diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json index a702c1ab51b..df94bc701a9 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43454", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T20:15:13.593", - "lastModified": "2025-03-10T20:15:13.593", + "lastModified": "2025-03-11T03:15:36.353", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A double free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/102741", diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json index d9620363fdc..8deab01b2a1 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4788.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4788", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.337", - "lastModified": "2024-11-21T07:35:56.633", + "lastModified": "2025-03-11T03:15:36.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json index 59ec8dd7585..f57a9637cd6 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48610", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T20:15:13.713", - "lastModified": "2025-03-10T20:15:13.713", + "lastModified": "2025-03-11T03:15:36.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2. An app may be able to access user-sensitive data." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/102741", diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23511.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23511.json index 43946f0597f..913f5f96676 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23511.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23511.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23511", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.073", - "lastModified": "2024-11-21T07:46:19.780", + "lastModified": "2025-03-11T04:15:20.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json index d5f67c2d5a6..3292edb9780 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0406", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-06T17:15:07.127", - "lastModified": "2024-11-21T08:46:30.900", + "lastModified": "2025-03-11T04:15:22.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2449", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0406", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json index dab7e703db1..19d15aaa166 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12087", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.467", - "lastModified": "2025-02-26T15:15:21.137", + "lastModified": "2025-03-11T04:15:23.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2600", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12087", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json index aafb310c076..9004fc758ec 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12088", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.643", - "lastModified": "2025-02-26T15:15:22.257", + "lastModified": "2025-03-11T04:15:23.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2600", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12088", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json index 003a2e28d0c..6daa31e99a0 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12747", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.830", - "lastModified": "2025-01-14T22:15:26.700", + "lastModified": "2025-03-11T04:15:24.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2600", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12747", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13436.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13436.json new file mode 100644 index 00000000000..2e5d656139a --- /dev/null +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13436.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13436", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-11T04:15:24.357", + "lastModified": "2025-03-11T04:15:24.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Appsero Helper plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.2. This is due to missing or incorrect nonce validation on the 'appsero_helper' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253119%40appsero-helper&new=3253119%40appsero-helper&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d0c31e-1641-48e6-bd3e-47d8afb1b3b8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json index 485d3e8e21c..0d11abfc80b 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44179", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:37.960", - "lastModified": "2025-03-10T19:15:37.960", + "lastModified": "2025-03-11T03:15:37.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sequoia 15. An attacker with physical access to a device may be able to read contact numbers from the lock screen." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json index 74546415798..34495b4d7b6 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44227", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.187", - "lastModified": "2025-03-10T19:15:38.187", + "lastModified": "2025-03-11T03:15:37.340", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json index 6abfadab837..14eebe65568 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54463", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.290", - "lastModified": "2025-03-10T19:15:38.290", + "lastModified": "2025-03-11T03:15:37.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "This issue was addressed with improved entitlements. This issue is fixed in macOS Sequoia 15. An app may be able to access removable volumes without user consent." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json index a725dac00d2..6c9cec1c0dc 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54467", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.387", - "lastModified": "2025-03-10T19:15:38.387", + "lastModified": "2025-03-11T03:15:37.643", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A cookie management issue was addressed with improved state management. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json index 95e3d64ad9e..550c14aa20b 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54546", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.697", - "lastModified": "2025-03-10T19:15:38.697", + "lastModified": "2025-03-11T03:15:37.