diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38116.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38116.json index 13af2baba16..ac1e40a22b7 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38116.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38116.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38116", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:18.663", - "lastModified": "2024-11-22T16:15:18.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "D25C400A-B561-42C0-845D-1F049D74CFDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38117.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38117.json index 401f16e2165..cf690c04b95 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38117.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38117.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38117", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:18.823", - "lastModified": "2024-11-22T16:15:18.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json index 7748311752d..4c5d55bd8f5 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38118", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:18.950", - "lastModified": "2024-11-22T16:15:18.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-250" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154" + } + ] + } + ] } ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38119.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38119.json index fdb2cbdb96d..283ca8dc52d 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38119.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38119.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38119", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.073", - "lastModified": "2024-11-22T16:15:19.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38134.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38134.json index 27bbcc1868f..42e78e366de 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38134.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38134.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38134", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.197", - "lastModified": "2024-11-22T16:15:19.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.6", + "matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json index 744cb919015..93e9d4a1e35 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38135", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.327", - "lastModified": "2024-11-22T16:15:19.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,12 +73,49 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndIncluding": "3.2.5", + "matchCriteriaId": "DF67FDD9-04A4-4B8E-8458-1994CB6AA8F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*", + "matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A" + } + ] + } + ] } ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json index 392d6ea51cb..0c261f7b039 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26324", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.470", - "lastModified": "2024-11-22T16:15:19.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*", + "matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch1_releasenotes/imanager326_patch1_releasenotes.pdf", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4315.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4315.json index 663478929ab..6ee1ad16d6e 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4315.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4315.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4315", "sourceIdentifier": "cve@gitlab.com", "published": "2023-03-08T23:15:10.893", - "lastModified": "2024-11-21T07:35:01.163", + "lastModified": "2025-03-04T16:15:33.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24466.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24466.json index 5a6a6f8718b..1507dd23c5b 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24466.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24466.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24466", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.673", - "lastModified": "2024-11-22T16:15:19.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.6", + "matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*", + "matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*", + "matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24467.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24467.json index eb54b40edc8..2a576b2c5c1 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24467.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24467.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24467", "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.810", - "lastModified": "2024-11-22T16:15:19.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -55,10 +75,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.2.6", + "matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*", + "matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*", + "matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26922.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26922.json index ae10a56a7f9..f16260da192 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26922.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26922.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26922", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T16:15:09.470", - "lastModified": "2024-11-21T07:52:04.360", + "lastModified": "2025-03-04T15:15:17.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json index 13e916cb954..58800897a4a 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11132", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-03T20:15:32.047", - "lastModified": "2025-02-03T20:15:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,19 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:*/AC:*/PR:*/UI:R/S:*/C:*/I:*/A:*", + "baseScore": 0.0, + "baseSeverity": "NONE", + "userInteraction": "REQUIRED" + }, + "exploitabilityScore": 0.0, + "impactScore": 0.0 } ] }, @@ -51,14 +64,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.9", + "matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b747d61-4528-485e-b746-6dddc64485b5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11133.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11133.json index e7bff669890..a30b2299225 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11133.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11133", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-03T20:15:32.203", - "lastModified": "2025-02-03T20:15:32.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.9", + "matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d78b823-fdff-41b2-8059-6564e3eb668d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11134.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11134.json index 49342bbb44b..35000ea4cb8 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11134.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11134", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-03T20:15:32.373", - "lastModified": "2025-02-03T20:15:32.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.9.9.1", + "matchCriteriaId": "C11E43CF-CF13-4AB5-8E9F-3672D6C3EC6D" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476bc092-c623-4caf-9676-3036d27c4840?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json new file mode 100644 index 00000000000..e10647028ef --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-11957", + "sourceIdentifier": "security@eset.com", + "published": "2025-03-04T16:15:34.927", + "lastModified": "2025-03-04T16:15:34.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@eset.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@eset.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/", + "source": "security@eset.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json index 49bbfdddf45..9dabc868fc3 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13685", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-04T06:15:27.240", - "lastModified": "2025-03-04T06:15:27.240", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:18.760", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/72c61904-253d-42d1-9edd-7ea2162a2f85/", diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json index 40c949e0c1f..5faa5b7cbed 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45598", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T16:15:31.267", - "lastModified": "2025-01-27T16:15:31.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.29", + "matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json index 80344673c8a..97c8c314df2 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48248", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T08:15:33.550", - "lastModified": "2025-03-04T09:15:10.307", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:35.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/watchtowrlabs/nakivo-arbitrary-file-read-poc-CVE-2024-48248/?ref=labs.watchtowr.com", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json index ebb4e9802b0..6c25ea90ce8 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50302", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:32.320", - "lastModified": "2024-11-27T15:27:00.187", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-04T16:15:35.