diff --git a/CVE-2020/CVE-2020-77xx/CVE-2020-7709.json b/CVE-2020/CVE-2020-77xx/CVE-2020-7709.json index ee2d6280b13..c881b892e4d 100644 --- a/CVE-2020/CVE-2020-77xx/CVE-2020-7709.json +++ b/CVE-2020/CVE-2020-77xx/CVE-2020-7709.json @@ -2,7 +2,7 @@ "id": "CVE-2020-7709", "sourceIdentifier": "report@snyk.io", "published": "2020-10-05T08:15:17.873", - "lastModified": "2024-11-21T05:37:39.330", + "lastModified": "2025-03-05T16:25:09.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:smallpdf:json-pointer:*:*:*:*:*:node.js:*:*", + "criteria": "cpe:2.3:a:manuelstofer:json-pointer:*:*:*:*:*:node.js:*:*", "versionEndExcluding": "0.6.1", - "matchCriteriaId": "932B7E85-3F8D-4572-AAC6-AECFCB914C8A" + "matchCriteriaId": "DC87709D-5381-4E55-891C-CE3F2FE6919E" } ] } diff --git a/CVE-2021/CVE-2021-238xx/CVE-2021-23807.json b/CVE-2021/CVE-2021-238xx/CVE-2021-23807.json index 5f1144292ca..f361b44e0ff 100644 --- a/CVE-2021/CVE-2021-238xx/CVE-2021-23807.json +++ b/CVE-2021/CVE-2021-238xx/CVE-2021-23807.json @@ -2,7 +2,7 @@ "id": "CVE-2021-23807", "sourceIdentifier": "report@snyk.io", "published": "2021-11-03T18:15:08.230", - "lastModified": "2024-11-21T05:51:53.750", + "lastModified": "2025-03-05T16:24:40.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jsonpointer_project:jsonpointer:*:*:*:*:*:node.js:*:*", + "criteria": "cpe:2.3:a:janl:jsonpointer:*:*:*:*:*:node.js:*:*", "versionEndExcluding": "5.0.0", - "matchCriteriaId": "9BFA123B-3852-4DD3-B0CE-FB58D0523294" + "matchCriteriaId": "320DE2B5-606F-4DC3-B80D-A5A681A1F768" } ] } diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36396.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36396.json index ae8a53e1137..acaaa79b528 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36396.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36396.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36396", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T21:15:10.577", - "lastModified": "2024-11-21T06:13:40.670", + "lastModified": "2025-03-05T16:15:35.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46394.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46394.json index 696a4513156..be3dd0a6950 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46394.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46394.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46394", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T19:15:10.613", - "lastModified": "2024-11-21T07:30:30.737", + "lastModified": "2025-03-05T16:15:36.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json index 77a0c6ede57..8e0dc484ff9 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48701", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T16:15:08.547", - "lastModified": "2024-11-21T07:33:49.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,234 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: corrige un error fuera de los l\u00edmites en __snd_usb_parse_audio_interface() Puede haber un dispositivo de audio USB defectuoso con una ID de USB de (0x04fa, 0x4201) y el Si el n\u00famero de interfaces es inferior a 4, se produce un error de lectura fuera de l\u00edmites al analizar el descriptor de interfaz para este dispositivo. Solucione este problema verificando la cantidad de interfaces." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.328", + "matchCriteriaId": "82C9EA22-96BE-488C-A979-0A1FBD90A0AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.293", + "matchCriteriaId": "5D9B742D-912D-4E0C-A42F-367086FDEA88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.258", + "matchCriteriaId": "253D30F5-3734-4663-883A-288786D3B66E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.213", + "matchCriteriaId": "4C373116-9E23-44BA-A6B7-87C8BF5C3B85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.143", + "matchCriteriaId": "E77EECF5-C31E-4342-8014-AA844BB83A76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.68", + "matchCriteriaId": "C440CED2-FE3C-495D-839C-857FFC6F523A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.19.9", + "matchCriteriaId": "B4895A99-6E1B-4C76-A510-FDED00AD7D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json index f6f0cb60129..e43da7964ce 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48702", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T16:15:08.593", - "lastModified": "2024-11-21T07:33:49.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,234 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ALSA: emu10k1: corrige el acceso fuera de los l\u00edmites en snd_emu10k1_pcm_channel_alloc() El asignador de voz a veces comienza a asignar desde cerca del final de la matriz y luego regresa, sin embargo, snd_emu10k1_pcm_channel_alloc() accede al nuevo asign\u00f3 voces como si nunca hubiera terminado. Esto da como resultado un acceso fuera de los l\u00edmites si la primera voz tiene un \u00edndice lo suficientemente alto como para que primera_voz + recuento_de_voces_solicitadas > NUM_G (64). Cuantas m\u00e1s voces se soliciten, m\u00e1s probabilidades habr\u00e1 de que esto ocurra. Esto se descubri\u00f3 inicialmente usando PipeWire, sin embargo, se puede reproducir llamando a aplay varias veces con 16 canales: aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero UBSAN: array-index-out -of-bounds en sound/pci/emu10k1/emupcm.c:127:40 el \u00edndice 65 est\u00e1 fuera de rango para el tipo 'snd_emu10k1_voice [64]' CPU: 1 PID: 31977 Comm: aplay Contaminado: GW IOE 6.0.0-rc2 -emu10k1+ #7 Nombre del hardware: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 22/07/2010 Seguimiento de llamadas: dump_stack_lvl+0x49/0x63 dump_stack+0x10/0x16 ubsan_epilogue+0x9/0x3f __ubsan_handle_out_of_bounds.cold + 0x44/0x49 snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1] snd_pcm_hw_params+0x29f/0x600 [snd_pcm] snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm] ? exit_to_user_mode_prepare+0x35/0x170? do_syscall_64+0x69/0x90? syscall_exit_to_user_mode+0x26/0x50? do_syscall_64+0x69/0x90? exit_to_user_mode_prepare+0x35/0x170 snd_pcm_ioctl+0x27/0x40 [snd_pcm] __x64_sys_ioctl+0x95/0xd0 do_syscall_64+0x5c/0x90 ? do_syscall_64+0x69/0x90? do_syscall_64+0x69/0x90 entrada_SYSCALL_64_after_hwframe+0x63/0xcd" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.328", + "matchCriteriaId": "82C9EA22-96BE-488C-A979-0A1FBD90A0AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.293", + "matchCriteriaId": "5D9B742D-912D-4E0C-A42F-367086FDEA88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.258", + "matchCriteriaId": "253D30F5-3734-4663-883A-288786D3B66E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.213", + "matchCriteriaId": "4C373116-9E23-44BA-A6B7-87C8BF5C3B85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.143", + "matchCriteriaId": "E77EECF5-C31E-4342-8014-AA844BB83A76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.68", + "matchCriteriaId": "C440CED2-FE3C-495D-839C-857FFC6F523A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.19.9", + "matchCriteriaId": "CDB5FDE9-1E3B-4462-8595-E937AA442258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/39a90720f3abe96625d1224e7a7463410875de4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4204a01ffce97cae1d59edc5848f02be5b2b9178", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45321a7d02b7cf9b3f97e3987fc1e4d649b82da2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45814a53514e10a8014906c882e0d0d38df39cc1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/637c5310acb48fffcc5657568db3f3e9bc719bfa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b0e260ac3cf289e38446552461caa65e6dab275", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88aac6684cf8bc885cca15463cb4407e91f28ff7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d29f59051d3a07b81281b2df2b8c9dfe4716067f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39a90720f3abe96625d1224e7a7463410875de4c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4204a01ffce97cae1d59edc5848f02be5b2b9178", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45321a7d02b7cf9b3f97e3987fc1e4d649b82da2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45814a53514e10a8014906c882e0d0d38df39cc1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/637c5310acb48fffcc5657568db3f3e9bc719bfa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b0e260ac3cf289e38446552461caa65e6dab275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88aac6684cf8bc885cca15463cb4407e91f28ff7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d29f59051d3a07b81281b2df2b8c9dfe4716067f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json index 994cb78020b..e2432e9bcb4 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48703", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T16:15:08.650", - "lastModified": "2024-11-21T07:33:49.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,98 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Thermal/int340x_thermal: maneja data_vault cuando el valor es ZERO_SIZE_PTR. En algunos casos, el GDDV devuelve un paquete con un buffer que tiene longitud cero. Provoca que kmemdup() devuelva ZERO_SIZE_PTR (0x10). Luego, data_vault_read() tuvo un problema de desreferencia de punto NULL al acceder al valor 0x10 en data_vault. [71.024560] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000010 Este parche usa ZERO_OR_NULL_PTR() para verificar ZERO_SIZE_PTR o el valor NULL en data_vault." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.19.9", + "matchCriteriaId": "A99BA199-0BFA-4BF0-A0C7-3EBC72400E1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7931e28098a4c1a2a6802510b0cbe57546d2049d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dae42083b045a4ddf71c57cf350cb2412b5915c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7931e28098a4c1a2a6802510b0cbe57546d2049d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dae42083b045a4ddf71c57cf350cb2412b5915c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22890.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22890.json index 1aedf6c0ecd..b433eeaa831 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22890.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22890.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22890", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T21:15:10.703", - "lastModified": "2024-11-21T07:45:35.493", + "lastModified": "2025-03-05T15:15:11.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24775.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24775.json index 1b948fbdf5c..bfa3afb5b42 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24775.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24775.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24775", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-07T18:15:09.117", - "lastModified": "2024-11-21T07:48:23.700", + "lastModified": "2025-03-05T15:15:12.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25143.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25143.json index 39c8e90c04e..5d4b3f3ffc7 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25143.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25143.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25143", "sourceIdentifier": "security@trendmicro.com", "published": "2023-03-10T21:15:14.883", - "lastModified": "2024-11-21T07:49:11.480", + "lastModified": "2025-03-05T15:15:12.443", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25223.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25223.json index d5e759e9196..ae129c0aac2 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25223.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25223.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25223", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-07T17:15:12.703", - "lastModified": "2024-11-21T07:49:20.550", + "lastModified": "2025-03-05T16:15:36.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json new file mode 100644 index 00000000000..e1122100699 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-38693", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T16:15:37.007", + "lastModified": "2025-03-05T16:15:37.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lucee/Lucee/security/advisories/GHSA-vwjx-mmwm-pwrf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json index 2062478b91b..5a2a20b57ea 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6731", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:08.150", - "lastModified": "2024-11-21T08:44:26.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:generatepress:wp_show_posts:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.6", + "matchCriteriaId": "297C6782-FB3D-4DF1-9C61-1278874C510C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071911%40wp-show-posts%2Ftrunk&old=3041416%40wp-show-posts%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6bb3680-0623-4633-971e-3bc4a52dfad3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071911%40wp-show-posts%2Ftrunk&old=3041416%40wp-show-posts%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6bb3680-0623-4633-971e-3bc4a52dfad3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json new file mode 100644 index 00000000000..575bd32ab21 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12799", + "sourceIdentifier": "security@opentext.com", + "published": "2025-03-05T15:15:13.127", + "lastModified": "2025-03-05T15:15:13.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently Protected Credentials\nvulnerability in OpenText Identity Manager Advanced Edition on Windows, Linux,\n64 bit allows Privilege Abuse. This vulnerability could allow an\nauthenticated user to obtain higher privileged user\u2019s sensitive information via\ncrafted payload.\n\nThis issue affects Identity Manager Advanced\nEdition: from 4.8.0.0 through 4.8.7.0102, 4.9.0.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:H/U:Red", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "PRESENT", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "RED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000037455", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json index 1a53bf43a28..2ad61235f1a 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1572", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:11.780", - "lastModified": "2024-11-21T08:50:51.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.0", + "matchCriteriaId": "FB35FA70-ED4C-4F42-AE7E-77F3321A6E46" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json index 701f40e865f..62440da2b66 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1759", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:12.983", - "lastModified": "2024-11-21T08:51:15.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.0", + "matchCriteriaId": "FB35FA70-ED4C-4F42-AE7E-77F3321A6E46" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/admin/classes/class-wp-ulike-widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d844ca83-84e5-4b6c-ae26-f300c7328d78?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/admin/classes/class-wp-ulike-widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d844ca83-84e5-4b6c-ae26-f300c7328d78?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json index 34b4c089993..f9b9f61bff0 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1797", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:13.150", - "lastModified": "2024-11-21T08:51:20.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.0", + "matchCriteriaId": "FB35FA70-ED4C-4F42-AE7E-77F3321A6E46" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3052611%40wp-ulike&new=3052611%40wp-ulike&sfp_email=&sfph_mail=#file43", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d225dee1-305c-4378-bc07-192347a0c838?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3052611%40wp-ulike&new=3052611%40wp-ulike&sfp_email=&sfph_mail=#file43", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d225dee1-305c-4378-bc07-192347a0c838?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json index 4f5413246ca..5119c55d0ad 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23081", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.757", - "lastModified": "2024-11-21T08:56:54.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -22,31 +22,101 @@ "value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente org.treeten.bp.LocalDate::compareTo(ChronoLocalDate)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:threeten:threeten_backport:1.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D09D261-8F05-4520-BD47-7470DD0B01AF" + } + ] + } + ] + } + ], "references": [ { "url": "http://threeten.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/LLM4IG/3cc9183dcd887020368a0bafeafec5e3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ThreeTen/threetenbp", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://threeten.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/LLM4IG/3cc9183dcd887020368a0bafeafec5e3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ThreeTen/threetenbp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2561.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2561.json index 72b5543b30e..2ff0632732a 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2561.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2561", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T11:15:06.540", - "lastModified": "2024-11-21T09:10:00.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:74cms:74cms:3.28.0:*:*:*:*:*:*:*", + "matchCriteriaId": "44AA0651-E3D9-4A47-B719-189F26AC633F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Southseast/9f5284d8ee0f6d91e72eef73b285512a", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257060", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257060", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://gist.github.com/Southseast/9f5284d8ee0f6d91e72eef73b285512a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257060", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257060", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2562.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2562.json index 94c7dbfb999..c4b23fe00a2 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2562.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2562", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T12:15:07.343", - "lastModified": "2024-11-21T09:10:01.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-03-10", + "matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PandaXGO/PandaX/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.257061", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257061", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/PandaXGO/PandaX/issues/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.257061", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257061", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2563.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2563.json index 6dc6efcc4a3..eedadf6db46 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2563.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2563.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2563", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T12:15:07.617", - "lastModified": "2024-11-21T09:10:01.167", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-03-10", + "matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PandaXGO/PandaX/pull/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.257062", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257062", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/PandaXGO/PandaX/pull/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.257062", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257062", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2565.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2565.json index 1d2356c22e7..ee666a1dc79 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2565.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2565", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T15:15:07.187", - "lastModified": "2024-11-21T09:10:01.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-03-10", + "matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PandaXGO/PandaX/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.257064", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257064", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/PandaXGO/PandaX/issues/5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.257064", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257064", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2566.