diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24774.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24774.json index 0a4a7771171..4ffd073063f 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24774.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24774.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24774", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-10T13:15:11.033", - "lastModified": "2024-11-21T07:48:23.573", + "lastModified": "2025-02-28T16:15:36.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json index ea2bca3d08e..5e635265e9b 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json @@ -2,16 +2,55 @@ "id": "CVE-2024-36046", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:36.953", - "lastModified": "2025-02-27T23:15:36.953", + "lastModified": "2025-02-28T16:15:36.987", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infoblox NIOS through 8.6.4 executes with more privileges than required." + }, + { + "lang": "es", + "value": "Informlox Nios a trav\u00e9s de 8.6.4 se ejecuta con m\u00e1s privilegios de los requeridos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.infoblox.com/s/article/000010390", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json index 34f856b225a..ec0ed2f010e 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json @@ -2,16 +2,55 @@ "id": "CVE-2024-36047", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.040", - "lastModified": "2025-02-27T23:15:37.040", + "lastModified": "2025-02-28T16:15:37.137", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infoblox NIOS through 8.6.4 and 9.x through 9.0.3 has Improper Input Validation." + }, + { + "lang": "es", + "value": "Informlox NIOS a trav\u00e9s de 8.6.4 y 9.x a 9.0.3 tiene una validaci\u00f3n de entrada incorrecta." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.infoblox.com/s/article/000010391", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json index 005d71b452b..3788343d53e 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37566", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.130", - "lastModified": "2025-02-27T23:15:37.130", + "lastModified": "2025-02-28T16:15:37.287", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infoblox NIOS through 8.6.4 has Improper Authentication for Grids." + }, + { + "lang": "es", + "value": "Informlox Nios a trav\u00e9s de 8.6.4 tiene una autenticaci\u00f3n inadecuada para Grids." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.infoblox.com/s/article/000010392", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json index fae75beda25..65c3f56c78c 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37567", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.210", - "lastModified": "2025-02-27T23:15:37.210", + "lastModified": "2025-02-28T16:15:37.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Infoblox NIOS through 8.6.4 has Improper Access Control for Grids." + }, + { + "lang": "es", + "value": "Informlox NIOS hasta 8.6.4 tiene un control de acceso incorrecto para Grids." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.infoblox.com/s/article/000010393", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json index f352a860aaf..e525d284fc4 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41334", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.483", - "lastModified": "2025-02-27T21:15:36.483", + "lastModified": "2025-02-28T16:15:37.587", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que los dispositivos Draytek Vigor 165/166 anteriores a la v4.2.6, Vigor 2620/LTE200 anteriores a la v3.9.8.8, Vigor 2860/2925 anteriores a la v3.9.7, Vigor 2862/2926 anteriores a la v3.9.9.4, Vigor 2133/2762/2832 anteriores a la v3.9.8, Vigor 2135/2765/2766 anteriores a la v4.4.5.1, Vigor 2865/2866/2927 anteriores a la v4.4.5.3, Vigor 2962/3910 anteriores a la v4.3.2.7, Vigor 3912 anteriores a la v4.3.5.2 y Vigor 2925 hasta la v3.9.6 no utilizaban la verificaci\u00f3n de certificados, lo que permit\u00eda a los atacantes cargar m\u00f3dulos APPE manipulados desde servidores no oficiales, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://draytek.com", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json index d7600464532..8301aca9ea6 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41338", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.753", - "lastModified": "2025-02-27T21:15:36.753", + "lastModified": "2025-02-28T15:15:11.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request." + }, + { + "lang": "es", + "value": "Una desreferencia de puntero NULL en los dispositivos Draytek Vigor 165/166 anteriores a v4.2.6, Vigor 2620/LTE200 anteriores a v3.9.8.8, Vigor 2860/2925 anteriores a v3.9.7, Vigor 2862/2926 anteriores a v3.9.9.4, Vigor 2133/2762/2832 anteriores a v3.9.8, Vigor 2135/2765/2766 anteriores a v4.4.5.1, Vigor 2865/2866/2927 anteriores a v4.4.5.3, Vigor 2962/3910 anteriores a v4.3.2.7, Vigor 3912 anteriores a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud DHCP manipulada espec\u00edficamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://draytek.com", diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json index cbcb7e8b701..ec798d47fe1 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41339", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.837", - "lastModified": "2025-02-27T21:15:36.837", + "lastModified": "2025-02-28T16:15:37.737", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution." + }, + { + "lang": "es", + "value": "Un problema en el endpoint CGI utilizado para cargar configuraciones en dispositivos Draytek Vigor 165/166 anterior a v4.2.6, Vigor 2620/LTE200 anterior a v3.9.8.8, Vigor 2860/2925 anterior a v3.9.7, Vigor 2862/2926 anterior a v3.9.9.4, Vigor 2133/2762/2832 anterior a v3.9.8, Vigor 2135/2765/2766 anterior a v4.4.5.1, Vigor 2865/2866/2927 anterior a v4.4.5.3, Vigor 2962/3910 anterior a v4.3.2.7, Vigor 3912 anterior a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes cargar un m\u00f3dulo de kernel manipulado espec\u00edficamente, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://draytek.com", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44754.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44754.json new file mode 100644 index 00000000000..bb47b9b17e9 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44754.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44754", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T16:15:37.883", + "lastModified": "2025-02-28T16:15:37.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cryptographic key extraction from internal flash in Minut M2 with firmware version #15142 allows physically proximate attackers to inject modified firmware into any other Minut M2 product via USB." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://minut.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.amlisoft.se/sec_20241114.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json index 2830099a375..150401ce80c 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json @@ -2,20 +2,63 @@ "id": "CVE-2024-53408", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:01.790", - "lastModified": "2025-02-27T20:16:01.790", + "lastModified": "2025-02-28T15:15:12.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AVE System Web Client v2.1.131.13992 was discovered to contain a cross-site scripting (XSS) vulnerability." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que AVE System Web Client v2.1.131.13992 conten\u00eda una vulnerabilidad de cross-site scripting (XSS)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cosmosofcyberspace.github.io/ave-system-cve.html", "source": "cve@mitre.org" + }, + { + "url": "https://cosmosofcyberspace.github.io/ave-system-cve.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57026.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57026.json index fc77f9ec908..608437636ac 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57026.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57026.json @@ -2,20 +2,81 @@ "id": "CVE-2024-57026", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-24T18:15:19.023", - "lastModified": "2025-02-24T18:15:19.023", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TawkTo Widget Version <= 1.3.7 is vulnerable to Cross Site Scripting (XSS) due to processing user input in a way that allows JavaScript execution." + }, + { + "lang": "es", + "value": " La versi\u00f3n del widget TawkTo <= 1.3.7 es vulnerable a Cross Site Scripting (XSS) debido a que procesa la entrada del usuario de una manera que permite la ejecuci\u00f3n de JavaScript." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tawk:tawk.to:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.3.7", + "matchCriteriaId": "B28A9CDE-1840-44C4-8BD1-2119AA6D1489" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cosmosofcyberspace.github.io/tawk_to_cve.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json index c2682279589..4340f553f44 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21184.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21184", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.180", - "lastModified": "2025-02-11T18:15:30.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,141 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21184", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json index fa3f69f19b0..fb9661ae009 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21188.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21188", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.403", - "lastModified": "2025-02-11T18:15:30.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -42,19 +42,51 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_network_watcher:*:*:*:*:*:azure_virtual_machine:*:*", + "versionEndExcluding": "1.4.3563.1", + "matchCriteriaId": "5870563D-82CF-4D78-8020-7FD45C747385" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21188", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json index 07793b8cb31..8beaccc7f63 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21190.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21190", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:30.610", - "lastModified": "2025-02-11T18:15:30.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21190", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json index 4f915ef7efc..b2a604807c0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21198", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.020", - "lastModified": "2025-02-11T18:15:31.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,50 @@ "value": "CWE-306" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hpc_pack_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2016.3", + "matchCriteriaId": "E75B4ABA-9F2F-49A7-9300-F987D791AEE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hpc_pack_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.8328.0", + "matchCriteriaId": "7A1C45BD-7ED9-4F9F-A91D-810A4CC5E662" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21198", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json index 2bbd5052f83..cafd4b686d2 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21200.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21200", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.203", - "lastModified": "2025-02-11T18:15:31.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21200", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json index 77f2060260a..23b2e3431ec 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21201.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21201", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.407", - "lastModified": "2025-02-11T18:15:31.407", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-415" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21201", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json index b736b5649da..0457de04853 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21206.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21206", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.610", - "lastModified": "2025-02-11T18:15:31.