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-908" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json index 89bb63dd6e0..a52eea98f11 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50656", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T19:15:12.370", - "lastModified": "2025-02-18T19:15:17.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "itsourcecode Placement Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-50656", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://itsourcecode.com/free-projects/php-project/placement-management-system-project-in-php-with-source-code/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json new file mode 100644 index 00000000000..0216f2c25a4 --- /dev/null +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50704", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T16:15:35.480", + "lastModified": "2025-03-04T16:15:35.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via a specially crafted HTTP POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://uniguest.com/cve-bulletins/", + "source": "cve@mitre.org" + }, + { + "url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50704-Vulnerability-Summary.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json new file mode 100644 index 00000000000..69017a49593 --- /dev/null +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50705", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T15:15:19.027", + "lastModified": "2025-03-04T16:15:35.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated reflected cross-site scripting (XSS) vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary scripts via the page parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://uniguest.com/cve-bulletins/", + "source": "cve@mitre.org" + }, + { + "url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50705-Vulnerability-Summary.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json new file mode 100644 index 00000000000..b14f3a58254 --- /dev/null +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50706", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T15:15:19.290", + "lastModified": "2025-03-04T15:15:19.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://uniguest.com/cve-bulletins/", + "source": "cve@mitre.org" + }, + { + "url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50706-Vulnerability-Summary.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json new file mode 100644 index 00000000000..dd4b17fc766 --- /dev/null +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50707", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T16:15:35.733", + "lastModified": "2025-03-04T16:15:35.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via the X-Forwarded-For header in an HTTP GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://uniguest.com/cve-bulletins/", + "source": "cve@mitre.org" + }, + { + "url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50707-Vulnerability-Summary.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53944.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53944.json index 3bd925d4257..f75cdf445df 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53944.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53944", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:01.887", - "lastModified": "2025-02-27T20:16:01.887", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:19.667", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en los dispositivos Tuoshi/Dionlink LT15D 4G Wi-Fi a trav\u00e9s de M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 y en los dispositivos LT21B a trav\u00e9s de M7628xUSAxUIv2_v1.0.1481.15.02_P0. Un atacante remoto no autenticado con acceso a la red puede aprovechar una vulnerabilidad de inyecci\u00f3n de comandos. El endpoint /goform/formJsonAjaxReq no pueden depurar los metacaracteres del shell enviados a trav\u00e9s de par\u00e1metros JSON, lo que permite a los atacantes ejecutar comandos arbitrarios del sistema operativo con privilegios de superusuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://www.tuoshi.net/productview.asp?id=218", @@ -36,6 +71,10 @@ { "url": "https://github.com/actuator/cve/blob/main/Tuoshi/Firmware-M7628NNxISPv2xUI_v1.0.1802.10.08_P4-Blind-CMD-Injection-unauth-WAN.gif", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json index c3424bbc29a..a5ba7305c12 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54145", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T17:15:16.240", - "lastModified": "2025-01-27T17:15:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.29", + "matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json index 7accba84c6a..39dea1238db 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54146", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T17:15:16.380", - "lastModified": "2025-01-27T17:15:16.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.29", + "matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-vj9g-p7f2-4wqj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57040.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57040.json index de9c6e59772..ca345f217ce 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57040.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57040", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T22:15:14.240", - "lastModified": "2025-02-26T22:15:14.240", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:20.283", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TL-WR845N(UN)_V4_200909 y TL-WR845N(UN)_V4_190219 contienen una contrase\u00f1a codificada para la cuenta ra\u00edz que se puede obtener mediante un ataque de fuerza bruta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://security.iiita.ac.in/iot/hashed_password.pdf", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json new file mode 100644 index 00000000000..f2c73741985 --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9149", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-04T15:15:22.530", + "lastModified": "2025-03-04T15:15:22.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wind Media E-Commerce Website Template allows SQL Injection.This issue affects E-Commerce Website Template: before v1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0051", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json index 8436bcb45a8..150395c68de 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0285", "sourceIdentifier": "cret@cert.org", "published": "2025-03-03T17:15:13.430", - "lastModified": "2025-03-03T17:15:13.430", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:36.020", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json index 3f11656faaa..d5ae8800788 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0286", "sourceIdentifier": "cret@cert.org", "published": "2025-03-03T17:15:13.537", - "lastModified": "2025-03-03T17:15:13.537", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:36.167", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0288.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0288.json index 4168dff0a0a..eec4e920cad 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0288.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0288.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0288", "sourceIdentifier": "cret@cert.org", "published": "2025-03-03T17:15:13.823", - "lastModified": "2025-03-03T17:15:13.823", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:36.317", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], "references": [ { "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0289.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0289.json index 8e461fdb9a5..16a20bcd07b 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0289.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0289.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0289", "sourceIdentifier": "cret@cert.org", "published": "2025-03-03T17:15:13.943", - "lastModified": "2025-03-03T17:15:13.943", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:36.467", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Paragon Partition Manager version 17, both community and Business versions, contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0840.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0840.json index ec8752cd5fb..156e03bf752 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0840.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0840.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0840", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-29T20:15:35.007", - "lastModified": "2025-01-29T20:15:35.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,90 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.44", + "matchCriteriaId": "9C3991B6-45EB-4A22-A984-3403405E378D" + } + ] + } + ] } ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15882", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32560", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.293997", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.293997", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485255", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json index 15d12ecb710..5a3c89e699f 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1106.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1106", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T19:15:24.613", - "lastModified": "2025-02-07T19:15:24.613", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.491518", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json index 29879ca163c..1ebdec22afe 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1147.