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2566.json index fcc005f1d52..39dea41bd92 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2566.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2566", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T15:15:07.420", - "lastModified": "2024-11-21T09:10:01.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kelixin_communication_command_and_dispatch_project:kelixin_communication_command_and_dispatch:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-03-13", + "matchCriteriaId": "F3092E4E-FA61-4B39-8905-983882970FF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-get_extension_yl.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257065", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257065", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-get_extension_yl.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257065", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257065", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json index 9cd90ec9a69..344013d56ef 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27026", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.940", - "lastModified": "2024-11-21T09:03:41.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vmxnet3: corrige la falta de espacio reservado. Use rbi->len en lugar de rcd->len para paquetes que no son de datos. Problema encontrado: XDP_WARN: xdp_update_frame_from_buff(line:278): ERROR del controlador: falta el cuarto de cola reservado ADVERTENCIA: CPU: 0 PID: 0 en net/core/xdp.c:586 xdp_warn+0xf/0x20 CPU: 0 PID: 0 Comm: swapper /0 Contaminado: GWO 6.5.1 #1 RIP: 0010:xdp_warn+0xf/0x20 ... ? xdp_warn+0xf/0x20 xdp_do_redirect+0x15f/0x1c0 vmxnet3_run_xdp+0x17a/0x400 [vmxnet3] vmxnet3_process_xdp+0xe4/0x760 [vmxnet3] ? vmxnet3_tq_tx_complete.isra.0+0x21e/0x2c0 [vmxnet3] vmxnet3_rq_rx_complete+0x7ad/0x1120 [vmxnet3] vmxnet3_poll_rx_only+0x2d/0xa0 [vmxnet3] __napi_poll+0x20/0x180 net_rx_action+0x177/ 0x390" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "5B28A88F-F85F-4008-8F7C-44FC9152916E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7c8505ecc2d15473d679b8e06335434b84fffe86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91d017d19d5a9ad153e2dc23ed3c0e2e79ef5262", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aba8659caf88017507419feea06069f529329ea6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e127ce7699c1e05279ee5ee61f00893e7bfa9671", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c8505ecc2d15473d679b8e06335434b84fffe86", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91d017d19d5a9ad153e2dc23ed3c0e2e79ef5262", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aba8659caf88017507419feea06069f529329ea6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e127ce7699c1e05279ee5ee61f00893e7bfa9671", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json index 6a5aab04dcb..48d069acd5b 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27061", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.593", - "lastModified": "2024-11-21T09:03:46.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: sun8i-ce: se corrige el use after free en unprepare. Se debe llamar a sun8i_ce_cipher_unprepare antes de crypto_finalize_skcipher_request, porque las devoluciones de llamada del cliente pueden liberar inmediatamente memoria, que ya no es necesaria. Pero ser\u00e1 utilizado por los que no est\u00e9n preparados despu\u00e9s de ser gratuito. Antes de eliminar las devoluciones de llamada de preparaci\u00f3n/despreparaci\u00f3n, el motor criptogr\u00e1fico lo manejaba en crypto_finalize_request. Por lo general, esto resulta en un problema de desreferencia del puntero durante una autoprueba en criptograf\u00eda. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000030 Informaci\u00f3n de cancelaci\u00f3n de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: falla de traducci\u00f3n de nivel 0 Informaci\u00f3n de cancelaci\u00f3n de datos: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 usuario pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=000000004716d000 [0000000000000030] pgd=0000000000000000, p4d=000000000000000000 Error interno: Ups: 0000000096000004 [# 1] SMP Este problema tambi\u00e9n lo detecta KASAN. ==================================================== ================ ERROR: KASAN: slab-use-after-free en sun8i_ce_cipher_do_one+0x6e8/0xf80 [sun8i_ce] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff00000dcdc040 por tarea 1c15000.crypto-/ 373 Nombre del hardware: Pine64 PinePhone (1.2) (DT) Rastreo de llamadas: dump_backtrace+0x9c/0x128 show_stack+0x20/0x38 dump_stack_lvl+0x48/0x60 print_report+0xf8/0x5d8 kasan_report+0x90/0xd0 __asan_load8+0x9c/0xc0 _cipher_do_one+0x6e8/0xf80 [sun8i_ce] crypto_pump_work+0x354/0x620 [crypto_engine] kthread_worker_fn+0x244/0x498 kthread+0x168/0x178 ret_from_fork+0x10/0x20 Asignado por tarea 379: kasan_save_stack+0x3c/0x68 c/0x40 kasan_save_alloc_info+0x24/0x38 __kasan_kmalloc+0xd4/ 0xd8 __kmalloc+0x74/0x1d0 alg_test_skcipher+0x90/0x1f0 alg_test+0x24c/0x830 cryptomgr_test+0x38/0x60 kthread+0x168/0x178 ret_from_fork+0x10/0x20 Liberado por la tarea 379: 3c/0x68 kasan_set_track+0x2c/0x40 kasan_save_free_info+0x38/ 0x60 __kasan_slab_free+0x100/0x170 slab_free_freelist_hook+0xd4/0x1e8 __kmem_cache_free+0x15c/0x290 kfree+0x74/0x100 kfree_SENSITIVE+0x80/0xb0 alg_test_skcipher+0x12c/0x1f0 24c/0x830 cryptomgr_test+0x38/0x60 kthread+0x168/0x178 ret_from_fork+0x10/ 0x20 La direcci\u00f3n con errores pertenece al objeto en ffff00000dcdc000 que pertenece al cach\u00e9 kmalloc-256 de tama\u00f1o 256. La direcci\u00f3n con errores se encuentra a 64 bytes dentro de la regi\u00f3n liberada de 256 bytes [ffff00000dcdc000, ffff00000dcdc100)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "0A32A237-A8EE-4654-9BB7-94C95ED898F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/183420038444547c149a0fc5f58e792c2752860c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51a7d338c212e0640b1aca52ba6590d5bea49879", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc60b25540c82fc4baa95d1458ae96ead21859e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/183420038444547c149a0fc5f58e792c2752860c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51a7d338c212e0640b1aca52ba6590d5bea49879", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc60b25540c82fc4baa95d1458ae96ead21859e0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json index de1c01a05ab..65defaecaac 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27079", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.443", - "lastModified": "2024-11-21T09:03:49.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/vt-d: corrige el dominio NULL al lanzar el dispositivo. En el kernel kdump, IOMMU opera en modo deferred_attach. En este modo, es posible que info->dominio a\u00fan no est\u00e9 asignado cuando se llama a la funci\u00f3n release_device. Conduce al siguiente bloqueo en el kernel bloqueado: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 000000000000003c ... RIP: 0010:do_raw_spin_lock+0xa/0xa0 ... _raw_spin_lock_irqsave+0x1b/0x30 intel_iommu_release_device+0x96/0x170 +0x39/ 0xf0 __iommu_group_remove_device+0xa0/0xd0 iommu_bus_notifier+0x55/0xb0 notifier_call_chain+0x5a/0xd0 blocking_notifier_call_chain+0x41/0x60 bus_notify+0x34/0x50 device_del+0x269/0x3d0 vice+0x77/0x100 p2sb_bar+0xae/0x1d0 ... i801_probe+0x423/0x740 Uso el mecanismo release_domain para solucionarlo. La entrada de contexto del modo escalable que no forma parte del dominio de lanzamiento debe borrarse en release_device()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "8EE257FD-236E-4180-A5F9-5DAA3C10F6F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/333fe86968482ca701c609af590003bcea450e8f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81e921fd321614c2ad8ac333b041aae1da7a1c6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/333fe86968482ca701c609af590003bcea450e8f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81e921fd321614c2ad8ac333b041aae1da7a1c6d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json index 72af6dd6ee6..d3425f6e806 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31903", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-22T16:15:29.030", - "lastModified": "2025-01-22T16:15:29.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T16:02:20.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "61E77E5A-B2DD-4ABA-BD86-7D097EB0AC8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.2", + "matchCriteriaId": "AC25541C-DC23-4384-8DA8-30A7528FD1AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7172233", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json index c7f0a84648c..471168da798 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31913", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-06T16:15:28.163", - "lastModified": "2025-01-06T16:15:28.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T16:02:20.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "61E77E5A-B2DD-4ABA-BD86-7D097EB0AC8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.2", + "matchCriteriaId": "AC25541C-DC23-4384-8DA8-30A7528FD1AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176081", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32567.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32567.json index 6c4b9da1a5f..3bb56a711af 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32567.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32567", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T10:15:10.910", - "lastModified": "2024-11-21T09:15:11.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:designinvento:directorypress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.8", + "matchCriteriaId": "60543EFB-43BF-401C-BCBA-0463ED7FF4B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/directorypress/wordpress-directorypress-plugin-3-6-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/directorypress/wordpress-directorypress-plugin-3-6-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32977.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32977.json index 79d4ec18ea1..32a36ee300d 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32977.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32977", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T16:17:12.590", - "lastModified": "2024-11-21T09:16:09.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 } ] }, @@ -51,22 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.10.1", + "matchCriteriaId": "17A95EDB-8459-432C-A6FF-E84427A4EB28" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OctoPrint/OctoPrint/commit/5afbec8d23508edc25b0f1bdef1620580136add4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/OctoPrint/OctoPrint/commit/5afbec8d23508edc25b0f1bdef1620580136add4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json index 84a588b9eb4..cac806e3a35 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33914", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-03T09:15:08.257", - "lastModified": "2024-11-21T09:17:43.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T15:11:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.6.9.2", + "matchCriteriaId": "032D8A14-6E57-42EB-BBBD-4ACB008E6AEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-1-broken-access-control-on-post-duplication-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-1-broken-access-control-on-post-duplication-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3719.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3719.json index ee70f148e0b..72c134dceb1 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3719.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3719", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-13T11:15:46.447", - "lastModified": "2024-11-21T09:30:14.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "43C975E7-ADB4-4AAF-8883-8998E01355B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%205.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260571", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260571", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%205.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260571", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260571", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.314205", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json index 33690a3fb98..2fdc44d75dc 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39312", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.547", - "lastModified": "2024-11-21T09:27:26.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,14 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:botan_project:botan:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.5", + "matchCriteriaId": "61B1DDAB-A102-4C7D-B680-1544D88151E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:botan_project:botan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.5.0", + "matchCriteriaId": "85DA9E3B-CA36-4070-941B-D6811931D262" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/randombit/botan/security/advisories/GHSA-jp24-56jm-gg86", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/randombit/botan/security/advisories/GHSA-jp24-56jm-gg86", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json index c64ba866a3e..5896b0d3593 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39319", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-26T16:15:07.947", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security-advisories@github.com", @@ -51,50 +73,127 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos:aimeos_frontend_controller:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.10.15", + "matchCriteriaId": "05061318-1635-43D5-A3AC-D50C5DBF09B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos:aimeos_frontend_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2021.04.1", + "versionEndExcluding": "2021.10.8", + "matchCriteriaId": "E56BF038-B298-4A8C-9A06-188F422058A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos:aimeos_frontend_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022.04.1", + "versionEndExcluding": "2022.10.8", + "matchCriteriaId": "85A13E16-25D0-4845-88B6-4C19AF1AC33D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos:aimeos_frontend_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.04.1", + "versionEndExcluding": "2023.10.9", + "matchCriteriaId": "F2D983DE-A57B-46AD-911E-44253A9A0373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos:aimeos_frontend_controller:2024.04.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9707F760-DC26-4879-8BB0-EA49A1E415B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/aimeos/ai-controller-frontend/commit/2ad5c062a629af374da470a319914c321c9bfee2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/53eebdc51fae34440dfd768a7811c169c7779aa9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/5833db6d18a889b94dc036dfb84b6f5cca73fbac", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/6ea6b82f5a1fc18c574cb6f97225930d139b14a5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/700da5ea2b622724b68c8684346bf74ac3bbca9b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/7c93139f86eff9ec26b117a8918e06ce6cc0000f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/ae7baa3f2fbf594c2c1e4b1aae83364a84b241a6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/cd8c95aa4663f54bd66a69c5952f2e42405426f3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/d4eac06f3a25330c089d8be4397f2ab1936dd9bb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/commit/f7c6a9ce2a6f5a9ad4af31313508870a78398f85", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-controller-frontend/security/advisories/GHSA-rw3j-574h-mrcq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39903.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39903.json index 84e673311e8..0ca30e381aa 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39903.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39903", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-12T15:15:11.177", - "lastModified": "2024-11-21T09:28:32.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:widgetti:solara:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.1", + "matchCriteriaId": "9075B59E-6E80-483D-9A8A-FE45449937CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/widgetti/solara/commit/df2fd66a7f4e8ffd36e8678697a8a4f76760dc54", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/widgetti/solara/security/advisories/GHSA-9794-pc4r-438w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/widgetti/solara/commit/df2fd66a7f4e8ffd36e8678697a8a4f76760dc54", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/widgetti/solara/security/advisories/GHSA-9794-pc4r-438w", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json index 042163fa292..b56650f4fe7 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45597", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-10T22:15:01.967", - "lastModified": "2024-09-11T16:26:11.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluto-lang:pluto:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "versionEndExcluding": "0.9.5", + "matchCriteriaId": "5C70FB7A-8911-49F4-8EC2-B9D290D70933" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PlutoLang/Pluto/pull/945", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-w8xp-pmx2-37w7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47821.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47821.json index f27260d98b2..2ac352bce18 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47821.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47821", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-25T23:15:02.530", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5A06D79-6D64-41FB-9040-17E9630DF4E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json index c2a21d4c8d7..81dec0904c7 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47836", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T20:15:06.350", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.12", + "matchCriteriaId": "E1C43E68-074E-42B1-B940-6D1304AB175C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-7c4c-749j-pfp2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50684.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50684.json index 24f5399b1e7..a36b1815c21 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50684.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50684", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T21:15:17.267", - "lastModified": "2025-02-26T21:15:17.267", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:14.537", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n para Android SunGrow iSolarCloud V2.1.6.20241017 y versiones anteriores utilizan una clave AES insegura para cifrar los datos del cliente (entrop\u00eda insuficiente). Esto puede permitir a los atacantes descifrar las comunicaciones interceptadas entre la aplicaci\u00f3n m\u00f3vil y iSolarCloud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], "references": [ { "url": "https://en.sungrowpower.com/security-notice-detail-2/6126", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5103.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5103.json index 3fa5c7c484e..314b1fb4587 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5103.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5103.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5103", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-19T21:15:06.893", - "lastModified": "2024-11-21T09:46:58.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3B428FEE-6202-4945-8D0F-4E4734D573EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265093", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265093", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338506", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265093", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265093", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338506", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5104.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5104.json index 4b0a24874d7..e36a0d9d0fe 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5104.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5104", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-19T22:15:24.520", - "lastModified": "2024-11-21T09:46:58.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3B428FEE-6202-4945-8D0F-4E4734D573EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%209.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265094", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265094", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338507", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%209.