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,80 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-427" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9.70", + "matchCriteriaId": "7148C3A7-9A70-4560-9A0C-94951B2C9B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.11.44", + "matchCriteriaId": "E672587A-4C0E-40F9-9417-0E9F91BC0361" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8", + "versionEndExcluding": "17.8.18", + "matchCriteriaId": "6AD60982-A18A-446A-970E-212B3F351925" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10", + "versionEndExcluding": "17.10.11", + "matchCriteriaId": "950538A7-8681-497B-BB96-A040B9989362" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.12", + "versionEndExcluding": "17.12.5", + "matchCriteriaId": "B7F01478-80E9-4E46-AD9B-CC6D095347D3" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21206", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json index 8d3436da165..314690b7968 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21208.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21208", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.793", - "lastModified": "2025-02-11T18:15:31.793", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,100 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21208", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json index 6386b1117f0..3cea099e633 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21212.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21212", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:31.980", - "lastModified": "2025-02-11T18:15:31.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,129 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21212", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json index e8458c9d349..ee2b6cb412a 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21216.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21216", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.177", - "lastModified": "2025-02-11T18:15:32.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,129 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21216", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json index eef3cae17ee..4b4f0825459 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21254.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21254", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.450", - "lastModified": "2025-02-11T18:15:32.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,129 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21254", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json index 8ffd6b4b6e4..3bdbba43dc8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21259.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21259", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:32.643", - "lastModified": "2025-02-11T18:15:32.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,51 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-451" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:outlook:*:*:*:*:*:android:*:*", + "versionEndExcluding": "4.2501.1", + "matchCriteriaId": "8DA759E6-2D16-4362-87BC-3FA342CC7D77" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21259", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json index 47f92de51b7..fd1f243cada 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21322.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21322", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.027", - "lastModified": "2025-02-11T18:15:33.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,51 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:pc_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.15.4.0", + "matchCriteriaId": "4CD76985-D5BF-41B9-80FF-3B3526B5B449" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21322", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json index 8daf6b263c0..561bddc260c 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21337.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21337", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.217", - "lastModified": "2025-02-11T18:15:33.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21337", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json index 154cd729e8f..fbf5daa9db1 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21347.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21347", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.497", - "lastModified": "2025-02-11T18:15:33.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,151 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21347", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json index 9288f5f057d..8165ada3903 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21349.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21349", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.697", - "lastModified": "2025-02-11T18:15:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,141 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21349", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json index 3c23b0e1643..0733a493c72 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21350.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21350", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:33.903", - "lastModified": "2025-02-11T18:15:33.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T16:02:50.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21350", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json index 3aaf17459f9..34ad321cf7d 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25323", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.637", - "lastModified": "2025-02-27T16:15:39.637", + "lastModified": "2025-02-28T16:15:38.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json index fbb83a6e096..d0fad60b80a 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25324", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.760", - "lastModified": "2025-02-27T16:15:39.760", + "lastModified": "2025-02-28T16:15:38.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json index fa4e5f1c976..8933851268c 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25325", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.870", - "lastModified": "2025-02-27T16:15:39.870", + "lastModified": "2025-02-28T16:15:38.457", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json index 5a74d2423d2..a3f79bb3016 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25326", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.987", - "lastModified": "2025-02-27T16:15:39.987", + "lastModified": "2025-02-28T16:15:38.603", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json index 9cd5db6d580..67ebddf0c4d 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25329", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T17:15:16.773", - "lastModified": "2025-02-27T17:15:16.773", + "lastModified": "2025-02-28T16:15:38.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json index 5fdf774e483..1634140aac9 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25330", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.103", - "lastModified": "2025-02-27T16:15:40.103", + "lastModified": "2025-02-28T16:15:38.913", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Boohee Technology Boohee Health iOS 13.0.13 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json index 030365b6288..9744e21172a 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25331", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.217", - "lastModified": "2025-02-27T16:15:40.217", + "lastModified": "2025-02-28T16:15:39.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Beitatong Technology LianJia iOS 9.83.50 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Beitatong Technology LianJia iOS 9.83.50 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json index 03f49487221..4e99db8da06 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25334", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.463", - "lastModified": "2025-02-27T16:15:40.463", + "lastModified": "2025-02-28T16:15:39.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Suning Commerce Group Suning EMall iOS 9.5.198 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Suning Commerce Group Suning EMall iOS 9.5.198 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json new file mode 100644 index 00000000000..b01c06d4538 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-25461", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T16:15:39.387", + "lastModified": "2025-02-28T16:15:39.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the \"Add Category\" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461", + "source": "cve@mitre.org" + }, + { + "url": "https://www.seeddms.org/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json index 723de71534a..08f0cad4c12 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25477", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.380", - "lastModified": "2025-02-28T00:15:36.380", + "lastModified": "2025-02-28T16:15:39.550", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A host header injection vulnerability in SysPass 3.2x allows an attacker to load malicious JS files from an arbitrary domain which would be executed in the victim's browser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25477", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25513.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25513.json index 5efd878f420..b60f0d4a7d0 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25513.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25513.json @@ -2,20 +2,81 @@ "id": "CVE-2025-25513", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-24T22:15:22.807", - "lastModified": "2025-02-24T22:15:22.807", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php." + }, + { + "lang": "es", + "value": " Seacms <=13.3 es vulnerable a la inyecci\u00f3n SQL en admin_members.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "13.3", + "matchCriteriaId": "C75904E7-D260-47F7-9D21-2751E901FA86" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json index 3cb66136763..41cb3defdad 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25729", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.827", - "lastModified": "2025-02-28T00:15:36.827", + "lastModified": "2025-02-28T16:15:39.707", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json new file mode 100644 index 00000000000..cebf71070a4 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-25916", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T15:15:13.613", + "lastModified": "2025-02-28T16:15:39.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "wuzhicms v4.1.0 has a Cross Site Scripting (XSS) vulnerability in del function in \\coreframe\\app\\member\\admin\\group.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/A7cc/e28b5790d8b40df8d418d1bd15c25d12", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/wuzhicms/wuzhicms/issues/213", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/wuzhicms/wuzhicms/issues/213", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json new file mode 100644 index 00000000000..2e271c94b93 --- /dev/null +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26047", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T16:15:40.020", + "lastModified": "2025-02-28T16:15:40.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loggrove v1.0 is vulnerable to SQL Injection in the read.py file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/olajowon/loggrove/issues/IBJXG8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json new file mode 100644 index 00000000000..020b8e43b88 --- /dev/null +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-26263", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T16:15:40.127", + "lastModified": "2025-02-28T16:15:40.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DRAGOWN/CVE-2025-26263", + "source": "cve@mitre.org" + }, + { + "url": "https://www.geovision.com.tw/download/product/GV-ASManager", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26326.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26326.json new file mode 100644 index 00000000000..d8a848e0c6b --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26326.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-26326", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T15:15:13.743", + "lastModified": "2025-02-28T15:15:13.