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1147", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T14:15:29.643", - "lastModified": "2025-02-10T14:15:29.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*", + "matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04" + } + ] + } + ] } ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15881", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.295051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485254", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json index 7076bad6421..23362cf4506 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1149.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1149", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T15:15:13.093", - "lastModified": "2025-02-10T15:15:13.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,6 +63,26 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*", + "matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04" + } + ] + } + ] + } + ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.295053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json new file mode 100644 index 00000000000..f921d6cc55e --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-1424", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-03-04T16:15:36.663", + "lastModified": "2025-03-04T16:15:36.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability in PocketBook InkPad Color 3 allows attackers to escalate to root privileges if they gain physical access to the device.\nThis issue affects InkPad Color 3 in version U743k3.6.8.3671." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json new file mode 100644 index 00000000000..5c101c4eb54 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-1425", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-03-04T16:15:36.803", + "lastModified": "2025-03-04T16:15:36.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Sudo privilege misconfiguration vulnerability in PocketBook InkPad Color 3 on Linux, ARM allows attackers to read file contents on the device.This issue affects InkPad Color 3: U743k3.6.8.3671." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json index 51892ed5d82..91c08955ca6 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1902", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T04:15:12.210", - "lastModified": "2025-03-04T04:15:12.210", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:37.450", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.506623", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/panghuanjie/Code-audits/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1903.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1903.json index b432fd1bd01..883da00190d 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1903.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1903.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1903", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T04:15:12.383", - "lastModified": "2025-03-04T04:15:12.383", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:37.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.506667", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/takakie/CVE/blob/main/cve_3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1904.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1904.json index cbb6bb8d367..17e46f7b523 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1904.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1904.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1904", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T05:15:14.440", - "lastModified": "2025-03-04T05:15:14.440", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:37.700", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.506868", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/lokihardk/cve/blob/main/xss-2_25.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json index 0bbea33f064..ea108cc3dea 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1905", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T05:15:14.680", - "lastModified": "2025-03-04T05:15:14.680", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:24.033", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json index 4f81d794277..1e4aeb293f1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1906", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T05:15:14.903", - "lastModified": "2025-03-04T05:15:14.903", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:24.233", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.508915", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/HaroldFinch-L/CVE/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json index 36ac5c7a197..8b2883d967b 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1933", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.170", - "lastModified": "2025-03-04T14:15:38.170", + "lastModified": "2025-03-04T16:15:37.823", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json index 72279efe35d..afc249823dd 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1934", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.273", - "lastModified": "2025-03-04T14:15:38.273", + "lastModified": "2025-03-04T16:15:37.970", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-185" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json index 5f4dd04a5e7..94091f96ab3 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1935", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.390", - "lastModified": "2025-03-04T14:15:38.390", + "lastModified": "2025-03-04T16:15:38.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json index e66539ce8d6..01360910979 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1940", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.950", - "lastModified": "2025-03-04T14:15:38.950", + "lastModified": "2025-03-04T16:15:38.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json index dcf61c67795..0949399e9fe 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1941", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.063", - "lastModified": "2025-03-04T14:15:39.063", + "lastModified": "2025-03-04T16:15:38.457", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json index 3e2c2da1886..6598ea766d4 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1942", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.167", - "lastModified": "2025-03-04T14:15:39.167", + "lastModified": "2025-03-04T16:15:38.607", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json index 1bea7045c8d..ab9e5a4998b 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1943", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.260", - "lastModified": "2025-03-04T14:15:39.260", + "lastModified": "2025-03-04T15:15:24.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136." + }, + { + "lang": "es", + "value": "Vulnerabilidades de seguridad en la gesti\u00f3n de memoria presentes en Firefox 135 y Thunderbird 135. Algunas de estas vulnerabilidades muestran evidencia de corrupci\u00f3n en la memoria y se presume que, con suficiente esfuerzo, algunas de ellas podr\u00edan ser explotadas para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 136." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json index 321bafe3309..f3ef22556f3 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21181.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21181", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:29.553", - "lastModified": "2025-02-25T16:58:10.650", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-04T15:15:26.497", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -202,6 +202,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-detection-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-mitigation-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json index 0257120ef9b..bf4449b4c70 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21399", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-17T20:15:46.117", - "lastModified": "2025-01-31T02:15:37.700", + "lastModified": "2025-03-04T15:15:28.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -52,7 +52,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -65,6 +65,14 @@ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399", "source": "secure@microsoft.com" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-detection-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-mitigation-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json index cd90f967289..3bc5ec0dd2e 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22224", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.687", - "lastModified": "2025-03-04T12:15:33.687", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:38.850", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json index 140fa035f1a..b4612df8a88 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22225", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.840", - "lastModified": "2025-03-04T12:15:33.840", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:38.970", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-123" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json index 6e28c9f8cb4..baabd435660 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22226", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.973", - "lastModified": "2025-03-04T12:15:33.973", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:39.097", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json index 23ceba60704..085b3de5a5b 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22402.