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265094", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265094", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338507", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5105.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5105.json index 77171aab427..d012c4d880b 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5105.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5105", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-19T23:15:07.320", - "lastModified": "2024-11-21T09:46:58.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3B428FEE-6202-4945-8D0F-4E4734D573EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2010.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265095", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265095", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338508", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2010.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338508", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5106.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5106.json index d545993b572..fa01d172cfc 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5106.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5106", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-19T23:15:07.600", - "lastModified": "2024-11-21T09:46:58.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3B428FEE-6202-4945-8D0F-4E4734D573EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2011.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265096", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265096", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338509", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2011.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265096", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265096", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.338509", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53676.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53676.json index 24f20992ece..e16c86fa462 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53676.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53676", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-27T01:15:05.250", - "lastModified": "2024-12-11T16:49:45.783", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T15:15:14.717", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -106,6 +106,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://github.com/pwnfuzz/POCs/tree/main/CVE-2024-53676", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1639.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1639.json index 7a848fc1696..7b4530541bf 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1639.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1639.json @@ -2,19 +2,43 @@ "id": "CVE-2025-1639", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-04T04:15:11.697", - "lastModified": "2025-03-04T04:15:11.697", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento Animation Addons for Elementor Pro para WordPress es vulnerable a la instalaci\u00f3n de complementos arbitrarios no autorizados debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n install_elementor_plugin_handler() en todas las versiones hasta la 1.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, instalen y activen complementos arbitrarios que pueden aprovecharse para infectar a\u00fan m\u00e1s a una v\u00edctima cuando Elementor no est\u00e1 activado en un sitio vulnerable." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -45,16 +69,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crowdytheme:arolax:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7", + "matchCriteriaId": "8D74F35E-060C-4BC1-AB28-040E0D5F4E86" + } + ] + } + ] } ], "references": [ { "url": "https://themeforest.net/item/arolax-creative-digital-agency-theme/53547630", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb310bdb-fc74-47b2-9371-3d10abd287fb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1695.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1695.json index 48c0b0b69d5..240402eb676 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1695.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1695.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1695", "sourceIdentifier": "f5sirt@f5.com", "published": "2025-03-04T01:15:10.063", - "lastModified": "2025-03-04T01:15:10.063", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:18:38.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In NGINX Unit before version 1.34.2 with the Java Language Module in use, undisclosed requests can lead to an infinite loop and cause an increase in CPU resource utilization. This vulnerability allows a remote attacker to cause a degradation that can lead to a limited denial-of-service (DoS). \u00a0There is no control plane exposure; this is a data plane issue only. \u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + }, + { + "lang": "es", + "value": "En NGINX Unit anterior a la versi\u00f3n 1.34.2 con el m\u00f3dulo de lenguaje Java en uso, las solicitudes no reveladas pueden generar un bucle infinito y provocar un aumento en la utilizaci\u00f3n de los recursos de la CPU. Esta vulnerabilidad permite que un atacante remoto provoque una degradaci\u00f3n que puede provocar una denegaci\u00f3n de servicio (DoS) limitada. No hay exposici\u00f3n del plano de control; se trata \u00fanicamente de un problema del plano de datos. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan." } ], "metrics": { @@ -91,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.29.1", + "versionEndExcluding": "1.34.2", + "matchCriteriaId": "C948A6A6-5CA3-47D1-8A7F-7245C1160D14" + } + ] + } + ] + } + ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000149959", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1714.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1714.json new file mode 100644 index 00000000000..4333aeb2dfc --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1714.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-1714", + "sourceIdentifier": "security@puppet.com", + "published": "2025-03-05T15:15:15.413", + "lastModified": "2025-03-05T15:15:15.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of Rate Limiting in Sign-up workflow in Perforce Gliffy prior to version 4.14.0-7\u00a0on Gliffy online allows attacker to enumerate valid user emails and potentially DOS the server" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@puppet.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@puppet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://perforce1.lightning.force.com/lightning/r/a91PA000001ScY1YAK/view", + "source": "security@puppet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json index 79ccb265ece..0c2545311cc 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1894", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T02:15:35.380", - "lastModified": "2025-03-04T02:15:35.380", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:18:38.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /search-result.php. La manipulaci\u00f3n del argumento searchdata provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Maochuyue/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298412", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298412", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json index 2e2cefbecc8..81e97d2af1e 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1895", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T02:15:36.163", - "lastModified": "2025-03-04T02:15:36.163", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:18:38.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tenda TX3 16.03.13.11_multi. This affects an unknown part of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Afecta a una parte desconocida del archivo /goform/setMacFilterCfg. La manipulaci\u00f3n del argumento deviceList provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,26 +144,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*", + "matchCriteriaId": "0C30310A-46F8-4A10-8718-B36DE179BA4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E287DCCF-7DF1-4FBE-8A50-A95E272A5B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_1.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298413", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298413", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506601", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1914.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1914.json index e285e7da1f2..5219f0963cb 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1914.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1914.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1914", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:10.233", - "lastModified": "2025-03-05T04:15:10.233", + "lastModified": "2025-03-05T15:15:15.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 134.0.6998.35 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1915.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1915.json index bbaa0521c5c..db4658aef83 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1915.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1915.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1915", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.147", - "lastModified": "2025-03-05T04:15:11.147", + "lastModified": "2025-03-05T15:15:15.743", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory in DevTools in Google Chrome on Windows prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "La limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido en DevTools en Google Chrome en Windows antes de la versi\u00f3n 134.0.6998.35 permiti\u00f3 que un atacante que convenciera a un usuario para que instalara una extensi\u00f3n maliciosa eludiera las restricciones de acceso a archivos a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1916.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1916.json index f7e5e0c49e5..1038420ccac 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1916.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1916.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1916", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.267", - "lastModified": "2025-03-05T04:15:11.267", + "lastModified": "2025-03-05T15:15:15.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Profiles in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "El use-after-free en los perfiles de Google Chrome anteriores a la versi\u00f3n 134.0.6998.35 permit\u00eda que un atacante que convenciera a un usuario para que instalara una extensi\u00f3n maliciosa pudiera explotar la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1917.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1917.json index bf4d26970b3..118ec03ad17 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1917.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1917.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1917", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.393", - "lastModified": "2025-03-05T04:15:11.393", + "lastModified": "2025-03-05T15:15:16.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Browser UI in Google Chrome on Android prior to 134.0.6998.35 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en la interfaz de usuario del navegador de Google Chrome en Android anterior a la versi\u00f3n 134.0.6998.35 permiti\u00f3 que un atacante remoto suplantara la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1918.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1918.json index 0e51f13f258..7baf751940f 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1918.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1918.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1918", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.520", - "lastModified": "2025-03-05T04:15:11.520", + "lastModified": "2025-03-05T15:15:16.223", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in PDFium in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en PDFium en Google Chrome anterior a la versi\u00f3n 134.0.6998.35 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de un archivo PDF manipulado por un usuario. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1919.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1919.json index 5d8393964c6..6f27e3f71ce 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1919.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1919.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1919", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.647", - "lastModified": "2025-03-05T04:15:11.647", + "lastModified": "2025-03-05T15:15:16.383", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Media en Google Chrome anterior a la versi\u00f3n 134.0.6998.35 permit\u00eda a un atacante remoto realizar potencialmente un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1921.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1921.json index 3a7ce753ecc..d154bdd69e1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1921.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1921.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1921", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.763", - "lastModified": "2025-03-05T04:15:11.763", + "lastModified": "2025-03-05T15:15:16.537", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Media Stream in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to obtain information about a peripheral via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en Media Stream en Google Chrome anterior a la versi\u00f3n 134.0.6998.35 permit\u00eda a un atacante remoto obtener informaci\u00f3n sobre un perif\u00e9rico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1922.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1922.json index 5969b62c6e7..4672d934008 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1922.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1922.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1922", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:11.887", - "lastModified": "2025-03-05T04:15:11.887", + "lastModified": "2025-03-05T15:15:16.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Selection in Google Chrome on Android prior to 134.0.6998.35 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en Selection en Google Chrome en Android anterior a la versi\u00f3n 134.0.6998.35 permiti\u00f3 que un atacante remoto convenciera a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1923.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1923.json index d8ac5e6bccc..bf728547bf7 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1923.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1923.json @@ -2,20 +2,47 @@ "id": "CVE-2025-1923", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-05T04:15:12.010", - "lastModified": "2025-03-05T04:15:12.010", + "lastModified": "2025-03-05T15:15:16.857", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en los mensajes de permiso en Google Chrome anteriores a la versi\u00f3n 134.0.6998.35 permit\u00eda que un atacante que convenciera a un usuario para que instalara una extensi\u00f3n maliciosa suplantara la interfaz de usuario a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Gravedad de seguridad de Chromium: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json index da00052b95b..5d1d6562762 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1963", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-05T00:15:37.723", - "lastModified": "2025-03-05T00:15:37.723", + "lastModified": "2025-03-05T16:15:37.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /reservation.php. The manipulation of the argument checkin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /reservation.php. La manipulaci\u00f3n del argumento checkin provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.511466", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ubfbuz3/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json index 9b7718ded19..b6d6b8d329c 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1965", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-05T01:15:11.600", - "lastModified": "2025-03-05T01:15:11.600", + "lastModified": "2025-03-05T15:15:17.107", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in projectworlds Online Hotel Booking 1.0. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument emailusername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ProjectWorlds Online Hotel Booking 1.0. Se trata de una funci\u00f3n desconocida del archivo /admin/login.php. La manipulaci\u00f3n del argumento emailusername provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.511473", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ubfbuz3/cve/issues/4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json index ecfdc8739b9..5f4b5d1748a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1966", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-05T02:15:36.157", - "lastModified": "2025-03-05T02:15:36.157", + "lastModified": "2025-03-05T15:15:17.260", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Pre-School Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Pre-School Enrollment System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/index.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.512039", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/SECWG/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json index 5a8a2f48f4b..054c52974ae 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1967", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-05T02:15:36.320", - "lastModified": "2025-03-05T02:15:36.320", + "lastModified": "2025-03-05T15:15:17.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /user_dashboard/donor.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Blood Bank Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /user_dashboard/donor.php. La manipulaci\u00f3n del nombre del argumento provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.512163", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/intercpt/XSS1/blob/main/XSS.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json new file mode 100644 index 00000000000..af78f29507f --- /dev/null +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2025-21095", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-03-05T16:15:37.487", + "lastModified": "2025-03-05T16:15:37.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal may lead to arbitrary file download. The score without \nleast privilege principle violation is as calculated below. In \ncombination with other issues it may facilitate further compromise of \nthe device. Remediation in Version 6.8.0, release date: 01-Mar-25." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://support.ixiacom.com/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://support.ixiacom.com/support-overview/product-support/downloads-updates", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-02", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.keysight.com/us/en/contact.html", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json new file mode 100644 index 00000000000..cf5a7ce1aa0 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22212", + "sourceIdentifier": "security@joomla.org", + "published": "2025-03-05T16:15:37.643", + "lastModified": "2025-03-05T16:15:37.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22212", + "source": "security@joomla.org" + }, + { + "url": "https://www.tassos.gr/", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json index 0ece6b9121d..ace3193118c 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json @@ -2,13 +2,24 @@ "id": "CVE-2025-22270", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T13:15:27.447", - "lastModified": "2025-02-28T13:15:27.447", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-05T16:15:37.797", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cvd@cert.pl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", "value": "An attacker with access to the Administration panel, specifically the \"Role Management\"\ntab, can\ninject code by adding a new role in the \"name\" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the\nrequired additional error that allows bypassing the Content-Security-Policy policy, which\nmitigates JS code execution while still allowing HTML injection.