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json index e1bd00fdebd..4a8cd5bd980 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54558", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.790", - "lastModified": "2025-03-10T19:15:38.790", + "lastModified": "2025-03-11T03:15:37.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A clickjacking issue was addressed with improved out-of-process view handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to trick a user into granting access to photos from the user's photo library." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json index d974b251ac7..550f00a7a35 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T15:15:17.837", - "lastModified": "2024-12-13T18:15:22.507", + "lastModified": "2025-03-11T03:15:38.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -411,6 +411,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:2449", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9675", "source": "secalert@redhat.com", diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json new file mode 100644 index 00000000000..80dce4dedd8 --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-1661", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-11T04:15:24.803", + "lastModified": "2025-03-11T04:15:24.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_text/index.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae7b6fc-2120-4573-8b1b-d5422d435fa5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1828.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1828.json index 5a5f438ea24..da06b7c6301 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1828.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1828.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1828", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-03-11T00:15:11.060", - "lastModified": "2025-03-11T00:15:11.060", + "lastModified": "2025-03-11T03:15:38.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.\n\nCrypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.\n\nIn particular, Windows versions of perl will encounter this issue by default." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json index d3edd594cd8..571549eecbe 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1920", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-10T21:15:40.280", - "lastModified": "2025-03-10T21:15:40.280", + "lastModified": "2025-03-11T03:15:38.630", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,34 @@ "value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json index 9d166aeef0a..3addecb0ccb 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2135", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-10T21:15:40.613", - "lastModified": "2025-03-10T21:15:40.613", + "lastModified": "2025-03-11T03:15:40.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,34 @@ "value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2169.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2169.json new file mode 100644 index 00000000000..e5ab4d66162 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2169.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-2169", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-11T04:15:25.330", + "lastModified": "2025-03-11T04:15:25.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The The WPCS \u2013 WordPress Currency Switcher Professional plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.2.0.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/currency-switcher/trunk/index.php#L1920", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249625%40currency-switcher&new=3249625%40currency-switcher&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253183%40currency-switcher&new=3253183%40currency-switcher&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb24ae0-41d6-4d8f-917c-dfd058a7a49d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json index eb6f5753ad4..c7f631d4c81 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25907", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T22:15:26.533", - "lastModified": "2025-03-10T22:15:26.533", + "lastModified": "2025-03-11T03:15:39.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/save. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/xujeff/tianti/issues/39", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json index 4f608ea898d..86d5b3ef669 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25908", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T22:15:27.150", - "lastModified": "2025-03-10T22:15:27.150", + "lastModified": "2025-03-11T03:15:39.350", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A stored cross-site scripting (XSS) vulnerability in tianti v2.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the coverImageURL parameter at /article/ajax/save." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/xujeff/tianti/issues/40", diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26707.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26707.json new file mode 100644 index 00000000000..d0df801252e --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26707.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26707", + "sourceIdentifier": "psirt@zte.com.cn", + "published": "2025-03-11T04:15:25.093", + "lastModified": "2025-03-11T04:15:25.