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22402", "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-07T03:15:12.287", - "lastModified": "2025-02-07T03:15:12.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,77 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:update_manager_plugin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.0", + "versionEndExcluding": "1.7.0", + "matchCriteriaId": "11CA0695-4DAC-42AE-A7FA-E237E198490B" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000281885/dsa-2025-047-security-update-for-dell-update-manager-plugin-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json index c6db3f6e107..51044a4e22d 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22604", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T17:15:17.307", - "lastModified": "2025-01-27T17:15:17.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.29", + "matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json index f7a095f0d76..5c091f7a05a 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23208", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-17T23:15:13.107", - "lastModified": "2025-01-17T23:15:13.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T14:45:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,20 +69,58 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zotregistry:zot:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.2", + "matchCriteriaId": "60B19393-9C0C-4BF9-98A3-C9E553BCEA48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/project-zot/zot/blob/5e30fec65c49e3139907e2819ccb39b2e3bd784e/pkg/meta/boltdb/boltdb.go#L1665", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/project-zot/zot/commit/002ac62d8a15bf0cba010b3ba7bde86f9837b613", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/project-zot/zot/security/advisories/GHSA-c9p4-xwr9-rfhx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json new file mode 100644 index 00000000000..895cec9aafe --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23368", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-03-04T16:15:39.270", + "lastModified": "2025-03-04T16:15:39.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-23368", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337621", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json index e2bc2ee41b8..4ee1c151fd4 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25379", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T23:15:10.790", - "lastModified": "2025-02-28T23:15:10.790", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:39.433", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in 07FLYCMS v.1.3.9 allows a remote attacker to execute arbitrary code via the id parameter of the del.html component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Request Forgery en 07FLYCMS v.1.3.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro id del componente del.html." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json index bfbc76c5123..8d220b080ba 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25428", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T19:15:36.773", - "lastModified": "2025-02-28T19:15:36.773", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:39.597", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TRENDnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow, que permite a los atacantes iniciar sesi\u00f3n como superusuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-Hardcoded-password-17815d9d4d2680d5a2becf32425d93fd", diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25430.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25430.json index 8ca43aea756..3f9c6e2504a 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25430.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25430.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25430", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T18:15:28.263", - "lastModified": "2025-02-28T18:15:28.263", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:39.763", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the configname parameter on the /cbi_addcert.htm page." + }, + { + "lang": "es", + "value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s del par\u00e1metro configname en la p\u00e1gina /cbi_addcert.htm." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875", "source": "cve@mitre.org" + }, + { + "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json index 1a9f49c0e82..afbd59cefee 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25431", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T18:15:28.407", - "lastModified": "2025-02-28T18:15:28.407", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:39.917", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the The ssid key of wifi_data parameter on the /captive_portal.htm page." + }, + { + "lang": "es", + "value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s de la clave ssid del par\u00e1metro wifi_data en la p\u00e1gina /captive_portal.htm." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe", "source": "cve@mitre.org" + }, + { + "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25476.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25476.json index 42461b3b95f..4ee36863b6e 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25476.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25476.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25476", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T23:15:11.063", - "lastModified": "2025-02-28T23:15:11.063", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:40.080", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows a malicious user with elevated privileges to execute arbitrary Javascript code by specifying a malicious XSS payload as a notification type or notification component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en SysPass 3.2.x permite que un usuario malintencionado con privilegios elevados ejecute c\u00f3digo Javascript arbitrario al especificar un payload XSS malicioso como un tipo de notificaci\u00f3n o un componente de notificaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25759.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25759.json index 39961a7502c..81952bc16a5 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25759.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25759.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25759", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T15:15:41.570", - "lastModified": "2025-02-27T15:15:41.570", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:28.353", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,46 @@ "value": "Un problema en el componente admin_template.php de SUCMS v1.0 permite a los atacantes ejecutar un directory traversal y la eliminaci\u00f3n arbitraria de archivos a trav\u00e9s de una solicitud GET manipulada espec\u00edficamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25760.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25760.json index 6389eee02ef..3b8fbbac59f 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25760.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25760.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25760", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T15:15:41.670", - "lastModified": "2025-02-27T15:15:41.670", - "vulnStatus": "Received", + "lastModified": "2025-03-04T15:15:28.590", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Server-Side Request Forgery (SSRF) en el componente admin_webgather.php de SUCMS v1.0 permite a los atacantes acceder a datos y servicios internos a trav\u00e9s de una solicitud GET manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf", diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json new file mode 100644 index 00000000000..09524d4cef7 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-26320", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-04T16:15:40.240", + "lastModified": "2025-03-04T16:15:40.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BaranTeyin1/vulnerability-research/tree/main/CVE-2025-26320", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/t0mer/broadlinkmanager-docker", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/t0mer/broadlinkmanager-docker/blob/master/broadlinkmanager/broadlinkmanager.py#L639-L657", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json index 569fed9d054..3797c735a83 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26849", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T09:15:10.917", - "lastModified": "2025-03-04T09:15:10.917", - "vulnStatus": "Received", + "lastModified": "2025-03-04T16:15:40.360", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/", "source": "cve@mitre.org" + }, + { + "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json new file mode 100644 index 00000000000..9d2811083d4 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-27111", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-04T16:15:40.487", + "lastModified": "2025-03-04T16:15:40.