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + }, + { + "lang": "es", + "value": "Un atacante con acceso al panel de administraci\u00f3n, espec\u00edficamente a la pesta\u00f1a \"Administraci\u00f3n de roles\", puede inyectar c\u00f3digo agregando un nuevo rol en el campo \"nombre\". Sin embargo, cabe se\u00f1alar que el riesgo de explotar la vulnerabilidad se reduce debido al error adicional requerido que permite eludir la pol\u00edtica Content-Security-Policy, que mitiga la ejecuci\u00f3n de c\u00f3digo JS al tiempo que permite la inyecci\u00f3n de HTML. Este problema afecta a CyberArk Endpoint Privilege Manager en la versi\u00f3n SaaS 24.7.1. Se desconoce el estado de otras versiones. Despu\u00e9s de varios intentos de contactar al proveedor, no recibimos ninguna respuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json index 5ad4f49346d..2a88b72ee77 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json @@ -2,13 +2,24 @@ "id": "CVE-2025-22271", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T13:15:27.630", - "lastModified": "2025-02-28T13:15:27.630", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-05T16:15:37.927", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cvd@cert.pl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", "value": "The application or its infrastructure allows for IP address spoofing by providing its own value in the \"X-Forwarded-For\" header. Thus, the action logging mechanism in the application loses\u00a0accountability\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n o su infraestructura permiten la suplantaci\u00f3n de direcciones IP al proporcionar su propio valor en el encabezado \"X-Forwarded-For\". Por lo tanto, el mecanismo de registro de acciones de la aplicaci\u00f3n pierde la responsabilidad. Este problema afecta a CyberArk Endpoint Privilege Manager en la versi\u00f3n SaaS 24.7.1. Se desconoce el estado de otras versiones. Despu\u00e9s de varios intentos de comunicarnos con el proveedor, no recibimos ninguna respuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json index 23816dde8f8..0aa60016020 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json @@ -2,13 +2,24 @@ "id": "CVE-2025-22272", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T13:15:27.770", - "lastModified": "2025-02-28T13:15:27.770", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-05T16:15:38.033", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cvd@cert.pl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", "value": "In the \"/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg\" endpoint, it is possible to inject code in the \"modalDlgMsgInternal\" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + }, + { + "lang": "es", + "value": "En el endpoint \"/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg\", es posible inyectar c\u00f3digo en el par\u00e1metro \"modalDlgMsgInternal\" mediante POST, que luego se ejecuta en el navegador. El riesgo de explotar la vulnerabilidad se reduce debido a la omisi\u00f3n adicional requerida de la pol\u00edtica Content-Security-Policy. Este problema afecta a CyberArk Endpoint Privilege Manager en la versi\u00f3n SaaS 24.7.1. Se desconoce el estado de otras versiones. Despu\u00e9s de varios intentos de comunicarnos con el proveedor, no recibimos ninguna respuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json index 4f185f13342..237c2a1dd29 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json @@ -2,13 +2,24 @@ "id": "CVE-2025-22273", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T13:15:27.927", - "lastModified": "2025-02-28T13:15:27.927", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-05T16:15:38.140", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cvd@cert.pl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", "value": "Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the \"/EPMUI/VfManager.asmx/ChangePassword\" endpoint it is possible to perform a brute force attack on the current password in use.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n no limita la cantidad ni la frecuencia de las interacciones del usuario, como la cantidad de solicitudes entrantes. En el endpoint \"/EPMUI/VfManager.asmx/ChangePassword\" es posible realizar un ataque de fuerza bruta sobre la contrase\u00f1a actual en uso. Este problema afecta a CyberArk Endpoint Privilege Manager en la versi\u00f3n SaaS 24.7.1. Se desconoce el estado de otras versiones. Despu\u00e9s de varios intentos de comunicarnos con el proveedor, no recibimos ninguna respuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json index 230fdccdd92..f005654e890 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json @@ -2,13 +2,24 @@ "id": "CVE-2025-22274", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T13:15:28.067", - "lastModified": "2025-02-28T13:15:28.067", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-05T16:15:38.243", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cvd@cert.pl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", "value": "It is possible to inject HTML code into the page content using the \"content\" field in the \"Application definition\" page.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + }, + { + "lang": "es", + "value": "Es posible inyectar c\u00f3digo HTML en el contenido de la p\u00e1gina mediante el campo \"contenido\" en la p\u00e1gina \"Definici\u00f3n de la aplicaci\u00f3n\". Este problema afecta a CyberArk Endpoint Privilege Manager en la versi\u00f3n SaaS 24.7.1. Se desconoce el estado de otras versiones. Despu\u00e9s de varios intentos de comunicarnos con el proveedor, no recibimos ninguna respuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23117.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23117.json index 6d304dda500..6a001fa621b 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23117.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23117.json @@ -2,16 +2,55 @@ "id": "CVE-2025-23117", "sourceIdentifier": "support@hackerone.com", "published": "2025-03-01T03:15:23.473", - "lastModified": "2025-03-01T03:15:23.473", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:38.340", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Insufficient Firmware Update Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de actualizaci\u00f3n de firmware insuficiente podr\u00eda permitir que un actor malicioso autenticado con acceso a la red adyacente de UniFi Protect Cameras realice cambios no admitidos en el sistema de la c\u00e1mara." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f", diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json new file mode 100644 index 00000000000..6be505f5fa8 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2025-23416", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-03-05T16:15:38.530", + "lastModified": "2025-03-05T16:15:38.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal may lead to arbitrary file deletion. The score without \nleast privilege principle violation is as calculated below. In \ncombination with other issues it may facilitate further compromise of \nthe device. Remediation in Version 6.8.0, release date: 01-Mar-25." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://support.ixiacom.com/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://support.ixiacom.com/support-overview/product-support/downloads-updates", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-02", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.keysight.com/us/en/contact.html", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json new file mode 100644 index 00000000000..9adf2843068 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2025-24494", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-03-05T16:15:38.937", + "lastModified": "2025-03-05T16:15:38.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal may allow remote code execution using privileged account \n(requires device admin account, cannot be performed by a regular user). \nIn combination with the 'Upload' functionality this could be used to \nexecute an arbitrary script or possibly an uploaded binary. Remediation \nin Version 6.7.0, release date: 20-Oct-24." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://support.ixiacom.com/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://support.ixiacom.com/support-overview/product-support/downloads-updates", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-02", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.keysight.com/us/en/contact.html", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json new file mode 100644 index 00000000000..20b6c611fb5 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2025-24521", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-03-05T16:15:39.093", + "lastModified": "2025-03-05T16:15:39.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External XML entity injection allows arbitrary download of files. The \nscore without least privilege principle violation is as calculated \nbelow. In combination with other issues it may facilitate further \ncompromise of the device. Remediation in Version 6.8.0, release date: \n01-Mar-25." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://support.ixiacom.com/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://support.ixiacom.com/support-overview/product-support/downloads-updates", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-02", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.keysight.com/us/en/contact.html", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25478.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25478.json index 082da7c61b4..043fccde727 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25478.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25478.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25478", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T23:15:11.170", - "lastModified": "2025-02-28T23:15:11.170", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:39.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The account file upload functionality in Syspass 3.2.x fails to properly handle special characters in filenames. This mismanagement leads to the disclosure of the web application s source code, exposing sensitive information such as the database password." + }, + { + "lang": "es", + "value": "La funci\u00f3n de carga de archivos de cuenta en Syspass 3.2.x no gestiona correctamente los caracteres especiales en los nombres de archivo. Esta mala gesti\u00f3n provoca la divulgaci\u00f3n del c\u00f3digo fuente de la aplicaci\u00f3n web, lo que deja expuesta informaci\u00f3n confidencial, como la contrase\u00f1a de la base de datos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25478", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25478", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json index f4f64cf852d..2095f8037fa 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25609", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T19:15:36.993", - "lastModified": "2025-02-28T19:15:36.993", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:39.460", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa" + }, + { + "lang": "es", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contiene una vulnerabilidad de desbordamiento de b\u00fafer. La vulnerabilidad surge de la validaci\u00f3n de entrada incorrecta del par\u00e1metro static_ipv6 en la interfaz formIpv6Setup de /bin/boa" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_ipv6.md", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json index a1a2549fde7..e27d2f93ef5 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25610", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T19:15:37.107", - "lastModified": "2025-02-28T19:15:37.107", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:39.623", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa." + }, + { + "lang": "es", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contiene una vulnerabilidad de desbordamiento de b\u00fafer. La vulnerabilidad surge de la validaci\u00f3n de entrada incorrecta del par\u00e1metro static_gw en la interfaz formIpv6Setup de /bin/boa." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_gw.md", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json index 9f7a20ae5ea..b65b38fd24d 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25635", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T19:15:37.223", - "lastModified": "2025-02-28T19:15:37.223", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:39.793", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa." + }, + { + "lang": "es", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contiene una vulnerabilidad de desbordamiento de b\u00fafer. La vulnerabilidad surge de la validaci\u00f3n de entrada incorrecta del par\u00e1metro pppoe_dns1 en la interfaz formIpv6Setup de /bin/boa." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-pppoe_dns1.md", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25723.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25723.json index d9b9fa6eb49..3bf7ab80343 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25723.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25723.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25723", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T23:15:11.280", - "lastModified": "2025-02-28T23:15:11.280", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:15:39.960", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in GPAC version 2.5 allows a local attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en GPAC versi\u00f3n 2.5 permite a un atacante local ejecutar c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/gpac/gpac/issues/3089", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gpac/gpac/issues/3089", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25784.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25784.json index 45a608ff4bf..6e5ab305e4e 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25784.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25784.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25784", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:26.580", - "lastModified": "2025-02-26T15:15:26.580", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:17.730", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente \\c\\TemplateController.php de Jizhicms v2.5.4 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://jizhicms.com", @@ -28,6 +63,10 @@ { "url": "https://www.jizhicms.cn/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Ka7arotto/JizhiCms/blob/main/jizhicms.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25785.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25785.json index 6397e569905..88eac60a6d2 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25785.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25785.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25785", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:26.720", - "lastModified": "2025-02-26T15:15:26.720", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:17.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que JizhiCMS v2.5.4 conten\u00eda Server-Side Request Forgery (SSRF) a trav\u00e9s del componente \\c\\PluginsController.php. Esta vulnerabilidad permite a los atacantes realizar un escaneo de intranet a trav\u00e9s de una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "http://jizhicms.com", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25789.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25789.json index a06044667d6..8a737830aa6 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25789.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25789.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25789", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:26.853", - "lastModified": "2025-02-26T15:15:26.853", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:18.117", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que FoxCMS v1.2.5 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del m\u00e9todo index() en \\controller\\Sitemap.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://foxcms.com", @@ -28,6 +63,10 @@ { "url": "https://www.foxcms.cn/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-rce3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25790.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25790.json index 6bf3c418220..3f32afc38fb 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25790.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25790.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25790", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:26.980", - "lastModified": "2025-02-26T15:15:26.980", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:18.287", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente \\controller\\LocalTemplate.php de FoxCMS v1.2.5 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://foxcms.com", @@ -28,6 +63,10 @@ { "url": "https://www.foxcms.cn/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-upload-rce.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25951.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25951.json index c418253f6e4..266b25f8f8e 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25951.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25951.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25951", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T01:15:11.660", - "lastModified": "2025-03-03T01:15:11.660", - "vulnStatus": "Received", + "lastModified": "2025-03-05T15:15:18.463", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in the component /rest/cb/executeBasicSearch of Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to access sensitive user information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente /rest/cb/executeBasicSearch de Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-89638", diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26202.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26202.json index a10095159ca..a140000fb84 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26202.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26202.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26202", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T19:15:38.640", - "lastModified": "2025-03-04T19:15:38.640", + "lastModified": "2025-03-05T16:15:40.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) vulnerability exists in the WPA/WAPI Passphrase field of the Wireless Security settings (2.4GHz & 5GHz bands) in DZS Router Web Interface. An authenticated attacker can inject malicious JavaScript into the passphrase field, which is stored and later executed when an administrator views the passphrase via the \"Click here to display\" option on the Status page" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross site scripting (XSS) en el campo Frase de contrase\u00f1a WPA/WAPI de la configuraci\u00f3n de seguridad inal\u00e1mbrica (bandas de 2,4 GHz y 5 GHz) en la interfaz web del enrutador DZS. Un atacante autenticado puede inyectar c\u00f3digo JavaScript malicioso en el campo de frase de contrase\u00f1a, que se almacena y se ejecuta posteriormente cuando un administrador ve la frase de contrase\u00f1a a trav\u00e9s de la opci\u00f3n \"Haga clic aqu\u00ed para visualizar\" en la p\u00e1gina de estado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://dzs.com", @@ -24,6 +63,10 @@ { "url": "https://github.com/A17-ba/CVE-2025-26202-Details", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/A17-ba/CVE-2025-26202-Details", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json new file mode 100644 index 00000000000..544d8d1b7ef --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27411", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T16:15:40.310", + "lastModified": "2025-03-05T16:15:40.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file upload. This vulnerability is fixed in 5.18.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/redaxo/redaxo/commit/3b2159bb45da0ab6cfaef5c8cf8b602ee5e2fb37", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redaxo/redaxo/security/advisories/GHSA-wppf-gqj5-fc4f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json new file mode 100644 index 00000000000..aee96b1b631 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27412", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T16:15:40.457", + "lastModified": "2025-03-05T16:15:40.