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@zte.com.cn", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@zte.com.cn", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646470", + "source": "psirt@zte.com.cn" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json index 4bbda35bc56..0e4f01c3e8d 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27913", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T20:15:14.500", - "lastModified": "2025-03-10T21:15:40.430", + "lastModified": "2025-03-11T03:15:40.027", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ diff --git a/README.md b/README.md index 58762350056..33dd570b569 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-11T03:00:19.293505+00:00 +2025-03-11T05:00:20.171336+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-11T02:15:11.120000+00:00 +2025-03-11T04:15:25.330000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284693 +284697 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `4` -- [CVE-2024-12009](CVE-2024/CVE-2024-120xx/CVE-2024-12009.json) (`2025-03-11T02:15:10.590`) -- [CVE-2024-12010](CVE-2024/CVE-2024-120xx/CVE-2024-12010.json) (`2025-03-11T02:15:10.773`) -- [CVE-2024-22340](CVE-2024/CVE-2024-223xx/CVE-2024-22340.json) (`2025-03-11T01:15:33.257`) -- [CVE-2024-41760](CVE-2024/CVE-2024-417xx/CVE-2024-41760.json) (`2025-03-11T01:15:33.427`) -- [CVE-2024-49823](CVE-2024/CVE-2024-498xx/CVE-2024-49823.json) (`2025-03-11T01:15:33.583`) -- [CVE-2025-0062](CVE-2025/CVE-2025-00xx/CVE-2025-0062.json) (`2025-03-11T01:15:33.740`) -- [CVE-2025-0071](CVE-2025/CVE-2025-00xx/CVE-2025-0071.json) (`2025-03-11T01:15:33.917`) -- [CVE-2025-23185](CVE-2025/CVE-2025-231xx/CVE-2025-23185.json) (`2025-03-11T01:15:34.330`) -- [CVE-2025-23188](CVE-2025/CVE-2025-231xx/CVE-2025-23188.json) (`2025-03-11T01:15:34.480`) -- [CVE-2025-23194](CVE-2025/CVE-2025-231xx/CVE-2025-23194.json) (`2025-03-11T01:15:34.630`) -- [CVE-2025-25242](CVE-2025/CVE-2025-252xx/CVE-2025-25242.json) (`2025-03-11T01:15:34.777`) -- [CVE-2025-25244](CVE-2025/CVE-2025-252xx/CVE-2025-25244.json) (`2025-03-11T01:15:34.927`) -- [CVE-2025-25245](CVE-2025/CVE-2025-252xx/CVE-2025-25245.json) (`2025-03-11T01:15:35.080`) -- [CVE-2025-26655](CVE-2025/CVE-2025-266xx/CVE-2025-26655.json) (`2025-03-11T01:15:35.230`) -- [CVE-2025-26656](CVE-2025/CVE-2025-266xx/CVE-2025-26656.json) (`2025-03-11T01:15:35.383`) -- [CVE-2025-26658](CVE-2025/CVE-2025-266xx/CVE-2025-26658.json) (`2025-03-11T01:15:35.533`) -- [CVE-2025-26659](CVE-2025/CVE-2025-266xx/CVE-2025-26659.json) (`2025-03-11T01:15:35.683`) -- [CVE-2025-26660](CVE-2025/CVE-2025-266xx/CVE-2025-26660.json) (`2025-03-11T01:15:35.837`) -- [CVE-2025-26661](CVE-2025/CVE-2025-266xx/CVE-2025-26661.json) (`2025-03-11T01:15:35.993`) -- [CVE-2025-27430](CVE-2025/CVE-2025-274xx/CVE-2025-27430.json) (`2025-03-11T01:15:36.157`) -- [CVE-2025-27431](CVE-2025/CVE-2025-274xx/CVE-2025-27431.json) (`2025-03-11T01:15:36.310`) -- [CVE-2025-27432](CVE-2025/CVE-2025-274xx/CVE-2025-27432.json) (`2025-03-11T01:15:36.467`) -- [CVE-2025-27433](CVE-2025/CVE-2025-274xx/CVE-2025-27433.json) (`2025-03-11T01:15:36.607`) -- [CVE-2025-27434](CVE-2025/CVE-2025-274xx/CVE-2025-27434.json) (`2025-03-11T01:15:36.760`) -- [CVE-2025-27436](CVE-2025/CVE-2025-274xx/CVE-2025-27436.json) (`2025-03-11T01:15:36.920`) +- [CVE-2024-13436](CVE-2024/CVE-2024-134xx/CVE-2024-13436.json) (`2025-03-11T04:15:24.357`) +- [CVE-2025-1661](CVE-2025/CVE-2025-16xx/CVE-2025-1661.json) (`2025-03-11T04:15:24.803`) +- [CVE-2025-2169](CVE-2025/CVE-2025-21xx/CVE-2025-2169.json) (`2025-03-11T04:15:25.330`) +- [CVE-2025-26707](CVE-2025/CVE-2025-267xx/CVE-2025-26707.json) (`2025-03-11T04:15:25.093`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `21` -- [CVE-2024-13159](CVE-2024/CVE-2024-131xx/CVE-2024-13159.json) (`2025-03-11T01:00:03.127`) -- [CVE-2024-13160](CVE-2024/CVE-2024-131xx/CVE-2024-13160.json) (`2025-03-11T01:00:03.127`) -- [CVE-2024-13161](CVE-2024/CVE-2024-131xx/CVE-2024-13161.json) (`2025-03-11T01:00:03.127`) -- [CVE-2024-57968](CVE-2024/CVE-2024-579xx/CVE-2024-57968.json) (`2025-03-11T01:00:03.127`) -- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-11T02:15:11.120`) -- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-03-11T01:00:03.127`) +- [CVE-2022-43454](CVE-2022/CVE-2022-434xx/CVE-2022-43454.json) (`2025-03-11T03:15:36.353`) +- [CVE-2022-4788](CVE-2022/CVE-2022-47xx/CVE-2022-4788.json) (`2025-03-11T03:15:36.760`) +- [CVE-2022-48610](CVE-2022/CVE-2022-486xx/CVE-2022-48610.json) (`2025-03-11T03:15:36.600`) +- [CVE-2023-23511](CVE-2023/CVE-2023-235xx/CVE-2023-23511.json) (`2025-03-11T04:15:20.983`) +- [CVE-2024-0406](CVE-2024/CVE-2024-04xx/CVE-2024-0406.json) (`2025-03-11T04:15:22.860`) +- [CVE-2024-12087](CVE-2024/CVE-2024-120xx/CVE-2024-12087.json) (`2025-03-11T04:15:23.443`) +- [CVE-2024-12088](CVE-2024/CVE-2024-120xx/CVE-2024-12088.json) (`2025-03-11T04:15:23.830`) +- [CVE-2024-12747](CVE-2024/CVE-2024-127xx/CVE-2024-12747.json) (`2025-03-11T04:15:24.073`) +- [CVE-2024-44179](CVE-2024/CVE-2024-441xx/CVE-2024-44179.json) (`2025-03-11T03:15:37.160`) +- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-11T03:15:37.340`) +- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-11T03:15:37.497`) +- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-11T03:15:37.643`) +- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-11T03:15:37.790`) +- [CVE-2024-54558](CVE-2024/CVE-2024-545xx/CVE-2024-54558.json) (`2025-03-11T03:15:37.937`) +- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2025-03-11T03:15:38.097`) +- [CVE-2025-1828](CVE-2025/CVE-2025-18xx/CVE-2025-1828.json) (`2025-03-11T03:15:38.440`) +- [CVE-2025-1920](CVE-2025/CVE-2025-19xx/CVE-2025-1920.json) (`2025-03-11T03:15:38.630`) +- [CVE-2025-2135](CVE-2025/CVE-2025-21xx/CVE-2025-2135.json) (`2025-03-11T03:15:40.230`) +- [CVE-2025-25907](CVE-2025/CVE-2025-259xx/CVE-2025-25907.json) (`2025-03-11T03:15:39.160`) +- [CVE-2025-25908](CVE-2025/CVE-2025-259xx/CVE-2025-25908.json) (`2025-03-11T03:15:39.350`) +- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-11T03:15:40.027`) ## Download and Usage diff --git a/_state.csv b/_state.csv index db3cb7515ee..577fa0b8091 100644 --- a/_state.csv +++ b/_state.csv @@ -209145,7 +209145,7 @@ CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000 CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000 CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000 -CVE-2022-43454,0,0,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000 +CVE-2022-43454,0,1,1ac30d91d0f3fbdec6270c6a16edf2417b1c1220cea8e38013f239ffc8fb68cc,2025-03-11T03:15:36.353000 CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000 CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000 CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000 @@ -212200,7 +212200,7 @@ CVE-2022-47876,0,0,fac63b993d6bfd89b7e4be4215b63f05effcc86d3db0ae7d640178e54b245 CVE-2022-47877,0,0,0b1de0eb7e502955d2bb7008421a44c1331d179ad7cbd0356d21cd2d5277b52d,2025-01-30T16:15:27.900000 CVE-2022-47878,0,0,a7952d6ecc8a2edaecb9f97d906a906fb5d9204d6ecf5083fd86b30c19b9d2dc,2025-01-30T16:15:28.067000 CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 -CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000 +CVE-2022-4788,0,1,7e79df388961de8004d4ad88f6a4c4b324c11edb81a92bedb1df161b47320b50,2025-03-11T03:15:36.760000 CVE-2022-47880,0,0,6912960d6442fdd7ed92092a03e4fe22fbfc3cd1e68d8e2a73464e9293478ab9,2025-01-27T17:15:10.117000 CVE-2022-47881,0,0,34fa102bc5505e6f5f8a5f6eb9d86c65176a3776a73b2e6594f74a0441654a64,2024-11-21T07:32:27.750000 CVE-2022-4789,0,0,44a64395cbd23efda5f94654d2800ee9169619339d67c212a50911f80f7d1374,2024-11-21T07:35:56.747000 @@ -212696,7 +212696,7 @@ CVE-2022-48604,0,0,b7085c3e4c6adaacb59f90e568dbbe0fd9c06f7150463b110ec956aae9dc3 CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000 CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000 CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000 -CVE-2022-48610,0,0,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000 +CVE-2022-48610,0,1,07ae3585b336264d90bf547ad24620e89c4e5410671da1970b635cf31e02b96e,2025-03-11T03:15:36.600000 CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000 CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000 CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000 @@ -218790,7 +218790,7 @@ CVE-2023-23507,0,0,0e671d252b1530d81e62fb1a72978a3ce7e376bcdb1a691cda96306a8a02e CVE-2023-23508,0,0,22ca610a47800f4e53008571c1f7d3e3efef0aff85fd5bbdac3583f465614325,2024-11-21T07:46:19.553000 CVE-2023-2351,0,0,3a82f210ae18463b28fb54c6272265e375b61557202f70072719d8e76667f500,2024-11-21T07:58:26.390000 CVE-2023-23510,0,0,a048f499883454a8531384714691524e2244fef480d3696bc91072aa63bc437e,2024-11-21T07:46:19.670000 -CVE-2023-23511,0,0,a2535d89cd9b39ef1ae6039643d4492f020e6c4e7050eec8d08f573c27f0b299,2024-11-21T07:46:19.780000 +CVE-2023-23511,0,1,79be774f2aec712d95f9d4909cdb05723f704493f639854978b6713057ca5803,2025-03-11T04:15:20.983000 CVE-2023-23512,0,0,4e2ff213db2e8b1c5edf97f8499254120d2881ff4802f92e3a5a52458f10572f,2024-11-21T07:46:19.900000 CVE-2023-23513,0,0,09bcbdc6eb54ad0ea39978f5767d4a0e9af96b65c2ea1f28367e4b3aae576c5f,2024-11-21T07:46:20.017000 CVE-2023-23514,0,0,316c0b5d15a623d1e0da5898db1b60d85cba18fe65fdb76b85221a04fd8edbab,2024-11-21T07:46:20.207000 @@ -243705,7 +243705,7 @@ CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecd CVE-2024-0403,0,0,c9b6ae724b586a946619c8ef0c81865180cac480da67df518481991ba669f2a4,2024-12-31T17:35:53.340000 CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000 CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000 -CVE-2024-0406,0,0,32138307a225ce5a983374924bf05097f2fb12720ed12df127395b83cccf520f,2024-11-21T08:46:30.900000 +CVE-2024-0406,0,1,6cd19b7da24ac933b612f0e0a8b08f4485367d08cafc92cc3bbc99b9e333d5c7,2025-03-11T04:15:22.860000 CVE-2024-0407,0,0,bf7446b50e0f1a0b381fa6716fb89f82f79db67f0ab4fa78f751b5ca6c555100,2024-11-21T08:46:31.027000 CVE-2024-0408,0,0,e030a2f701c930b593d7d8ff457fa175da0a5c43fe41606146dc8b73cdf52f60,2024-11-21T08:46:31.200000 CVE-2024-0409,0,0,9ef4dd3ff45e8aeeb4d2ab9d9226ad37168b774e60bec3b6e361da09f5c22590,2024-11-21T08:46:31.373000 @@ -245390,7 +245390,7 @@ CVE-2024-1125,0,0,4d0b5fc967895869908236f67000c1641c8e7f2139240de53289a37094eb17 CVE-2024-11250,0,0,1d911eaa132e9450b36dc6c8a663ef95ec738de06fd7b57aac724c63248cb110,2024-12-10T17:22:10.547000 CVE-2024-11251,0,0,305bbf1592d4eaa4534e1c7e8c0a204d7446c058354be3d67d2a086abef32e2f,2024-11-18T17:11:56.587000 CVE-2024-11252,0,0,e3a49be80375d7d6eb07a5b8ea5fe1ead6b27bf2476ff0719e421b392fb0b61d,2024-11-30T06:15:17.580000 -CVE-2024-11253,1,1,3858460f9fe4ac1e49b297c8c2e71363b10100444463672160b196b2fbb17ec2,2025-03-11T02:15:10.043000 +CVE-2024-11253,0,0,3858460f9fe4ac1e49b297c8c2e71363b10100444463672160b196b2fbb17ec2,2025-03-11T02:15:10.043000 CVE-2024-11254,0,0,12fbeae61db8ca9bcd036368ccbe2be9dd932023914350fb32d0ee40fe1214be,2025-02-21T20:44:25.797000 CVE-2024-11256,0,0,1a837548036f49b724cb7ad582e9538d46d656e447bd851b0561c9868934299e,2024-11-19T21:49:04.790000 CVE-2024-11257,0,0,02e2cb90c3265c0c393e258ef6e28870b3aa9ad15c8da8d1d0ca2d0bcba03821,2024-11-19T21:24:40.443000 @@ -246135,9 +246135,9 @@ CVE-2024-12005,0,0,324bcdf3eef33c86a215a7fc4463dbf5b3c99ef12c1bafdfd55a84f361ad3 CVE-2024-12006,0,0,36f18b21148a0ee67abb3880ad49f0f8c4ad811090df2db1dbbfc11fa749b0af,2025-01-16T21:30:14.640000 CVE-2024-12007,0,0,627d69eb6e5a241a3ef4f6b964cb6e445ca6bf5f36dffa4224a97a10758c5340,2024-12-11T03:16:24.473000 CVE-2024-12008,0,0,c6233d44f9ccc9833da766f9738aceabd906dd7310efd71abd35e6e9b4e35a50,2025-01-16T21:30:41.017000 -CVE-2024-12009,1,1,d56a357e5c10017983a8cb5e95d52c49178cbf14087498c585e299048e9426fc,2025-03-11T02:15:10.590000 +CVE-2024-12009,0,0,d56a357e5c10017983a8cb5e95d52c49178cbf14087498c585e299048e9426fc,2025-03-11T02:15:10.590000 CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000 -CVE-2024-12010,1,1,0f6927bc518388d5560c28856b0afbe9de95ec1ae877f94dbe9aa1b4addeab60,2025-03-11T02:15:10.773000 +CVE-2024-12010,0,0,0f6927bc518388d5560c28856b0afbe9de95ec1ae877f94dbe9aa1b4addeab60,2025-03-11T02:15:10.773000 CVE-2024-12011,0,0,0f6f68e8d37d4c19c05769b393e533228632d01f9d5845f4745581d3d1c7e951,2025-02-13T16:15:43.750000 CVE-2024-12012,0,0,14e98b5ac64b0045db87c72ad7846ff409f949761b743388daf77e1918c1b3cf,2025-02-13T16:15:43.913000 CVE-2024-12013,0,0,0cd473350b3884feea6dfce21eb5c412ab8c70283b9ee64d68edf79d425156af,2025-02-13T16:15:44.050000 @@ -246199,8 +246199,8 @@ CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753 CVE-2024-12084,0,0,09f03b9789ff761106bb1f3be0d03a40a943d9b32f44fa2457c69ada372f11ea,2025-02-26T14:15:10.473000 CVE-2024-12085,0,0,a26c674a2ee75c06843a39f7d7fc7c1d719143bc404b993b02db8dda47ca8141,2025-02-26T15:15:20.790000 CVE-2024-12086,0,0,eddb6eda122eaf0dac2b18ce83df4e5fbbd9d253ae3afef485d18d17f7300647,2025-02-26T15:15:21.020000 -CVE-2024-12087,0,0,356c1c83ddab7432222e0e7b9cf68a9947336514f9d4819aca0b6660c9f7f918,2025-02-26T15:15:21.137000 -CVE-2024-12088,0,0,5de5522e1c5994069083df43aa98684503a6cd5536902d1b0e828e78682b8730,2025-02-26T15:15:22.257000 +CVE-2024-12087,0,1,dab16f771659d9b3a68e5b4f67e018530e819147e3a54748641c8439474a16b2,2025-03-11T04:15:23.443000 +CVE-2024-12088,0,1,840c3f7106724c89f22b5bd71291f0d46922a187018b26f01ff24d06752ceb27,2025-03-11T04:15:23.830000 CVE-2024-12089,0,0,e4693d0f49f7bcd8f49a3c46cbf99b45117c9aeb9696a4344a79bacac3eaba78,2024-12-16T15:15:06.250000 CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000 CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000 @@ -246803,7 +246803,7 @@ CVE-2024-12742,0,0,585984e2f53d23e5a2e5d8f6c2e3627ccc17d0604bc97a0fb417773511041 CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000 -CVE-2024-12747,0,0,ebc91191d07badeb79dc6f2f702ff942b05784a8436470a9a76f1e6a5f2c2932,2025-01-14T22:15:26.700000 +CVE-2024-12747,0,1,ef1dee418767d9a46c5e537d51089f78a8367b2f683d5e5109a29e5dd4061247,2025-03-11T04:15:24.073000 CVE-2024-12749,0,0,5aa8a13fb5a49d8a51055450e8b5d54601f3a9edde2e14d012673c5b4cca8042,2025-01-29T15:15:16.223000 CVE-2024-1275,0,0,8eab781ab1c4b6181e657741b9361b7d07c5c975bf66f07a41ffcd3de9380867,2024-11-21T08:50:12.913000 CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca134,2024-12-30T21:15:06.130000 @@ -247164,10 +247164,10 @@ CVE-2024-13155,0,0,6682537fa9f5844e5906fbe79fbac9ddfaae9e2af1434030859c114baf0c7 CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000 CVE-2024-13157,0,0,80e03db47d7aeaaff8ebfe5d3bb0d4e0a672091f1b6d6e0617afb0f75c61e9a3,2025-01-31T09:15:06.617000 CVE-2024-13158,0,0,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000 -CVE-2024-13159,0,1,1b0544d647dd2528d8ae3f2ee13f7372d59bd46267b4cbd9536792835f820301,2025-03-11T01:00:03.127000 +CVE-2024-13159,0,0,1b0544d647dd2528d8ae3f2ee13f7372d59bd46267b4cbd9536792835f820301,2025-03-11T01:00:03.127000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 -CVE-2024-13160,0,1,308834317ed661e80a60b310d3aff3e4287b3e85ca7c5932af9c4c419816b460,2025-03-11T01:00:03.127000 -CVE-2024-13161,0,1,2f940d0c2471f99f0a6167e8617f46db1e105823fb948909d142ca5e370a1f58,2025-03-11T01:00:03.127000 +CVE-2024-13160,0,0,308834317ed661e80a60b310d3aff3e4287b3e85ca7c5932af9c4c419816b460,2025-03-11T01:00:03.127000 +CVE-2024-13161,0,0,2f940d0c2471f99f0a6167e8617f46db1e105823fb948909d142ca5e370a1f58,2025-03-11T01:00:03.127000 CVE-2024-13162,0,0,da666b41a7d98c9e3b9af1e27b198252acb00cdb0ecec4980b750fd64eed2fe4,2025-01-14T18:15:26.840000 CVE-2024-13163,0,0,bfd7b222341b4eeb132c53cc185879949445b8743e8f9a1b980d00c942a7fc15,2025-01-14T18:15:27.033000 CVE-2024-13164,0,0,5e00467d585bd74d24cb5c4fbdec02b53f0efb7f0a08f8e18116c4133fca3a2a,2025-01-14T18:15:27.257000 @@ -247435,6 +247435,7 @@ CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4ae CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 CVE-2024-13435,0,0,b98b757f5665b8bd47ba999629316aa1ac42c88a1acae5a8c7aa5011428e90cd,2025-02-25T18:27:07.640000 +CVE-2024-13436,1,1,d9f42e612ff8ce7ceeb517e49a12e470fa727a720bc2ecb4d86a7c619f906cd5,2025-03-11T04:15:24.357000 CVE-2024-13437,0,0,7a5ba53fa8ac2f3dff3b1f88d94ad8c9cb0d268cb8579ff8722f7f28d5b5ca1c,2025-02-25T18:24:21.563000 CVE-2024-13438,0,0,368c1d2de10ebc37c011dce97979d0a38fdf4ed2a5b5de964fc559be5e3d5055,2025-02-21T15:44:25.023000 CVE-2024-13439,0,0,2f059501bc7533dd49b97287e80dce5e31332841fdcf6ed4dd7d300b721f1877,2025-02-24T12:32:54.363000 @@ -250531,7 +250532,7 @@ CVE-2024-22337,0,0,176b2bb99f38a37cc5c4bceef64e53e66f0257dfccc9a4bf213596d99f663 CVE-2024-22338,0,0,2f5d103b20e176fcbbf750834003442156af5ed8589bffd33826dcce94cd2d4d,2024-11-21T08:56:05.150000 CVE-2024-22339,0,0,f84cb1f36ac458831eefd9cd784c894dbf751b04ff3bdf01cd3577255e1fd032,2025-01-29T21:27:46.043000 CVE-2024-2234,0,0,2580af67855545545b0dbe2146fd22b02b33bca58d42a33b34f8d1d966926c31,2024-11-21T09:09:18.983000 -CVE-2024-22340,1,1,951527e0ac666fcb519e977a9eafb3a71bcc714b4ee291c7be180a2af14480f1,2025-03-11T01:15:33.257000 +CVE-2024-22340,0,0,951527e0ac666fcb519e977a9eafb3a71bcc714b4ee291c7be180a2af14480f1,2025-03-11T01:15:33.257000 CVE-2024-22341,0,0,3cfdfded8ccd1f5ef6f6a7285669b2b2725fa7742cae96369e40764326933e55,2025-02-22T01:15:10.507000 CVE-2024-22343,0,0,a3ffc2e94274da5793eb1457be21bec9aa8bc9334ca3ffb82f0713c176cb924d,2025-01-14T21:09:37.513000 CVE-2024-22344,0,0,175ecdaf0188d9abe716b262cfd96bf9fb3ed5588248fdac15f91aea57c0f76b,2025-01-14T21:11:47.730000 @@ -265190,7 +265191,7 @@ CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 CVE-2024-41757,0,0,adb5f4b542a7b16af6b71d1e87a048661b9da0542f10941d3eef8a15957fc294,2025-03-04T16:58:06.783000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 -CVE-2024-41760,1,1,86224cacb935567f918b11a5b43afd8ca20b995e8b28b4d1f5f292e535b9c69e,2025-03-11T01:15:33.427000 +CVE-2024-41760,0,0,86224cacb935567f918b11a5b43afd8ca20b995e8b28b4d1f5f292e535b9c69e,2025-03-11T01:15:33.427000 CVE-2024-41761,0,0,48d0303faeacb5aea64f43156f94a0affd943a18971bba4b04fb6042b87c2c03,2025-01-31T15:26:34.900000 CVE-2024-41762,0,0,c1974aea0e06b2927c18784e57637a55268819be3644cbae33cf4f7fc7ed3224,2025-01-31T15:27:03.190000 CVE-2024-41763,0,0,94c378f8474aa53dee22239e59e2b4c07cea8d922818f488d7813a8a5b926f47,2025-01-04T15:15:06.017000 @@ -267286,7 +267287,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000 -CVE-2024-44179,0,0,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000 +CVE-2024-44179,0,1,8738cc3384fee9866b0689839324327a845dbe6b17224c700f40bed740080821,2025-03-11T03:15:37.160000 CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000 CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000 CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000 @@ -267331,7 +267332,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 -CVE-2024-44227,0,0,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000 +CVE-2024-44227,0,1,78991226d342639bea540782d397663c7852f11a30eade90b3ee93859533b808,2025-03-11T03:15:37.340000 CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 @@ -271100,7 +271101,7 @@ CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96 CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000 