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/azurejoga/CVE-2025-26326", + "source": "cve@mitre.org" + }, + { + "url": "https://www.nvaccess.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json index 7f0e694505e..a8a392a7985 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27133", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-24T19:15:14.763", - "lastModified": "2025-02-24T19:15:14.763", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WeGIA anterior a la versi\u00f3n 3.2.15 en el endpoint `adicionar_tipo_exame.php`. Esta vulnerabilidad permite a un atacante autorizado ejecutar consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. La versi\u00f3n 3.2.15 contiene un parche para el problema." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -69,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.15", + "matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27140.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27140.json index 09b8c646b23..0108c122df7 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27140.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27140.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27140", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-24T22:15:22.913", - "lastModified": "2025-02-24T22:15:22.913", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue." + }, + { + "lang": "es", + "value": " WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos en el sistema operativo en versiones anteriores a la 3.2.15 de la aplicaci\u00f3n WeGIA, endpoint `importar_dump.php`. Esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario de forma remota. El comando es b\u00e1sicamente un comando para mover un archivo temporal, por lo que tambi\u00e9n es posible una carga mediante webshell. La versi\u00f3n 3.2.15 contiene un parche para el problema." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,16 +97,51 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.15", + "matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27141.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27141.json index cb9b1ccb97d..610d020e664 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27141.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27141.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27141", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-24T22:15:23.077", - "lastModified": "2025-02-24T22:15:23.077", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Metabase Enterprise Edition is the enterprise version of Metabase business intelligence and data analytics software. Starting in version 1.47.0 and prior to versions 1.50.36, 1.51.14, 1.52.11, and 1.53.2 of Metabase Enterprise Edition, users with impersonation permissions may be able to see results of cached questions, even if their permissions don\u2019t allow them to see the data. If some user runs a question which gets cached, and then an impersonated user runs that question, then the impersonated user sees the same results as the previous user. These cached results may include data the impersonated user should not have access to. This vulnerability only impacts the Enterprise Edition of Metabase and not the Open Source Edition. Versions 1.53.2, 1.52.11, 1.51.14, and 1.50.36 contains a patch. Versions on the 1.49.X, 1.48.X, and 1.47.X branches are vulnerable but do not have a patch available, so users should upgrade to a major version with an available fix. Disabling question caching is a workaround for this issue." + }, + { + "lang": "es", + "value": "Metabase Enterprise Edition es la versi\u00f3n empresarial del software de inteligencia empresarial y an\u00e1lisis de datos Metabase. A partir de la versi\u00f3n 1.47.0 y anteriores a las versiones 1.50.36, 1.51.14, 1.52.11 y 1.53.2 de Metabase Enterprise Edition, los usuarios con permisos de suplantaci\u00f3n de identidad pueden ver los resultados de las preguntas almacenadas en cach\u00e9, incluso si sus permisos no les permiten ver los datos. Si alg\u00fan usuario ejecuta una pregunta que se almacena en cach\u00e9 y luego un usuario suplantado ejecuta esa pregunta, el usuario suplantado ve los mismos resultados que el usuario anterior. Estos resultados almacenados en cach\u00e9 pueden incluir datos a los que el usuario suplantado no deber\u00eda tener acceso. Esta vulnerabilidad solo afecta a la Enterprise Edition de Metabase y no a la Open Source Edition. Las versiones 1.53.2, 1.52.11, 1.51.14 y 1.50.36 contienen un parche. Las versiones de las ramas 1.49.X, 1.48.X y 1.47.X son vulnerables, pero no tienen un parche disponible, por lo que los usuarios deben actualizar a una versi\u00f3n principal con una soluci\u00f3n disponible. Deshabilitar el almacenamiento en cach\u00e9 de preguntas es un workaround para este problema." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "ACTIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "LOW", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -69,18 +95,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.47.0", + "versionEndExcluding": "1.50.36", + "matchCriteriaId": "AACC8509-72A6-4D34-834D-2E28DEE43E3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.51.0", + "versionEndExcluding": "1.51.14", + "matchCriteriaId": "838875F9-C45A-4610-9D27-476B440862C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.52.0", + "versionEndExcluding": "1.52.11", + "matchCriteriaId": "CAF5BC90-DC75-40EA-9ACA-EECB3E56EAD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.53.0", + "versionEndExcluding": "1.53.2", + "matchCriteriaId": "F93B3622-0521-479F-817F-378FA03854AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.metabase.com/docs/latest/configuring-metabase/caching", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://www.metabase.com/docs/latest/permissions/impersonation", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27143.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27143.json index a14e3dcea9a..3098dae2342 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27143.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27143.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27143", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-24T23:15:11.160", - "lastModified": "2025-02-24T23:15:11.160", - "vulnStatus": "Received", + "lastModified": "2025-02-28T16:07:41.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Better Auth is an authentication and authorization library for TypeScript. Prior to version 1.1.21, the application is vulnerable to an open redirect due to improper validation of the callbackURL parameter in the email verification endpoint and any other endpoint that accepts callback url. While the server blocks fully qualified URLs, it incorrectly allows scheme-less URLs. This results in the browser interpreting the URL as a fully qualified URL, leading to unintended redirection. An attacker can exploit this flaw by crafting a malicious verification link and tricking users into clicking it. Upon successful email verification, the user will be automatically redirected to the attacker's website, which can be used for phishing, malware distribution, or stealing sensitive authentication tokens. This CVE is a bypass of the fix for GHSA-8jhw-6pjj-8723/CVE-2024-56734. Version 1.1.21 contains an updated patch." + }, + { + "lang": "es", + "value": "Better Auth es una librer\u00eda de autenticaci\u00f3n y autorizaci\u00f3n para TypeScript. Antes de la versi\u00f3n 1.1.21, la aplicaci\u00f3n era vulnerable a una redirecci\u00f3n abierta debido a una validaci\u00f3n incorrecta del par\u00e1metro callbackURL en el endpoint de verificaci\u00f3n de correo electr\u00f3nico y cualquier otro endpoint que acepte una URL de devoluci\u00f3n de llamada. Si bien el servidor bloquea las URL completamente calificadas, permite incorrectamente las URL sin esquema. Esto hace que el navegador interprete la URL como una URL completamente calificada, lo que genera una redirecci\u00f3n no deseada. Un atacante puede explotar este fallo creando un enlace de verificaci\u00f3n malicioso y enga\u00f1ando a los usuarios para que hagan clic en \u00e9l. Tras una verificaci\u00f3n de correo electr\u00f3nico exitosa, el usuario ser\u00e1 redirigido autom\u00e1ticamente al sitio web del atacante, que puede usarse para suplantaci\u00f3n de identidad, distribuci\u00f3n de malware o robo de tokens de autenticaci\u00f3n confidenciales. Esta CVE es una omisi\u00f3n de la correcci\u00f3n para GHSA-8jhw-6pjj-8723/CVE-2024-56734. La versi\u00f3n 1.1.21 contiene un parche actualizado." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "LOW", - "subsequentSystemIntegrity": "LOW", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -69,26 +95,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:better-auth:better_auth:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "1.1.21", + "matchCriteriaId": "31BED966-390F-4645-B4C8-DD62F07542B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/better-auth/better-auth/commit/24659aefc35a536b95ea4e5347e52c8803910153", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/better-auth/better-auth/commit/b381cac7aafd6aa53ef78b6ab771ebfa24643c80", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/better-auth/better-auth/releases/tag/v1.1.21", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-8jhw-6pjj-8723", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-hjpm-7mrm-26w8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json new file mode 100644 index 00000000000..e967ded05ec --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json @@ -0,0 +1,98 @@ +{ + "id": "CVE-2025-27400", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-28T16:15:40.237", + "lastModified": "2025-02-28T16:15:40.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 2.9, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.4, + "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 2.9, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.4, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c8617a065f6..ad046515ad5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-28T15:00:20.043026+00:00 +2025-02-28T17:00:19.921748+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-28T14:53:55.297000+00:00 +2025-02-28T16:15:40.237000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283514 +283521 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `7` -- [CVE-2025-1300](CVE-2025/CVE-2025-13xx/CVE-2025-1300.json) (`2025-02-28T13:15:27.043`) -- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-02-28T13:15:27.267`) -- [CVE-2025-1746](CVE-2025/CVE-2025-17xx/CVE-2025-1746.json) (`2025-02-28T14:15:34.943`) -- [CVE-2025-1747](CVE-2025/CVE-2025-17xx/CVE-2025-1747.json) (`2025-02-28T14:15:35.480`) -- [CVE-2025-1748](CVE-2025/CVE-2025-17xx/CVE-2025-1748.json) (`2025-02-28T14:15:35.617`) -- [CVE-2025-1749](CVE-2025/CVE-2025-17xx/CVE-2025-1749.json) (`2025-02-28T14:15:35.760`) -- [CVE-2025-1776](CVE-2025/CVE-2025-17xx/CVE-2025-1776.json) (`2025-02-28T14:15:35.943`) -- [CVE-2025-22270](CVE-2025/CVE-2025-222xx/CVE-2025-22270.json) (`2025-02-28T13:15:27.447`) -- [CVE-2025-22271](CVE-2025/CVE-2025-222xx/CVE-2025-22271.json) (`2025-02-28T13:15:27.630`) -- [CVE-2025-22272](CVE-2025/CVE-2025-222xx/CVE-2025-22272.json) (`2025-02-28T13:15:27.770`) -- [CVE-2025-22273](CVE-2025/CVE-2025-222xx/CVE-2025-22273.json) (`2025-02-28T13:15:27.927`) -- [CVE-2025-22274](CVE-2025/CVE-2025-222xx/CVE-2025-22274.json) (`2025-02-28T13:15:28.067`) +- [CVE-2024-44754](CVE-2024/CVE-2024-447xx/CVE-2024-44754.json) (`2025-02-28T16:15:37.883`) +- [CVE-2025-25461](CVE-2025/CVE-2025-254xx/CVE-2025-25461.json) (`2025-02-28T16:15:39.387`) +- [CVE-2025-25916](CVE-2025/CVE-2025-259xx/CVE-2025-25916.json) (`2025-02-28T15:15:13.613`) +- [CVE-2025-26047](CVE-2025/CVE-2025-260xx/CVE-2025-26047.json) (`2025-02-28T16:15:40.020`) +- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-02-28T16:15:40.127`) +- [CVE-2025-26326](CVE-2025/CVE-2025-263xx/CVE-2025-26326.json) (`2025-02-28T15:15:13.743`) +- [CVE-2025-27400](CVE-2025/CVE-2025-274xx/CVE-2025-27400.json) (`2025-02-28T16:15:40.237`) ### CVEs modified in the last Commit -Recently modified CVEs: `52` +Recently modified CVEs: `42` -- [CVE-2021-3929](CVE-2021/CVE-2021-39xx/CVE-2021-3929.json) (`2025-02-28T13:15:25.913`) -- [CVE-2022-22587](CVE-2022/CVE-2022-225xx/CVE-2022-22587.json) (`2025-02-28T14:53:55.297`) -- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2025-02-28T14:44:48.713`) -- [CVE-2022-22674](CVE-2022/CVE-2022-226xx/CVE-2022-22674.json) (`2025-02-28T14:53:55.297`) -- [CVE-2022-32893](CVE-2022/CVE-2022-328xx/CVE-2022-32893.json) (`2025-02-28T14:53:55.297`) -- [CVE-2022-32894](CVE-2022/CVE-2022-328xx/CVE-2022-32894.json) (`2025-02-28T14:53:55.297`) -- [CVE-2022-32917](CVE-2022/CVE-2022-329xx/CVE-2022-32917.json) (`2025-02-28T14:53:55.297`) -- [CVE-2022-42856](CVE-2022/CVE-2022-428xx/CVE-2022-42856.json) (`2025-02-28T14:44:48.713`) -- [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2025-02-28T14:53:55.297`) -- [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2025-02-28T14:53:55.297`) -- [CVE-2023-32373](CVE-2023/CVE-2023-323xx/CVE-2023-32373.json) (`2025-02-28T14:53:55.297`) -- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2025-02-28T13:15:26.103`) -- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2025-02-28T14:53:55.297`) -- [CVE-2024-26306](CVE-2024/CVE-2024-263xx/CVE-2024-26306.json) (`2025-02-28T13:15:26.423`) -- [CVE-2024-36259](CVE-2024/CVE-2024-362xx/CVE-2024-36259.json) (`2025-02-28T13:35:22.340`) -- [CVE-2024-40896](CVE-2024/CVE-2024-408xx/CVE-2024-40896.json) (`2025-02-28T13:15:26.640`) -- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-02-28T13:15:26.860`) -- [CVE-2025-23046](CVE-2025/CVE-2025-230xx/CVE-2025-23046.json) (`2025-02-28T13:35:22.340`) -- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-28T13:15:28.213`) -- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-02-28T14:44:48.713`) -- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-02-28T13:35:22.340`) -- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-28T13:15:28.343`) -- [CVE-2025-27110](CVE-2025/CVE-2025-271xx/CVE-2025-27110.json) (`2025-02-28T13:35:22.340`) -- [CVE-2025-27139](CVE-2025/CVE-2025-271xx/CVE-2025-27139.json) (`2025-02-28T13:35:22.340`) -- [CVE-2025-27142](CVE-2025/CVE-2025-271xx/CVE-2025-27142.json) (`2025-02-28T13:35:22.340`) +- [CVE-2025-21208](CVE-2025/CVE-2025-212xx/CVE-2025-21208.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21212](CVE-2025/CVE-2025-212xx/CVE-2025-21212.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21216](CVE-2025/CVE-2025-212xx/CVE-2025-21216.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21254](CVE-2025/CVE-2025-212xx/CVE-2025-21254.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21259](CVE-2025/CVE-2025-212xx/CVE-2025-21259.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21322](CVE-2025/CVE-2025-213xx/CVE-2025-21322.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21337](CVE-2025/CVE-2025-213xx/CVE-2025-21337.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21347](CVE-2025/CVE-2025-213xx/CVE-2025-21347.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21349](CVE-2025/CVE-2025-213xx/CVE-2025-21349.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-21350](CVE-2025/CVE-2025-213xx/CVE-2025-21350.json) (`2025-02-28T16:02:50.353`) +- [CVE-2025-25323](CVE-2025/CVE-2025-253xx/CVE-2025-25323.json) (`2025-02-28T16:15:38.153`) +- [CVE-2025-25324](CVE-2025/CVE-2025-253xx/CVE-2025-25324.json) (`2025-02-28T16:15:38.307`) +- [CVE-2025-25325](CVE-2025/CVE-2025-253xx/CVE-2025-25325.json) (`2025-02-28T16:15:38.457`) +- [CVE-2025-25326](CVE-2025/CVE-2025-253xx/CVE-2025-25326.json) (`2025-02-28T16:15:38.603`) +- [CVE-2025-25329](CVE-2025/CVE-2025-253xx/CVE-2025-25329.json) (`2025-02-28T16:15:38.760`) +- [CVE-2025-25330](CVE-2025/CVE-2025-253xx/CVE-2025-25330.json) (`2025-02-28T16:15:38.913`) +- [CVE-2025-25331](CVE-2025/CVE-2025-253xx/CVE-2025-25331.json) (`2025-02-28T16:15:39.067`) +- [CVE-2025-25334](CVE-2025/CVE-2025-253xx/CVE-2025-25334.json) (`2025-02-28T16:15:39.220`) +- [CVE-2025-25477](CVE-2025/CVE-2025-254xx/CVE-2025-25477.json) (`2025-02-28T16:15:39.550`) +- [CVE-2025-25513](CVE-2025/CVE-2025-255xx/CVE-2025-25513.json) (`2025-02-28T16:07:41.847`) +- [CVE-2025-25729](CVE-2025/CVE-2025-257xx/CVE-2025-25729.json) (`2025-02-28T16:15:39.707`) +- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-28T16:07:41.847`) +- [CVE-2025-27140](CVE-2025/CVE-2025-271xx/CVE-2025-27140.json) (`2025-02-28T16:07:41.847`) +- [CVE-2025-27141](CVE-2025/CVE-2025-271xx/CVE-2025-27141.json) (`2025-02-28T16:07:41.847`) +- [CVE-2025-27143](CVE-2025/CVE-2025-271xx/CVE-2025-27143.json) (`2025-02-28T16:07:41.847`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7870324f208..bffc8197210 100644 --- a/_state.csv +++ b/_state.csv @@ -87889,8 +87889,8 @@ CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e9989 CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000 CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000 CVE-2016-4655,0,0,f3b2e2852359ec879f695defe2b724c840abee2b548d4c99ea49aea75b4f9d75,2025-02-04T21:03:31.853000 -CVE-2016-4656,0,1,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000 -CVE-2016-4657,0,1,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000 +CVE-2016-4656,0,0,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000 +CVE-2016-4657,0,0,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000 CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000 CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000 CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000 @@ -122903,7 +122903,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074 CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000 CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000 CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000 -CVE-2018-4344,0,1,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000 +CVE-2018-4344,0,0,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000 CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000 CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000 CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000 @@ -141290,7 +141290,7 @@ CVE-2019-6219,0,0,51fb8aba06c50f5beb34035c1b242a41d19be52942c31c18d7c2bc7a8531d9 CVE-2019-6220,0,0,cbf2407952b07ecf4492f093b5fc103d1b2a227a81b385b9faca3d2d185c14eb,2024-11-21T04:46:15.033000 CVE-2019-6221,0,0,f50ee778054e49605f683211032acfa21388b43f0c6177a6b438d11f78a69b76,2024-11-21T04:46:15.137000 CVE-2019-6222,0,0,b2e119bf8c2ad53cb80edcff569884b3877b26f333c41130791c9bc95e585fe3,2024-11-21T04:46:15.247000 -CVE-2019-6223,0,1,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000 +CVE-2019-6223,0,0,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000 CVE-2019-6224,0,0,ecfbf121a69bfc82d1550f3281adf5d3bf177bace8e5f517f9f0d32509cf5d40,2024-11-21T04:46:15.460000 CVE-2019-6225,0,0,ce41491fd66792659c0d145bd85753c0d55c4ec7b1ab133ce86b89f9ab9f2ca5,2024-11-21T04:46:15.573000 CVE-2019-6226,0,0,2aa666681d279cd3af63767890ce00e7894e99d62118a90ff3d1b5e4f08ebd09,2024-11-21T04:46:15.687000 @@ -142061,7 +142061,7 @@ CVE-2019-7283,0,0,feffafb71756ca36d7ebb5e5732cf21c65af1eef8b0b4a000a01722bcbf9d7 CVE-2019-7284,0,0,4f4944ffaef6b9ae94cd5db36f56541cb3730404bdacdc17a02e650c89f80cde,2024-11-21T04:47:55.540000 CVE-2019-7285,0,0,313d5b7c9ac5d469845e6bfae8fac9cde4a21e9607c8aa24344fef7be804554b,2024-11-21T04:47:55.650000 CVE-2019-7286,0,0,02a5092dc2c9edee56617f9cb1cc06cefc2fe17bcd4f6e2cc3426d833d26be53,2025-01-29T18:15:32.340000 -CVE-2019-7287,0,1,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000 +CVE-2019-7287,0,0,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000 CVE-2019-7288,0,0,37259472abe9a71efd7ecb7947dce39a94a93ee4f5a3fc21f4b31239799bffb6,2024-11-21T04:47:56.020000 CVE-2019-7289,0,0,490b84305deba02cd9c12685d90ff374698a1976137c62fa8dacb278f2a4b4ee,2024-11-21T04:47:56.150000 CVE-2019-7290,0,0,364d38b1b25fabde5737927c410b77a3a82901e5520f715924a529b21f8dd778,2024-11-21T04:47:56.273000 @@ -142971,7 +142971,7 @@ CVE-2019-8502,0,0,c434befa76a4d4ec9f96079a6522d800615fb7b5a48ac54913486401cebb09 CVE-2019-8503,0,0,0fa026e8d1f022ec049b1ca9e49137afb60072dff1e8e2dd72b28d15c80c7f81,2024-11-21T04:49:57.480000 CVE-2019-8504,0,0,dbc06dfdb448c3a4a5038f7f7fffd2ddbd9e83bd6911705199749c704ab21b6d,2024-11-21T04:49:57.607000 CVE-2019-8505,0,0,e1a01ac4804c5cc3e2fc73634b47f99331a6a4ce7a7c3c2bbfed7c9969ad3586,2024-11-21T04:49:57.723000 -CVE-2019-8506,0,1,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000 +CVE-2019-8506,0,0,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000 CVE-2019-8507,0,0,b01ebef1a03939c2e3ada65de3c55f419e29cf0247c08ea4d212b6b10f7b019d,2024-11-21T04:49:57.980000 CVE-2019-8508,0,0,cef14e0810b1e31a960bc6e50e6e7aba1a448ffacb5ba344f9c35735a88a9bf6,2024-11-21T04:49:58.090000 CVE-2019-8509,0,0,ec37506e1999ed61157738d5e3cb9f41d210f01cd362d5aea688c39cd5258611,2024-11-21T04:49:58.203000 @@ -142991,7 +142991,7 @@ CVE-2019-8522,0,0,0eae3335c616182d312f36c43cae51aa49706785a5e522721af70477311a7b CVE-2019-8523,0,0,58aaa978a7e9de77277ba3f7bc706507334d4693bd0c5521150bdec55490072c,2024-11-21T04:49:59.800000 CVE-2019-8524,0,0,32c4b83ccc7f0a278121313d1e2f9075e195d072f0b93eabeb1707ea8b920726,2024-11-21T04:49:59.923000 CVE-2019-8525,0,0,6ecd93b661cfa469f49d67d3496d956460a9b9f18cdb8779c33e292274db4eb8,2024-11-21T04:50:00.047000 -CVE-2019-8526,0,1,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000 +CVE-2019-8526,0,0,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000 CVE-2019-8527,0,0,7f47548387851680e5a961a6246e9e3c27175977bb648565dd45c6a5b3234b0e,2024-11-21T04:50:00.290000 CVE-2019-8528,0,0,1639b73f58d13f7ed0ff712ed4ffad30e15b2bab49d4978d2759cd12fc2ee8e7,2024-11-21T04:50:00.423000 CVE-2019-8529,0,0,cf361ae2751882bf4341036b0cfea24f00b715e4dc1d6ea3088e8dd4127f4153,2024-11-21T04:50:00.540000 @@ -143068,7 +143068,7 @@ CVE-2019-8601,0,0,5e1b649cd76c28875d6e8e75de505e8524898c98238cb4a152590695820ca2 CVE-2019-8602,0,0,dfd4f0ad81cd404bc76b02e5763cbcb73de09c2d34cedf9136b1b93dd3c3c1d3,2024-11-21T04:50:09.217000 CVE-2019-8603,0,0,397ffd36d4e84c621cf449a9fe68c20353e9e5a5e6eeb155fe03bdbf21382c50,2024-11-21T04:50:09.353000 CVE-2019-8604,0,0,a865afc630f7beaf44df56caaf7efbc7bcf793b8a0a6e8a16c85b32c7369a571,2024-11-21T04:50:09.463000 -CVE-2019-8605,0,1,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000 +CVE-2019-8605,0,0,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000 CVE-2019-8606,0,0,9d793373058d23a812a6cec3d9e2bdd104d6ee9c23a4401600c30545293a6e9d,2024-11-21T04:50:09.690000 CVE-2019-8607,0,0,7ac0d064c6b42563e8682aff1dcfab6f7183e1d42a575096d72bb934c174f4b5,2024-11-21T04:50:09.797000 CVE-2019-8608,0,0,db9ceb00c77dadef8090d297e1f1d19a2d5eb960a616fdf84109118f8a2fb620,2024-11-21T04:50:09.923000 @@ -156758,7 +156758,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365 CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000 CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000 CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000 -CVE-2020-27950,0,1,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000 +CVE-2020-27950,0,0,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000 CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000 CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000 CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000 @@ -159728,7 +159728,7 @@ CVE-2020-3833,0,0,e764dc5cfbb8f637552b2441e9ddb593562a3918809b4c677bb07276f1f37b CVE-2020-3834,0,0,3e772505e33e0e780d0ee45c96850de3b9441fb84529cb87198cfe1cd9457c55,2024-11-21T05:31:48.527000 CVE-2020-3835,0,0,cdcfa07a09a472bd33c6fad2c5ebc47f55b7047cf8a668f3558757ee2f0554ef,2024-11-21T05:31:48.627000 CVE-2020-3836,0,0,26198ab0a7a09181b9daabad3d9d21eadd74796c73b69cca8eeebfe42cc70abc,2024-11-21T05:31:48.737000 -CVE-2020-3837,0,1,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000 +CVE-2020-3837,0,0,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000 CVE-2020-3838,0,0,8d1784baae371177f9d969f0cf7d2c32eccd6737302888ee0e7d97c3ed35fe4e,2024-11-21T05:31:48.980000 CVE-2020-3839,0,0,cce4070eb0b58eef19224cd877e2e6dd6b8f5e237e9f84b7c9bae85d5ed0c879,2024-11-21T05:31:49.107000 CVE-2020-3840,0,0,514e04d2cf82acf4eded7fae4a5294fb412c6b1287f03b9bf0112344f66a3086,2024-11-21T05:31:49.210000 @@ -164696,8 +164696,8 @@ CVE-2020-9814,0,0,39d23ae595854756548268c04031dd78beb4f4daf7ec7db61e365f2b36b9a1 CVE-2020-9815,0,0,a003a768ee0eea54e269add860f10e3abee748e6ca2781978085f4f2ae41bb71,2024-11-21T05:41:20.167000 