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + }, + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json index a4359f9f46a..e6ad24b8689 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27424", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.397", - "lastModified": "2025-03-04T14:15:39.397", + "lastModified": "2025-03-04T16:15:40.647", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1945392", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json index e037abe5d95..66d6fe5ed3a 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27425", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.493", - "lastModified": "2025-03-04T14:15:39.493", + "lastModified": "2025-03-04T16:15:40.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS < 136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941525", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json index 65b6613974c..560b907b5ce 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27426", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.593", - "lastModified": "2025-03-04T14:15:39.593", + "lastModified": "2025-03-04T16:15:40.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136." + }, + { + "lang": "es", + "value": "Sitios web maliciosos que utilicen una redirecci\u00f3n del lado del servidor a una p\u00e1gina de error interno podr\u00edan permitir mostrar una URL falsa para el sitio web. Esta vulnerabilidad afecta a Firefox para iOS < 136." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079", diff --git a/README.md b/README.md index 67ffc92772a..082bbee7952 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-04T15:00:20.197668+00:00 +2025-03-04T17:00:19.916462+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-04T14:15:39.593000+00:00 +2025-03-04T16:15:40.933000+00:00 ``` ### Last Data Feed Release @@ -33,42 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284072 +284083 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `11` -- [CVE-2025-1925](CVE-2025/CVE-2025-19xx/CVE-2025-1925.json) (`2025-03-04T14:15:36.717`) -- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-03-04T14:15:37.850`) -- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-03-04T14:15:37.963`) -- [CVE-2025-1932](CVE-2025/CVE-2025-19xx/CVE-2025-1932.json) (`2025-03-04T14:15:38.053`) -- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-04T14:15:38.170`) -- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T14:15:38.273`) -- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T14:15:38.390`) -- [CVE-2025-1936](CVE-2025/CVE-2025-19xx/CVE-2025-1936.json) (`2025-03-04T14:15:38.500`) -- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-04T14:15:38.610`) -- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T14:15:38.730`) -- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-04T14:15:38.837`) -- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T14:15:38.950`) -- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T14:15:39.063`) -- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T14:15:39.167`) -- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T14:15:39.260`) -- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T14:15:39.397`) -- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T14:15:39.493`) -- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T14:15:39.593`) +- [CVE-2024-11957](CVE-2024/CVE-2024-119xx/CVE-2024-11957.json) (`2025-03-04T16:15:34.927`) +- [CVE-2024-50704](CVE-2024/CVE-2024-507xx/CVE-2024-50704.json) (`2025-03-04T16:15:35.480`) +- [CVE-2024-50705](CVE-2024/CVE-2024-507xx/CVE-2024-50705.json) (`2025-03-04T15:15:19.027`) +- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T15:15:19.290`) +- [CVE-2024-50707](CVE-2024/CVE-2024-507xx/CVE-2024-50707.json) (`2025-03-04T16:15:35.733`) +- [CVE-2024-9149](CVE-2024/CVE-2024-91xx/CVE-2024-9149.json) (`2025-03-04T15:15:22.530`) +- [CVE-2025-1424](CVE-2025/CVE-2025-14xx/CVE-2025-1424.json) (`2025-03-04T16:15:36.663`) +- [CVE-2025-1425](CVE-2025/CVE-2025-14xx/CVE-2025-1425.json) (`2025-03-04T16:15:36.803`) +- [CVE-2025-23368](CVE-2025/CVE-2025-233xx/CVE-2025-23368.json) (`2025-03-04T16:15:39.270`) +- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-04T16:15:40.240`) +- [CVE-2025-27111](CVE-2025/CVE-2025-271xx/CVE-2025-27111.json) (`2025-03-04T16:15:40.487`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `62` -- [CVE-2024-11955](CVE-2024/CVE-2024-119xx/CVE-2024-11955.json) (`2025-03-04T13:49:18.880`) -- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-04T13:15:10.063`) -- [CVE-2025-21626](CVE-2025/CVE-2025-216xx/CVE-2025-21626.json) (`2025-03-04T13:49:18.880`) -- [CVE-2025-21627](CVE-2025/CVE-2025-216xx/CVE-2025-21627.json) (`2025-03-04T13:49:18.880`) -- [CVE-2025-23024](CVE-2025/CVE-2025-230xx/CVE-2025-23024.json) (`2025-03-04T13:49:18.880`) +- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T16:15:37.970`) +- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T16:15:38.110`) +- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T16:15:38.310`) +- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T16:15:38.457`) +- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T16:15:38.607`) +- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T15:15:24.493`) +- [CVE-2025-21181](CVE-2025/CVE-2025-211xx/CVE-2025-21181.json) (`2025-03-04T15:15:26.497`) +- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-03-04T15:15:28.007`) +- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T16:15:38.850`) +- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T16:15:38.970`) +- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T16:15:39.097`) +- [CVE-2025-22402](CVE-2025/CVE-2025-224xx/CVE-2025-22402.json) (`2025-03-04T14:53:43.637`) +- [CVE-2025-22604](CVE-2025/CVE-2025-226xx/CVE-2025-22604.json) (`2025-03-04T14:45:17.807`) +- [CVE-2025-23208](CVE-2025/CVE-2025-232xx/CVE-2025-23208.json) (`2025-03-04T14:45:17.807`) +- [CVE-2025-25379](CVE-2025/CVE-2025-253xx/CVE-2025-25379.json) (`2025-03-04T16:15:39.433`) +- [CVE-2025-25428](CVE-2025/CVE-2025-254xx/CVE-2025-25428.json) (`2025-03-04T16:15:39.597`) +- [CVE-2025-25430](CVE-2025/CVE-2025-254xx/CVE-2025-25430.json) (`2025-03-04T16:15:39.763`) +- [CVE-2025-25431](CVE-2025/CVE-2025-254xx/CVE-2025-25431.json) (`2025-03-04T16:15:39.917`) +- [CVE-2025-25476](CVE-2025/CVE-2025-254xx/CVE-2025-25476.json) (`2025-03-04T16:15:40.080`) +- [CVE-2025-25759](CVE-2025/CVE-2025-257xx/CVE-2025-25759.json) (`2025-03-04T15:15:28.353`) +- [CVE-2025-25760](CVE-2025/CVE-2025-257xx/CVE-2025-25760.json) (`2025-03-04T15:15:28.590`) +- [CVE-2025-26849](CVE-2025/CVE-2025-268xx/CVE-2025-26849.json) (`2025-03-04T16:15:40.360`) +- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T16:15:40.647`) +- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T16:15:40.797`) +- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T16:15:40.933`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cab5bfa1211..87364b264f7 100644 --- a/_state.csv +++ b/_state.csv @@ -180669,10 +180669,10 @@ CVE-2021-38112,0,0,a516ccd688b3159a26d29a0542b1c43f34877df13f43b28ebc723fa181534 CVE-2021-38113,0,0,5d46b02d44dc495677e9944e1d41b326640fa8e6ba7e6607ee011515521389db,2024-11-21T06:16:25.040000 CVE-2021-38114,0,0,dcc34993449335bce7ac164918f8ca13087f09cfe97ee05f1f3c1ffaea5268a6,2024-11-21T06:16:25.210000 CVE-2021-38115,0,0,aac65d670b83c50bb6fdf3dde8ca97dd9df4d7eee0cdf91517338dfa0ded44ba,2024-11-21T06:16:25.407000 -CVE-2021-38116,0,0,7605eb54c7a08f7f0a93962ccc4cee27af114f406294e82196371a2dec5c100f,2024-11-22T16:15:18.663000 -CVE-2021-38117,0,0,dd6895df3006f09f9170c6284fdca2b4116d45d468635cb6c9ed22067e0948ba,2024-11-22T16:15:18.823000 -CVE-2021-38118,0,0,e2a68ed769b0065bfa89affc336db21c384d35a927ded440c1a09b23ff25c9d9,2024-11-22T16:15:18.950000 -CVE-2021-38119,0,0,341e8c6f8b6e146cea158ff744aee0b2346a26031ddc96be8e0d7f40fd2c437a,2024-11-22T16:15:19.073000 +CVE-2021-38116,0,1,9e2fcb7c454c84f0b73e4d451e4413ed14590e6d837393661712109d6c18a1ca,2025-03-04T14:45:17.807000 +CVE-2021-38117,0,1,c738ea68a8ed127f7c256f1f36be5720aae895b5778cdb70d63718b5b689ec05,2025-03-04T14:45:17.807000 +CVE-2021-38118,0,1,19afdc159a962568ad4d5ce3a0527049365f3ee9bf24d4050e4a7a28bb6b7674,2025-03-04T14:45:17.807000 +CVE-2021-38119,0,1,c51e04931621af9a60c5862276d47e6123773da43400202d3becd6612e750d3d,2025-03-04T14:45:17.807000 CVE-2021-3812,0,0,c5cb3f5b7111b975944866407ce7921fd1756d44d3c707face417fefec9022e0,2024-11-21T06:22:30.810000 CVE-2021-38120,0,0,b60e1861e1b921e1137b6df18349a144506c4be8364c1355e526faee82dc1255,2024-09-13T18:04:28.527000 CVE-2021-38121,0,0,bdeea87570d2aa637690322ce273b1fd44ad6ff765ffafe37b82df033fc08cd3,2024-09-13T18:04:16.260000 @@ -180688,8 +180688,8 @@ CVE-2021-38130,0,0,5dd7dd740c971ae448230e2fa7c6fa473ff13dd5ba4fffac83ff3ded78f32 CVE-2021-38131,0,0,980eb492833fef04df71f8c1be96cc90363084ebe94acd61a1b0ddd54c9cf526,2024-09-18T21:00:30.420000 CVE-2021-38132,0,0,cc4e1381a735ddb1e1b2e30ee731f10ac1786d2b08adbdb5c6b1a67d1117697d,2024-09-18T21:04:11.840000 CVE-2021-38133,0,0,0d77afe3c41e217ee49f58798c33ffe693557e4f4c683fac1020b9d1c0576a03,2024-09-18T21:05:17.027000 -CVE-2021-38134,0,0,b25046d28e2af5287414a719ab2bcf34666258d99ee50222a162cf63f5a52ac7,2024-11-22T16:15:19.197000 -CVE-2021-38135,0,0,8f44911b2b2d5adf734eb900af129c8d1bbfba186feae24358ffcd75a4a0d7ad,2024-11-22T16:15:19.327000 +CVE-2021-38134,0,1,41def84a96a3d580650d1c7b11022b92a9312986e0554171cd30a23f3b11fdb8,2025-03-04T14:45:17.807000 +CVE-2021-38135,0,1,6d6e41e6bc7b9a1351c2dd4f5bb95b6bf0dd710ff2b709eab83029b5c13588bd,2025-03-04T14:45:17.807000 CVE-2021-38136,0,0,75dccf60c11e25464bc510952d9ccdd379a17e029a4ca730fef234378d74c33b,2024-11-21T06:16:27.247000 CVE-2021-38137,0,0,2ddc1b293c690f5b9d3e7ffefcd4ca372c28380db582fcb89b1014416b90329f,2024-11-21T06:16:27.437000 