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json new file mode 100644 index 00000000000..7a5fd50c82c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27497", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T16:15:40.587", + "lastModified": "2025-03-05T16:15:40.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to \"always\" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OpenIdentityPlatform/OpenDJ/commit/08aee4724608e4a32baa3c7d7499ec913a275aaf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OpenIdentityPlatform/OpenDJ/security/advisories/GHSA-93qr-h8pr-4593", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27637.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27637.json index 439777b5bc8..e5899fd3c79 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27637.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27637.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27637", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:34.977", - "lastModified": "2025-03-05T06:15:34.977", + "lastModified": "2025-03-05T16:15:40.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows Cross-Site Scripting V-2024-016." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.1002 La aplicaci\u00f3n 20.0.2614 permite cross site scripting V-2024-016." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27653.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27653.json index b23c1102ad9..96d19ffa507 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27653.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27653.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27653", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:37.203", - "lastModified": "2025-03-05T06:15:37.203", + "lastModified": "2025-03-05T16:15:40.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Preauthenticated Cross Site Scripting (XSS): Badge Registration V-2023-012." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite cross site scripting (XSS) preautenticadas: registro de insignia V-2023-012." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27654.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27654.json index 0ef617c3378..a3e19d58cc2 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27654.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27654.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27654", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:37.340", - "lastModified": "2025-03-05T06:15:37.340", + "lastModified": "2025-03-05T16:15:41.043", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Cross Site Scripting (XSS) V-2023-017." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite cross site scripting (XSS) V-2023-017." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27664.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27664.json index 069b0bd7bc4..f1a014ac6b4 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27664.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27664.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27664", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:38.717", - "lastModified": "2025-03-05T06:15:38.717", + "lastModified": "2025-03-05T16:15:41.217", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient CSRF Protection OVE-20230524-0008." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite protecci\u00f3n CSRF insuficiente OVE-20230524-0008." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27673.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27673.json index 88f6b4c5b12..c93ac4b5488 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27673.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27673.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27673", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.167", - "lastModified": "2025-03-05T06:15:40.167", + "lastModified": "2025-03-05T16:15:41.377", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cookie Returned in Response Body OVE-20230524-0017." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la devoluci\u00f3n de cookies en el cuerpo de respuesta OVE-20230524-0017." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-539" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27674.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27674.json index 09a135bac17..2289fd92b97 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27674.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27674.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27674", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.293", - "lastModified": "2025-03-05T06:15:40.293", + "lastModified": "2025-03-05T16:15:41.537", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Hardcoded IdP Key V-2023-006." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la clave IdP codificada V-2023-006." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27675.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27675.json index 35b9335592c..6e89c25fcbf 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27675.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27675.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27675", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.420", - "lastModified": "2025-03-05T06:15:40.420", + "lastModified": "2025-03-05T16:15:41.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Vulnerable OpenID Implementation V-2023-004." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la implementaci\u00f3n de OpenID vulnerable V-2023-004." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27676.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27676.json index 0b8df76098e..ac22af0c430 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27676.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27676.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27676", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.553", - "lastModified": "2025-03-05T06:15:40.553", + "lastModified": "2025-03-05T16:15:41.863", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Reports V-2023-002." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite cross site scripting en los informes V-2023-002." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27677.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27677.json index 53ed4c5d88e..a171d43573e 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27677.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27677.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27677", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.683", - "lastModified": "2025-03-05T06:15:40.683", + "lastModified": "2025-03-05T16:15:42.030", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Symbolic Links For Unprivileged File Interaction V-2022-002." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite enlaces simb\u00f3licos para la interacci\u00f3n de archivos sin privilegios V-2022-002." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27678.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27678.json index 388ed263e4b..c083f31d149 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27678.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27678.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27678", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.817", - "lastModified": "2025-03-05T06:15:40.817", + "lastModified": "2025-03-05T16:15:42.197", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Client Remote Code Execution V-2023-001." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la ejecuci\u00f3n remota de c\u00f3digo del cliente V-2023-001." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27679.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27679.json index 88a2f94331d..83ff31f539f 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27679.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27679.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27679", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:40.933", - "lastModified": "2025-03-05T06:15:40.933", + "lastModified": "2025-03-05T15:15:18.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Badge Registration V-2023-005." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite cross site scripting en el registro de credenciales V-2023-005." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27680.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27680.json index 1a26009f324..111aad6df17 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27680.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27680.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27680", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:41.047", - "lastModified": "2025-03-05T06:15:41.047", + "lastModified": "2025-03-05T15:15:18.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.750 Application 20.0.1442 allows Insecure Firmware Image with Insufficient Verification of Data Authenticity V-2024-004." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.750 La aplicaci\u00f3n 20.0.1442 permite una imagen de firmware insegura con verificaci\u00f3n insuficiente de la autenticidad de los datos V-2024-004." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27681.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27681.json index 67356bbc491..44679663943 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27681.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27681.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27681", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:41.177", - "lastModified": "2025-03-05T06:15:41.177", + "lastModified": "2025-03-05T15:15:18.970", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 mishandles Client Inter-process Security V-2022-004." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 gestiona incorrectamente la seguridad entre procesos del cliente V-2022-004." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-602" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27682.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27682.json index 7f4995b3edc..b6065cce5c5 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27682.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27682.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27682", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T06:15:41.297", - "lastModified": "2025-03-05T06:15:41.297", + "lastModified": "2025-03-05T15:15:19.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Insecure Log Permissions V-2022-005." + }, + { + "lang": "es", + "value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite permisos de registro inseguros V-2022-005." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm", diff --git a/README.md b/README.md index 492a03c28fc..8994abd44e6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-05T15:00:20.760643+00:00 +2025-03-05T17:00:20.315796+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-05T14:15:36.540000+00:00 +2025-03-05T16:39:15.917000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284232 +284243 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `11` -- [CVE-2024-11216](CVE-2024/CVE-2024-112xx/CVE-2024-11216.json) (`2025-03-05T13:15:11.493`) -- [CVE-2024-12097](CVE-2024/CVE-2024-120xx/CVE-2024-12097.json) (`2025-03-05T14:15:35.280`) -- [CVE-2024-13147](CVE-2024/CVE-2024-131xx/CVE-2024-13147.json) (`2025-03-05T14:15:35.910`) +- [CVE-2023-38693](CVE-2023/CVE-2023-386xx/CVE-2023-38693.json) (`2025-03-05T16:15:37.007`) +- [CVE-2024-12799](CVE-2024/CVE-2024-127xx/CVE-2024-12799.json) (`2025-03-05T15:15:13.127`) +- [CVE-2025-1714](CVE-2025/CVE-2025-17xx/CVE-2025-1714.json) (`2025-03-05T15:15:15.413`) +- [CVE-2025-21095](CVE-2025/CVE-2025-210xx/CVE-2025-21095.json) (`2025-03-05T16:15:37.487`) +- [CVE-2025-22212](CVE-2025/CVE-2025-222xx/CVE-2025-22212.json) (`2025-03-05T16:15:37.643`) +- [CVE-2025-23416](CVE-2025/CVE-2025-234xx/CVE-2025-23416.json) (`2025-03-05T16:15:38.530`) +- [CVE-2025-24494](CVE-2025/CVE-2025-244xx/CVE-2025-24494.json) (`2025-03-05T16:15:38.937`) +- [CVE-2025-24521](CVE-2025/CVE-2025-245xx/CVE-2025-24521.json) (`2025-03-05T16:15:39.093`) +- [CVE-2025-27411](CVE-2025/CVE-2025-274xx/CVE-2025-27411.json) (`2025-03-05T16:15:40.310`) +- [CVE-2025-27412](CVE-2025/CVE-2025-274xx/CVE-2025-27412.json) (`2025-03-05T16:15:40.457`) +- [CVE-2025-27497](CVE-2025/CVE-2025-274xx/CVE-2025-27497.json) (`2025-03-05T16:15:40.587`) ### CVEs modified in the last Commit -Recently modified CVEs: `23` +Recently modified CVEs: `90` -- [CVE-2022-49733](CVE-2022/CVE-2022-497xx/CVE-2022-49733.json) (`2025-03-05T14:05:15.387`) -- [CVE-2023-50316](CVE-2023/CVE-2023-503xx/CVE-2023-50316.json) (`2025-03-05T14:08:19.020`) -- [CVE-2024-58022](CVE-2024/CVE-2024-580xx/CVE-2024-58022.json) (`2025-03-05T14:05:15.387`) -- [CVE-2024-58042](CVE-2024/CVE-2024-580xx/CVE-2024-58042.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-0285](CVE-2025/CVE-2025-02xx/CVE-2025-0285.json) (`2025-03-05T14:15:36.060`) -- [CVE-2025-0287](CVE-2025/CVE-2025-02xx/CVE-2025-0287.json) (`2025-03-05T14:15:36.253`) -- [CVE-2025-0288](CVE-2025/CVE-2025-02xx/CVE-2025-0288.json) (`2025-03-05T14:15:36.390`) -- [CVE-2025-0289](CVE-2025/CVE-2025-02xx/CVE-2025-0289.json) (`2025-03-05T14:15:36.540`) -- [CVE-2025-1702](CVE-2025/CVE-2025-17xx/CVE-2025-1702.json) (`2025-03-05T12:15:35.420`) -- [CVE-2025-1879](CVE-2025/CVE-2025-18xx/CVE-2025-1879.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-1880](CVE-2025/CVE-2025-18xx/CVE-2025-1880.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-1881](CVE-2025/CVE-2025-18xx/CVE-2025-1881.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-1890](CVE-2025/CVE-2025-18xx/CVE-2025-1890.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21793](CVE-2025/CVE-2025-217xx/CVE-2025-21793.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21794](CVE-2025/CVE-2025-217xx/CVE-2025-21794.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21798](CVE-2025/CVE-2025-217xx/CVE-2025-21798.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21809](CVE-2025/CVE-2025-218xx/CVE-2025-21809.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21814](CVE-2025/CVE-2025-218xx/CVE-2025-21814.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21820](CVE-2025/CVE-2025-218xx/CVE-2025-21820.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-21824](CVE-2025/CVE-2025-218xx/CVE-2025-21824.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-27219](CVE-2025/CVE-2025-272xx/CVE-2025-27219.json) (`2025-03-05T14:05:15.387`) -- [CVE-2025-27220](CVE-2025/CVE-2025-272xx/CVE-2025-27220.json) (`2025-03-05T14:05:49.230`) -- [CVE-2025-27221](CVE-2025/CVE-2025-272xx/CVE-2025-27221.json) (`2025-03-05T14:05:49.230`) +- [CVE-2025-25478](CVE-2025/CVE-2025-254xx/CVE-2025-25478.json) (`2025-03-05T16:15:39.297`) +- [CVE-2025-25609](CVE-2025/CVE-2025-256xx/CVE-2025-25609.json) (`2025-03-05T16:15:39.460`) +- [CVE-2025-25610](CVE-2025/CVE-2025-256xx/CVE-2025-25610.json) (`2025-03-05T16:15:39.623`) +- [CVE-2025-25635](CVE-2025/CVE-2025-256xx/CVE-2025-25635.json) (`2025-03-05T16:15:39.793`) +- [CVE-2025-25723](CVE-2025/CVE-2025-257xx/CVE-2025-25723.json) (`2025-03-05T16:15:39.960`) +- [CVE-2025-25784](CVE-2025/CVE-2025-257xx/CVE-2025-25784.json) (`2025-03-05T15:15:17.730`) +- [CVE-2025-25785](CVE-2025/CVE-2025-257xx/CVE-2025-25785.json) (`2025-03-05T15:15:17.930`) +- [CVE-2025-25789](CVE-2025/CVE-2025-257xx/CVE-2025-25789.json) (`2025-03-05T15:15:18.117`) +- [CVE-2025-25790](CVE-2025/CVE-2025-257xx/CVE-2025-25790.json) (`2025-03-05T15:15:18.287`) +- [CVE-2025-25951](CVE-2025/CVE-2025-259xx/CVE-2025-25951.json) (`2025-03-05T15:15:18.463`) +- [CVE-2025-26202](CVE-2025/CVE-2025-262xx/CVE-2025-26202.json) (`2025-03-05T16:15:40.130`) +- [CVE-2025-27637](CVE-2025/CVE-2025-276xx/CVE-2025-27637.json) (`2025-03-05T16:15:40.713`) +- [CVE-2025-27653](CVE-2025/CVE-2025-276xx/CVE-2025-27653.json) (`2025-03-05T16:15:40.880`) +- [CVE-2025-27654](CVE-2025/CVE-2025-276xx/CVE-2025-27654.json) (`2025-03-05T16:15:41.043`) +- [CVE-2025-27664](CVE-2025/CVE-2025-276xx/CVE-2025-27664.json) (`2025-03-05T16:15:41.217`) +- [CVE-2025-27673](CVE-2025/CVE-2025-276xx/CVE-2025-27673.json) (`2025-03-05T16:15:41.377`) +- [CVE-2025-27674](CVE-2025/CVE-2025-276xx/CVE-2025-27674.json) (`2025-03-05T16:15:41.537`) +- [CVE-2025-27675](CVE-2025/CVE-2025-276xx/CVE-2025-27675.json) (`2025-03-05T16:15:41.700`) +- [CVE-2025-27676](CVE-2025/CVE-2025-276xx/CVE-2025-27676.json) (`2025-03-05T16:15:41.863`) +- [CVE-2025-27677](CVE-2025/CVE-2025-276xx/CVE-2025-27677.json) (`2025-03-05T16:15:42.030`) +- [CVE-2025-27678](CVE-2025/CVE-2025-276xx/CVE-2025-27678.json) (`2025-03-05T16:15:42.197`) +- [CVE-2025-27679](CVE-2025/CVE-2025-276xx/CVE-2025-27679.json) (`2025-03-05T15:15:18.623`) +- [CVE-2025-27680](CVE-2025/CVE-2025-276xx/CVE-2025-27680.json) (`2025-03-05T15:15:18.790`) +- [CVE-2025-27681](CVE-2025/CVE-2025-276xx/CVE-2025-27681.json) (`2025-03-05T15:15:18.970`) +- [CVE-2025-27682](CVE-2025/CVE-2025-276xx/CVE-2025-27682.json) (`2025-03-05T15:15:19.130`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9a3d53dea22..254cc8229b0 100644 --- a/_state.csv +++ b/_state.csv @@ -162943,7 +162943,7 @@ CVE-2020-7705,0,0,2eb1e273012865f9ca53db1c71a162e863792ba868494a36e760a07e1c962e CVE-2020-7706,0,0,ff7270d9ac2ac3af22876a1d61ce648a6e6ea0a0a4a7a97b554ee72f3f546940,2024-11-21T05:37:38.977000 CVE-2020-7707,0,0,043386afcd60855dfd88c57438305484c8897de50728aa000a421d2527e4dd1a,2024-11-21T05:37:39.090000 CVE-2020-7708,0,0,528106470ef567eca430430d64dbc9322ece3af6f31ffd7ceeb7439ad6a16aa1,2024-11-21T05:37:39.210000 -CVE-2020-7709,0,0,9f0b95adc9fd622ef8b6771b482fa3f336af5eba2556e33f2cc709790b19dd08,2024-11-21T05:37:39.330000 +CVE-2020-7709,0,1,f194d50ecfee0aada711cd317627eab1ca8c4ce6747c92ec0060824f89969abd,2025-03-05T16:25:09.277000 CVE-2020-7710,0,0,c883cc04db385baf6b9354582550f3afda555b3600f6ba91e7f2d8b272912a9c,2024-11-21T05:37:39.443000 CVE-2020-7711,0,0,c7f196fc3757fa1b8e23a0d5efafa0a21a4d10ff221fb557a8e51072830fac6d,2024-11-21T05:37:39.553000 CVE-2020-7712,0,0,ee2a134908aefac25a9d9543bc3297996f3dba57908377c52c9710c58dd50c8e,2024-11-21T05:37:39.673000 @@ -169970,7 +169970,7 @@ CVE-2021-23792,0,0,e6d2feaf24c2a9a1080856a1098a7a57a415dded682ca4f483ac3debe7c87 CVE-2021-23797,0,0,6c2a002646a9fd6360d933cc1468668180fcfc0e03af3be8e3fe675a52f83ac9,2024-11-21T05:51:53.510000 CVE-2021-2380,0,0,e4ece85aaa61319fb366f0e67c0fbe1c88ac97ade334d8d2f0f289add1bf9b2c,2024-11-21T06:03:00.213000 CVE-2021-23803,0,0,eb8e9adef601c1b8d4a2b999ca421ca5388ac2e6d624a0dc3c5b3280887e5b96,2024-11-21T05:51:53.627000 -CVE-2021-23807,0,0,47743bfec83f3c80cfc56ee4a6a0db1a4ddbaf542f951d33394b55511b105b90,2024-11-21T05:51:53.750000 +CVE-2021-23807,0,1,6a75b280203317daea84367b04604555d73dce1e7b062c1ec4ed95723e4d3568,2025-03-05T16:24:40.203000 CVE-2021-2381,0,0,73c8f0f20d7c0d82a834c6c2433f14a1b0192d95ad270c68a3a9c2a28a32f3af,2024-11-21T06:03:00.337000 CVE-2021-23814,0,0,05b7694c6871e414e1d38dfa93faea0bbff03ef31ec821bb43ceb57d448d1b86,2024-11-21T05:51:53.883000 CVE-2021-2382,0,0,ad1c8d64756b68cea26351f8493edc116cb9eadff88d7c9a4241c09cace8cee5,2024-11-21T06:03:00.463000 @@ -179424,7 +179424,7 @@ CVE-2021-36392,0,0,dafd751fb751532ca183faaa5cd9eadb25113ee95568ca182dc17715f2843 CVE-2021-36393,0,0,7c4cb40fb09fbe4f7555a9fb60d5a806cdc3977ab2056f27668df9f629175a62,2024-11-21T06:13:40.337000 CVE-2021-36394,0,0,ff6f4e5f5419882d259376fa27ffb3ec24bb43e11bba2deff04207c77183c78e,2024-11-21T06:13:40.443000 CVE-2021-36395,0,0,ebbeb40a22f1fdca47a6c286ffed449443ec2f8803ffaeb3607548db5bc6295c,2024-11-21T06:13:40.557000 -CVE-2021-36396,0,0,c59982992b3127a9680e48e5b220f2c662765cf45bb10f876e6958444b6d7d0e,2024-11-21T06:13:40.670000 +CVE-2021-36396,0,1,88ae47709a6bbde66b382959dcb20b2fde2250fbd13c3746271df62eebc3151e,2025-03-05T16:15:35.433000 CVE-2021-36397,0,0,eebf3717bb6d7a75919581e9690ded27175cc43d0e0ae84aad7e9fc635cccd2c,2024-11-21T06:13:40.793000 CVE-2021-36398,0,0,a15925e7e8302adc45445e0e6a65d8200cc01053000945d2c340fe144e385a65,2024-11-21T06:13:40.903000 CVE-2021-36399,0,0,c1c77e13ccc41082e659facaf679a4d1b66ebebbe068780edf8992260be97673,2024-11-21T06:13:41.013000 @@ -211227,7 +211227,7 @@ CVE-2022-4639,0,0,12c99b1898fd44d7a52f2496482d7af257ed8fde2f5e7fdf098966b2129455 CVE-2022-46391,0,0,12b55a63fea6ed6a614d5f9d0ed857f3071abc46b2b790ab169203062a182dd0,2024-11-21T07:30:30.270000 CVE-2022-46392,0,0,bdb2fd1fc6d20511f33339b3022444ae31e5a978f9038f710531d6f52a0996f5,2024-11-21T07:30:30.423000 CVE-2022-46393,0,0,9944fae02132a2ed275dc451c59b429952d65d76a8444001055e2378c282ad68,2024-11-21T07:30:30.580000 -CVE-2022-46394,0,0,8114d74b5f021d78174f32faa4f2ecd2eacda1822339bff0b5d6086cbfc86fa7,2024-11-21T07:30:30.737000 +CVE-2022-46394,0,1,5e5426ef302809263ec7e5581a2cc817e2c88594fb42e1f1b8694b6cb4a0587e,2025-03-05T16:15:36.350000 