CVE-2024-49819,0,0,18989ee02215782dbaa36dd11585d529ff7cb27112e595064942a9ff9397ee70,2025-01-10T17:52:26.793000 CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452731,2025-01-10T17:42:53.707000 -CVE-2024-49823,1,1,e225e98bc3abe406bdaebed8b0b3c4551bcb6ecc828b83e5ab3aa8d6d3a1f49e,2025-03-11T01:15:33.583000 +CVE-2024-49823,0,0,e225e98bc3abe406bdaebed8b0b3c4551bcb6ecc828b83e5ab3aa8d6d3a1f49e,2025-03-11T01:15:33.583000 CVE-2024-49824,0,0,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000 CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef05a,2025-01-29T18:07:43.813000 CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 @@ -274602,10 +274603,10 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000 CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000 -CVE-2024-54463,0,0,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000 +CVE-2024-54463,0,1,22cec7522a63aea69b5e7085098fbc7e6f3636959f62bdae4b656da8177bd3e6,2025-03-11T03:15:37.497000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 -CVE-2024-54467,0,0,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000 +CVE-2024-54467,0,1,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 @@ -274677,13 +274678,13 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 -CVE-2024-54546,0,0,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000 +CVE-2024-54546,0,1,3d121a1d3cbf889806670100e4c6e412de58482ef60a6e52ad9ac16749687ca9,2025-03-11T03:15:37.790000 CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 -CVE-2024-54558,0,0,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000 +CVE-2024-54558,0,1,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -276410,7 +276411,7 @@ CVE-2024-57964,0,0,60e211b17010106ead87fc4560e1e4ffe78e9e25a18b2e6877df7f7f9b319 CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 -CVE-2024-57968,0,1,748bdc71aa3e23e83c5127d55ec69a4684fe8d0eefc6772c43b09e95ac08b237,2025-03-11T01:00:03.127000 +CVE-2024-57968,0,0,748bdc71aa3e23e83c5127d55ec69a4684fe8d0eefc6772c43b09e95ac08b237,2025-03-11T01:00:03.127000 CVE-2024-57969,0,0,8a2052e46457143381617c41d784a01bcfd413646c5ba70b070b95c9aa759ff0,2025-02-14T07:15:32.340000 CVE-2024-57970,0,0,4db4cc3cdc42f255941d980da801a4e2e9f8b4ba6d1c25a10de778120606a2ba,2025-02-18T17:15:19.130000 CVE-2024-57971,0,0,19f9693c2a947ecc81adc9515f9451f49c9c0497b8a17c88b011da939c705fcc,2025-02-16T04:15:23.077000 @@ -279916,7 +279917,7 @@ CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c CVE-2024-9672,0,0,86cfa21f9d605c119ad8f12206e2a4e62457c3e0d7e7be3b9be9abdd26e1b1e9,2025-01-30T14:55:08.713000 CVE-2024-9673,0,0,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000 CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,0,00d4dc2f1e7706c2dbe94ebff288188d87800560d2f4c32185d599f287de35c6,2024-12-13T18:15:22.507000 +CVE-2024-9675,0,1,d4bb4d35f7159f3f0c08a87289c65cedab79bd86311019345497008fa7e339e5,2025-03-11T03:15:38.097000 CVE-2024-9676,0,0,5ea8ef35b3d36cfd8e2fda2ec17f1b3f548c4977ed9f067b712331b5e46c57ce,2025-02-07T05:15:12.250000 CVE-2024-9677,0,0,8ac7fd75efed77835a38e0d5d30fbebdcc1b6d67032d9bfdfc464e20115a7f11,2024-12-05T22:11:15.217000 CVE-2024-9678,0,0,8a9aac36cdd1afadf3a2846ff6bcb7bda613879cb4254453bb0b517c3a415a98,2024-12-16T07:15:06.917000 @@ -280214,7 +280215,7 @@ CVE-2025-0058,0,0,8c854cc3b9cd8d37f23bdcb243a1d6a5a5ec966a10c671e68823b0f04149de CVE-2025-0059,0,0,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef539168b,2025-01-14T01:15:16.190000 CVE-2025-0060,0,0,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000 CVE-2025-0061,0,0,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000 -CVE-2025-0062,1,1,1402743f49bb8649f04181d086cf138421faa52e408a12d4c4c721c080184e72,2025-03-11T01:15:33.740000 +CVE-2025-0062,0,0,1402743f49bb8649f04181d086cf138421faa52e408a12d4c4c721c080184e72,2025-03-11T01:15:33.740000 CVE-2025-0063,0,0,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000 CVE-2025-0064,0,0,e7f5bd1ecd70eeee1a65854e054746f34eb8dfec8e0a20e48bb6b270dfafe980,2025-02-18T18:15:28.470000 CVE-2025-0065,0,0,70f469a84981289145ddab7e496e3ce6a2882a8618ec61a008685ed9d3ced71c,2025-01-28T11:15:07.413000 @@ -280223,7 +280224,7 @@ CVE-2025-0067,0,0,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969 CVE-2025-0068,0,0,335ecdc06a29db245188288060d2d78b12fd2ca685b50ec8e17c976ac125be2f,2025-01-14T01:15:17.107000 CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b09a,2025-01-14T01:15:17.257000 CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000 -CVE-2025-0071,1,1,8c0c274e177519e669209b0690536ee8179845692353b7b61dc9bb1c73544a1f,2025-03-11T01:15:33.917000 +CVE-2025-0071,0,0,8c0c274e177519e669209b0690536ee8179845692353b7b61dc9bb1c73544a1f,2025-03-11T01:15:33.917000 CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000 CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000 CVE-2025-0105,0,0,06eb71f16599e7ae8629718f901478ad68364254538fe5e092751226e1b94cb6,2025-01-11T03:15:22.317000 @@ -281144,6 +281145,7 @@ CVE-2025-1644,0,0,11dc7631b000d67798bd397f7a51f560854b084da5ab0dd69b1cdb2c0ab76f CVE-2025-1645,0,0,04ec87d98beb60cc953f9d19acf54f139fb80161a3db0460324c4b28ab5996d3,2025-02-25T02:15:16.123000 CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc304,2025-02-25T14:15:31.320000 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 +CVE-2025-1661,1,1,c718692b127abf2ab2405bf627be21dedb77423dc857bce07380a6187cbd6651,2025-03-11T04:15:24.803000 CVE-2025-1662,0,0,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000 CVE-2025-1664,0,0,928cb3965a19577a81242a6eb1ec59c4bb6442769e32edf43d299744e6de1a44,2025-03-08T12:15:36.010000 CVE-2025-1666,0,0,129a5300a49835d516d7b95bc1f11c6cf7012490eda8d6a20d90a510d721111b,2025-03-06T12:15:36.117000 @@ -281217,7 +281219,7 @@ CVE-2025-1818,0,0,37447926f9841734f2812c1740f60067b78922f1e49cdd900fb1888b830ace CVE-2025-1819,0,0,30aaf321bf598a632d335efe867dfbf1c954d81c19dbf59077d00052427f6e82,2025-03-02T17:15:11.483000 CVE-2025-1820,0,0,de7c6baac78093b7f0e7c2343af2d32bf8e1894ea47cf7930dd387f103a53ed8,2025-03-03T19:15:33.900000 CVE-2025-1821,0,0,b3349008b31943d36983f65c5b6d573a651ca8d675ec056cb33951299f02ed59,2025-03-03T19:15:34.030000 -CVE-2025-1828,0,0,4da459dee35684f24ea6486e71fd88fa2ca41ea8103d63977d81f2f72d7e7ad2,2025-03-11T00:15:11.060000 +CVE-2025-1828,0,1,5b945fa8d13408a57ed9015ef3ca26dc76b93e530f6ae1200921bcdd112b5392,2025-03-11T03:15:38.440000 CVE-2025-1829,0,0,cdfa3e67c0c277a6177da9bd34f08d7ed678dd9267ec9b77fb630e0d887cc4f0,2025-03-03T18:15:31.937000 CVE-2025-1830,0,0,b7d520c7dab1ad06ab8077ecd612df524f731c0cd8662ed0f43d61b14b168f12,2025-03-03T22:15:37.637000 CVE-2025-1831,0,0,df633658ed50bfe4aae872b54c5326e5accc4a7746409c9cf665f4b4ab647254,2025-03-03T18:15:32.520000 @@ -281290,7 +281292,7 @@ CVE-2025-1916,0,0,62cbf7d0baf3b65340e1dd71d636637dffa9fe88a30cf5f1b31df7c201565e CVE-2025-1917,0,0,a45aaaab45a99ee616555c7303ae35fa5deaa8caf5cbc67c816a0b6730fb0cec,2025-03-05T15:15:16.067000 CVE-2025-1918,0,0,0b969e174274812299d3170aab0162f6660668a900b37b5060bb255adfce2bba,2025-03-05T15:15:16.223000 CVE-2025-1919,0,0,fdbf01b21cd0a0a7341c004e74c5a0f8896d5fa9b9090a1373c391c776ac0904,2025-03-05T15:15:16.383000 -CVE-2025-1920,0,0,a0d0c9fb951cf98495373119c44fed133186b818c653aa305539ce35dd9f9779,2025-03-10T21:15:40.280000 +CVE-2025-1920,0,1,7aa1068442ff47d2007177a7e4f93f0497805ad5f4e925607b5dfef91a6c6585,2025-03-11T03:15:38.630000 CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca5e,2025-03-05T15:15:16.537000 CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 @@ -281303,7 +281305,7 @@ CVE-2025-1933,0,0,3e5005e8a9c650ec4f2f811a22521c8ad0490eb69bc64f511f300de34c9c44 CVE-2025-1934,0,0,62d5877cb0a6bc1c29a9ae6dc05c446ff5aa98cc30731b480267f540b52e058d,2025-03-05T00:15:36.617000 CVE-2025-1935,0,0,f5c41a093a13f86f7817460f81aad5f90e557b8b8cedf9cda6848a41a28cc99c,2025-03-05T00:15:36.770000 CVE-2025-1936,0,0,5aeb3954667ffde00751af15da91ac949e3b09e154211a4ee43408b06f4ab0ea,2025-03-05T00:15:36.913000 -CVE-2025-1937,0,1,bd4726a157f7605f9c828200122b7531d04cc50473063878b94d53c6d49d9479,2025-03-11T02:15:11.120000 +CVE-2025-1937,0,0,bd4726a157f7605f9c828200122b7531d04cc50473063878b94d53c6d49d9479,2025-03-11T02:15:11.120000 CVE-2025-1938,0,0,a3d2c5e41b6927e626441d453303cede8a435a27378e2cbc19add8fd6b6df97b,2025-03-05T00:15:37.097000 CVE-2025-1939,0,0,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000 CVE-2025-1940,0,0,3afeb38944a20fc07b896bfe1f1ad2c69e4bbbb599fa0f218233eafca8c83765,2025-03-04T16:15:38.310000 @@ -281756,7 +281758,7 @@ CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b CVE-2025-21347,0,0,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000 CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000 CVE-2025-21349,0,0,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000 -CVE-2025-2135,0,0,058838e592421d8b6728ed0a278da453199aa29ff40fb15b025017a98dc3d7f3,2025-03-10T21:15:40.613000 +CVE-2025-2135,0,1,396419dc41ad6a0c7aa785e2df34fa5dc46cb535c49bfcf3c79d16a562340d2f,2025-03-11T03:15:40.230000 CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000 CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000 CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000 @@ -282004,6 +282006,7 @@ CVE-2025-21686,0,0,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b CVE-2025-21687,0,0,d2be3c07fa40d2b0700c26116c096842bd5c6c7ed676a7a97931879912c5713b,2025-02-21T16:49:03.180000 CVE-2025-21688,0,0,83d96137942cce89d182c2e18cb17480888099104bcec5d853760c9570117a30,2025-02-21T16:41:20.307000 CVE-2025-21689,0,0,08605a9dadcb5e6f41f433e2a7a386a3665d3af78ce886565ea8e399d128b89e,2025-02-21T16:36:30.260000 +CVE-2025-2169,1,1,f7c752156d76c8cd08d8ac496574a2e4d24527d0d465506da5c37fca0c552d37,2025-03-11T04:15:25.330000 CVE-2025-21690,0,0,be2b9cba4362e4032926d1ec773a3725bd1e1480c8cf9a50976015a301688b92,2025-02-21T16:30:37.037000 CVE-2025-21691,0,0,0be10dae2960ce4184af79c8851fe271b17975e4a70fbd2fd5e02d9fceba956d,2025-02-10T16:15:38.660000 CVE-2025-21692,0,0,035869e70635131e4bc45eada54414f9b05505ca42a556efe739e328b5ef2fc9,2025-02-21T15:59:44.317000 @@ -282720,14 +282723,14 @@ CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 -CVE-2025-23185,1,1,bd0d98997b3e82d4720306a4c68c120c414e2cdd61c888c56c3e80f74dc62e6b,2025-03-11T01:15:34.330000 +CVE-2025-23185,0,0,bd0d98997b3e82d4720306a4c68c120c414e2cdd61c888c56c3e80f74dc62e6b,2025-03-11T01:15:34.330000 CVE-2025-23187,0,0,c290fe7dd4f9aea98485c447bf9862acb0a55538c675ba503d3516720f3efd65,2025-02-18T18:15:33.497000 -CVE-2025-23188,1,1,908df07101b52db1268519960315a08741374d3517f3ae897d73ef055616551e,2025-03-11T01:15:34.480000 +CVE-2025-23188,0,0,908df07101b52db1268519960315a08741374d3517f3ae897d73ef055616551e,2025-03-11T01:15:34.480000 CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e263e,2025-02-11T01:15:10.263000 CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 -CVE-2025-23194,1,1,a0d81e5dc1f32b2b3dd38ab495b441441f6406dbd08da7c13c98cb115151c2ac,2025-03-11T01:15:34.630000 +CVE-2025-23194,0,0,a0d81e5dc1f32b2b3dd38ab495b441441f6406dbd08da7c13c98cb115151c2ac,2025-03-11T01:15:34.630000 CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 CVE-2025-23197,0,0,099217d7c50fa4e567446b5ed24de5a49493412d57096b7a33e5ff39354836a3,2025-01-27T18:15:41.037000 @@ -283915,7 +283918,7 @@ CVE-2025-25167,0,0,e14b9eb6e466e19d148bb81d5cb2df8f805c1241e9a9e8cd6260db11c719e CVE-2025-25168,0,0,93fb1477ac0fd147322a0beee26e3b74949bd1187f727ff11033ff5c839391ea,2025-02-11T18:21:01.407000 CVE-2025-25169,0,0,b2c2eae9e9728260a10cbcd3cd6ed185b5ee51c8c2c4bd8b669b60e645fe9781,2025-03-03T14:15:54.477000 CVE-2025-25170,0,0,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483c78,2025-03-03T14:15:54.613000 -CVE-2025-25181,0,1,54bb22ae37fb0440fda0b5dd67cbfbac1a1597f5e597c7d05ce884fb001eab92,2025-03-11T01:00:03.127000 +CVE-2025-25181,0,0,54bb22ae37fb0440fda0b5dd67cbfbac1a1597f5e597c7d05ce884fb001eab92,2025-03-11T01:00:03.127000 CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 CVE-2025-25184,0,0,2da8803a7b31a0463a88b6351bc585e918c07913590e0cf3e756bba1e93f2c10,2025-02-14T20:15:34.350000 @@ -283945,10 +283948,10 @@ CVE-2025-25222,0,0,c2ca7e3dc29f3574e03139c7399b4994d988797dae7ad6db23b85350baa3d CVE-2025-25223,0,0,a49bb693ef5024209af2cdf099d01934d199df8e6379e744ca5e733fcd788f54,2025-02-18T01:15:09.347000 CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09e30,2025-02-18T01:15:09.473000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 -CVE-2025-25242,1,1,8b5706ef301e771bf1021edd4fedd9bd7c7759a34b0806dbecfa87f66ad8d61c,2025-03-11T01:15:34.777000 +CVE-2025-25242,0,0,8b5706ef301e771bf1021edd4fedd9bd7c7759a34b0806dbecfa87f66ad8d61c,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 -CVE-2025-25244,1,1,b836bfdf91c6dd5b656c585c65289127b775f6eb8d385fbc95c5600b8c7153e2,2025-03-11T01:15:34.927000 -CVE-2025-25245,1,1,f15727cdd2fded14c9775d24595293dcd4ea43628f991058c4ad9a8dd2760009,2025-03-11T01:15:35.080000 +CVE-2025-25244,0,0,b836bfdf91c6dd5b656c585c65289127b775f6eb8d385fbc95c5600b8c7153e2,2025-03-11T01:15:34.927000 +CVE-2025-25245,0,0,f15727cdd2fded14c9775d24595293dcd4ea43628f991058c4ad9a8dd2760009,2025-03-11T01:15:35.080000 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-25279,0,0,042549a55fc10922a139cd28848b848f448630efd12168ac54dc544f129afb38,2025-02-24T08:15:10.607000 @@ -284126,8 +284129,8 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 -CVE-2025-25907,0,0,e5237174c73183bb9c4faed1ab9448b1c1549126d28490fd2a4de3eda386c7ec,2025-03-10T22:15:26.533000 -CVE-2025-25908,0,0,27b564080d99cedf990d09d8e4212c143da715fb09167f046532fc22ff354cc0,2025-03-10T22:15:27.150000 +CVE-2025-25907,0,1,8eddb3e34e5ca04ddfd7eafdccb3d0fd4fc3b588c6ef53c20451e548d14d87c3,2025-03-11T03:15:39.160000 +CVE-2025-25908,0,1,15cbc8d0f24f9f7768867a37c9ad79a9c2e3d53fc06bfc7415ba76e6fe802dc7,2025-03-11T03:15:39.350000 CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 CVE-2025-25940,0,0,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000 @@ -284323,17 +284326,18 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000 -CVE-2025-26655,1,1,0f3a08ccef3d70b6b204225ccf1d375dcff58cae567d22996a8c9a79c45ba0ba,2025-03-11T01:15:35.230000 -CVE-2025-26656,1,1,1a812f43138149f2d7d6651efca463558863ccdacf3acc529b62dbfb2f3c3007,2025-03-11T01:15:35.383000 -CVE-2025-26658,1,1,d118441d3436a47c606b50b102cf03d9c402c14a6366b95d69e29a7d79e0e3de,2025-03-11T01:15:35.533000 -CVE-2025-26659,1,1,68eba87b24200d0516b6e9b6214ef6466194fdc5a18d27ddac9737f1786b152f,2025-03-11T01:15:35.683000 -CVE-2025-26660,1,1,529f2a8a9a489ca0a28a5fca6db2be343390ec2b45b92ee6c3ed517d3a52980b,2025-03-11T01:15:35.837000 -CVE-2025-26661,1,1,ca779d9ce9e34774aa5a0f969b9709373e8d76f9ab3b576068ec16d5fa48ab4c,2025-03-11T01:15:35.993000 +CVE-2025-26655,0,0,0f3a08ccef3d70b6b204225ccf1d375dcff58cae567d22996a8c9a79c45ba0ba,2025-03-11T01:15:35.230000 +CVE-2025-26656,0,0,1a812f43138149f2d7d6651efca463558863ccdacf3acc529b62dbfb2f3c3007,2025-03-11T01:15:35.383000 +CVE-2025-26658,0,0,d118441d3436a47c606b50b102cf03d9c402c14a6366b95d69e29a7d79e0e3de,2025-03-11T01:15:35.533000 +CVE-2025-26659,0,0,68eba87b24200d0516b6e9b6214ef6466194fdc5a18d27ddac9737f1786b152f,2025-03-11T01:15:35.683000 +CVE-2025-26660,0,0,529f2a8a9a489ca0a28a5fca6db2be343390ec2b45b92ee6c3ed517d3a52980b,2025-03-11T01:15:35.837000 +CVE-2025-26661,0,0,ca779d9ce9e34774aa5a0f969b9709373e8d76f9ab3b576068ec16d5fa48ab4c,2025-03-11T01:15:35.993000 CVE-2025-26695,0,0,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000 CVE-2025-26696,0,0,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 +CVE-2025-26707,1,1,b335a3f23b28b6414ebb94f4c4f87393c831d9c2c0b8947d6c63e556bbfdcb07,2025-03-11T04:15:25.093000 CVE-2025-26708,0,0,d8e31c1d3ac2ae2d4309442531e3be42990d730d60213fee7cc6165b1cee0645,2025-03-07T03:15:33.307000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000 @@ -284585,12 +284589,12 @@ CVE-2025-27423,0,0,76136ac7a97f6b3b77c306faa15fa09b7bae261cd8dfd81b49033906f60d3 CVE-2025-27424,0,0,ae381ad83c7e807194f65eb0dd3ebd33b86a96ab3f79d590c8b606ddf3148b97,2025-03-04T16:15:40.647000 CVE-2025-27425,0,0,0c979c07a2366d7040a7201e00a999f4f859e07054a931c54247ba3eb41c463b,2025-03-04T16:15:40.797000 CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 -CVE-2025-27430,1,1,a06ec715a7ce108e60a696528ba671c55bcf8dc2ec481d5e12a7170f1c65937d,2025-03-11T01:15:36.157000 -CVE-2025-27431,1,1,d3a9675081d2e37b13dc9dd22035ed3c565fd85bed5f8ac188e29d92fec6432b,2025-03-11T01:15:36.310000 -CVE-2025-27432,1,1,007a3faf5a4b3dd72c503190961a97a9f124ce550e1b2c3e3c068c571ef636b2,2025-03-11T01:15:36.467000 -CVE-2025-27433,1,1,802ef576da4ee45fc183584d31950306c1fc4ab770cdfb1d54c7001bee2b2bee,2025-03-11T01:15:36.607000 -CVE-2025-27434,1,1,3af8a235aaed03ea586bcafb82e3517b0d2a276ddea4b00764a6bc5e730dd53f,2025-03-11T01:15:36.760000 -CVE-2025-27436,1,1,04f316589a1bbdce7cd6902d63c8b5944fa23ffbd5c8a89b29a1531f5831ed0c,2025-03-11T01:15:36.920000 +CVE-2025-27430,0,0,a06ec715a7ce108e60a696528ba671c55bcf8dc2ec481d5e12a7170f1c65937d,2025-03-11T01:15:36.157000 +CVE-2025-27431,0,0,d3a9675081d2e37b13dc9dd22035ed3c565fd85bed5f8ac188e29d92fec6432b,2025-03-11T01:15:36.310000 +CVE-2025-27432,0,0,007a3faf5a4b3dd72c503190961a97a9f124ce550e1b2c3e3c068c571ef636b2,2025-03-11T01:15:36.467000 +CVE-2025-27433,0,0,802ef576da4ee45fc183584d31950306c1fc4ab770cdfb1d54c7001bee2b2bee,2025-03-11T01:15:36.607000 +CVE-2025-27434,0,0,3af8a235aaed03ea586bcafb82e3517b0d2a276ddea4b00764a6bc5e730dd53f,2025-03-11T01:15:36.760000 +CVE-2025-27436,0,0,04f316589a1bbdce7cd6902d63c8b5944fa23ffbd5c8a89b29a1531f5831ed0c,2025-03-11T01:15:36.920000 CVE-2025-27497,0,0,04993fdb1d20329c81d2ff19baac9002b619ad4067b2189fb1ebe9ca1d230777,2025-03-05T16:15:40.587000 CVE-2025-27498,0,0,7cb66b0e34a52fccf99fcea1075b68d5f7e08d30f7f5bc4fcc53c0689130dbca,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000 @@ -284688,7 +284692,7 @@ CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515de CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000 -CVE-2025-27913,0,0,e681422c2870f7557e227a904142f507f947df7c17e14a658700958ba9e15e29,2025-03-10T21:15:40.430000 +CVE-2025-27913,0,1,92f0e63b2f34b43057718e94c59cbcd0bc6c45ad7dd48a61195dae91a8101cac,2025-03-11T03:15:40.027000 CVE-2025-27924,0,0,d40dddf9c788a92a564c369dc07fb0c4ee52a536da4d5b62375b8a5c15743685,2025-03-10T23:15:35.280000 CVE-2025-27925,0,0,485e150b88bb2f812318e08feb0a9c6b157058d6411460ec078db5dd1eea4d8e,2025-03-10T23:15:35.473000 CVE-2025-27926,0,0,7edaac2d1c025dda0053fdf2758b6d17f504c63d4dde96cbe3b933499321fab6,2025-03-10T23:15:35.670000