CVE-2020-9816,0,0,ead57dd330ea3372df51f17718a1057a151f35f4442acd93f18839173d58f970,2024-11-21T05:41:20.270000 CVE-2020-9817,0,0,6451091f69be5568064f6c8a083aedc1278642490c4a281b5e17f6d40ca1424c,2024-11-21T05:41:20.380000 -CVE-2020-9818,0,1,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000 -CVE-2020-9819,0,1,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000 +CVE-2020-9818,0,0,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000 +CVE-2020-9819,0,0,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000 CVE-2020-9820,0,0,4fdad7d17b8d9bbdef875e36d0061295507fa69ba2f8dbd3a4a1d39c55b0a586,2024-11-21T05:41:20.713000 CVE-2020-9821,0,0,07529420971d10ff2bbfd70ddd9990d24f55005291e73adea0637f70f81b6285,2024-11-21T05:41:20.820000 CVE-2020-9822,0,0,dd0bacca6d947be1747310d2122b048f784f56925b7be141e555edeaa848edf0,2024-11-21T05:41:20.927000 @@ -164735,7 +164735,7 @@ CVE-2020-9855,0,0,f62de7238477aea93f3abf3ab8ea2dfc400975c6489e15199db3b3de03a472 CVE-2020-9856,0,0,e48989f32d60137c0edc8a02e834ea84cd4505ab62440e90630bb6ca0255475d,2024-11-21T05:41:25.117000 CVE-2020-9857,0,0,4564f37640cf033d502580176544c1ca67b90e10b289096385a5ce052561a423,2024-11-21T05:41:25.217000 CVE-2020-9858,0,0,365f269021dc2690a80c7be2353be85740b98a3c242d31c022e2f1ae9fd07a21,2024-11-21T05:41:25.317000 -CVE-2020-9859,0,1,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000 +CVE-2020-9859,0,0,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000 CVE-2020-9860,0,0,6d689ddd768a7729996307cbe7c2aa5b1d09bcc559832a4fec10fff8c58a23c6,2024-11-21T05:41:25.513000 CVE-2020-9861,0,0,5c800faea68343bf58424d7e251e1c13d6dc6d14a61816a5cf1f99cb4d5b1992,2024-11-21T05:41:25.610000 CVE-2020-9862,0,0,b6f03288f468f0d4024a3988e42405a25e797fb0852093161144538c7e8105b3,2024-11-21T05:41:25.710000 @@ -164780,7 +164780,7 @@ CVE-2020-9903,0,0,fd8ba9246c03cf84ed34090daa738b1e21ec1682f0f8cda6dedaa4761c5864 CVE-2020-9904,0,0,5fdc6e10d2f1f01c714b258e99f79acbd6194e185af91fb066f25cb2d75768c4,2024-11-21T05:41:30.013000 CVE-2020-9905,0,0,b68cf578fe49078f790bcf44e5ff24959136d2e396535b0c2537b5b0ffecaa75,2024-11-21T05:41:30.123000 CVE-2020-9906,0,0,166cedb6a95dee0a53a40439951152b4c6ffba0b89929eb32a8c66f410558976,2024-11-21T05:41:30.230000 -CVE-2020-9907,0,1,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000 +CVE-2020-9907,0,0,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000 CVE-2020-9908,0,0,06606ab1c2077a54e1320041f575a636b9cd10146870b40c63b7a42243148093,2024-11-21T05:41:30.437000 CVE-2020-9909,0,0,db45329d72cab554faea03693de3ea5691e4845af8f9053ecf8a8d9d2e894736,2024-11-21T05:41:30.537000 CVE-2020-9910,0,0,eacc185ba0c7ff3cc1d990c8fea0abc7edb47327ee8ca9ee20d8023e0c9a1f62,2024-11-21T05:41:30.647000 @@ -164807,7 +164807,7 @@ CVE-2020-9930,0,0,6e27c898f04c57974ee33a6efc19d92b2d388cd1a02ee2fa6c053c46a67dc9 CVE-2020-9931,0,0,f8db6056ab6e7b000a860597155fbc28fbf14076d94aef57849ea84edb033dec,2024-11-21T05:41:32.923000 CVE-2020-9932,0,0,d4ac093d8a0c5c44ead5f82d1790e5da018a7c279ee0812a2e45de174844d665,2024-11-21T05:41:33.040000 CVE-2020-9933,0,0,b1ac39dc4c32bae5f3c1adcbaa421d06f55965e5d7f7c3871b963dbc0c4a1561,2024-11-21T05:41:33.153000 -CVE-2020-9934,0,1,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000 +CVE-2020-9934,0,0,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000 CVE-2020-9935,0,0,8c8962420a06ea8b9704251fdd323828ea6570405c8d4526638213ce066ddf64,2024-11-21T05:41:33.400000 CVE-2020-9936,0,0,3f0520c5f2eface2c145c0dc6c279d5078dc8e79c797e1a3ffd2befbb5d1d782,2024-11-21T05:41:33.513000 CVE-2020-9937,0,0,d572deb06e95e84154ea8a51424aa07761fb2c381fd1bef9008c747db6755e1f,2024-11-21T05:41:33.633000 @@ -166431,14 +166431,14 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943 CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000 CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000 CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000 -CVE-2021-1782,0,1,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000 +CVE-2021-1782,0,0,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000 CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000 CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000 CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000 CVE-2021-1786,0,0,844528cd02ae52e41c72912ba3abea868e3a31a8ead52c9afc5203d16bdb7bdd,2024-11-21T05:45:06.603000 CVE-2021-1787,0,0,2fed3cae125c2895dac1e44fd837f817f5b5e70f63daf568baaa5ea04f53dd36,2024-11-21T05:45:06.733000 CVE-2021-1788,0,0,7cd9b9e8fd97ec6f34bcc85b8d8ae756cef050deec7f91d8bdd5e69f3ff22f38,2024-11-21T05:45:06.860000 -CVE-2021-1789,0,1,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000 +CVE-2021-1789,0,0,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000 CVE-2021-1790,0,0,453727956bec9f85809fc98d61ce3827a48322b65c0a1308fdd19254e25b7d46,2024-11-21T05:45:07.223000 CVE-2021-1791,0,0,0858d7a66d6852664ff89bbf6b3f6519588dcf813a61680a95653c00c4525806,2024-11-21T05:45:07.340000 CVE-2021-1792,0,0,5ffc2bf1833bc5c8fb2e4843cb4db95b9711424cf4aab2d2cc4aaf61cb70cd0c,2024-11-21T05:45:07.477000 @@ -166509,8 +166509,8 @@ CVE-2021-1864,0,0,e61bb78daa00b5dca2e6f100a892bda75d87a592b9962975d78c060881b491 CVE-2021-1865,0,0,d4d8e0986b62bedaab54dbcf207c7ced93d3d91287ee0883bce3ef5ceb5d3d36,2024-11-21T05:45:15.390000 CVE-2021-1867,0,0,88725f08a5e44d02242ea72ac07f37bb9e06618f3cd63825dbd1ad8b63b8cb04,2024-11-21T05:45:15.513000 CVE-2021-1868,0,0,432a8d063e46b26199a2f940e4c6839746a15a330270af8952a5e97a5f7524ac,2024-11-21T05:45:15.640000 -CVE-2021-1870,0,1,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000 -CVE-2021-1871,0,1,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000 +CVE-2021-1870,0,0,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000 +CVE-2021-1871,0,0,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000 CVE-2021-1872,0,0,4aad0f7c4f760558662da2aa02617c0ae0669394f36c9abb206cff7b5c7e6f77,2024-11-21T05:45:16.040000 CVE-2021-1873,0,0,f647da70e48b4a0e757dc32d4da6a78ccdcb576a528532094359d47a435eae89,2024-11-21T05:45:16.153000 CVE-2021-1874,0,0,11acb083af68bc66cbb55a31d610911ff9e1492756cdefbcf79bd2d863878bb4,2024-11-21T05:45:16.287000 @@ -166518,7 +166518,7 @@ CVE-2021-1875,0,0,a763019d62a197757c122cba7e6ec2caf0210e0fc06c38570a6774aace7636 CVE-2021-1876,0,0,50e3e6073a13251685729089e5f9b48623129fa60396e005f85f8948fe4b1930,2024-11-21T05:45:16.527000 CVE-2021-1877,0,0,78167aec1738ed934a9db101730f2475d220aa596ff08cccd6d82eadaaf3136f,2024-11-21T05:45:16.647000 CVE-2021-1878,0,0,bbc94e824fa34a03db5d35e1bbb0245d5ebeb5ba4878c0691539ed3e105efdd0,2024-11-21T05:45:16.777000 -CVE-2021-1879,0,1,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000 +CVE-2021-1879,0,0,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000 CVE-2021-1880,0,0,f21767cc17b0b400ea36769c68e9dc0fc94bd57122b1b556aeb6342108dfd313,2024-11-21T05:45:17.023000 CVE-2021-1881,0,0,71d96589a667db4e83dea8a9b9340b5dda8ce4877b845ef6e86d23e76d807867,2024-11-21T05:45:17.143000 CVE-2021-1882,0,0,0de80653eb0cc938d031bd299bc26b6178d33ea21b4b167b4804efdfdc78bad9,2024-11-21T05:45:17.280000 @@ -175042,15 +175042,15 @@ CVE-2021-30653,0,0,af6209998169bf0b59156640376c5ebe8e7a91975ee599eee6d8c80cb5bdb CVE-2021-30654,0,0,d454b5e9d0444f22c1324170868a7170e32ba4142b3b3d1feb9e8f43129b786d,2024-11-21T06:04:22.110000 CVE-2021-30655,0,0,c5bd87f283bc66de8cf6a1dccdc1113eb65e46ccaaed5eff9fd5299b957c5164,2024-11-21T06:04:22.250000 CVE-2021-30656,0,0,4f25be990cd3e56338347956b5cd16bd2d8602e91cf11f5de83660e31c7f84bc,2024-11-21T06:04:22.390000 -CVE-2021-30657,0,1,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000 +CVE-2021-30657,0,0,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000 CVE-2021-30658,0,0,a7e6ce534983d6265ea77dbc37d43cd7f21d26f66f7c40d693487b5c676730f2,2024-11-21T06:04:22.637000 CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257775,2024-11-21T06:04:22.750000 CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000 -CVE-2021-30661,0,1,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000 +CVE-2021-30661,0,0,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000 CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000 CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000 CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000 -CVE-2021-30665,0,1,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000 +CVE-2021-30665,0,0,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000 CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000 CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000 CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000 @@ -175096,7 +175096,7 @@ CVE-2021-30708,0,0,0d4ef740951de9fa3c7d46cd5d922d5031082b03c36b68901042a25459d7b CVE-2021-30709,0,0,ac4f597f103d40c646c9a37992122e647523ecf1a80c9ea7d0cad044139adf79,2024-11-21T06:04:29.733000 CVE-2021-30710,0,0,6f9138aff87c816b5801441de245256cd714004b0c7fe4d082b9380d78dbecf5,2024-11-21T06:04:29.883000 CVE-2021-30712,0,0,fd76d4bdea30f6917b1b4272719a88821011e5d27fc4ee0c3f5302060e454266,2024-11-21T06:04:30.037000 -CVE-2021-30713,0,1,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000 +CVE-2021-30713,0,0,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000 CVE-2021-30714,0,0,1ac3cdebf872ac967c92c82c1f293c834ed9a9b2a9af3cbda73ed47dcff3c59f,2024-11-21T06:04:30.317000 CVE-2021-30715,0,0,8526fff9426684bf5994f2385d0e54f12e8042c43b974b959d854ca5cfd03af8,2024-11-21T06:04:30.440000 CVE-2021-30716,0,0,1351521f863a9be568843ed0717057da020860858dd82d7d962e25e477f48e69,2024-11-21T06:04:30.573000 @@ -175183,7 +175183,7 @@ CVE-2021-30802,0,0,d3af46ce2f497920c6024a63ea8ea8888c260d90da7eb1da62c0463dfa869 CVE-2021-30803,0,0,da6c846ff7628e171742041c5c4f2a9ae56f35437b19a5957ae69acd101f42a1,2024-11-21T06:04:45.030000 CVE-2021-30804,0,0,a8448168f3c60c9210c3b99df09e33ba1abc83f92b034856b3391f42be985878,2024-11-21T06:04:45.140000 CVE-2021-30805,0,0,a45ac4492d17d042337985687b2b1544cdce5f65bc715a78eaef4fca60b02db2,2024-11-21T06:04:45.257000 -CVE-2021-30807,0,1,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000 +CVE-2021-30807,0,0,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000 CVE-2021-30808,0,0,7332f9b25719fd725098c6e1a14e50d288895c73b1d9691fc7752d3662d18d33,2024-11-21T06:04:45.500000 CVE-2021-30809,0,0,9faa62183c613ce8119ed921c618805568e2bfada6377a76f91a8e0d329247cf,2024-11-21T06:04:45.630000 CVE-2021-30810,0,0,0e59876a610502b4445f0847e17025234c0f485bc63ceb2d065709a0d4be2e41,2024-11-21T06:04:45.760000 @@ -178812,7 +178812,7 @@ CVE-2021-35482,0,0,5b472310c7c4047d6c33038218d864d04f51f66e4d51e1cb7991026a14c61 CVE-2021-35487,0,0,331ce5b429413f54a5bdb9718850b6786d3b058d3cbb6312518d5ffedf213af6,2024-11-21T06:12:21.600000 CVE-2021-35488,0,0,e65262e0a1c1d0504b83abe345c410bff84cdfb7fa7e3e92be53ed427da99d9b,2024-11-21T06:12:21.740000 CVE-2021-35489,0,0,53bce953b714dca045a33c64982814f760f224a2cdd4b57395f881b88326173d,2024-11-21T06:12:21.887000 -CVE-2021-3549,0,1,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000 +CVE-2021-3549,0,0,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000 CVE-2021-35490,0,0,8518f891efcd6e2c5ff624523dd1d73b81408947a5d2a6dceb5053db70504775,2024-11-21T06:12:22.030000 CVE-2021-35491,0,0,f4dc4e73cd732408245742225cf63817e06513f351fcb7db023db8d554876caa,2024-11-21T06:12:22.200000 CVE-2021-35492,0,0,c1d7bd87fad0c3e28378adc00aafab61674ebaa8678be1c7775d09b09a4bb35b,2024-11-21T06:12:22.410000 @@ -180102,7 +180102,7 @@ CVE-2021-37346,0,0,946b92ddc4fbe8315c7d41ff29ec3fe6897aba5d320afff2a62bc560a60f7 CVE-2021-37347,0,0,3b9e777c10e939bdebc4042602b6811e52742ff1bb9cf92b7d4c7384ff6b0b30,2024-11-21T06:14:59.177000 CVE-2021-37348,0,0,ca272066b16ec187cad70b4e87c46a9e6652a909d15aa5859776a09d1693fbd9,2024-11-21T06:14:59.330000 CVE-2021-37349,0,0,08392ea9c36b212d62ac5ffcca309c8a34443a89420b70fa89a06ba97b793121,2024-11-21T06:14:59.490000 -CVE-2021-3735,0,1,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000 +CVE-2021-3735,0,0,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000 CVE-2021-37350,0,0,cf25b34ef1bbfd95231919aef949f1c5ef44e04e05be9690834576ef277c1b91,2024-11-21T06:14:59.677000 CVE-2021-37351,0,0,d11c79c834d15cc2144d8711dffb0ddf0689cebc7c8d0fa23ad5d1503584c13d,2024-11-21T06:14:59.823000 CVE-2021-37352,0,0,1d39000a015942794d66401eebb5b89f81736f941a96aecacf01420137c33cd4,2024-11-21T06:14:59.973000 @@ -181647,7 +181647,7 @@ CVE-2021-39283,0,0,eda15ad1b3bcdcea2bbabe3c3a719378090dd1f6b09ac9e32c24dec27d162 