CVE-2022-46395,0,0,219ad3b4f9624d34b9d70567c4582107fee436c5cd53ac43301d04b95b2e92dc,2024-11-21T07:30:30.913000 CVE-2022-46396,0,0,79126e060499e4cb027f3964577f73c1565abacbfb6ec8e9a9f8c4fcfbbeedad,2025-02-11T18:15:20.450000 CVE-2022-46397,0,0,28539785d12ea6f2f72214e068a422a2c2ab230d3773bc45641acb5b99cabec0,2025-02-19T19:15:11.217000 @@ -212788,9 +212788,9 @@ CVE-2022-48698,0,0,02c1690bff6c336e6ab17c3750cee520d0e856986dee5e0e93b475ff30ff2 CVE-2022-48699,0,0,4a65b916873eacb0ff3e3e320e4042125dd7b4593e08989ea9e1bb3148422bc9,2024-11-21T07:33:48.920000 CVE-2022-4870,0,0,cf8eabe70441156e718239f55dd4a96c27111e9045e8fc7245a71a9a53fcb5be,2025-01-21T21:15:08.203000 CVE-2022-48700,0,0,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000 -CVE-2022-48701,0,0,2da8846f75d477826b5f598167c96f0bf17f98d076753697e10bffd6c8549f4e,2024-11-21T07:33:49.133000 -CVE-2022-48702,0,0,c04e7f7aabe0d7b07d7d3dd28a1a67cf1e2851d7feb5a14c193073ee6cce3169,2024-11-21T07:33:49.250000 -CVE-2022-48703,0,0,5e17ee089b870f0fb33b0a3acdcd07fa6b5d2314a04bed344e89ed8c0302980f,2024-11-21T07:33:49.380000 +CVE-2022-48701,0,1,f0b2ddac6715759cbee5c47311c40fb0bc98e66c6e1bcd7726c45b3e14afacab,2025-03-05T15:11:27.097000 +CVE-2022-48702,0,1,d8b3b78e5852ff8ba4e8c26c53d9a1a7a9f4c0d4246c63d48c193ef4c90eb5e2,2025-03-05T15:11:27.097000 +CVE-2022-48703,0,1,83de7f7c8e2e4fe4ca7b9a3a9a133fd837582405da2b6d9d0019028ad33dfc7d,2025-03-05T15:11:27.097000 CVE-2022-48704,0,0,47746aeb57bcf7a965c1ca8f69f62ccdd67c83a463e82f583542de3bf10ea0fa,2024-11-21T07:33:49.487000 CVE-2022-48705,0,0,4d7355aade7f8a715c9b190e7e3da5273a5fffb6306134ecaf22441341989089,2024-11-21T07:33:49.613000 CVE-2022-48706,0,0,655269dad9460ce24903be8487a36beced2ab87815e825178201c8883a7a58e6,2025-02-03T16:12:16.050000 @@ -213917,7 +213917,7 @@ CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176 CVE-2022-49730,0,0,2bfdce97189f4294a4f5bd9bb6fb8ea7daf4ec20279fe3e8023054ddc72e2701,2025-02-27T19:15:47.153000 CVE-2022-49731,0,0,3087aebf92cbb510ce471fc8272df920f283560767e2c40c990611543a35c126,2025-02-26T07:01:48.710000 CVE-2022-49732,0,0,91e898c8ed487c200545020bc19ca94e34172dbee027d967192fdde21cd00234,2025-02-26T15:15:17.843000 -CVE-2022-49733,0,1,fc0c6252bda4004b2b7a07aea99702f475ab06667c4f4e935e922bfbdec22966,2025-03-05T14:05:15.387000 +CVE-2022-49733,0,0,fc0c6252bda4004b2b7a07aea99702f475ab06667c4f4e935e922bfbdec22966,2025-03-05T14:05:15.387000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fbd5,2025-01-27T14:15:27.210000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 @@ -218417,7 +218417,7 @@ CVE-2023-22887,0,0,9500df946dba5534f211144e9851e9d48e0ee8ec0c089e042d11b59806b35 CVE-2023-22888,0,0,21f2ad7126398dfecc421c82eb979bf0052bbe2538451b515afd03d68cbb392e,2024-11-21T07:45:35.207000 CVE-2023-22889,0,0,6716b509ed5c405bd04ae933068b80977723c43438fbe0730e49946a4c10f433,2024-11-21T07:45:35.347000 CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3f4,2024-11-21T07:58:19.060000 -CVE-2023-22890,0,0,594c803ebe43843c407dd09796d90846ed3fbf28e4010f104f3e4bc11928c0ed,2024-11-21T07:45:35.493000 +CVE-2023-22890,0,1,f0d3730f64c477dba58781dd1df246a96dfbef568d6cada5ee7da87752d9dba8,2025-03-05T15:15:11.563000 CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000 CVE-2023-22892,0,0,c963711bf8dff126d953038745e504027e8bd2d954a24cb7a184225e893f5abe,2025-03-04T21:15:11.610000 CVE-2023-22893,0,0,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000 @@ -219847,7 +219847,7 @@ CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000 CVE-2023-24773,0,0,1cc31190f570fc3c23b7b2196d6c7eae4d5aa9f41329bb819157d05a69818791,2024-11-21T07:48:23.443000 CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 -CVE-2023-24775,0,0,b668469f90fa3e9c9678adfb39908c761d3adbdd38c4e1fbc1564403498a6494,2024-11-21T07:48:23.700000 +CVE-2023-24775,0,1,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000 CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000 CVE-2023-24777,0,0,4a866ff95b4f709fb308f1ed6883b97243dc32bc5395b4fb2599794ee1bd83c4,2024-11-21T07:48:23.967000 CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000 @@ -220204,7 +220204,7 @@ CVE-2023-25139,0,0,c8c6816eb7d6fad0b1254d72563b0eca09c617cb1a12c92195044d95d483e CVE-2023-2514,0,0,c0a74aabdf612338b5c2bbf99973c4dcf772d38ab9efc3bea1b0156e23e9654b,2024-11-21T07:58:45.227000 CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b135,2024-11-21T07:49:11.220000 CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000 -CVE-2023-25143,0,0,14673f779b3c9743323eb6c05d4634f3ddf065b6d92e92692f48b6d22a52a3eb,2024-11-21T07:49:11.480000 +CVE-2023-25143,0,1,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000 CVE-2023-25144,0,0,ab7d84d2f165ab21b0b1f9ed1abfd79fb52c70cb16fd0a8455b22ed951ca3fc4,2024-11-21T07:49:11.603000 CVE-2023-25145,0,0,40e2cd226835d090403bef22f34c90db08cbb0e894597d8e9f9a4de5cd90b761,2024-11-21T07:49:11.720000 CVE-2023-25146,0,0,add1fb2292e87ec0b9dfd9045fc9df0890a4f23ca5a928d3819c099dbd73b58c,2024-11-21T07:49:11.830000 @@ -220284,7 +220284,7 @@ CVE-2023-2522,0,0,d26a5d65f68e595ad349090c37d8d53e828da03e8e04481ad741154edc3188 CVE-2023-25220,0,0,360e5bc70b74d8295b45f92b0bb55e6e2afb24e820e8b771b591e1a761fdcdfa,2025-02-12T21:15:12.137000 CVE-2023-25221,0,0,dba0f8224901a4b584260906fa8ce101f492002e94aef33e718dc4e3c685a287,2024-11-21T07:49:20.293000 CVE-2023-25222,0,0,8088846710b2df8e157581112043c8bc6d9756975531b6619999896dc395f58e,2024-11-21T07:49:20.423000 -CVE-2023-25223,0,0,c378829a1b744ea0995e1d888e19bb3510bab9780a7262c0abebc0478c000c25,2024-11-21T07:49:20.550000 +CVE-2023-25223,0,1,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601c4f,2025-03-05T16:15:36.693000 CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000 CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000 CVE-2023-25231,0,0,88c61d385aa432e00fc3c0ad1089f0cddd7c90b8afad049aca3f8d335980af3f,2024-11-21T07:49:20.813000 @@ -230899,6 +230899,7 @@ CVE-2023-3869,0,0,bf7ef47bca609710666823cda2cd3b87d8368f34d3f0495a52f2eaf8d6c44c CVE-2023-38690,0,0,16edfbb5cb2da86dc520cb5ce44bd79a6d8ebde822cfbb040067fae63d47da2b,2024-11-21T08:14:03.810000 CVE-2023-38691,0,0,ca389910441b1a7454482f4a88e1c4c63885642739c40e4d7a0ccd5c7ef7d2d4,2024-11-21T08:14:03.960000 CVE-2023-38692,0,0,0ee556b72a6afea4c1de339993db6445281a90b87ec7792f6788a7e15bf792fa,2024-11-21T08:14:04.103000 +CVE-2023-38693,1,1,3a8d3441aac765332c8a68d16370c7198bd8f3d600dc368fd25b0fd1e8356469,2025-03-05T16:15:37.007000 CVE-2023-38694,0,0,dd6e03df9e481aa178e1dad22a17dfad00b2b20258d8ee6ef2c5f1d62d099484,2024-11-21T08:14:04.243000 CVE-2023-38695,0,0,586d599b8505c7fdbd06e5e8f2e6eba0814ffaacde0ff856d8f56a1e1d91ff0e,2024-11-21T08:14:04.383000 CVE-2023-38696,0,0,a792d5772add555e04dc32b1184a43591031e259a2b88d17649495621f2e2914,2023-11-07T04:17:23.480000 @@ -239495,7 +239496,7 @@ CVE-2023-50312,0,0,1e67563904324223fd079dcc66d3aab87e6451abcc03afbf697386cae3c09 CVE-2023-50313,0,0,a83e416401577e94df6dfe4b1b998ddd0a8952164aaa6f5ea90e36bebd23e193,2024-11-21T08:36:50.540000 CVE-2023-50314,0,0,ce35340ffb0568ccdcb723e50bf9507ce76dc59cc4416bfa4739778b544bd02c,2024-08-23T19:20:22.473000 CVE-2023-50315,0,0,625341a76fda8905bc70b73219527e00e0b32c20581d112bacaee69e8b51c52a,2024-09-11T13:38:26.370000 -CVE-2023-50316,0,1,d2a6fa563d8c7c4f2ca779aa41670344d5eee71be8ccf35a8b979a86c4517fe1,2025-03-05T14:08:19.020000 +CVE-2023-50316,0,0,d2a6fa563d8c7c4f2ca779aa41670344d5eee71be8ccf35a8b979a86c4517fe1,2025-03-05T14:08:19.020000 CVE-2023-5032,0,0,4ede5b17693a04ef49d59f95a825f1eb5b57b0f4b8cfa1778c1a2dc8be2d09df,2024-11-21T08:40:55.963000 CVE-2023-50324,0,0,000a39c6d0a06cbde348ac025e564c5cce355db8654aef4cbde2d0d01df1d4ed,2024-11-21T08:36:50.840000 CVE-2023-50326,0,0,bd3bc6fce1ffc5491df4da766864b97e8ced1cbb50bba99d705adb05a7f7ceb3,2024-11-21T08:36:50.950000 @@ -242814,7 +242815,7 @@ CVE-2023-6727,0,0,7bbd3e1513b451c00bdb1e60d5521ce4d0edecad79d485652e420462189820 CVE-2023-6728,0,0,d5cad901337cc4f13c12b57aeda30d9bb062a3112003e6a2837c11a6ce7a609a,2024-11-05T20:35:16.583000 CVE-2023-6729,0,0,2086303b3eb3fdf0b43c4f9d5042f89ed6b56bc1b32daea71fb38f406001fdf0,2024-10-18T12:52:33.507000 CVE-2023-6730,0,0,22067958a8780ef63fcf2d5dd8344cfe89214cadcc1e42b0442beaf8085d13fa,2024-11-21T08:44:26.450000 -CVE-2023-6731,0,0,cb2b8faf6dfbd832cc1c717dbc198655351ca1ef8a481e55d15038f5c864ebb7,2024-11-21T08:44:26.570000 +CVE-2023-6731,0,1,73323634074d18078cf13363658197f9d85b0e501f4e4486a4d4829b56032d00,2025-03-05T15:11:27.097000 CVE-2023-6732,0,0,f4818ab892836c726761fbb1f6979409df88c74e546c8095c628beec8a815e3a,2024-11-21T08:44:26.687000 CVE-2023-6733,0,0,3253e9934cdbad22d3f5bf18ea41de714a7571ae0a9c69b303a3f5309983ec5b,2024-11-21T08:44:26.820000 CVE-2023-6734,0,0,f702cfc07dd4f70df68ba07e813e6841d7b4220f597a5c694e7bd72e1e10c540,2024-06-05T20:15:12.617000 @@ -245340,7 +245341,7 @@ CVE-2024-11212,0,0,dad420a6e86f99c5e67692991f0bb8597771bef4a10b7a730d646b52f4f41 CVE-2024-11213,0,0,0a835f1f24f19dbff91d96d3a6351088ad7320e11ffd8b9112fe1d7f03522e6f,2024-11-19T15:48:58.680000 CVE-2024-11214,0,0,ce293b49fa3792aed1bdef0278728de22346b7c8c6fd060fecdb1a211d7c2a56,2024-11-19T15:38:59.060000 CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000 -CVE-2024-11216,1,1,a6c74f3e9ab35e562debd77e74e353f728b8647e91c626d40439216aac83aa2a,2025-03-05T13:15:11.493000 +CVE-2024-11216,0,0,a6c74f3e9ab35e562debd77e74e353f728b8647e91c626d40439216aac83aa2a,2025-03-05T13:15:11.493000 CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000 CVE-2024-11218,0,0,875e6819ebb5635213862f7e98526a8a05a16cd878e41e397f3a02b1ffd8c4e0,2025-03-05T06:15:33.043000 CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000 @@ -246188,7 +246189,7 @@ CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba4235099726 CVE-2024-12094,0,0,6dd85a9b2557f08ee364682e83ba2b4a96df650121716b26f85951e9de06f6f5,2024-12-05T13:15:05.923000 CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000 CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000 -CVE-2024-12097,1,1,f0fbc9cab5ca704ee3f0fcbeb9df9f3077c0ffb3abbe086aa053df92f7b5e220,2025-03-05T14:15:35.280000 +CVE-2024-12097,0,0,f0fbc9cab5ca704ee3f0fcbeb9df9f3077c0ffb3abbe086aa053df92f7b5e220,2025-03-05T14:15:35.280000 CVE-2024-12098,0,0,cfa03906537e6957dc74f6fb1d7564d835cb1a36c16bba952c18f41c644686c9,2025-01-07T04:15:07.837000 CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000 CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000 @@ -246807,6 +246808,7 @@ CVE-2024-12793,0,0,26c5bed7dc7fb3941e0dd492fd9b824242ccc2a6944616404398fdcebdfd5 CVE-2024-12794,0,0,6bb67958621fa403e9f361b5ad08b405e435c9a95ea0caa583a82467bdddcffa,2025-01-06T14:40:23.127000 CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 CVE-2024-12798,0,0,488a2c4e7527f89aadf88a0b958da900c0b1ca920e367bf77296a8bbc1acc4e9,2025-01-03T14:15:24.370000 +CVE-2024-12799,1,1,1dca9138b488b748cfaef0f9618cb6f28ee1e7f5e5e00f8a3b4908730a7013f9,2025-03-05T15:15:13.127000 CVE-2024-12801,0,0,8847bb4162cad8847e95f5d549749935a98cd5eaeb3583ac43cc5f1acc6c369c,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000 @@ -247114,7 +247116,7 @@ CVE-2024-13142,0,0,83cd0ec82f1a2b8cb6c41841e46d0299ee030474dc8bce00e898bf7c3451e CVE-2024-13143,0,0,2d1d64f3642c4512a91652d1c43c226acaba3a89d87b58cf23cbe6f5d959b82f,2025-01-06T00:15:05.460000 CVE-2024-13144,0,0,cbdedf0ba314069fc9465dd283b23b5b130c41c32e40b222fa368abcc66db722,2025-01-06T00:15:05.633000 CVE-2024-13145,0,0,5c365a974659bd41337fcb8adb2d8fbc8e9cd8f5a39411bbe19577a7fc11a4ee,2025-01-06T01:15:06.253000 -CVE-2024-13147,1,1,343038e0e5fda9e074575f80d86a2f71b9de0f3dde5b2b0c00e3413bd06794a9,2025-03-05T14:15:35.910000 +CVE-2024-13147,0,0,343038e0e5fda9e074575f80d86a2f71b9de0f3dde5b2b0c00e3413bd06794a9,2025-03-05T14:15:35.910000 CVE-2024-13148,0,0,5e62731777939a6cccea414e3b22f75ba2217f43648f57abb338beb059e81dd8,2025-02-27T15:15:38.583000 CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000 CVE-2024-13152,0,0,122264645183d9f888de428d629fb2ba29cf302edc1f968441a9e42307fca5f1,2025-02-14T13:15:42.170000 @@ -247941,7 +247943,7 @@ CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed141 CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000 CVE-2024-1570,0,0,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000 CVE-2024-1571,0,0,f3d49b2468436cc55f43430be000f569c341c5bb488502d391ca8d5ab3df2145,2025-02-27T14:53:37.577000 -CVE-2024-1572,0,0,bb3a1eb6c662460f9557a889cd8d0374061d765bd17fbe00a19c42fa309803f7,2024-11-21T08:50:51.713000 +CVE-2024-1572,0,1,52e66641f14582b51f6c682628bfe6493f11577d836fe53ee64b105339aaf73f,2025-03-05T15:11:27.097000 CVE-2024-1573,0,0,55326b48e714bd45f8a7f03a13179fac399e55741cedcbe359268a4ab07b26b6,2024-11-21T08:50:51.837000 CVE-2024-1574,0,0,4b773e15e20eaa265c844cea28d7f429a990bf0f316d61c1be91dcdcc753dad5,2024-11-21T08:50:51.953000 CVE-2024-1575,0,0,47396d8f2bdd90814814821ab28fd5bb094a96f06ae089ffd65db5fdbabaf2a4,2025-01-22T22:33:15.853000 @@ -248112,7 +248114,7 @@ CVE-2024-1754,0,0,1a62e04cfc963db540100c68219b255ef7962cf0c80d59371fd17c6fd5a636 CVE-2024-1755,0,0,a7ea4e5076a3c70d07f1af2be88a686318f2826b2707f5d9b21f454fe91f58c3,2024-11-21T08:51:14.617000 CVE-2024-1756,0,0,a55105396c0a5cfd03125dbd5666bd370a097913a79fb44905b745cf43bd3390,2024-11-21T08:51:14.803000 CVE-2024-1758,0,0,ef03cf9202f4026f46269efeea4931a318bae80acf68b5222343fe571ba49031,2025-02-27T22:03:40.670000 -CVE-2024-1759,0,0,ed5060f5c977e318d688daf61c7d8c152cbea54fcda1544a684d2a9780f43d87,2024-11-21T08:51:15.043000 +CVE-2024-1759,0,1,b16d8680c6a35a91ded94bed07b573a61ba4bc03cdc898a5fb71d81f8efab8c1,2025-03-05T15:11:27.097000 CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000 CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000 CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000 @@ -248150,7 +248152,7 @@ CVE-2024-1793,0,0,1247321dd371ac163a2d163c7822069c7d100252b9c561f2f44a64adcc334d CVE-2024-1794,0,0,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 CVE-2024-1795,0,0,5d11bf1b8dc2b5c0d5b4fc8d4df7bd6ebd06ec9fc982e70886676d8ffd994d14,2025-01-23T19:27:09.377000 CVE-2024-1796,0,0,68e9ddfacf3afc0af79bfa53830daae380aee08e50d59d0729da4a8eb41d2478,2024-11-21T08:51:20.390000 -CVE-2024-1797,0,0,f5b9bd26be8712ff7eee9f455cb0e401b1d5811a03ebfa84c9a534e54be22a03,2024-11-21T08:51:20.520000 +CVE-2024-1797,0,1,8a86b9a23c2f404495c192d39ca153ea7af461d55a03a2b3b5625ffff2374a4b,2025-03-05T15:11:27.097000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 CVE-2024-1799,0,0,ce13c6b26581557f75d58a2c3e31cff1ba5c8746dd0f7905466ddfc2bd34017e,2025-02-04T20:59:34.903000 CVE-2024-1800,0,0,4198f2af30da2326c4f00a8a81874f56fa7d692eb5115afc306e3d02e598b03f,2025-01-16T17:07:24.633000 @@ -250818,7 +250820,7 @@ CVE-2024-23078,0,0,bb7455dc97cc4099bc6efc4f312e2cf3074cd4427821f3b5202bcc8c61d65 CVE-2024-23079,0,0,f3d44238e38317645a3c01e89bcc6a7aa90557be7f2ec40d731a4e51d7416a4c,2024-11-21T08:56:54.373000 CVE-2024-2308,0,0,959def2a19721d4386cce911e775ed265f667c8b67396bf7dd522aecaf9f376b,2024-11-21T09:09:28.530000 CVE-2024-23080,0,0,540ca37d96b6e87160adffdc252f4ed23b6baf060296443d27e143f1618529f5,2024-11-21T08:56:54.597000 -CVE-2024-23081,0,0,f55b71c505d68dcb371f4b51ad020e05f32bccd3590072ffd2f30037ffdf7d3e,2024-11-21T08:56:54.827000 +CVE-2024-23081,0,1,60dd7d0171d4f6b245d6e66367ad149073b97042840c382bdf429ce61cac7791,2025-03-05T14:53:25.190000 CVE-2024-23082,0,0,d39e2b9140325ff9294ea026d156b9f5476453085f001710478d4907c9bf8431,2024-11-21T08:56:54.977000 CVE-2024-23083,0,0,d23a30eccd928efa89ebd34d77870fc08c7c63d6718d2c4194c3c87f6f8cb2c1,2024-11-21T08:56:55.123000 CVE-2024-23084,0,0,57dcee85b27ce9ed8cd7baa959eea8645979790b952aebb9618ae26f5e79143e,2024-11-21T08:56:55.360000 @@ -252704,7 +252706,7 @@ CVE-2024-25606,0,0,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207a CVE-2024-25607,0,0,06dc471323b4afa7222682ac5fb4dd5d44d44e94ff758e128f9acd26e8c70902,2024-12-11T18:01:46.027000 CVE-2024-25608,0,0,2218fa4ac21f657fa2fbbebf77aba86963a945c80edb012840336f5250fa9527,2024-12-11T17:56:22.230000 CVE-2024-25609,0,0,449173a45e8af1888444d8561b8c36a94ed4c231c7b5cd3ac9b60aae4312f88a,2024-12-11T17:55:21.677000 -CVE-2024-2561,0,0,04f2b79e4caed77cd7c696af8931054d48e611518ace5d60e96b952be85e3cea,2024-11-21T09:10:00.900000 +CVE-2024-2561,0,1,33ef877d7829eaee8c1535f645daa352a4c15d35c6dfe9550b280612ea516855,2025-03-05T14:53:25.190000 CVE-2024-25610,0,0,8896ff0f1f468ecd846d761dc6b069e63fe6869fa6f678c43376d7d1c0de05df,2024-12-11T17:53:18.093000 CVE-2024-25611,0,0,cde677ed5ebe4d43712eddebcd30ecd2f61efb6ed67eed3492ff3e41f222582d,2024-11-21T09:01:04.730000 CVE-2024-25612,0,0,ec9cb19cb6fef9f5730ac98407ab78035ecdd8500b5dd57529c310a3425ca68a,2024-11-21T09:01:04.860000 @@ -252715,7 +252717,7 @@ CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d976 CVE-2024-25617,0,0,32206fb84ae6c779e53188e2391090c1824d28f44711f01759dbaf45469f6e57,2025-01-09T13:51:19.633000 CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000 -CVE-2024-2562,0,0,e5e6d2157ccae4abb588d1ea46835dee1b79702c34c80c9ef54562d7f608cfef,2024-11-21T09:10:01.040000 +CVE-2024-2562,0,1,2a125b8373fc56249eb4d52aad7b759b60c69787ce7ae8cdc13b6705d57e3a65,2025-03-05T14:53:25.190000 CVE-2024-25620,0,0,3242825c0355f9f35c07a4b629a4a478687338f127cdab33ebd2096721a4fa70,2025-01-09T13:55:40.353000 CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000 CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000 @@ -252725,7 +252727,7 @@ CVE-2024-25626,0,0,f02e56290cb5b100e94919272bfbb330213ad132979c2e09c687f6ade453a CVE-2024-25627,0,0,7cbce9e513644e3e2bc69141c068497c8530550daae3c8ffcfeb9fb3cc079991,2024-12-18T19:34:36.927000 CVE-2024-25628,0,0,7e120fb8d8628e240dd092a683ce7920f893f4e4925ec5e71fd9cd00ee4291cf,2024-12-18T19:43:00.970000 CVE-2024-25629,0,0,c60dacc32e09ac11ce3900131761f5159dfac90a7c6d3e202e6530538d450a15,2025-02-05T21:41:30.157000 -CVE-2024-2563,0,0,38d833fcf7f6b7e26d5909bf25d93cc9e0b9cbbf815bf130e6469e66238c9037,2024-11-21T09:10:01.167000 +CVE-2024-2563,0,1,ce7695de26284ecb3ca2deb604b44b716ff5657f67f121f4d44296da315e190e,2025-03-05T14:53:25.190000 CVE-2024-25630,0,0,ecd6e6ec38c84c0ab9470ff192c42ac27446ddc160f090f2949ed78a9bcf8e77,2024-12-18T17:17:18.427000 CVE-2024-25631,0,0,fbafe1ecc8e60562bddab22b51dc14f366e5552d340d15c3c201ebe075d0af39,2024-12-18T17:17:13.857000 CVE-2024-25632,0,0,962536212e86cd885a6ba9e6b6032cc1849154b0c1e3be8d347b06343f802f94,2024-10-04T13:51:25.567000 @@ -252747,7 +252749,7 @@ CVE-2024-25646,0,0,44fe52cac33c14917646765b719e0181c8f6a16956565ea90bcc52cfa7963 CVE-2024-25647,0,0,6ba463439932268f415cad2033565cebf5b38360197928ebbf36d39da23efd4d,2024-11-15T14:00:09.720000 CVE-2024-25648,0,0,0ece45355a42fc3b687a2f1556c683fc8eeb86f74ff8f0174897a1a4726e28d1,2024-11-21T09:01:09.197000 CVE-2024-25649,0,0,c5044a7156eced7aef22521c9d5d5799d34a0af8837474e60f7a3cb3ed4c9a28,2024-11-21T09:01:09.320000 -CVE-2024-2565,0,0,7afce915016e610664e8202b2124c09a8e96e069445c6b0bbf0da4f75a8cb977,2024-11-21T09:10:01.430000 +CVE-2024-2565,0,1,6097f965a73d354b47b854d80502c4ecc1996f9f9c512d6018bbcf74de325d4f,2025-03-05T14:53:25.190000 CVE-2024-25650,0,0,f1fdd24881bbb858099fdfb162a9c3ab99054b45ebf42548e6ecdb32d8d483be,2024-11-21T16:15:22.850000 CVE-2024-25651,0,0,0008bab1fa009665b7985a391a89acec44f7971e3b6e5fac28b3331b9c9f1dd3,2024-11-21T09:01:09.683000 CVE-2024-25652,0,0,43c6d619d0cb7e3494f17b410ee9fdf4fe29c9ab38f306948193a804ae81162a,2024-11-21T09:01:09.903000 @@ -252758,7 +252760,7 @@ CVE-2024-25656,0,0,484ac43ec4b98fcad48f110fcd3b62960b82cbaf155d2b074860186e105c5 CVE-2024-25657,0,0,6b81b67761ba29bdb7cb37dc814df198a6f49d69e365f723c72ba940b665211d,2024-11-21T09:01:10.990000 CVE-2024-25658,0,0,55ba182e1a8c62984f431c4340fbff129f85f68859b2a6a5e512efacac6cbbec,2024-11-22T20:15:08.393000 CVE-2024-25659,0,0,e55ecbaff5c28867f07fea4fc6a6ae4847d764e4f96935fbb0eca59b496f76b5,2024-10-04T13:51:25.567000 -CVE-2024-2566,0,0,6229fabae2b9265f23116be0cbf2f78fe25f81bd432133a3678cb6d69c3a5bd0,2024-11-21T09:10:01.570000 +CVE-2024-2566,0,1,f76fad1c3d392fdba1230bd22002711a8d9a8fcaf73caf15ca60c7d30a9926a8,2025-03-05T14:53:25.190000 CVE-2024-25660,0,0,71d3fe859b48c8317f52ff82cead80a9b08f8063c160074d5f194ee75e886d94,2024-10-04T13:51:25.567000 CVE-2024-25661,0,0,886c6ead90a40d96b4e336cb03fb62e9266195190d45070fe67fd5515e08e14c,2024-10-04T13:51:25.567000 CVE-2024-25662,0,0,3f956c29077c3c371379144c2b910c5ebc3e419f7b97589adf00339280e10e04,2024-11-21T09:01:11.920000 @@ -253902,7 +253904,7 @@ CVE-2024-27022,0,0,dbd739de33657415c11414e3e66c989817b265db76abc8d2ca1d25c1fa757 CVE-2024-27023,0,0,2aaf37192bcf19ff82447827ef1a65b2dac0157dd2feeef8bad9a358df7f5392,2024-11-21T09:03:41.150000 CVE-2024-27024,0,0,ebee5e148de6b3dde2fcaa8816a9f4f8ed64a771f098565be007ca61974f2619,2024-12-23T19:22:58.463000 CVE-2024-27025,0,0,5c3859f46c671ad7ffd95b4676d27d7a5d64666b3d74e9808cc4d7ce65e2e8ff,2024-12-23T19:24:12.370000 -CVE-2024-27026,0,0,09bf43acffc1d40ae58190f2fcb60e82fd2a37abac0e5ff15a3e014909dc8823,2024-11-21T09:03:41.530000 +CVE-2024-27026,0,1,a75d62d38406aea070ec58fb8188e590311cb21f5951f2ee6ea144ce43ab3eb5,2025-03-05T15:11:27.097000 CVE-2024-27027,0,0,ec024f008e45533c7aa91a2939bed64fbe577975d8b93228076417e0feb7b7fa,2024-11-21T09:03:41.650000 CVE-2024-27028,0,0,4246551a6c16b60a708e8d31512be639408dd731b44c719c490d0705c79e5515,2024-11-21T09:03:41.770000 CVE-2024-27029,0,0,1bc28b467b9b9b92bd81e2a843981108d7a2bcb3adede434c7103dc028886ab0,2024-12-23T19:33:28.437000 @@ -253941,7 +253943,7 @@ CVE-2024-27058,0,0,e8e18c8efb56c2ad87995b6dc7ebbe8c01bb5c8a51c8ae719afbfa612893f CVE-2024-27059,0,0,b8d358dc987b94bc06e49be13c99ba48022e2070d952b9bca9d47418a24f172e,2025-01-14T14:36:42.747000 CVE-2024-2706,0,0,ec4b783f22cb2952cae8bff1153eed6be7a282f6f994a45b7c4840589cd8711c,2024-12-12T17:27:56.637000 CVE-2024-27060,0,0,22bda1115b48ba58b7256e3896819cc9078fb8284ee48e35606dd5d9241e5131,2024-12-23T14:22:29.173000 -CVE-2024-27061,0,0,73e910d5946f764b2b7788ba36ec0556c53a3ecb605cbb07ade94ee44f100169,2024-11-21T09:03:46.663000 +CVE-2024-27061,0,1,e12055cdc2721a54c36e2218dd9b95b3853ee2ba581ef4fb80fe6830bb06e0ac,2025-03-05T15:11:27.097000 CVE-2024-27062,0,0,1731f85c74cbfffe2b0174004fb7faa0936dcae34c056b7a42ec2105bb8663bc,2024-11-21T09:03:46.793000 CVE-2024-27063,0,0,7ee22d524b1409264e7967210020859acead09ce5897f02f265765222a640dd8,2024-11-21T09:03:46.987000 CVE-2024-27064,0,0,51ddac2c3289f375846afce0848ba809f5baf86f50157e78463267321c7eeb6e,2024-12-23T14:17:03.783000 @@ -253960,7 +253962,7 @@ CVE-2024-27075,0,0,bbc8253a771dc51806d5205d7483e1a3fb0cf345232dab1fd0c81023001aa CVE-2024-27076,0,0,67207a2d32a43cace3a63d153fb1693a83721d20345be41ce05847c86c97c805,2024-12-23T15:08:03.860000 CVE-2024-27077,0,0,a9d0a16072fe98c5c2eca54562942bf1af10446c1eb18085729ac3d5e8eae272,2024-12-23T14:38:37.373000 CVE-2024-27078,0,0,9ca3d93b99f63cde707b0ba6eb1f9737780ff11116ff8c753623207ee276811c,2024-12-23T14:34:14.230000 -CVE-2024-27079,0,0,17c9dbb5c9852a4c173a0f3d7fa5bdc6cc16b3cde9008d35fa12e1289dca5885,2024-11-21T09:03:49.070000 +CVE-2024-27079,0,1,e52d550e2616a0128cc79eb7c4f40568bd536b7e87277ab0daac64584c0d7931,2025-03-05T15:11:27.097000 CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000 CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000 CVE-2024-27081,0,0,6c15e52adcba0ad7d5109f723b9d2cb1dbea4dedb4b02f02c3fea3429d99e07c,2025-02-07T17:33:26.027000 @@ -257554,7 +257556,7 @@ CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062e CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000 CVE-2024-3190,0,0,acb939305a3c103ea90b729158b96bbb213cfee2d2e362ac5c55eb275ba4dc51,2025-01-30T16:09:08.383000 CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000 -CVE-2024-31903,0,0,238cf7be78170d78bf8ae20cf7cc232326fefa26c9e5d154cbc32da7d1d13202,2025-01-22T16:15:29.030000 +CVE-2024-31903,0,1,4a74d297ea0ee92ee4899d60cc41cfa3ddf164ce6051acbd3a09cf6ce61de4b6,2025-03-05T16:02:20.257000 CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000 CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000 CVE-2024-31906,0,0,cd02788745284fef9455eef30d802865c268a4ada62b61c6de9d5bcb4bb5628c,2025-01-26T15:15:22.770000 @@ -257562,7 +257564,7 @@ CVE-2024-31907,0,0,56360f441ba18f82366ed4eb471a5c96a8260a64fefc6012f99306629a9a9 CVE-2024-31908,0,0,74d2a41f6e31ae19807e7a04173849b90024608a485a3ca2443e9547826e8735,2025-01-08T17:02:59.363000 CVE-2024-3191,0,0,26fefd7ee9b00b194a72c3556380217e011fbb35712e009d8c207a4a175b109d,2024-11-21T09:29:06.920000 CVE-2024-31912,0,0,e94e3df1ade121bddb59b6e335d1c107f2b94a6c777e07a2785aa6e9b40b0354,2024-11-21T09:14:07.060000 -CVE-2024-31913,0,0,5c36ad85f1ab857c5b7b02eabe3481adc26d7100e41968a173964db7473a3773,2025-01-06T16:15:28.163000 +CVE-2024-31913,0,1,67feaeae7cc90e05e2283909ffad505fe5d64ca91e3a072ea14fc4d891a74755,2025-03-05T16:02:20.257000 CVE-2024-31914,0,0,8f54d3c1595f40be32f6003c7ad9aa18159bb689ccb3242d3444b6ed3c0064e9,2025-01-06T17:15:36.653000 CVE-2024-31916,0,0,6fc3d0c53ff2a376147d1c083325963708c8d7a8627c56aff3166ae76e3bdfce,2024-11-21T09:14:07.203000 CVE-2024-31919,0,0,04cd44631dd35d8a93968eae8f42bcf1ee19cf844b815e3cd3b25950416741a4,2024-11-21T09:14:07.353000 @@ -258043,7 +258045,7 @@ CVE-2024-32563,0,0,042e452faf3dc5050438d3dc5c4385575336ba9ab2343ecdc12ab66fbfc1c CVE-2024-32564,0,0,3c01c3431545a02f9eb774616c0598060c77d661ea71518ff688a7c75f936f86,2024-11-21T09:15:11.423000 CVE-2024-32565,0,0,7dd81a464449b814394fd1cdbc9cb23fa58003fa8bbcfbaf2c78bc7b6d0ce6f7,2024-11-21T09:15:11.563000 CVE-2024-32566,0,0,278b7fdbf86df5e4af67f94eefdf109c16b34988e68f17f65480a161af0f5df5,2024-11-21T09:15:11.700000 -CVE-2024-32567,0,0,7f197142f15484f66a12a5823963402df1ccf9161e05443182e8552a4fc294b5,2024-11-21T09:15:11.840000 +CVE-2024-32567,0,1,163f9a2cf551122c47842ddd3ee839d5cec0754590f7668f6870a1015018c5c3,2025-03-05T15:11:27.097000 CVE-2024-32568,0,0,c46b110e0cf20ec211923366c955b66401d96fb6645ba987b981123ba2168a79,2024-11-21T09:15:11.960000 CVE-2024-32569,0,0,a9454b78d83009bb1146577e9f0f3c0fd07a0743e4f961159113b1ceff2d75b1,2024-11-21T09:15:12.080000 CVE-2024-3257,0,0,17a5c1b3335c534f12f741af8d905a58129b55f451b0aff8e5ebd31d5c7181e8,2025-02-10T23:04:32.190000 @@ -258462,7 +258464,7 @@ CVE-2024-32973,0,0,be4074c0768b3a3c576f64ebdbd72c01750f65108713226dc057fa32944a2 CVE-2024-32974,0,0,b58e40ed0994d151943728d1116cf01a5b040cd13976abae877354981cb177de,2024-11-21T09:16:08.717000 CVE-2024-32975,0,0,f60595c70db9c286ec5c4779228dcf417c0327f406445369bca436abc69fb4c1,2024-11-21T09:16:08.867000 CVE-2024-32976,0,0,e884d0582910c5e4855b85d7200d0f9f3e650c4ebe8d8ea13a61de63118d84bd,2024-11-21T09:16:09.013000 -CVE-2024-32977,0,0,a18a36aa056a0235fd8e8d55ce4d3e56c3e06b6c59a5c35fb8a69ad3847e9071,2024-11-21T09:16:09.153000 +CVE-2024-32977,0,1,78522fecce5744cdcb71502bab8f906f36304f3b457d0ca9e34a07e45cc226fe,2025-03-05T14:53:25.190000 CVE-2024-32978,0,0,5433a8a6d453ddf98e8b0986dbe4dec46752ee391b744c7b018139ff1a347748,2024-11-21T09:16:09.297000 CVE-2024-32979,0,0,9034d737698a6db9ec8baac74d9030c92cfb541f8293b48afda3b049c733ecbf,2024-11-21T09:16:09.433000 CVE-2024-3298,0,0,d3079e4925f23b712a219d35c997a87b84c0e7297168abedaa813477b6a67367,2024-11-21T09:29:20.760000 @@ -259078,7 +259080,7 @@ CVE-2024-33910,0,0,02e7d7d2c717810e2e6046c8ab909ba55dab8588e7c23d058b758e17103fa CVE-2024-33911,0,0,0e3e9910921546cb7570b8065942096c714978a134424a460a960dbda2fdb342,2024-11-21T09:17:43.373000 CVE-2024-33912,0,0,a608e7e465c57121cca07e9663053bedfaf8d84018b404734ba5de93c623d002,2025-02-03T19:05:39.657000 CVE-2024-33913,0,0,c3f41653850668bfae1fd42c342538945d3100d9b4dc2c329a882cfcb5828e2e,2024-11-21T09:17:43.583000 -CVE-2024-33914,0,0,f1c6db7e65f5d7f5cbf1d0a7aebea997776701c106aa56b55d4efd8ea3417c4d,2024-11-21T09:17:43.687000 +CVE-2024-33914,0,1,6f245fe468704f9b388e98af332380b650413eb0a535cfc1c58ef1cb2ddb0175,2025-03-05T15:11:27.097000 CVE-2024-33915,0,0,b5d6ca9802eb50cf7b3fedca8792fbf9297319e0fe0443966abc02517a524960,2024-11-21T09:17:43.793000 CVE-2024-33916,0,0,ba6dc48849bce2305ded2826593fb53e84078a68675657f57981759e5c7a5b0e,2024-11-21T09:17:43.903000 CVE-2024-33917,0,0,60a4af7cfcf4e06103f1c6d2c14a236296bec211e9de649b77897e1343e3899a,2024-11-21T09:17:44.010000 @@ -261679,7 +261681,7 @@ CVE-2024-37184,0,0,302ca72575b888a5995c74a2442f826313849e238e514a8b2f701d7195130 CVE-2024-37185,0,0,ae0cc862279502ae5e66322a3aebd2640385872be1c74e78f56119b40d276146,2024-11-21T09:23:22.897000 CVE-2024-37186,0,0,154e72deffecde1795102479b38c4ff4c5d18584b229038d937653892b1beaee,2025-01-14T16:15:29.907000 CVE-2024-37187,0,0,7a5ae12c3c44b373fe145ae49b5077852bc1afda08d8ee4227ef5572a5ef2db8,2024-10-07T15:17:34.747000 -CVE-2024-3719,0,0,7907625296f0f11f4323e981782e409d50c0236f57a6c459ecbc4b51dfce98b1,2024-11-21T09:30:14.340000 +CVE-2024-3719,0,1,1534a3ee728a023c9161159e59c9c363b1fa1ab90a3185175602f1235d1070d0,2025-03-05T14:53:25.190000 CVE-2024-37198,0,0,9e0ae22ac4bfae0159d0f8b987c6b86da412e901b7413281a582e9d83651bff5,2024-11-21T09:23:23.130000 CVE-2024-37199,0,0,b784200e2def350baf38dcdbdc38661fc5c785336685431e2a7d97195e266d8a,2024-11-21T09:23:23.287000 CVE-2024-3720,0,0,b11c7b31cf05e9f63f61a9439774ec42df59bfceaf23b187fd53a91e86fe6e60,2024-11-21T09:30:14.480000 @@ -263409,14 +263411,14 @@ CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e32936 CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000 CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000 CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000 -CVE-2024-39312,0,0,7a14e5ba47d44865f4b77225dde75ffd88a80b41a15fd22bc2074df84d8c1c7e,2024-11-21T09:27:26.250000 +CVE-2024-39312,0,1,091a032ff8260452715f5ea8758378766ae4690061f220fe04cb023c20b269cb,2025-03-05T14:53:25.190000 CVE-2024-39313,0,0,bf1f38bc6d0108e622f942f1293f80672041643afd14eec60c286129bde9696d,2024-11-21T09:27:26.370000 CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000 CVE-2024-39315,0,0,08689d38bae33a39d2ee0c6fd90987ee32dc4022e1a5589ea67c2b5cd59d8082,2024-11-21T09:27:26.610000 CVE-2024-39316,0,0,45ccc4606c1ced74f32c315d82c11378f05d7721ddef5999e7262273275ce374,2024-11-21T09:27:26.727000 CVE-2024-39317,0,0,a0fc4d71b5cabdaeb3b999c76cc981eac10eecf8294b24aaf6ecf119a554904f,2024-11-21T09:27:26.850000 CVE-2024-39318,0,0,6764e76c817e87d695ea3993b86a3354d209bb056859b5c07dcb19565385d010,2024-08-01T12:42:36.933000 -CVE-2024-39319,0,0,8e00a786e9c378a1a80588678c38a05df2bebdc5449e683c911373b1cea63731,2024-09-30T12:46:20.237000 +CVE-2024-39319,0,1,32bb31ccb46056a9232ed4ef30f00fd85a1c0ab916a9286d2faf9a5ca332690b,2025-03-05T14:53:25.190000 CVE-2024-3932,0,0,e1e6e934d506d463f318dcd7b6195b8fede3f030a5382e5fa87592a6b9829b2f,2024-11-21T09:30:43.703000 CVE-2024-39320,0,0,e4877e1d00ea378952f1c53c996ffb9e5141d5f98d9781e6944ef5bef1cdbd3c,2024-11-21T09:27:27.230000 CVE-2024-39321,0,0,801cf361a46239e192f4acfd721bba0cfca689a711cbfe4c715ecc082a7cb3ff,2024-11-21T09:27:27.390000 @@ -263983,7 +263985,7 @@ CVE-2024-3990,0,0,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000 CVE-2024-39901,0,0,dfe56b10f6e323b587500698e0833597c95fdbbfc63c2621d91311d6c3045504,2024-11-21T09:28:31.763000 CVE-2024-39902,0,0,034e518f03ca153bdc0378a8d985edbd73e6d7771dd113c36f0eafb749f67384,2024-11-21T09:28:31.950000 -CVE-2024-39903,0,0,4cce25467121a6dd482dd79a7c606f810898021aa5f1a2f7d65781fe70b1df0f,2024-11-21T09:28:32.080000 +CVE-2024-39903,0,1,a69b7a29d317259f3f1f62823597f65c2403a31ed436103a3f5378280f0c74e5,2025-03-05T14:53:25.190000 CVE-2024-39904,0,0,c25a670401bfc26df8afcb7510809458f883fcd709af93a20a1029e5f5b91ccc,2024-11-21T09:28:32.210000 CVE-2024-39905,0,0,d79772b7ab69602842d543f2aa4b14bfae95db33b08992cb0b4a652162ac9ab0,2024-11-21T09:28:32.333000 CVE-2024-39906,0,0,8d84350de04535242f8eba72f437fedb14fc0f4312838c85d0cb07a5dd7eabf7,2024-11-21T09:28:32.470000 @@ -268109,7 +268111,7 @@ CVE-2024-45593,0,0,c0a1f50bf86c5f8aca4cc79b465060e1ce64223e49adedfd583e4aaad6d5a CVE-2024-45594,0,0,7a3512bdd289e08930c55958e7a3b82e2f30b26c968886b9e51f5b90019583ff,2025-02-14T16:35:51.647000 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 -CVE-2024-45597,0,0,5a68594db914cb6b4d8306c16fbb00f262377974d86e7839e390f218fadb00b1,2024-09-11T16:26:11.920000 +CVE-2024-45597,0,1,db548a005ff7a1fd19c34ed33f14f80c61bb705b4a78fcb0689078146db88b2b,2025-03-05T14:53:25.190000 CVE-2024-45598,0,0,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 @@ -269727,7 +269729,7 @@ CVE-2024-47818,0,0,474b7accac59722d9682a2897bdf63f7157ad6793aaac3aaa3419635fb428 CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e996,2024-10-25T14:24:36.823000 CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 -CVE-2024-47821,0,0,76b827a268a29215d24c29e6352099eb5efb4e0a0fc6d7027d5b3a03715d192c,2024-10-28T13:58:09.230000 +CVE-2024-47821,0,1,548ec07ef1ce23fda935039365fb1338b7d2cbebaa0f5fad0ac50306a140b074,2025-03-05T14:53:25.190000 CVE-2024-47822,0,0,92c6f57c3e90f75d3fc504f166ddbbe4b9ecd9f20fa8edf7413164d0cd32832b,2025-01-03T16:31:38.163000 CVE-2024-47823,0,0,4967341ad081596ff093637a780ca486831b3e2d97a0e50755edaa6faf32b4ac,2024-10-10T12:56:30.817000 CVE-2024-47824,0,0,a6ed6f23ae40be69a679bf0b38da4a6a4364f56979ee1f794b9647e1e4c37eff,2024-11-21T17:15:17.650000 @@ -269742,7 +269744,7 @@ CVE-2024-47832,0,0,2094d7befb221ddc11234bf90a706f9031e3970a0595297792c480a91def5 CVE-2024-47833,0,0,cedf8a7f49cdbdfc4954e19b64aca1f0f431cd6f3397df1c55a4eade72fc7a64,2024-10-16T16:33:34.493000 CVE-2024-47834,0,0,4cba8af3821e728bf9be87b2cebd02718392a54164383033c634eedac352ea45,2024-12-18T19:43:02.923000 CVE-2024-47835,0,0,01f83380a6b7f032e95ad1e4070463e59ceb3517fbe77413d53b634726b76aa4,2024-12-18T19:45:03.047000 -CVE-2024-47836,0,0,02b65883e122e7917f3c03aed3241195da87d2ffdc88d735c882ce139f9839c9,2024-10-18T12:53:04.627000 +CVE-2024-47836,0,1,9207945cc13ee8abfaa870e9be8ecd13b5ff7244ac48f5fb11251aebb5fe72f4,2025-03-05T14:53:25.190000 CVE-2024-4784,0,0,2e76d4546e9c62c3ba092021d46c486d8384cfb9c654dd39c0e0103c384bad26,2024-08-23T16:59:30.430000 CVE-2024-47840,0,0,3aec5fd3cabcb26de1c56a4f55fe5f3aff85c552d29ac0305323dba49302af4c,2024-10-16T16:44:54.440000 CVE-2024-47841,0,0,27e9090f82efe087c67c424b2ba5c47a35507461f5831d7f372685997ba849cf,2024-10-16T16:34:31.173000 @@ -271857,7 +271859,7 @@ CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb9 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc151d7,2024-11-27T17:15:12.563000 CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166101,2024-12-06T17:15:10.180000 -CVE-2024-50684,0,0,5a61a50d007de96e358b48a746bcc4b0ab7bfc7b760a2f7b5136cfc32170c3a6,2025-02-26T21:15:17.267000 +CVE-2024-50684,0,1,d14e407aa0e46dc9eb061232b43a33bc60afd2cff74cf3b51dfcbb918bb86fbe,2025-03-05T15:15:14.537000 CVE-2024-50685,0,0,59e9595e40a823d9905fea8d75a88e2fb2c63033537cbd78efe9d391fbfb163c,2025-03-04T22:15:36.813000 CVE-2024-50686,0,0,0171ebeb1b945891d00c815a65f69b73d47e2ab2940d7c6aed13c26fe5622bea,2025-03-04T22:15:37.017000 CVE-2024-50687,0,0,f99c76c74640587e351d9ae9128e2b3ddbc7b6f5fac68e17f56141a62e1ebe8f,2025-03-04T22:15:37.213000 @@ -272023,19 +272025,19 @@ CVE-2024-51023,0,0,9a18854a7f98b73387269020b87c83d43d61687672a7417fdfb2ca98bc2f4 CVE-2024-51024,0,0,591d5456b79884bcaf690fc58eb2d5e416722b63f03748014dd860e9df3b2051,2024-11-05T20:35:25.253000 CVE-2024-51026,0,0,2eae5d4cdeca069e20ee72340c082bed5619244540ef913ee815d0d094b9a2f0,2024-11-12T18:35:32.357000 CVE-2024-51027,0,0,796469a65ad33b6b2a28c85a0c0dc02ce4aa4508412c529ed5039204a0ab107a,2024-11-25T20:15:09.607000 -CVE-2024-5103,0,0,3bab6f44dc170baf4594a2f7e9a7cdac12a86cc1533219774ed5f3becd8483b2,2024-11-21T09:46:58.490000 +CVE-2024-5103,0,1,f79e44d9fd8599eeb24c3a7410ea6783fdee9c68dc6e5d9190aea7c54a159e6c,2025-03-05T14:53:57.827000 CVE-2024-51030,0,0,738383150dd0c94610c4e494eccb88372b420621be99c82fb38ec8e441f0fe02,2024-11-21T17:15:22.093000 CVE-2024-51031,0,0,cc1c5c5a0b0ec0f8409c1a284c87ef4035aa76fc156532b8acad4dd8543cee9e,2024-11-21T09:45:13.027000 CVE-2024-51032,0,0,941c8c0564f1dd22056a7cb5f2f649d98ed960dce11288451f8aa87b6db8c062,2024-11-21T09:45:13.287000 CVE-2024-51037,0,0,c1c3331683c9f9caff3864b6549510544eb9a399c89f075a63e4c59b2ad4a923,2024-11-18T19:35:06.770000 -CVE-2024-5104,0,0,01eb116078f9682fb2bf40ca2d7c31e8977a9ebfbc02b2993340924fa7c7c3a7,2024-11-21T09:46:58.640000 -CVE-2024-5105,0,0,453aa2840b06f5e1cc2373ff018e4d6aba34de20397aafa4350690639e756b79,2024-11-21T09:46:58.763000 +CVE-2024-5104,0,1,92a0d82727c9c41dcc8a8e1c62412a21681ae489a449e9fc7fb170d1cb7d5cec,2025-03-05T14:53:57.827000 +CVE-2024-5105,0,1,7caec2acdd0e6b9c2303fd3dac38bcac807748b07153fa0cd02316a3075d581e,2025-03-05T14:53:57.827000 CVE-2024-51051,0,0,4589e8828150b90b78c5f1b073be1ebbc9d60f7f75517bd8ffdf59f3d0d8db1f,2024-11-19T21:57:32.967000 CVE-2024-51053,0,0,df14748197642c19f425f4579e26ed4da48eb787396a4dfdc60ac3edccac61ce,2024-11-19T21:57:32.967000 CVE-2024-51054,0,0,168c647cf628fc56d9508f2825b5c25c05902ffacc5b7f14be663628b10eede3,2024-11-12T20:35:17.823000 CVE-2024-51055,0,0,8c557950a9a065601e8c6c8dceb6fdc953c2a7292e6455f04da0193339cabbf1,2024-11-13T16:35:25.810000 CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000 -CVE-2024-5106,0,0,a230c33f6e13a964fd3ef234953a83f1c006c0acefd879749dd085fd7e1d6922,2024-11-21T09:46:58.907000 +CVE-2024-5106,0,1,5fa6d0a4f1c911ebca975aec13aa902c3787bc1bf724700a8b0413308269a1f6,2025-03-05T14:53:57.827000 CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000 CVE-2024-51063,0,0,3317bbf937800b748b7e64ed1e797ea62def5b0d16d8aa6d63210137c0a3309c,2024-11-01T17:35:09.657000 CVE-2024-51064,0,0,1c9653179af323f5fbe8d860c24f0767ba57e81cdf442595c8044480ddec5282,2024-11-01T16:35:28.140000 @@ -273795,7 +273797,7 @@ CVE-2024-53672,0,0,c034dac4c4637a95856788fb40ca70c5483331e0a98b00ebbe100e048ed73 CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145127,2024-12-12T19:50:22.903000 CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000 CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000 -CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000 +CVE-2024-53676,0,1,c490c381bc4cf20362ca2fe80c2a42d5885518e67b502c7eb2104a16d0af86f5,2025-03-05T15:15:14.717000 CVE-2024-53677,0,0,8366436219755b1800912ef688e04813e43d75c9b7c1b34216e46bc5e5cd4bc2,2025-01-03T12:15:26.673000 CVE-2024-5368,0,0,13518c0767ed3e28c7d8f854dc377d56337113717b880dc627d3073c12ab697b,2025-02-11T18:32:28.793000 CVE-2024-53680,0,0,d00cdef75190d88cc2c8633c99dc18973cdcb2e6508d8e02eb8a8af87c5c3651,2025-01-11T13:15:25.710000 @@ -276336,11 +276338,11 @@ CVE-2024-58019,0,0,ebe852acb58145e0f515ee4e65d8d88d1691b0b856363c64f164142eb938a CVE-2024-5802,0,0,19fff604014c9cef9e0f8bc6a62b84f7523f1797653eafe6700c36b3d03bd7a8,2024-11-21T09:48:21.447000 CVE-2024-58020,0,0,c6dd37c1ce19d533a907eee523d03dd86887dec00b10f065b1660bbe7fc7135b,2025-02-27T03:15:12.997000 CVE-2024-58021,0,0,228350909b9f49e0925cb16d6fff6890df30f86ad805ed469980f5769f553c12,2025-02-27T03:15:13.110000 -CVE-2024-58022,0,1,fa469b1694a27ff9f3883dfbb31bb0fb81728568f162205ac4ad417c587e1c4b,2025-03-05T14:05:15.387000 +CVE-2024-58022,0,0,fa469b1694a27ff9f3883dfbb31bb0fb81728568f162205ac4ad417c587e1c4b,2025-03-05T14:05:15.387000 CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974d3,2024-10-04T13:50:43.727000 CVE-2024-58034,0,0,a58d20858f51668ab0e30ae7e40910f616321f1f89fdedf57b44aac4e3186045,2025-03-04T18:15:24.617000 CVE-2024-5804,0,0,2f00fd3e9947e9e26596c3d44370745abf63c8732a08c44c5ab0acfd9a8ea957,2024-11-21T09:48:21.677000 -CVE-2024-58042,0,1,913d82d5746eaf56dcb73a81d4d4f1fa1f2df917e4048e31415852279ac58b5c,2025-03-05T14:05:15.387000 +CVE-2024-58042,0,0,913d82d5746eaf56dcb73a81d4d4f1fa1f2df917e4048e31415852279ac58b5c,2025-03-05T14:05:15.387000 CVE-2024-58043,0,0,6c9910f151efabab9fe50138adf0da55634410981bc17ef17a1c0db9e0e3064e,2025-03-04T08:15:34.480000 CVE-2024-58044,0,0,8e00020c0a23f91d16935df02123388ecc92dafd7e3584b75e082f22487dd0da,2025-03-04T08:15:34.750000 CVE-2024-58045,0,0,3f471ef259c7022a6a0a348332711cb0922f730d2612ffd76edbb88143589def,2025-03-04T08:15:34.973000 @@ -280139,11 +280141,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080 CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000 CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 -CVE-2025-0285,0,1,4831dfb88edfaad15d3b159af89ca8e4b44eba800428b41a9fa527cf07435932,2025-03-05T14:15:36.060000 +CVE-2025-0285,0,0,4831dfb88edfaad15d3b159af89ca8e4b44eba800428b41a9fa527cf07435932,2025-03-05T14:15:36.060000 CVE-2025-0286,0,0,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000 -CVE-2025-0287,0,1,4dcb5dd88c8e60224b4c9a209ee5974c1a6c00db395b72c96cdce748b13a63dd,2025-03-05T14:15:36.253000 -CVE-2025-0288,0,1,0b1e2365b27ccfce1154f46e7d56ca5437e3871eb5ed29ae989f0655fe49bfbe,2025-03-05T14:15:36.390000 -CVE-2025-0289,0,1,b048b066c322e6746f9d2ad3d9569f0fb36c1ec7366376297a2bfd2dce508d49,2025-03-05T14:15:36.540000 +CVE-2025-0287,0,0,4dcb5dd88c8e60224b4c9a209ee5974c1a6c00db395b72c96cdce748b13a63dd,2025-03-05T14:15:36.253000 +CVE-2025-0288,0,0,0b1e2365b27ccfce1154f46e7d56ca5437e3871eb5ed29ae989f0655fe49bfbe,2025-03-05T14:15:36.390000 +CVE-2025-0289,0,0,b048b066c322e6746f9d2ad3d9569f0fb36c1ec7366376297a2bfd2dce508d49,2025-03-05T14:15:36.540000 CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 @@ -280933,7 +280935,7 @@ CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0 CVE-2025-1632,0,0,28fe99b7a4053d94bf92a115fabddf2bf6f2fcf0d6264d4d013a0dc1f70735ec,2025-02-24T15:15:13.217000 CVE-2025-1634,0,0,4cd063c32518b09ae8b07ad657bad146c97cc4d931f5189e3d631a7cc1d23de7,2025-03-03T14:15:34.237000 CVE-2025-1638,0,0,73f08267213d85fae6cfc79fe8ee252b893947fe65424e2f84e6465aca895ec5,2025-03-01T08:15:34.167000 -CVE-2025-1639,0,0,5303a0c80213944ee87437e0d453dd5a13f420bef52e515a9556f6a6ccdc836b,2025-03-04T04:15:11.697000 +CVE-2025-1639,0,1,cfbf2e6591ffebf411f63d293bf18c5e63cdb958516a5890f7098c88e7d5697f,2025-03-05T16:39:15.917000 CVE-2025-1640,0,0,a0f8f210f37587375db5b38f353b81a59e9ce28e661d11d8fbd0998061d8e8e7,2025-02-28T01:55:41.530000 