46956afe05bb6d2661db933b23bed541d9a55676b820,2025-02-20T20:15:46.697000 @@ -284371,6 +284376,7 @@ CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885 CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,dd14a5484414b1ba9c22991f32be2602892353b81ceae03dd79061797e9e5adc,2025-02-11T08:15:32.003000 CVE-2025-24899,0,0,7816fe20b0c1908c0a40b5877e6e92a7dcc6eb4d232e7366b9208152803d77e6,2025-02-03T21:15:15.703000 +CVE-2025-2490,1,1,e7ec0264ef51f1a92542719fd7c8111b43b3537bd9fadbac1ab0d67b6349b05a,2025-03-18T14:15:46.250000 CVE-2025-24900,0,0,12a09249a507b6d9fb85eedd73a9e64a950411d75e49fdadf829b0cc45e6b210,2025-02-11T16:15:51.763000 CVE-2025-24901,0,0,bd99b1b0ebfeeb520dd8f3faba434d145a8e1d709b882bc2215e45767faa0251,2025-02-13T19:01:24.310000 CVE-2025-24902,0,0,623a5d8cac0a059ec59c84d4f4cbfa6844d5070567ceaf720618a336c321ecaf,2025-02-13T19:00:59.777000 @@ -284381,11 +284387,11 @@ CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48 CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000 CVE-2025-24924,0,0,3cb1f58ac0f82a4a651fd56ef4a80a8ba6f8902630bb63eebac1edae30e9552a,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,8e9335012d42a7d487e5f9921ea54f865e117f9248798a001634be5429fb2b4a,2025-02-18T23:15:10.250000 -CVE-2025-2493,1,1,2b3a514ada435fc466246da6d5a66a551f84e997c51e827ce1c658a6c518c797,2025-03-18T12:15:15.950000 -CVE-2025-2494,1,1,90edcd70afa12a5b458787396b810c7a7c91617053c96db3161decbb0e3d078f,2025-03-18T12:15:16.090000 +CVE-2025-2493,0,0,2b3a514ada435fc466246da6d5a66a551f84e997c51e827ce1c658a6c518c797,2025-03-18T12:15:15.950000 +CVE-2025-2494,0,0,90edcd70afa12a5b458787396b810c7a7c91617053c96db3161decbb0e3d078f,2025-03-18T12:15:16.090000 CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000 CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000 -CVE-2025-2495,1,1,f127770b943657c81257511dfa2f9513d8d8bb040f26e60d9ed50c5dc8a365b6,2025-03-18T12:15:16.227000 +CVE-2025-2495,0,0,f127770b943657c81257511dfa2f9513d8d8bb040f26e60d9ed50c5dc8a365b6,2025-03-18T12:15:16.227000 CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eafcd8,2025-02-11T11:15:17.273000 CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000 CVE-2025-24958,0,0,0ae446ece37f4692f130ad0dc256efa2fd5d1fe74929c7d4ebe10575dc57a55a,2025-02-13T18:58:56.320000 @@ -284650,6 +284656,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000 +CVE-2025-25500,1,1,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 @@ -284772,7 +284779,7 @@ CVE-2025-25894,0,0,3f9d2e7801654dc301f71e4b1ffcdf5f43972d9bc766b46d709bc030e71ac CVE-2025-25895,0,0,420cfe9c83f8ba0a9cc6496ef638a111b855c60de22aee5c238d6d5765c63784,2025-02-19T16:15:42.087000 CVE-2025-25896,0,0,cd3dcc213555e90c5d040ed31f6976b5cb54f10c52efb54acc663fd3589794f4,2025-02-19T16:15:42.240000 CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 -CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 +CVE-2025-25898,0,1,d58b45df31d2ab16820300309437bcd9af06cdd7005531ff67ae87c6f364cbef,2025-03-18T14:15:43.617000 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,c19958e46a5c7601d0a2f6f81f8761b82e188d6b471104e0d3a3030c6717cdee,2025-03-13T14:15:36.057000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 @@ -285566,9 +285573,9 @@ CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435b CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 -CVE-2025-29909,0,0,ac7d1844d1e2c309f19004efcf9bef8fdd465a1f2bcd636b0eb01eaf419f6421,2025-03-17T22:15:14.657000 -CVE-2025-29910,0,0,a1449fa10c871b20c6a6ecb3b490c56a1057d8705ec496065bcd5667ab02ad5c,2025-03-17T22:15:14.810000 -CVE-2025-29911,0,0,5d1ec805dc1e346e7e6b764ec7d8b70cd63fee9e1f021d9740a7b15e82142f1b,2025-03-17T23:15:18.293000 +CVE-2025-29909,0,1,763144943d5bc13d24b119de23c47602f4df0647e1341ddac3a9c1d2fe539cba,2025-03-18T14:15:43.803000 +CVE-2025-29910,0,1,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e772e,2025-03-18T14:15:43.913000 +CVE-2025-29911,0,1,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000 CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000 CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000 @@ -285582,4 +285589,5 @@ CVE-2025-30074,0,0,5d0dfb842ba5d24afb134fe0eb5f7e2e10f0c5619590d2c6aaa9483b4a179 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-30089,0,0,26c0c3e573114b1e3e240c2d6bcb88b42d7bf3c75b6c33122ef4296822dfa500,2025-03-17T16:15:28.507000 +CVE-2025-30106,1,1,31af7150d5c12c0672c068b31fc4f3ce3cdb8904bdd8d13adc1c237b5e869d32,2025-03-18T14:15:46.480000 CVE-2025-30143,0,0,dfaeb3eef5e72894446a00bc252dd02d40d218e0a77cd9256d63da4e0a89e02b,2025-03-17T16:15:28.643000