CVE-2021-39285,0,0,a30e82f0b54273bf7230675bfc50d449c5b054125f271ae318a58b9f82ff968d,2024-11-21T06:19:07.193000 CVE-2021-39286,0,0,ef6a7f535e70ea4c70e16914bb393fc1fe7ddce52d7869aa8e27ed3514a1c0a5,2024-11-21T06:19:07.390000 CVE-2021-39289,0,0,065932f15029abf31cec0e9a8c93f437f6a2e6f1d70a6cf84aed55a74ab5c3a9,2024-11-21T06:19:07.593000 -CVE-2021-3929,0,1,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000 +CVE-2021-3929,0,0,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000 CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000 CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000 CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000 @@ -192299,7 +192299,7 @@ CVE-2022-22583,0,0,cef0a1b3c51e05882dd405aa523ef9e9bbbacbdae2cf3cbfa227960daba5e CVE-2022-22584,0,0,5248aa63983720014377ab3a932e7e26d00aa01f6109bfe9bbfe564e719ab265,2024-11-21T06:47:04.220000 CVE-2022-22585,0,0,49d858c7854d86c30431073a89e3a77a374d0583f41fe955f4122b98bff7b1d8,2024-11-21T06:47:04.370000 CVE-2022-22586,0,0,7a8c327b1fdb0dc879577cb6623c3b5a67edc10748196e7bf3d4d9a371e2a4bb,2024-11-21T06:47:04.493000 -CVE-2022-22587,0,1,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000 +CVE-2022-22587,0,0,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000 CVE-2022-22588,0,0,6c57d89d82e014a04c1d1a269239114176bf790579db18cc8a4e0bb9b98618f5,2024-11-21T06:47:04.710000 CVE-2022-22589,0,0,ad265160333aeff24b5a24815da36d925fd4417ebc2ddd4162500edd6aad12ec,2024-11-21T06:47:04.823000 CVE-2022-2259,0,0,150b52071c57e9da09e4562b9e329d9ebb764927f18ed734d3725de25cc194b6,2024-11-21T07:00:38.140000 @@ -192334,7 +192334,7 @@ CVE-2022-22616,0,0,fd6c62268b016f15b1bb153516514624f101ccecfdc0b548b6bd7175935d8 CVE-2022-22617,0,0,b9a76fb778badaf7135b648c1b9e7a3b21aea99bf752c663599f8da2405573b1,2024-11-21T06:47:07.893000 CVE-2022-22618,0,0,53a6466f73e6695117bc56fb459dfa0bde3aacbb8110ea335a0c42333cb99e27,2024-11-21T06:47:08.017000 CVE-2022-2262,0,0,48f9f12588c4cb17d7b597dce3fc433cbe7d88db72523f825ed2022a32d1a7a8,2024-11-21T07:00:38.480000 -CVE-2022-22620,0,1,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000 +CVE-2022-22620,0,0,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000 CVE-2022-22621,0,0,f64d274fe62db017d3a340f8a8d18fc17ad01dea66a7a94ad96229b65fa87834,2024-11-21T06:47:08.227000 CVE-2022-22622,0,0,096e2e61980549c51cd46b9fbef7cf08515942db2ff08880a7a4a737ef13b81f,2024-11-21T06:47:08.337000 CVE-2022-22623,0,0,7ed1ca6096215ea8485a50fc8cae6d57524f6a37b6c47c50add71b768de4e4c8,2023-11-07T03:43:56.890000 @@ -192393,7 +192393,7 @@ CVE-2022-22670,0,0,c0441f67d04e29f04a1c244c888e912d7e003563c05a6c1660033505dca78 CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9d06,2024-11-21T06:47:14.617000 CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000 CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000 -CVE-2022-22674,0,1,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000 +CVE-2022-22674,0,0,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000 CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000 CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000 CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000 @@ -201007,8 +201007,8 @@ CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000 CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000 CVE-2022-32892,0,0,445bb66d3cb66bfa52cb3b8f236b40adfc7de6fe48f16d3abd8207d65c213073,2024-11-21T07:07:10.590000 -CVE-2022-32893,0,1,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000 -CVE-2022-32894,0,1,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000 +CVE-2022-32893,0,0,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000 +CVE-2022-32894,0,0,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000 CVE-2022-32895,0,0,43d08342ad442aaa6b2f9df4c24c35921ef46cb9a7757a6ff79496a2351a09c3,2024-11-21T07:07:11.033000 CVE-2022-32896,0,0,c0ac2853331d6a1c5683c215abdb98389fc122489eb770c05070e76281984e79,2024-11-21T07:07:11.157000 CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc99c6,2024-11-21T07:07:11.290000 @@ -201033,7 +201033,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000 CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000 CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000 -CVE-2022-32917,0,1,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000 +CVE-2022-32917,0,0,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000 CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000 CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000 CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000 @@ -208701,7 +208701,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316 CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000 CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000 CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000 -CVE-2022-42856,0,1,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000 +CVE-2022-42856,0,0,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000 CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000 CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000 CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000 @@ -218800,7 +218800,7 @@ CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa4471 CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000 CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000 CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000 -CVE-2023-23529,0,1,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000 +CVE-2023-23529,0,0,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000 @@ -219841,7 +219841,7 @@ CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4 CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000 CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000 CVE-2023-24773,0,0,1cc31190f570fc3c23b7b2196d6c7eae4d5aa9f41329bb819157d05a69818791,2024-11-21T07:48:23.443000 -CVE-2023-24774,0,0,7eafe72f4a7525306c79f6ce362726fff327ac2b01c767e3f25cf9b56332274f,2024-11-21T07:48:23.573000 +CVE-2023-24774,0,1,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 CVE-2023-24775,0,0,b668469f90fa3e9c9678adfb39908c761d3adbdd38c4e1fbc1564403498a6494,2024-11-21T07:48:23.700000 CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000 CVE-2023-24777,0,0,4a866ff95b4f709fb308f1ed6883b97243dc32bc5395b4fb2599794ee1bd83c4,2024-11-21T07:48:23.967000 @@ -222654,7 +222654,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000 CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000 -CVE-2023-28206,0,1,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000 +CVE-2023-28206,0,0,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 @@ -225918,7 +225918,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000 CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000 CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000 -CVE-2023-32373,0,1,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000 +CVE-2023-32373,0,0,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000 CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000 CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000 CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000 @@ -227453,7 +227453,7 @@ CVE-2023-34184,0,0,2442eadc7f7ae90259cef50a8536ce9bd375108fe6cfeb3ded94765555a83 CVE-2023-34185,0,0,4c5f4bf40def13d12fc3b4e803a32228e00caefcd5ded5fd0047f122b45f0170,2024-11-21T08:06:43.960000 CVE-2023-34186,0,0,4a58da1254a6f379a26c0f12ec76897c53ffd6ab2c992e984b8875d4d20e7c36,2024-11-21T08:06:44.087000 CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b2f0,2024-11-21T08:06:44.200000 -CVE-2023-34188,0,1,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000 +CVE-2023-34188,0,0,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000 CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000 CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000 CVE-2023-34192,0,0,8e068b263c612b1cfb21e8e741bf1c7c4a21d6b7a2cbdefe2e15a248cfc85c32,2025-02-27T02:00:01.920000 @@ -250879,7 +250879,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2 CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000 CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000 CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000 -CVE-2024-23222,0,1,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000 +CVE-2024-23222,0,0,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000 CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000 CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000 CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000 @@ -253251,7 +253251,7 @@ CVE-2024-26302,0,0,fc5638e5f76b6239bb433ea39fb38c5e3b9f0a6c8cdf6356f010d0b303320 CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840eb2,2024-11-21T09:02:19.880000 CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000 CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000 -CVE-2024-26306,0,1,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 +CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000 CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000 CVE-2024-26309,0,0,29b65aa638465aa8c64d469c75ef0651a7e59224972ac32d6818f20d170c6343,2024-11-21T09:02:20.667000 @@ -260724,8 +260724,8 @@ CVE-2024-3604,0,0,0c726ac283946631d580b3ea047d73595adcfa6f29e4d6dd86387d266f76d4 CVE-2024-36041,0,0,4161ec03e4910e4c5c5920c414e1b3c98759b0d09bfd41e398f897b3d9dafc1c,2024-11-21T09:21:29.970000 CVE-2024-36042,0,0,dd61539a28198f3c8b42fd4591e0a6d17418212950f931fea78e92fd4e6935c4,2024-11-21T09:21:30.217000 CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000 -CVE-2024-36046,0,0,a71f9d1ce14296660706291dadd5521ea62c73b042b976b441e24a15402db92d,2025-02-27T23:15:36.953000 -CVE-2024-36047,0,0,7264120aaaa6fc94b5c29d6436880879d0b64d1b7aadf156a698ef3f6a9f8070,2025-02-27T23:15:37.040000 +CVE-2024-36046,0,1,e0f89ab571addd6ccc0a13c28f0987d8d3a2bdf98f6b75fa4bcb1f70cd9694d0,2025-02-28T16:15:36.987000 +CVE-2024-36047,0,1,7e66dce3cf964e4f7a2d27e530fbb169401596667aecd9fd25058c0304521c6a,2025-02-28T16:15:37.137000 CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000 CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000 CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000 @@ -260922,7 +260922,7 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3 CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000 CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000 CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000 -CVE-2024-36259,0,1,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000 +CVE-2024-36259,0,0,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 @@ -262002,8 +262002,8 @@ CVE-2024-37562,0,0,5fff92160e9f180d6fe1aded48520e5c6ac7153a661594f79b08cd1a412b6 CVE-2024-37563,0,0,d4e514fd48c3dba41649f3e92a70b0fc3d03714769849d8f74d1af2737d1f75a,2024-11-21T09:24:05.057000 CVE-2024-37564,0,0,5e5d8deb79ce02d4743630e479447f7c70c69d56d6a449fdd936c029fbd20c0c,2024-11-21T09:24:05.177000 CVE-2024-37565,0,0,bd3b0fed28622fea5585bed01c88dfdb2958196d65cd20b1a612d41bf69c1081,2024-11-21T09:24:05.300000 -CVE-2024-37566,0,0,afc84a078a0a9b0218b76c2095d0f3cbf51cacb2a19f425267ac8a51241b2229,2025-02-27T23:15:37.130000 -CVE-2024-37567,0,0,37373dfcb2cafd40454d28a85d4fe7f5b87c2e25faee6c6b1ee95dc38f4850da,2025-02-27T23:15:37.210000 +CVE-2024-37566,0,1,d7487614f1383b8e2d54d9b2f7eb4177f926ae1fbac788241489dfbdff3f5970,2025-02-28T16:15:37.287000 +CVE-2024-37567,0,1,095a22db77c4c3bfe2298e23cb9487c31d572f438204db0208873abaceb7a794,2025-02-28T16:15:37.440000 CVE-2024-37568,0,0,856c439c12dc3c079f8f1ff58d753340540c2c4d1ef54b75ce0508c5a8fc3e4b,2024-11-21T09:24:05.420000 CVE-2024-37569,0,0,8791820124a473aaae0983330573ab7c8bbd9a5bcb0565b37b2d1bf3d3a92c7e,2024-11-21T09:24:05.663000 CVE-2024-3757,0,0,3b15c3daf6ad6b887b44ee124913c1fe2d8b6654e23c894d9fab65c313615142,2025-01-02T19:05:19.333000 @@ -264427,7 +264427,7 @@ CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56 CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000 -CVE-2024-40896,0,1,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000 +CVE-2024-40896,0,0,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000 CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000 CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000 CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000 @@ -264789,11 +264789,11 @@ CVE-2024-41320,0,0,2a8260febdf4182236d26585f89ccb09d753292e86d39cca719b36642a7c5 CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e44251f,2024-11-21T09:42:15.257000 CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,5d0a608f5ba280f35dd905d53d7227fb5786301ea98916e97e2bbf00edad40a3,2024-08-07T20:54:44.060000 -CVE-2024-41334,0,0,5845fe9591167f9c467f1e510f13acf10e81dcd2a3a31ad8ab264052c9baab6a,2025-02-27T21:15:36.483000 +CVE-2024-41334,0,1,19fc7d796046d537baaf3e290ebf897dd5658e944e3500f513adc9003711ac13,2025-02-28T16:15:37.587000 CVE-2024-41335,0,0,d3ee5339fa03fba2a5866f9228ee1228004e295e13e06cb78bf5e379f057c8b7,2025-02-27T21:15:36.577000 CVE-2024-41336,0,0,016781541090851745dba8109086c189ef3dfbb0254c6447a98713589cf6b08a,2025-02-27T21:15:36.663000 -CVE-2024-41338,0,0,b47e2008cdd659d8f0cdedadff0bdbf2a4bfe032a7e5b7a1018561a0077dea9e,2025-02-27T21:15:36.753000 -CVE-2024-41339,0,0,1e4104fd36d7ad7e931c61df1818c76e0ae50dcc9a248e4d0ad045641b8caa68,2025-02-27T21:15:36.837000 +CVE-2024-41338,0,1,e56ba6eccb1f913832538e27e67769c5e8bccd2807f995ee0dbd29477021d2da,2025-02-28T15:15:11.727000 +CVE-2024-41339,0,1,95fa126ce7ca6eb431bde7c3eaf6536eeaddf344a24f0d3796abf61ab7720cf0,2025-02-28T16:15:37.737000 CVE-2024-41340,0,0,5fb432a505b386cc70f2c3d152557019cc679584cc3504caf8f640cd7a854646,2025-02-27T21:15:36.923000 CVE-2024-41344,0,0,c38269b43014f5cca22fcf4afc82639c77f2b3bf5d57b1fd1305828277d7aa4f,2024-10-16T16:38:43.170000 CVE-2024-41345,0,0,8a6a87dfa4080752a61cdb78a92bacc8a547bb5d8e3779dd7c2648fc92fcbe83,2024-09-04T14:17:57.747000 @@ -267372,6 +267372,7 @@ CVE-2024-44739,0,0,6f14d5eff3dff89834977a4432c417b1af61a4ec23be95658eac014ef024c CVE-2024-4474,0,0,fd3fa0366486b2defe9820ff505cd8868a6d31d4b6c81237532989ab734a6a29,2024-11-21T09:42:53.833000 CVE-2024-44744,0,0,13a864504cc5ddf6bb42dbaf6270143c0dd06ca1a55cc37045e7ac3ebdba96ae,2024-10-04T20:15:07.203000 CVE-2024-4475,0,0,72508479edb36460622b89717d4eaedb904c06449d7fa7d7ad28501bc5167e0b,2024-11-21T09:42:54.027000 +CVE-2024-44754,1,1,51d8884ed60ddd5196cae74aa10aca836e313f5c9ccc9d407e3c2204d4dcafbc,2025-02-28T16:15:37.883000 CVE-2024-44756,0,0,3cc662834a62f0e83640a2f55cde38782fc1a331b2d6e5bee47b1efe435ee06c,2024-11-21T17:15:14.863000 CVE-2024-44757,0,0,d9a510bb1d7c1043adeeb88a2b183cdf042cccdbed8ccc72bbec6278713deeea,2024-11-21T17:15:15.110000 CVE-2024-44758,0,0,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000 @@ -273562,7 +273563,7 @@ CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b6 CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000 CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000 -CVE-2024-53408,0,0,fad2504477aa5345271d8863f19e55b9d1c9b4f8952b0c3b4bfd093802e01e07,2025-02-27T20:16:01.790000 +CVE-2024-53408,0,1,bca41a6c9a00b3326c58a5e4ef803bf4bc97e2a577bf3cf6dac35f1dfb354578,2025-02-28T15:15:12.317000 CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 @@ -275645,7 +275646,7 @@ CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000 CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000 -CVE-2024-57026,0,0,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000 +CVE-2024-57026,0,1,7bff9bc334b5d71c0a05dc5a9ea9ca7494445d26ebc88d7cd3f4e9846c368395,2025-02-28T16:07:41.847000 CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000 CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000 CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000 @@ -280037,7 +280038,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559 CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 -CVE-2025-0395,0,1,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000 +CVE-2025-0395,0,0,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000 CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000 @@ -280585,9 +280586,9 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813 CVE-2025-1293,0,0,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000 CVE-2025-1295,0,0,675204ae0772f088026fc7f2412f8ab28c43fc8efc072775299de73d53b5b7cf,2025-02-27T06:15:21.990000 CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 -CVE-2025-1300,1,1,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000 +CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000 CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000 -CVE-2025-1319,1,1,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 +CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000 @@ -280752,15 +280753,15 @@ CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53 CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000 CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000 CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000 -CVE-2025-1746,1,1,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000 -CVE-2025-1747,1,1,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000 -CVE-2025-1748,1,1,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000 -CVE-2025-1749,1,1,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000 +CVE-2025-1746,0,0,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000 +CVE-2025-1747,0,0,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000 +CVE-2025-1748,0,0,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000 +CVE-2025-1749,0,0,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000 CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000 CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000 CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000 CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000 -CVE-2025-1776,1,1,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000 +CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -280907,29 +280908,29 @@ CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99d CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000 CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000 CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000 -CVE-2025-21184,0,0,176160e0714d2f36cd4fbe06ebd53804dcc2c0a32ceb6ff9aa34164d56b4a8be,2025-02-11T18:15:30.180000 +CVE-2025-21184,0,1,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000 CVE-2025-21185,0,0,382559bc0e85e942334285c772283cee8d0ca5a4b02a81c52925c66dc4c27526,2025-02-07T21:06:14.873000 CVE-2025-21186,0,0,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000 CVE-2025-21187,0,0,05994f278acb907e9de51acc1037aa859f6c5afa8dace166ad321c325a389481,2025-02-05T19:14:06.093000 -CVE-2025-21188,0,0,d7b111ff774208de399abaa7106629ded0401669785b4e7d276976a329fcb4c6,2025-02-11T18:15:30.403000 +CVE-2025-21188,0,1,b31daea4bb469ad7d6730cf1515cfeaf51d8ab46128508537630adf914f3c6d0,2025-02-28T16:02:50.353000 CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000 -CVE-2025-21190,0,0,07646213243484771acd05c18315f79affbd3ab1f88425845bb63026f32e5249,2025-02-11T18:15:30.610000 +CVE-2025-21190,0,1,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49d1c,2025-02-28T16:02:50.353000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 -CVE-2025-21198,0,0,30ced4bcee2342c009365afe74226ad51767dba5f3716858f2213f4790dc210c,2025-02-11T18:15:31.020000 -CVE-2025-21200,0,0,6ab25dc0f13c1b559fcf2fc559f0570c61cd1162be881ce79b488a4181e69ae1,2025-02-11T18:15:31.203000 -CVE-2025-21201,0,0,d2413a74168a0176b2012cd098348307d5637137afb19e0de2733c18dfa6d511,2025-02-11T18:15:31.407000 +CVE-2025-21198,0,1,222e32f01b9e38e4737a53b6906c9486a61c90514139fa02b4604a18d9475dfb,2025-02-28T16:02:50.353000 +CVE-2025-21200,0,1,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000 +CVE-2025-21201,0,1,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 -CVE-2025-21206,0,0,a02355978bda2794140bd082fd4bb1ad68e34b4630d7bec026a9c3c3f9e70073,2025-02-11T18:15:31.610000 +CVE-2025-21206,0,1,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 -CVE-2025-21208,0,0,b0a53ebd1070215b1bcd39c99be1f27e3e7b9ead96e6fc3a22f33f6cf9aad8ba,2025-02-11T18:15:31.793000 +CVE-2025-21208,0,1,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000 CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000 CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000 -CVE-2025-21212,0,0,aacb1bf84eb558b2bb4a198390eb40b2a485f936654ed11ea4df089503cbb313,2025-02-11T18:15:31.980000 +CVE-2025-21212,0,1,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000 CVE-2025-21213,0,0,528a66554547e026ef0c9b0b0fa09fbf1c8980822bfea86508e8a2b2b44cab58,2025-01-27T18:40:41.820000 CVE-2025-21214,0,0,b4b935621385a9108dcb42d4939dc75aba798e00e57001b21bdc03438f9edeb9,2025-01-27T18:40:22.427000 CVE-2025-21215,0,0,d2a7a3bab7c47b0d09e64e875649c7b8760c68d5eb2f91a478aa121dc7ec1b54,2025-01-27T18:38:36.757000 -CVE-2025-21216,0,0,0cbb9ca36d7650fef5802048880f5ab67aa53da9ffbd219a6bd893857b2720e2,2025-02-11T18:15:32.177000 +CVE-2025-21216,0,1,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1337,2025-02-28T16:02:50.353000 CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000 CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000 CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 @@ -280964,12 +280965,12 @@ CVE-2025-21250,0,0,4e89a566438f1e28e8838350c59192f7c8bae0fa09d47d1f5f0f32355a4e8 CVE-2025-21251,0,0,5440266405ae4f5a1eea13ba92fdc75258561cea9d4f2a0de5b103c45023d533,2025-01-24T21:54:57.333000 CVE-2025-21252,0,0,6055e1c3e54e765508a0901e6591be173ca3b23ac49a425f1555d0244d559b99,2025-01-24T21:55:05.360000 CVE-2025-21253,0,0,998ca5933add3987f50ef40acf3b400fadb9546f5a2e9bc579c9e6ccaab029f6,2025-02-11T22:18:40.563000 -CVE-2025-21254,0,0,4bea76efb0bf23622a0abec3d73b3f9e14acca1cd80277710ecd589ef6304774,2025-02-11T18:15:32.450000 +CVE-2025-21254,0,1,910332dc041760d9bcacf4b45917e760de978adbf1ed3ea64c0f0eb9de810eb0,2025-02-28T16:02:50.353000 CVE-2025-21255,0,0,8f8621218daa5ece83eff9b164b167c141187b12e766fb110978adaf1f9c2e14,2025-01-27T18:48:06.630000 CVE-2025-21256,0,0,046fe33676648d49ab958cea06795409b133ff67b2e397e47021fff2b0522138,2025-01-27T18:48:24.467000 CVE-2025-21257,0,0,a4aa8eb764428591988a4a9138451d22d056f236bcba642d77cd9ec1175f53f8,2025-01-27T18:48:34.057000 CVE-2025-21258,0,0,1f595e4730f0a0101ec7c6ff9cdba409af8fa944714e620a4a15245fbce00d59,2025-01-27T18:48:41.780000 -CVE-2025-21259,0,0,d7b0093a133cb996a3cdc94dbca5e662a9f75469a51e68e8653813fca7fcf142,2025-02-11T18:15:32.643000 +CVE-2025-21259,0,1,8612071202f3d3592dfe29f2bd8e2314128424dcfd6444cf3765d46d69eb3ffb,2025-02-28T16:02:50.353000 CVE-2025-21260,0,0,0a7c1f91b0bf465a1abd98448dde131c6cb51ed7e169790e660636d55e49b3fd,2025-01-27T18:48:49.733000 CVE-2025-21261,0,0,4959e566283cea5c3896dc096def632c73bb2ea004186a297dc44c88399b27c3,2025-01-27T18:49:17.243000 CVE-2025-21262,0,0,53158e77111cde0b4bd12b84c347b79f0eb1bff1360ae5aad148e2597a850e89,2025-02-07T15:18:05.707000 @@ -281031,7 +281032,7 @@ CVE-2025-21318,0,0,5ff3710adc6b941daeb26737ee7866486d9c863941517d982a3a97a2f0786 CVE-2025-21319,0,0,f438a23881d0da34e77dbbeb756804186ca74b144b3c3080f26cf29fa51052e5,2025-01-22T14:44:50.860000 CVE-2025-21320,0,0,2bf5b9d6da8e13f0983ed08dc9cf0a61539e484ef9e6c51d78636785e0ee89e5,2025-01-22T14:45:53.317000 CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7df1d,2025-01-22T14:46:12.787000 -CVE-2025-21322,0,0,36afae68f9b6dac0a27406f76009dfe495c605cb1fe6c331fac0678ef1b2abae,2025-02-11T18:15:33.027000 +CVE-2025-21322,0,1,a36700e623b7042775efcb047c6ac1b4f686ce001f46283148f214e3a99ff95a,2025-02-28T16:02:50.353000 CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000 CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000 CVE-2025-21325,0,0,1e9ac8e59ea270ba0213d9228cab1f528312c5bc6be8058bf3244a2b7017b22f,2025-02-07T15:21:31.407000 @@ -281046,7 +281047,7 @@ CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000 -CVE-2025-21337,0,0,3c3423720bfe0d3d5072f95cc233449f86d4cbb35a1665fae8eb0916093a452f,2025-02-11T18:15:33.217000 +CVE-2025-21337,0,1,4ecd6e025d7ebaf7e8da468d73429ad6ccf72512bb4d690335b019c7f0ef0c4d,2025-02-28T16:02:50.353000 CVE-2025-21338,0,0,ab086dfca1b49b499ba269066d1300889796e4ccce139b627f3e11f636e5ba00,2025-01-21T20:08:44.550000 CVE-2025-21339,0,0,442e09cebfc2b51a14d5657fd8bad9e56aae7d3e9ea789a26fb84dd1f483d156,2025-01-21T20:11:14.430000 CVE-2025-21340,0,0,47a95b98bc1be24a98506d39df5e3299bee8f816a1a17f7db6df116c0f66f94c,2025-01-21T19:46:40.997000 @@ -281056,10 +281057,10 @@ CVE-2025-21343,0,0,0e6138632cbd4475bd4cf71380d93c68f5d11ac4e740335bf785ce7eae137 CVE-2025-21344,0,0,77d0aae01883902f81c0082b1fd6e206aef82974cb0e1c18fa53c6191a390b22,2025-01-21T19:51:39.647000 CVE-2025-21345,0,0,ac230bebff6a1de687bcf2e0076c3320e327f5480e428ca1278d4856df31bf4d,2025-01-21T19:52:00.833000 CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b9d8,2025-01-21T19:29:19.320000 -CVE-2025-21347,0,0,7d247979bf64f9ac010be1587545cceb03684f90571ae4a0b943cddb699e58dc,2025-02-11T18:15:33.497000 +CVE-2025-21347,0,1,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000 CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000 -CVE-2025-21349,0,0,6d368976201e52b2580e8a9496c7d5c8b2e92a3335a67efb6eb9f1e83d33b8cc,2025-02-11T18:15:33.697000 -CVE-2025-21350,0,0,afdf915978914de12ddb47f8080382e5c3b27b9e602062b6fd9ccfc1c9cd23c8,2025-02-11T18:15:33.903000 +CVE-2025-21349,0,1,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000 +CVE-2025-21350,0,1,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000 CVE-2025-21351,0,0,48fcf1f43b1c92276907ee87c085abb066108b8d3a5f6a626a70e01ac00f8d1a,2025-02-11T18:15:34.113000 CVE-2025-21352,0,0,a81d34aef4d981cd5666fd3fb8eca70146e26df755619e866a1140df31ff66cc,2025-02-11T18:15:34.310000 CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000 @@ -281476,11 +281477,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85 CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000 CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 -CVE-2025-22270,1,1,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000 -CVE-2025-22271,1,1,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000 -CVE-2025-22272,1,1,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000 -CVE-2025-22273,1,1,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000 -CVE-2025-22274,1,1,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000 +CVE-2025-22270,0,0,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000 +CVE-2025-22271,0,0,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000 +CVE-2025-22272,0,0,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000 +CVE-2025-22273,0,0,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000 +CVE-2025-22274,0,0,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000 @@ -281929,7 +281930,7 @@ CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000 CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000 CVE-2025-23045,0,0,5cf9ac707be65a7cb86de834c6707744da7ff35db3dfb07c7b6442c00c475c3a,2025-01-28T16:15:40.690000 -CVE-2025-23046,0,1,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000 +CVE-2025-23046,0,0,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000 CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 @@ -281950,7 +281951,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881 CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000 CVE-2025-23081,0,0,88335d5d07bd744f2fedc19f5e2fa983c6c0a68ed633dfc146bea9e424067900,2025-02-18T22:15:18.257000 CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 -CVE-2025-23083,0,1,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000 +CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000 CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000 @@ -282476,7 +282477,7 @@ CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c81 CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000 CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000 -CVE-2025-24085,0,1,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000 +CVE-2025-24085,0,0,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000 @@ -283012,7 +283013,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000 CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000 CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000 -CVE-2025-25192,0,1,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000 +CVE-2025-25192,0,0,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000 CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000 @@ -283052,15 +283053,15 @@ CVE-2025-25299,0,0,3b24acf1d2004d8b4c6aca494f2152b620141ac014e17849f142b2b49de11 CVE-2025-25300,0,0,b7e8b6eadd3a124fef94cf4aa5497d00354ff8a753d773c320d25ce607eb8590,2025-02-18T19:15:28.957000 CVE-2025-25304,0,0,788bdf6a18db5f968ef26eda5d9694e7483d0ff6e02996c3186ccc8ce04eb43e,2025-02-14T20:15:36.903000 CVE-2025-25305,0,0,3bc54120ca4b8dd20d29c84d0022ea008e0f61f5bc4dbbe96dcffeee4c227201,2025-02-18T19:15:29.083000 -CVE-2025-25323,0,0,9d54f6ab903f7d667d98dd6d95d826ddc61bd41984daa807a0cea6e5a7b6672c,2025-02-27T16:15:39.637000 -CVE-2025-25324,0,0,7416fec2baed5a33bce83e714c820e6bbedabfbd40ca8cfcf862246456e22209,2025-02-27T16:15:39.760000 -CVE-2025-25325,0,0,c86828d940531de1f9ba9a0442c7b2c96402c4863bc6449fb0dd3ed1d3adb216,2025-02-27T16:15:39.870000 -CVE-2025-25326,0,0,955c851f345060263e9fe55f19172f235fd67cd8788d63ce6cc31b2512aba192,2025-02-27T16:15:39.987000 -CVE-2025-25329,0,0,c3d3063744527b7041f8dc9250e7653ecc91051586557f2eedaceff36c858bc4,2025-02-27T17:15:16.773000 -CVE-2025-25330,0,0,0a92c33d73444ad205c8dff313935ffbef10654588ff371f4eadabd58b6898b2,2025-02-27T16:15:40.103000 -CVE-2025-25331,0,0,a7e1084033f53e04a790d37a366d6556d7807dba3d23cde5c9e0f882a523fe13,2025-02-27T16:15:40.217000 +CVE-2025-25323,0,1,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000 +CVE-2025-25324,0,1,5b3b99996b198db19221a35dfdee6e3286d56f16572f9eccdf5efd7ec5b7f501,2025-02-28T16:15:38.307000 +CVE-2025-25325,0,1,7ac080e63c68e81f20ebab4d9228091863e1f25a92d142072d332eff1106665c,2025-02-28T16:15:38.457000 +CVE-2025-25326,0,1,1a9fe139d2a10b61db16345be5208a2d5105ee9b72982d34638c81056b3db442,2025-02-28T16:15:38.603000 +CVE-2025-25329,0,1,f8df5c8a4c4e3265c55fb37312bb192f184fb852627dd7f8acac36e50a6f04fc,2025-02-28T16:15:38.760000 +CVE-2025-25330,0,1,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070004,2025-02-28T16:15:38.913000 +CVE-2025-25331,0,1,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000 CVE-2025-25333,0,0,6ec9229dcc048d32377c65843d4940ce53486855d56d23de2a9388232fef0e38,2025-02-27T20:16:05.073000 -CVE-2025-25334,0,0,09f902b448e0e9b7a4421fffc73864efaba3e065c215ef17ffb5bb8d88ce2adc,2025-02-27T16:15:40.463000 +CVE-2025-25334,0,1,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000 CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000 CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 @@ -283073,6 +283074,7 @@ CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820 CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000 +CVE-2025-25461,1,1,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,dbc3563b50545898d3f8b4c30a8e42190486beb767837401e5dfa97eecd0595d,2025-02-26T16:15:16.933000 CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000 CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000 @@ -283082,11 +283084,11 @@ CVE-2025-25472,0,0,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d CVE-2025-25473,0,0,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000 CVE-2025-25474,0,0,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000 CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000 -CVE-2025-25477,0,0,fa83ac139b189320f092d0f9e3e2e1a7bed57d6a30bb1db68ae534b67a375486,2025-02-28T00:15:36.380000 +CVE-2025-25477,0,1,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000 CVE-2025-25505,0,0,c69812bbe3b275d3bc181fb00a5a8c8f1f26c31684ed982db7260503469e7b3d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,de0377abf29412c164b8ddbcc15e82dfdb0b23020e12eca7c6e04a6e73ed3fd7,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,4997c3387297db121e4e9c1042fc244ebe3429ef8058fdf6dffa5196020cd974,2025-02-21T21:15:24.023000 -CVE-2025-25513,0,0,e1943590b94885dd95437dc0873156668d062e8b298f484c30409dc6927e7d11,2025-02-24T22:15:22.807000 +CVE-2025-25513,0,1,043fca8e8841337dff57d4e28c7e510727843dfcc920ce62d1b986adb3261f5b,2025-02-28T16:07:41.847000 CVE-2025-25514,0,0,a88e1a82b61fa77a3d9be210516c051b22e00e5112ab6f4dd2c37a8804d7ed85,2025-02-25T22:15:23.900000 CVE-2025-25515,0,0,12362bebea8038452149ff678950c3baddf6b375c654587a84882561b06de0a2,2025-02-26T15:15:25.327000 CVE-2025-25516,0,0,2cdca73fe7bd0fa4ed6c7d23f220ae85378dc04e2718623592d0f0650288bb83,2025-02-26T15:15:25.507000 @@ -283118,7 +283120,7 @@ CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b23 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 CVE-2025-25727,0,0,eed5aa4e92d3da35936b8898a3baaeb8486976d6506a3be4f81c3be66ac7acb1,2025-02-28T00:15:36.530000 CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314bf22,2025-02-28T00:15:36.680000 -CVE-2025-25729,0,0,1dc91ccbc734b272e128d2f5d34455e76de95ae22cd801e388136dbd2cb156ea,2025-02-28T00:15:36.827000 +CVE-2025-25729,0,1,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000 CVE-2025-25730,0,0,9e2c6f6143351e8d57d454a9cbdf7dde2aaaadac268330af920b7098a53fa3df,2025-02-27T22:15:38.820000 CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 @@ -283171,6 +283173,7 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 +CVE-2025-25916,1,1,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000 CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000 CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000 @@ -283191,12 +283194,14 @@ CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195 CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000 CVE-2025-26013,0,0,681443cbea1aecaac9440a9aad5c73fef9dca35a347aeb9f53f53f8b739a2bc4,2025-02-21T21:15:24.470000 CVE-2025-26014,0,0,4c1a90c8dc606f24e0044dd527fca4e86b8cdadd364a955283c3e7a026ac0a07,2025-02-21T17:15:14.680000 +CVE-2025-26047,1,1,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 CVE-2025-26156,0,0,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000 CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000 +CVE-2025-26263,1,1,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000 CVE-2025-26264,0,0,66de1a3ec09277cf0bb2d99d96048c42039940052291dafb3801b689b4bee37d,2025-02-27T22:15:38.947000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 @@ -283207,6 +283212,7 @@ CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4e CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000 CVE-2025-26325,0,0,159576ddbe22366fba138ea7241c3769634089af321e96d5b630e4afa13ef3de,2025-02-27T22:15:39.057000 +CVE-2025-26326,1,1,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 @@ -283251,7 +283257,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 -CVE-2025-26465,0,1,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000 +CVE-2025-26465,0,0,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000 CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000 @@ -283443,17 +283449,17 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000 CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000 CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000 -CVE-2025-27110,0,1,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 +CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000 CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000 -CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000 +CVE-2025-27133,0,1,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 CVE-2025-27135,0,0,2b4ca3a6c4bb963ede6b8510aa33d7ae3bb4bf8b75f298a6d5163ae954eac93d,2025-02-25T19:15:15.677000 CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000 -CVE-2025-27139,0,1,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000 -CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000 -CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000 -CVE-2025-27142,0,1,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000 -CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000 +CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000 +CVE-2025-27140,0,1,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000 +CVE-2025-27141,0,1,a41b4e712730fea8fc4ff3b257eef40bd5b6d5d5d2766ea09d25a8c5fedfd1f6,2025-02-28T16:07:41.847000 +CVE-2025-27142,0,0,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000 +CVE-2025-27143,0,1,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f851895fd,2025-02-28T16:07:41.847000 CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000 CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000 CVE-2025-27146,0,0,1949c93bb4c1257d1700888fb7aa70bba73c2053b702350dbd7e6c46a590f25c,2025-02-25T20:15:38.030000 @@ -283513,3 +283519,4 @@ CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d502 CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000 CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000 CVE-2025-27399,0,0,047834ae4cb02eb8c620e48e474a23f71c1292e787766a014db687c899a834cc,2025-02-27T18:15:30.380000 +CVE-2025-27400,1,1,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000