CVE-2021-38138,0,0,1e14c27b356072692022b0b633e52103df305663f6cc532303cc54463d19ff14,2024-11-21T06:16:27.617000 @@ -195539,7 +195539,7 @@ CVE-2022-26318,0,0,07059bedee342f87c82fd403ca9f475724f3e3520a133422d7d146531f355 CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000 CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000 CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000 -CVE-2022-26324,0,0,33ccb3efe4469f2fbee00466ef3e2b87185a07fd40d022ba08d8da5ef8f63b98,2024-11-22T16:15:19.470000 +CVE-2022-26324,0,1,2cf850d71ebd6ea115d8393bdf5f5fd251b338a6a65536c9dccc8ab5b19b2468,2025-03-04T14:45:17.807000 CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000 CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000 CVE-2022-26327,0,0,14209176bfddac3742a841a3f635ca4404a584d709335abb6ed62100d8608437,2024-08-21T17:25:08.560000 @@ -208920,7 +208920,7 @@ CVE-2022-43143,0,0,868df4c4bb9b71ab79398441260504ea4a2d34397197a776dbb7b3925861a CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000 CVE-2022-43146,0,0,84fc36b0fa34c0e6ead69551bc9e1f56df82e44d1b7de7fb090389def45d5436,2024-11-21T07:25:59.457000 CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad77bb,2024-11-21T07:25:59.620000 -CVE-2022-4315,0,0,a5cbf0230d4828476dc0d837762d5f9e6c799c34d8051fe5afacc263bf7c1f3f,2024-11-21T07:35:01.163000 +CVE-2022-4315,0,1,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000 CVE-2022-43151,0,0,ec89dabd3a8fe8d38444eb7088f65645800c95a944f74fc4a0c9106f179d5e70,2024-11-21T07:25:59.777000 CVE-2022-43152,0,0,7758037884cb4ab135d613748ea4d21af54b5940bb82e54694efe5a64eaf1a18,2024-11-21T07:25:59.940000 CVE-2022-43162,0,0,1ccbaac0bb66d6449309a729c532512bc27611c36ca1d066f10c644d326c69e3,2024-11-21T07:26:00.100000 @@ -219610,8 +219610,8 @@ CVE-2023-24461,0,0,fd8bc2abb65aada1d7309949da776fd5d44c92bdea8ca6223fb68c7781454 CVE-2023-24463,0,0,a3c9e4674f772990b219d4f3438aaa2243bf93efafd37788b7290fa8764d44b4,2024-11-21T07:47:54.737000 CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66119,2025-02-11T17:15:15.437000 CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000 -CVE-2023-24466,0,0,cf734ceccfb5911b5b7e627c53a307368cab7376fb3061da294e5c9aa89cd221,2024-11-22T16:15:19.673000 -CVE-2023-24467,0,0,07490941e7ee60ebe008d984f75a4eb57ec217c7a9f6818f2eef6ec413eb2c8a,2024-11-22T16:15:19.810000 +CVE-2023-24466,0,1,1531d5aa8037433592fb8ed22ccab6d1519aba55b9991ced01572ffa4bda530c,2025-03-04T14:45:17.807000 +CVE-2023-24467,0,1,ab8e076c3763270e0693d9addd66b4b0c5c52ff5f6b3f9268c08789601c6c418,2025-03-04T14:45:17.807000 CVE-2023-24468,0,0,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000 CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000 CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000 @@ -221582,7 +221582,7 @@ CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884 CVE-2023-2692,0,0,ad06513e2f116b8fb6a964da6618fc1d94588cf004f25980806dd3b489093f9f,2024-11-21T07:59:05.780000 CVE-2023-26920,0,0,7032d8fb85b06c0f68b934efb7c1ddc8da00b25992344fdcc0d0ab8b925ca6a8,2024-11-21T07:52:04.053000 CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef63f2,2025-02-13T16:15:40.510000 -CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000 +CVE-2023-26922,0,1,5257fd53c31086036e10c945e5d64e3cfb29fb098c4fd4c471d83fb6324a5b27,2025-03-04T15:15:17.240000 CVE-2023-26923,0,0,75862e39801fb950c2f14e9f720d435da722d14d0e221faf7dfcb2b0a16c8d5c,2025-02-18T21:15:14.770000 CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000 CVE-2023-26925,0,0,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000 @@ -245263,9 +245263,9 @@ CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51 CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000 CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000 CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000 -CVE-2024-11132,0,0,0821914b8713b59a5594a768e713d894977db965864534f7c1570dcf8385b455,2025-02-03T20:15:32.047000 -CVE-2024-11133,0,0,ec82007b0a80c7248c9750c974f69dc3d569b8565d47f719c0e652c5a939052f,2025-02-03T20:15:32.203000 -CVE-2024-11134,0,0,80669d4c37428b414124ba754353d3b371091e0c0a1f0a0960f4766e9c86ba92,2025-02-03T20:15:32.373000 +CVE-2024-11132,0,1,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000 +CVE-2024-11133,0,1,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000 +CVE-2024-11134,0,1,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000 CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000 CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 @@ -246054,8 +246054,9 @@ CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000 CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000 CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000 -CVE-2024-11955,0,1,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000 +CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000 CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000 +CVE-2024-11957,1,1,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000 CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,98cccdbf2a56893ba844e9a27d11d8e19b411cb229a2ffc9fddc1d1b0c64d4ba,2024-12-04T16:52:34.413000 @@ -247602,7 +247603,7 @@ CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47 CVE-2024-13682,0,0,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000 -CVE-2024-13685,0,0,03de3c2f4567b362885b87939b3221f81be18564e943cae2676e8a3616a94948,2025-03-04T06:15:27.240000 +CVE-2024-13685,0,1,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000 CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000 CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000 CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000 @@ -268074,7 +268075,7 @@ CVE-2024-45594,0,0,7a3512bdd289e08930c55958e7a3b82e2f30b26c968886b9e51f5b9001958 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,5a68594db914cb6b4d8306c16fbb00f262377974d86e7839e390f218fadb00b1,2024-09-11T16:26:11.920000 -CVE-2024-45598,0,0,fb11f2533ae20ca5b770b3e6cfb8400dfd4666b24d9a5d89096f872428905225,2025-01-27T16:15:31.267000 +CVE-2024-45598,0,1,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000 @@ -269963,7 +269964,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 -CVE-2024-48248,0,0,ac3fc0f6c8ce3e0223ebe710a67ff2a29a152ed42554d6cf3798d430ad51a664,2025-03-04T09:15:10.307000 +CVE-2024-48248,0,1,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -271476,7 +271477,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000 CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000 CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000 -CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000 +CVE-2024-50302,0,1,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000 CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000 CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000 CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000 @@ -271808,7 +271809,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 -CVE-2024-50656,0,0,e53c92dd40aeb79d431b51fb04bac1f16260e97b7e3acd3a14cd582afd780293,2025-02-18T19:15:17.930000 +CVE-2024-50656,0,1,0388b4db16cd9aabe7b5e8e43f14e295a2a569883a92c3216db45e5c95061e17,2025-03-04T14:53:43.637000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000 CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 @@ -271841,6 +271842,10 @@ CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e0265 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000 CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000 +CVE-2024-50704,1,1,9d331c8d6b363d37fff2547f6d76cc65ecf4258701e3633eed0ee80ab60702ca,2025-03-04T16:15:35.480000 +CVE-2024-50705,1,1,7f8c9f9cf68b3101f3ba62602ce2f5e6e57e21f3f81bbd324b10b941dd67f273,2025-03-04T16:15:35.597000 +CVE-2024-50706,1,1,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000 +CVE-2024-50707,1,1,44896e88bc7dc773fec1e11f006564a397b1d0d8621287ea0206c057d3930403,2025-03-04T16:15:35.733000 CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000 CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000 CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5076,2024-12-28T18:15:08.193000 @@ -273996,7 +274001,7 @@ CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2 CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000 CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2e17,2025-02-03T18:15:36.633000 CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000 -CVE-2024-53944,0,0,c9e41084ca96c95464f2cbaa1f2ca069883a8508c18c1b3a9d39831f60e08355,2025-02-27T20:16:01.887000 +CVE-2024-53944,0,1,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000 CVE-2024-53947,0,0,e2f76f81a7b4b04a6a0933301af0327b41592be00ca6e33f47671fd393eff3dc,2024-12-09T14:15:12.267000 CVE-2024-53948,0,0,d599ead73c1f590fbb2eff6448b7bf9439b2eabd12941877aab993eed63132d0,2025-02-11T16:27:31.023000 CVE-2024-53949,0,0,a7aea508a7c1f88d7575b0e16e3be5a77b1cd694ac35d309754b1488d9891f8c,2025-02-12T10:15:13.790000 @@ -274147,8 +274152,8 @@ CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000 CVE-2024-54142,0,0,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000 CVE-2024-54143,0,0,8db75f45f675c8e0c94c9f789265e5f7040d3230f01c944775ae37d21a402ba6,2024-12-06T17:15:12.687000 -CVE-2024-54145,0,0,d29401c66a345e085157a72c34e12541d999da662af740f11a31d17e1caeb437,2025-01-27T17:15:16.240000 -CVE-2024-54146,0,0,8be3afe261f70a34dd94521b64c588c302e6bf746bd01d3a66c8807a54d879ea,2025-01-27T17:15:16.380000 +CVE-2024-54145,0,1,0086ede8d33f4c38cf42c46cc6e8e377784b371f7ac491d57a1e89761d1ee349,2025-03-04T14:45:17.807000 +CVE-2024-54146,0,1,ec63a6eaa7f42f80e3e3b10f3681a77c87540f5ea9640756664e7e50eb919830,2025-03-04T14:45:17.807000 CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000 CVE-2024-54148,0,0,1bfb17d4d936ce6a940dfc88f1d38025c4aaaa0bf878ea9058eb2876c8005731,2024-12-24T02:15:06.410000 CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000 @@ -275757,7 +275762,7 @@ CVE-2024-57034,0,0,e52a39ecd5c7a609e90fa7ae9c35e819ec30d141102d18c5cb8dc9ebebfd4 CVE-2024-57035,0,0,8f647174886ad5489698835d701ee28c5ff6c813395545be8ae09bfd3cde425f,2025-02-28T19:16:13.133000 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 -CVE-2024-57040,0,0,4de3ec8520d627412151a285808f07acb55340667ec561d8d5d9eefc71b5b985,2025-02-26T22:15:14.240000 +CVE-2024-57040,0,1,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 CVE-2024-57045,0,0,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000 CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000 @@ -279261,6 +279266,7 @@ CVE-2024-9145,0,0,97a312c1c66b488d02b8e5ae15f80967927307525d089b410f672665e8c386 CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000 CVE-2024-9147,0,0,0093d2743a16315fb2395e20e4313d0098c0f4e5a32333383ccd3780d7d6e4a8,2024-11-06T15:53:59.983000 CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000 +CVE-2024-9149,1,1,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000 CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c3126535,2025-02-21T12:15:30.463000 CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000 CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000 @@ -280094,11 +280100,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080 CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000 CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 -CVE-2025-0285,0,0,bd76a73d88fc72bc10ed44c3117c45016b96684dc519171e4420c8e33e931fd6,2025-03-03T17:15:13.430000 -CVE-2025-0286,0,0,c4ec72a9554ec8a756e5843089b16cd508ff7c50c18456a0f96863f5d96c876a,2025-03-03T17:15:13.537000 +CVE-2025-0285,0,1,8bef17d3f85cba40ca0c2d7eb2962a0b4098c9c2a2ea291e3924377e2de2a5c0,2025-03-04T16:15:36.020000 +CVE-2025-0286,0,1,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000 CVE-2025-0287,0,0,99b2806e0b914384724b92a9eeda355dfeaeb1f153364014a4accbba6bc06de4,2025-03-03T20:15:44.100000 -CVE-2025-0288,0,0,a9d3af508f26bc1a8c7748a2db86a46548a895db1c48b9ff7e76f56239bc4552,2025-03-03T17:15:13.823000 -CVE-2025-0289,0,0,8d7c88a592ed289173b4a13ae98054285b63c7fbb44bee84e192a3dffe5fdd54,2025-03-03T17:15:13.943000 +CVE-2025-0288,0,1,5535019b67c8186a5a2a2f66909842decaee326bbc7e615060a66e0dcdf41d37,2025-03-04T16:15:36.317000 +CVE-2025-0289,0,1,bde669fd45186b8a31a5a0375129ab340a8c051d355c15c4807dca5af7b187de,2025-03-04T16:15:36.467000 CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 @@ -280457,7 +280463,7 @@ CVE-2025-0825,0,0,a0334191040ddd84cf58e374702797f73c6f21c21dcc064c3fd05efc814927 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000 -CVE-2025-0840,0,0,79ef33a6b34430ee30098d47cac5f4328a851ed337a384616ad40711bf9306bf,2025-01-29T20:15:35.007000 +CVE-2025-0840,0,1,582d68c7d01609df8f75b41175c198a68760a9d4af98efb8dd178ec4d57bbaae,2025-03-04T14:53:43.637000 CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000 CVE-2025-0842,0,0,880989b2076d537c6bb018739fce330a49d894aec3d353193ef18e6fe884c71a,2025-02-25T19:45:04.700000 CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f69,2025-02-04T17:16:08.127000 @@ -280616,7 +280622,7 @@ CVE-2025-1102,0,0,0a58fac809cb082841f9122cd183bbcaae0c3230347602227d2b0c09eb06da CVE-2025-1103,0,0,0e526fd4466d75abc344bf0bd683cde20cd72e5c520f7b078f91058dbcc62271,2025-02-07T16:15:39.973000 CVE-2025-1104,0,0,cd698b7fb9abc7a0e8cf365342427529ce4ee897116a726790abd164b5d7a4e8,2025-02-07T17:15:31.477000 CVE-2025-1105,0,0,3bacdf77291dd429d5a36d299846ec2970e0b6d32e073b87ebe633608b8b63d8,2025-02-07T18:15:28.433000 -CVE-2025-1106,0,0,a3b8b89a6d6841c31a035bb06d6cbb743b91b68a5569eb34eac7fb1ed0d7d04b,2025-02-07T19:15:24.613000 +CVE-2025-1106,0,1,524d2874116becb8ba796cd93b1a3dfabff51569f8ccd989ff4bae924e49e1aa,2025-03-04T14:53:43.637000 CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000 @@ -280637,9 +280643,9 @@ CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000 CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000 CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000 -CVE-2025-1147,0,0,a91ddadecd3b5a2c253a89bf4197712aa1818ad0485210aad82264eeb6af62ce,2025-02-10T14:15:29.643000 +CVE-2025-1147,0,1,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000 CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e57c,2025-02-10T14:15:29.927000 -CVE-2025-1149,0,0,d8d91fe8a3ea61c4ba8a8728b35b19cb024f17e8929c6b84c98db6467585ef43,2025-02-10T15:15:13.093000 +CVE-2025-1149,0,1,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000 CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000 CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000 CVE-2025-1152,0,0,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000 @@ -280789,6 +280795,8 @@ CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3d CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000 CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 +CVE-2025-1424,1,1,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000 +CVE-2025-1425,1,1,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000 CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000 CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 @@ -280998,7 +281006,7 @@ CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42 CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000 CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000 CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000 -CVE-2025-1893,0,1,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000 +CVE-2025-1893,0,0,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000 CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000 CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 @@ -281007,26 +281015,26 @@ CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c CVE-2025-1899,0,0,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000 CVE-2025-1900,0,0,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000 CVE-2025-1901,0,0,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000 -CVE-2025-1902,0,0,471c441de14373e77348d0bbdc653bd5f8e13826241da34d0938b9485f96b4a8,2025-03-04T04:15:12.210000 -CVE-2025-1903,0,0,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b750429807,2025-03-04T04:15:12.383000 -CVE-2025-1904,0,0,c3f8c1fa1d9579c4d82bc617eae230933b987e0aaee6ca3786c17750a6074cf8,2025-03-04T05:15:14.440000 -CVE-2025-1905,0,0,544d2a978ea2a42a58a9b1374a4628e0334caacaa4fa4d5b01db57902479138d,2025-03-04T05:15:14.680000 -CVE-2025-1906,0,0,459dada4012727e3771610e3a7119b7d5a5efce1dfb2febc2be2da9752686a5c,2025-03-04T05:15:14.903000 -CVE-2025-1925,1,1,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 -CVE-2025-1930,1,1,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000 -CVE-2025-1931,1,1,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000 -CVE-2025-1932,1,1,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000 -CVE-2025-1933,1,1,af60cb7e54d694102cf1a34b3bf8a3d7b976ad074c5c72afe1edcea9c3030cb9,2025-03-04T14:15:38.170000 -CVE-2025-1934,1,1,defda1fa968f2d1f6b4bab5407943d1f18c163966bf3940bc1ce343e2dc494af,2025-03-04T14:15:38.273000 -CVE-2025-1935,1,1,628d9831cfde3bf6c1721fb5b4eb6426bb6f2fece608e7b61bb7df00efe8d704,2025-03-04T14:15:38.390000 -CVE-2025-1936,1,1,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000 -CVE-2025-1937,1,1,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000 -CVE-2025-1938,1,1,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000 -CVE-2025-1939,1,1,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 -CVE-2025-1940,1,1,5dbf44d5cc7ae5e21d3790ba36646b5bedeb9ad84f1c6a4302111774521a8db2,2025-03-04T14:15:38.950000 -CVE-2025-1941,1,1,e65f467cf8ffb9224f34a01e5cdb113d9511f46ba9c9c07e683575d280ecf13e,2025-03-04T14:15:39.063000 -CVE-2025-1942,1,1,643dcf7b843a42dc9ccb28b7e76a8aa357d034b38c8e0ef0ed7c25ddc2827490,2025-03-04T14:15:39.167000 -CVE-2025-1943,1,1,e9f1827e222fe2c9d54915e014c7896e9d0f61d9e34695a6c9e7975aa52b9e5a,2025-03-04T14:15:39.260000 +CVE-2025-1902,0,1,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000 +CVE-2025-1903,0,1,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612c4,2025-03-04T16:15:37.577000 +CVE-2025-1904,0,1,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000 +CVE-2025-1905,0,1,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000 +CVE-2025-1906,0,1,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 +CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 +CVE-2025-1930,0,0,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000 +CVE-2025-1931,0,0,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000 +CVE-2025-1932,0,0,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000 +CVE-2025-1933,0,1,013824cf9256af099bc6347ceda0ada705eda8a2cf83be8ba6383655963c9e57,2025-03-04T16:15:37.823000 +CVE-2025-1934,0,1,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6b0,2025-03-04T16:15:37.970000 +CVE-2025-1935,0,1,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000 +CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000 +CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000 +CVE-2025-1938,0,0,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000 +CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 +CVE-2025-1940,0,1,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 +CVE-2025-1941,0,1,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 +CVE-2025-1942,0,1,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000 +CVE-2025-1943,0,1,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 @@ -281193,7 +281201,7 @@ CVE-2025-21176,0,0,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd89 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 CVE-2025-21178,0,0,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000 CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000 -CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000 +CVE-2025-21181,0,1,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000 CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000 CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000 CVE-2025-21184,0,0,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000 @@ -281393,7 +281401,7 @@ CVE-2025-21394,0,0,4ccc160d26f412d0660db2820673933d53f9e960ede3214b61aa7e3d64874 CVE-2025-21395,0,0,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 -CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 +CVE-2025-21399,0,1,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000 CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 CVE-2025-21401,0,0,e4d9e7c879800da1629474ad618445ce941bd3b909c5b2d4a6d10765a7fe87ae,2025-02-18T17:15:20.057000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 @@ -281522,8 +281530,8 @@ CVE-2025-21620,0,0,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be094 CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000 -CVE-2025-21626,0,1,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000 -CVE-2025-21627,0,1,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000 +CVE-2025-21626,0,0,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000 +CVE-2025-21627,0,0,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000 CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000 CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000 CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08 @@ -281760,9 +281768,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000 CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000 -CVE-2025-22224,0,0,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000 -CVE-2025-22225,0,0,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000 -CVE-2025-22226,0,0,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000 +CVE-2025-22224,0,1,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000 +CVE-2025-22225,0,1,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000 +CVE-2025-22226,0,1,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -281865,7 +281873,7 @@ CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6a CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000 CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000 -CVE-2025-22402,0,0,f76cbab41280a8de72b99de03f7ca0b8e04580815d7e99e01923e9b1697ba28c,2025-02-07T03:15:12.287000 +CVE-2025-22402,0,1,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000 CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 @@ -281974,7 +281982,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02 CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 -CVE-2025-22604,0,0,f2e2f3e5714493a0587fb09fddd55f91c682225656d2d60d4b600d17f03f7fdd,2025-01-27T17:15:17.307000 +CVE-2025-22604,0,1,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000 CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000 CVE-2025-22607,0,0,7c0a771fa15c2fffda62d633c9927cd84470e8d10f639a2980e7fc8bdf835ab5,2025-01-24T16:15:38.470000 @@ -282208,7 +282216,7 @@ CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e CVE-2025-23020,0,0,ddc02947f0b59a5de6e6a776839dec2cf08c84bac344560dd2b477015ae3c297,2025-02-20T03:15:12.630000 CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000 CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000 -CVE-2025-23024,0,1,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000 +CVE-2025-23024,0,0,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000 CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 CVE-2025-23027,0,0,3d8a20e7f66f71ebfff4348388587603a6ab48265ca2628da8f07052fa639ed0,2025-01-13T20:15:30.150000 @@ -282294,7 +282302,7 @@ CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83 CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000 CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000 CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000 -CVE-2025-23208,0,0,0895c6a64980853d0ca71f84de6b0e100f054b96d041a45a6799d08d97b8f9cb,2025-01-17T23:15:13.107000 +CVE-2025-23208,0,1,18e8dd4156ff7a971fcd6f122778478e5486080caeaf8f18c2797a06dc02b4cb,2025-03-04T14:45:17.807000 CVE-2025-23209,0,0,5039cc636732004b36d1abe67ffc1f35372cacab530b3970be9516a2d86f22df,2025-02-21T14:48:55.367000 CVE-2025-23210,0,0,65bcfc40caedf4e3c9e8b75bd933193b1248e3166d8ac42679477e8b6066d8bd,2025-02-03T22:15:28.187000 CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6770,2025-01-28T17:15:26.160000 @@ -282321,6 +282329,7 @@ CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e72412009724 CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 +CVE-2025-23368,1,1,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000 CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 @@ -283530,14 +283539,14 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6 CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 -CVE-2025-25379,0,0,738b03ca4625962dfa89966740701d4df3897a8e4af1f92e80e1cd49976c0c26,2025-02-28T23:15:10.790000 +CVE-2025-25379,0,1,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 -CVE-2025-25428,0,0,7c9e8b5adbcec4172a435bc0445a832224ef2aaebd6fa92be1fbe29fc2ee9ecb,2025-02-28T19:15:36.773000 +CVE-2025-25428,0,1,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 -CVE-2025-25430,0,0,94a67adc555362067a515c38cf02aeb84a8bd7c8fa8c3cd90b22df5262795fa8,2025-02-28T18:15:28.263000 -CVE-2025-25431,0,0,226362430653b83ef54d39ec1534ee38f2c2c9ca36c02c59252ca3699e225ad2,2025-02-28T18:15:28.407000 +CVE-2025-25430,0,1,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 +CVE-2025-25431,0,1,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 @@ -283549,7 +283558,7 @@ CVE-2025-25472,0,0,6c6dc9c03a8c0408df3e1a9caeca7e0bfec3e9936d5584756b38960f4938d CVE-2025-25473,0,0,e8e0a8342346bf2f32dfaaee95898f0b633608ccb1cba92ce43fca3dc31e73b1,2025-02-20T22:15:30.863000 CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4113,2025-02-20T22:15:31.027000 CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000 -CVE-2025-25476,0,0,295ca2449e77c24dfd41b0e6988f848bd5ebe2b3b39dd8048ab6a39488795ccf,2025-02-28T23:15:11.063000 +CVE-2025-25476,0,1,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000 CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,12db196fdbdedfe1d57ae93bb18fa9d9c8691821fcbf897c2d62e811de8bb585,2025-02-28T23:15:11.170000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 @@ -283603,8 +283612,8 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 -CVE-2025-25759,0,0,b72901452c56894af5f21d8b6dd05a44d60e919231ddbb81928df2d768b4767b,2025-02-27T15:15:41.570000 -CVE-2025-25760,0,0,b30f302a0d601a35cec14bf52c6cebe6fec99ba9512ba110eec0ce813dd117f2,2025-02-27T15:15:41.670000 +CVE-2025-25759,0,1,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 +CVE-2025-25760,0,1,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 CVE-2025-25761,0,0,3db442c19fbfc76e4afa4e4eacc9350d95fd28b1bf92eb230c9d214105e6b76b,2025-02-27T15:15:41.777000 CVE-2025-25765,0,0,4771a7e87c33cb6b1bf793f3b79e4f059f64eb7778711124d0e26c1a7b4b4033,2025-03-03T20:15:46.433000 CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413b60,2025-03-03T20:15:46.600000 @@ -283694,6 +283703,7 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000 +CVE-2025-26320,1,1,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000 CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 @@ -283865,7 +283875,7 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 -CVE-2025-26849,0,0,54decf0050486d8bff18d33a6116f8f7ed807923bef5d3d8bf0649b9106ae882,2025-03-04T09:15:10.917000 +CVE-2025-26849,0,1,b13951f979e617745ee5f8ac921a867df9f510109c7775edd0473f90fdd96dd7,2025-03-04T16:15:40.360000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 @@ -283959,6 +283969,7 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000 CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000 CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 +CVE-2025-27111,1,1,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000 CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000 CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000 CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 @@ -284057,9 +284068,9 @@ CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000 CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000 CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000 -CVE-2025-27424,1,1,cc2945756d56b37d88e982abae75015a79e227fff15d34182659ed65557d5d90,2025-03-04T14:15:39.397000 -CVE-2025-27425,1,1,fbc4b3118251230ac7c7affcbb0b3e868553e04992c0c3515adecdf42212f11a,2025-03-04T14:15:39.493000 -CVE-2025-27426,1,1,860f9cbbdf2d294154d869e5bfa7c5c461d73af2f1e84fe2ef0c26777f1a316e,2025-03-04T14:15:39.593000 +CVE-2025-27424,0,1,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000 +CVE-2025-27425,0,1,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000 +CVE-2025-27426,0,1,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,ab06e5a6a9e6a84d5061b8c89a502ae1ba119ec86416a651117e80b7694ffcba,2025-03-03T19:15:36.027000 CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000