CVE-2025-1641,0,0,298e7bd3f12e0ff5b9a9caf6661079e526cc4d770741d969c699c4454e05db34,2025-02-28T01:55:41.530000 CVE-2025-1642,0,0,33d55f220307ffb92ee160bb35401cd9d8f51dff5d5fa56b0deb6dbdc0aebe78,2025-02-28T01:55:41.530000 @@ -280957,8 +280959,9 @@ CVE-2025-1690,0,0,c3c30e76959167db5e53b3f3d7f732bab0cb17823abdf119dfc999308f89a2 CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec582d,2025-02-27T16:15:38.610000 CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000 CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000 -CVE-2025-1695,0,0,357cfe78a2c92e1c865a0bb908329007d0ab26040698f97311ebba02a25bd231,2025-03-04T01:15:10.063000 -CVE-2025-1702,0,1,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000 +CVE-2025-1695,0,1,11ac8a68241490aba1f5f798db0dba9522b478d170bec56bb4dd6fd08e218fb4,2025-03-05T15:18:38.660000 +CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000 +CVE-2025-1714,1,1,7d464005cc3e2fe8abdf07631689d8f1c4467f8ffe467852e3ced1b0a0be0afa,2025-03-05T15:15:15.413000 CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000 CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000 CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000 @@ -281050,17 +281053,17 @@ CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327 CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000 CVE-2025-1877,0,0,4b3ca9eb38fe13d61b6a5fe1999238787def06e15c7cfb4ade6a5110ae7008d1,2025-03-03T19:15:34.180000 CVE-2025-1878,0,0,ec23e88b569005bf7d3c4526d077acc62c590ae5f6c22422ff423486f2dbc798,2025-03-03T19:15:34.387000 -CVE-2025-1879,0,1,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9ad,2025-03-05T14:05:15.387000 -CVE-2025-1880,0,1,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000 -CVE-2025-1881,0,1,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000 +CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9ad,2025-03-05T14:05:15.387000 +CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000 +CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000 CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000 CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000 -CVE-2025-1890,0,1,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000 +CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000 CVE-2025-1891,0,0,48564a83b01094f027d40be0fc2e0faa1b03fdb1978bf68de11e33632eeefdd9,2025-03-04T17:15:14.510000 CVE-2025-1892,0,0,2fa96864979ccd34da4a094f4e313760a12e68561a0843aec1e575c6ac276b4a,2025-03-04T17:15:15.700000 CVE-2025-1893,0,0,9be412d2514b9be0790e5a4193b6955597746daf900e90c81d514cf9ccc312d7,2025-03-04T17:15:15.890000 -CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000 -CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000 +CVE-2025-1894,0,1,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000 +CVE-2025-1895,0,1,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000 CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000 @@ -281072,15 +281075,15 @@ CVE-2025-1903,0,0,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612 CVE-2025-1904,0,0,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000 CVE-2025-1905,0,0,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000 CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 -CVE-2025-1914,0,0,bcad0de3c9ab7406af4468d5efb972f0836199c9eea435008e17a71744fba0c2,2025-03-05T04:15:10.233000 -CVE-2025-1915,0,0,878977d45d4c1d176ab5ca6d2e3a9f67ca4d8b2737af8af0fef9466acd1618ea,2025-03-05T04:15:11.147000 -CVE-2025-1916,0,0,3202db47e9fb74c02b2ddd508fa1e8a78e048df1705262eb8d369c1c1d59d39a,2025-03-05T04:15:11.267000 -CVE-2025-1917,0,0,1eb9efbe487c3a1acd86ce9f20887a945afbc90901b37ac9feb7daffd536e563,2025-03-05T04:15:11.393000 -CVE-2025-1918,0,0,3f3431eedd7f189204e01042429a5feb419b3ff86f86866b0db49a44b7f9ab45,2025-03-05T04:15:11.520000 -CVE-2025-1919,0,0,81ffc17e247a5794ac9c07a734a52d2d2cb54fc2c1fa8a844ae4096034276e13,2025-03-05T04:15:11.647000 -CVE-2025-1921,0,0,42ee5b7505148dd84fc5c50bba6143e74e34bd3611fa1433dabc575124718aca,2025-03-05T04:15:11.763000 -CVE-2025-1922,0,0,a27f167b095bb7d17a76a80ba6db6fc48d2b0728f7a0138544c6c4713e8d3f23,2025-03-05T04:15:11.887000 -CVE-2025-1923,0,0,d3f011736bfc21dcba07a82ba583899d6041edc4ff034a70860106a10941e92d,2025-03-05T04:15:12.010000 +CVE-2025-1914,0,1,26644d87f7ea78754e61afdf88af3b53e637cc322d9c410d45452411107b6199,2025-03-05T15:15:15.560000 +CVE-2025-1915,0,1,87990d884ed6a1cf9c53cbb9074aeaf50ed7455c17bcda3f0fc14c8f3723c450,2025-03-05T15:15:15.743000 +CVE-2025-1916,0,1,62cbf7d0baf3b65340e1dd71d636637dffa9fe88a30cf5f1b31df7c201565e56,2025-03-05T15:15:15.900000 +CVE-2025-1917,0,1,a45aaaab45a99ee616555c7303ae35fa5deaa8caf5cbc67c816a0b6730fb0cec,2025-03-05T15:15:16.067000 +CVE-2025-1918,0,1,0b969e174274812299d3170aab0162f6660668a900b37b5060bb255adfce2bba,2025-03-05T15:15:16.223000 +CVE-2025-1919,0,1,fdbf01b21cd0a0a7341c004e74c5a0f8896d5fa9b9090a1373c391c776ac0904,2025-03-05T15:15:16.383000 +CVE-2025-1921,0,1,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca5e,2025-03-05T15:15:16.537000 +CVE-2025-1922,0,1,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 +CVE-2025-1923,0,1,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 CVE-2025-1930,0,0,89cdd0943883dc9e142ebc3c06e7538620eaf1f97fe6d2da84f7fbe8ac0aedc9,2025-03-05T00:15:36.133000 CVE-2025-1931,0,0,b5e38c0da3bd8580a8ad8790659a66faed6e8c8f7d9210cfe046349c16f0890a,2025-03-05T00:15:36.227000 @@ -281109,11 +281112,11 @@ CVE-2025-1958,0,0,619bed4d75a15053f3aac5475d86341822d0cd5f222710eba99a248d83ce8b CVE-2025-1959,0,0,9d8676fc512d4ebd32698dcf5e1427729182b6be21e1286eabe5a5fd753c8b41,2025-03-04T23:15:10.507000 CVE-2025-1961,0,0,9e70e856851ce821d28e595aa7eb232d22a2f1598d80232c2dfbe9955aeb8530,2025-03-04T23:15:10.717000 CVE-2025-1962,0,0,2f5f3cb494705637cf4dfe7215b0b63905c31e67fe2442f500c19b1fc8e3bec8,2025-03-05T00:15:37.540000 -CVE-2025-1963,0,0,ae4db31776c2043c41d80624a85ed9cdbbe71f48764d851cdd9b83ee7498b17e,2025-03-05T00:15:37.723000 +CVE-2025-1963,0,1,e716dc9db11e4c1f600581dc5831d63020e89d0b334c585d4ffe68d4995bcc15,2025-03-05T16:15:37.307000 CVE-2025-1964,0,0,07710436d9e737e6da480fa71767564d9bba5024aeb8fd1d210868a19af62be9,2025-03-05T01:15:10.020000 -CVE-2025-1965,0,0,4732c5ee4081d479acbc10d6bb941ea388b81420e39e5c81488b45ad9f9bb7ab,2025-03-05T01:15:11.600000 -CVE-2025-1966,0,0,e6e749c04982f30acdf59aade6e0f7c88ccd923cdf2374879c211391ea776872,2025-03-05T02:15:36.157000 -CVE-2025-1967,0,0,b20ac9c31f423689ed3bec468ad68a64b0cde468e389b0543651d57ec4aaed89,2025-03-05T02:15:36.320000 +CVE-2025-1965,0,1,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b78855204,2025-03-05T15:15:17.107000 +CVE-2025-1966,0,1,6ccd782fa14c79bfb085da504344a1de6f9901dce1ffefcf87ba1c9f56a60487,2025-03-05T15:15:17.260000 +CVE-2025-1967,0,1,42e655fe49f6762d0d9e1e0fe0e87e8caffe391f86ae92c278c36c149b534595,2025-03-05T15:15:17.410000 CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 @@ -281238,6 +281241,7 @@ CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93c CVE-2025-21089,0,0,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000 CVE-2025-21091,0,0,c802a7b25882d42a090b27badb1537fcdda8854c4d36451323648d734d1e16cc,2025-02-05T18:15:30.613000 CVE-2025-21092,0,0,140b3fe8a31460f6705b94bca92c1cb8e7389d9fdc0b822b07be6f1b43759d3a,2025-03-05T00:15:38.080000 +CVE-2025-21095,1,1,347be251bc2554322848b77faa7397784ae841c11ccccb8f061e410d0514029d,2025-03-05T16:15:37.487000 CVE-2025-21097,0,0,da0506b0f8f381393fdc99df275174ef6f455eaaace2f30a63e7d5c90c865651,2025-03-04T04:15:13.813000 CVE-2025-21098,0,0,a193a406b493161331e8c0047ba76e17ef891d131b44cddf900c465d6f51a0c8,2025-03-04T04:15:13.953000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 @@ -281779,12 +281783,12 @@ CVE-2025-21789,0,0,e477523ebf1c25bff34233693c1301cb500a0cc650ece9680b705605ac450 CVE-2025-21790,0,0,c20bf732c4cb238a8dedc4b5703caa71b82947fa16283e41cd9ceb2902ed25d4,2025-02-27T03:15:19.870000 CVE-2025-21791,0,0,8cd3044e2974ddbe5ec4d845888ae202de59370c264d374cccc339066a7a4834,2025-02-27T18:15:30.053000 CVE-2025-21792,0,0,30ce74f4157cc4d72041564941a761e9bab427028f9dbc41bf824055385783d0,2025-02-27T03:15:20.080000 -CVE-2025-21793,0,1,9a7861c245a7b4cd4548bb2065778b0ee3c1b4414d4337450e9ba3cca6d8f72c,2025-03-05T14:05:15.387000 -CVE-2025-21794,0,1,f6647e49bb9908d17a4c6de9f144258688ff3128fb4a245ba073f55b15aa9f22,2025-03-05T14:05:15.387000 +CVE-2025-21793,0,0,9a7861c245a7b4cd4548bb2065778b0ee3c1b4414d4337450e9ba3cca6d8f72c,2025-03-05T14:05:15.387000 +CVE-2025-21794,0,0,f6647e49bb9908d17a4c6de9f144258688ff3128fb4a245ba073f55b15aa9f22,2025-03-05T14:05:15.387000 CVE-2025-21795,0,0,815676136ff167ea211ac85d264a3129527371a209d25217b76d438c3f52fe9e,2025-02-27T03:15:20.390000 CVE-2025-21796,0,0,cec6654841982f5711d9d5a48f2c05b5c7cd88ea8da091f7dfce5e709904e74c,2025-02-27T18:15:30.210000 CVE-2025-21797,0,0,88445ee18da910ef5bfc7791d96ceef61083d17beebbb47d3aa8d3a13e039286,2025-02-27T19:15:50.807000 -CVE-2025-21798,0,1,9fc961c2dc8a958e3699d87d565c8d3ee8d8054c582027e79f5a5b359595ecf4,2025-03-05T14:05:15.387000 +CVE-2025-21798,0,0,9fc961c2dc8a958e3699d87d565c8d3ee8d8054c582027e79f5a5b359595ecf4,2025-03-05T14:05:15.387000 CVE-2025-21799,0,0,3b8abdf6a148f43cbe7e5379c90405bbe9907485b65e459fe464395b6e077c85,2025-02-27T20:16:02.563000 CVE-2025-21800,0,0,b85c240f364818c80483c72d4d3b4ccf3c37b4c6eb0ab94e0c189b5f91261cfa,2025-02-27T20:16:02.660000 CVE-2025-21801,0,0,b2091f0a15d88754e84fef2b4a29fc94ad76a536a4b85fa75af7b434f485c543,2025-02-27T20:16:02.753000 @@ -281795,22 +281799,22 @@ CVE-2025-21805,0,0,130755634bdbdf0e26144dc48e041cd2d3c9091da9f673a936a266c576aee CVE-2025-21806,0,0,4b9664d0226df4067eaf096dd2e1d1d56c6473f10b7d359a25481dd598c88e9e,2025-02-27T20:16:03.220000 CVE-2025-21807,0,0,839061c416ed53205346020cb397a0da118a6b3431eca5e326eaa2d635936dde,2025-02-27T20:16:03.317000 CVE-2025-21808,0,0,84bce3df420f8d3db785caf233d71bd40ee3985bd8337dd2a9b820e6bd0a408e,2025-02-27T20:16:03.410000 -CVE-2025-21809,0,1,2f4cb5efc653aac40b44d3818284785d3141db6e56217af95575ded45f9f2b5c,2025-03-05T14:05:15.387000 +CVE-2025-21809,0,0,2f4cb5efc653aac40b44d3818284785d3141db6e56217af95575ded45f9f2b5c,2025-03-05T14:05:15.387000 CVE-2025-21810,0,0,a6c30e94287c9c8d86b20b52c523e8b0de4fba5b3ecf6bbcb1e02bf3205e74bd,2025-02-27T20:16:03.587000 CVE-2025-21811,0,0,f4cf837d733fe9c7f89ff20c50a9b1b21bfae5f9fa68f7560bb7735d2ba8c602,2025-03-04T18:15:24.840000 CVE-2025-21812,0,0,7ab1e2667db13e9301bf6dc8371a94bc370eac4d101187c6481cc0bd898c0a20,2025-03-04T18:15:25.100000 CVE-2025-21813,0,0,796169d7100b9f68cc3cae340072c0f90bd1f5da53f6ec3d5de4f6f96ffe2fff,2025-02-27T20:16:03.883000 -CVE-2025-21814,0,1,03224a2dbb88c92b5106851fa0282460b832d59a0233255531097ac847c68eda,2025-03-05T14:05:15.387000 +CVE-2025-21814,0,0,03224a2dbb88c92b5106851fa0282460b832d59a0233255531097ac847c68eda,2025-03-05T14:05:15.387000 CVE-2025-21815,0,0,505081b931ce8b8c7648642e1759e5d2b9d854ed396415c4f32376b2124b935f,2025-02-27T20:16:04.063000 CVE-2025-21816,0,0,c528fc8128c19bc0bd15f68d6d374b8163180d99f68610bfa350a8bd45cfeffe,2025-02-27T20:16:04.150000 CVE-2025-21817,0,0,fb75e4ad84b34fea43e1625612ef1f6ef9314f907dcd5da0b3430bf5a489cbce,2025-02-27T20:16:04.243000 CVE-2025-21818,0,0,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 CVE-2025-21819,0,0,94bfba28f3d8b661ffc0c813899c721c943da294e0b08f1f347068f2b89e6225,2025-02-27T20:16:04.430000 -CVE-2025-21820,0,1,23c9cab68146fb0b910784e5d7f00192179f8dd92cced412d25a48d0e33f3c7b,2025-03-05T14:05:15.387000 +CVE-2025-21820,0,0,23c9cab68146fb0b910784e5d7f00192179f8dd92cced412d25a48d0e33f3c7b,2025-03-05T14:05:15.387000 CVE-2025-21821,0,0,fd6efc5d1ffad2a00aa09e345a704277d9daeb9e6fddc1a42c293b6132b6a1e2,2025-02-27T20:16:04.613000 CVE-2025-21822,0,0,20ef27da51fd71ed1bc2f3085ac0746fabc8aa34de630fd5cf985e239376c55c,2025-02-27T20:16:04.707000 CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e2065204cc,2025-02-27T20:16:04.793000 -CVE-2025-21824,0,1,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 +CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,209f0b09db7969ce0de8827739da84ae754f62e53b6787f1c269b033ae39f483,2025-01-20T16:15:27.880000 @@ -281841,6 +281845,7 @@ CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c05 CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000 CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000 CVE-2025-22211,0,0,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000 +CVE-2025-22212,1,1,22155226abb26c66fd05b97bb0fbe3d0fcc9563c5101aa93e68ce4d0d83f7665,2025-03-05T16:15:37.643000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000 @@ -281859,11 +281864,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85 CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000 CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 -CVE-2025-22270,0,0,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000 -CVE-2025-22271,0,0,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000 -CVE-2025-22272,0,0,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000 -CVE-2025-22273,0,0,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000 -CVE-2025-22274,0,0,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000 +CVE-2025-22270,0,1,7a9647f1981c7f8597e37941c872c23267a6a0b387a70240c142797bac754eb2,2025-03-05T16:15:37.797000 +CVE-2025-22271,0,1,1e3eb4c303404069ebdf1eaccbacad8ebf9bb5093e5c5ae88456256df43624aa,2025-03-05T16:15:37.927000 +CVE-2025-22272,0,1,c2967b31da9d1feff547bb4c9d78a41ef5c3adaf7e85acfec3e9cbc3e8c5685e,2025-03-05T16:15:38.033000 +CVE-2025-22273,0,1,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb769bd,2025-03-05T16:15:38.140000 +CVE-2025-22274,0,1,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 CVE-2025-22280,0,0,03c8e21f54ef26562b39bddfb4ae4d0ca65ee88cfe32d5d2b87b9048402bb26b,2025-02-27T14:15:36.033000 @@ -282360,7 +282365,7 @@ CVE-2025-23113,0,0,e6cccd37793f33004af385d66a450da8db2860bda0bd7d1ee76256a1a29e8 CVE-2025-23114,0,0,76dcd1ec6e101307de60d1efade8dc8b1885e30638a84718a1a37bbecd49b630,2025-02-05T02:15:28.610000 CVE-2025-23115,0,0,d809baa250bb6271b2b24f5db83bcfb12be4dc10edc0be309139d3eeaccfa95c,2025-03-01T03:15:23.263000 CVE-2025-23116,0,0,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000 -CVE-2025-23117,0,0,5732a4937afa35b8f8d30224de97ffd5815c8e798bd9572f33ca15c433571cdc,2025-03-01T03:15:23.473000 +CVE-2025-23117,0,1,3b650561fcfb78dd195d3496b028d41feef3a20547a31675fb51a8efff748de1,2025-03-05T16:15:38.340000 CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000 CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 @@ -282426,6 +282431,7 @@ CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fb CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000 CVE-2025-23414,0,0,2c9de769450c672cb0ed8621be68efc7fb4031b86902dc24212f40994c2669ef,2025-03-04T17:12:06.513000 CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711bd88,2025-02-05T18:15:32.573000 +CVE-2025-23416,1,1,5966c7694a2936faba0ed713c4fa6c38da0a8673adfedd49a71129e2115ac5d2,2025-03-05T16:15:38.530000 CVE-2025-23418,0,0,b560b331a0d6c1d64f53a311d14d0150022927a9bccc490bdea6a032ad9aa775,2025-03-04T17:12:06.513000 CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000 CVE-2025-23420,0,0,e40880a9b24585d5dfdcb427a281a44babdfcb41db4c12310ab309bdd9fe6cba,2025-03-04T17:12:06.513000 @@ -283130,6 +283136,7 @@ CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca16 CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 +CVE-2025-24494,1,1,4505eb9f7cf0964d30efd35051c5fc63d906a9027aff7d3cdb61dc165fbf7dd9,2025-03-05T16:15:38.937000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000 CVE-2025-24500,0,0,9295dd9b249041670d2ba554602eebc3b93f68829fb82212836936456e522eee,2025-02-05T05:15:11.067000 @@ -283140,6 +283147,7 @@ CVE-2025-24504,0,0,ef6de3b3dbf1242190b08aac9e33b32e05b2dd27e51e53bc5474f7cffa0c6 CVE-2025-24505,0,0,7974460272478c3512102c93107009cbcaf39c532939b93286f6169dc2322ea0,2025-02-05T06:15:31.587000 CVE-2025-24506,0,0,6d0f2b92aeb54c0239442b80d645c7de8b9983e714f18d96e40f89a3734ac9c7,2025-02-05T06:15:31.737000 CVE-2025-24507,0,0,422b270ad7f0d60cc805efaa577ee203a8a40781b3fc9ddd5b1e3464f7401c91,2025-02-05T06:15:31.860000 +CVE-2025-24521,1,1,d2a5434d44903256a9b307636f2b9358f00abf8efd9d36c4ebb2f34759c6b0ee,2025-03-05T16:15:39.093000 CVE-2025-24526,0,0,1e18d1f5ae98abeeaf7d844b3f89d785c7636c11b538120dbb867fa27b9c5f64,2025-02-24T08:15:10.427000 CVE-2025-24527,0,0,64c5f15d3a36426dd086cf6753a3bcfcae0a9e70014bff12440c7ea401e9bd26,2025-02-24T16:15:14.683000 CVE-2025-24529,0,0,bc0b161a595e000cd783abe643c1f26152f3142c15687c9c73e18c43346dadb9,2025-01-23T06:15:27.710000 @@ -283647,7 +283655,7 @@ CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4 CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000 CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000 CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000 -CVE-2025-25478,0,0,12db196fdbdedfe1d57ae93bb18fa9d9c8691821fcbf897c2d62e811de8bb585,2025-02-28T23:15:11.170000 +CVE-2025-25478,0,1,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 @@ -283671,9 +283679,9 @@ CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd65 CVE-2025-25570,0,0,430988ff55d84a8ccb4f31c79b9a35f79acfce21676368efb1c34e8edc940913,2025-02-28T22:15:39.630000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 -CVE-2025-25609,0,0,7bf84b1e07826ca6db3fb598111557fee1cb62f682fbabe7e789b24e0c36948b,2025-02-28T19:15:36.993000 -CVE-2025-25610,0,0,ef390e1ef1ec1a7911bf3f4e4e276c7f840ff67beafba71f3ff1c0f017c97cd8,2025-02-28T19:15:37.107000 -CVE-2025-25635,0,0,ac55b0c97dd1dcb3ee34b4e93c1dc33a05def2222873f1109828fd7c9ad4701d,2025-02-28T19:15:37.223000 +CVE-2025-25609,0,1,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 +CVE-2025-25610,0,1,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 +CVE-2025-25635,0,1,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 CVE-2025-25663,0,0,2c66463e17f0da9d9b59da03f32234807a5e0504a922f80726e5f203d3e2d884,2025-02-21T18:15:41.693000 CVE-2025-25664,0,0,a850b1756187529b43d44abf29c2e6255214e11c23d9ad57a237c7a415fbb154,2025-02-21T18:15:45.417000 @@ -283684,7 +283692,7 @@ CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000 CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 -CVE-2025-25723,0,0,44cf1036cba935dd1550a2aa3aba7bc11b6905f5950cf24649b57976812b29d7,2025-02-28T23:15:11.280000 +CVE-2025-25723,0,1,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000 CVE-2025-25724,0,0,a31718192b53d6a361e6a655d6ad32958c9e6ce226e8fbe6e70b631b7f89a878,2025-03-02T02:15:36.603000 CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000 CVE-2025-25726,0,0,1241b8ce4f2f3e5a9582d1cb34e021df8b6f066d37fe203461681ffda7c05f0f,2025-03-02T02:15:36.850000 @@ -283710,10 +283718,10 @@ CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98c CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000 CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25783,0,0,7667c9a81f530a99609c56eb13bc325e3e204504dcfbc3fb6341518f78f741e8,2025-03-04T22:15:40.787000 -CVE-2025-25784,0,0,7692b0b021ef9cff1ec4a869e2fe61c0999898fb7ec7360d59c814b17f82d8d2,2025-02-26T15:15:26.580000 -CVE-2025-25785,0,0,bc17dc315f508712d84a76b1e8f23f7f21539e82980e5f82975871a87c4e8aae,2025-02-26T15:15:26.720000 -CVE-2025-25789,0,0,dbcde910a2e6bfc7406d8baa980984134d87dc975529ef3dc53c087268dc1585,2025-02-26T15:15:26.853000 -CVE-2025-25790,0,0,cf16ab54e5556628b5b883651ce8af541edf2d9d76dc393146144b12103f43c5,2025-02-26T15:15:26.980000 +CVE-2025-25784,0,1,3e43aebf6f03069ac210115a03220d81a261d055bf117d06bf3215e14e26226d,2025-03-05T15:15:17.730000 +CVE-2025-25785,0,1,12399114d1e01798a9cb8e44ff529be3a97f5d175baa693f6af5ee4fed7d3d07,2025-03-05T15:15:17.930000 +CVE-2025-25789,0,1,0f14c3f4531a98890710e1a14e26e29c794c8daab8f347fb89e415279f670b71,2025-03-05T15:15:18.117000 +CVE-2025-25790,0,1,7f4ba42ac1fa0ded64af2d9c6fa1b05caa67d4b689df7ce81d6f0841ed6a91ca,2025-03-05T15:15:18.287000 CVE-2025-25791,0,0,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000 CVE-2025-25792,0,0,8ed8e898e77ccb511a21f5618850617bafb38b135aa1ceeb89c7273480778843,2025-03-03T21:15:18.863000 CVE-2025-25793,0,0,98717c3b4b6e47ee955ffb5711c27dc13e1eae9c4a0dc0d8e895a7e87452c379,2025-02-26T15:15:27.367000 @@ -283754,7 +283762,7 @@ CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c CVE-2025-25948,0,0,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000 CVE-2025-25949,0,0,29482f12ffd0f2b6fd752f7c5eba6fa6abde4b17a1f82f01edef5f8dee7003ca,2025-03-04T17:15:17.890000 CVE-2025-25950,0,0,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000 -CVE-2025-25951,0,0,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000 +CVE-2025-25951,0,1,db8b0e1dd6f4e9fc11d938b0110ae2cb606ddf2c5d30cabb88033ad3680ab6fe,2025-03-05T15:15:18.463000 CVE-2025-25952,0,0,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000 CVE-2025-25953,0,0,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c715e,2025-03-03T01:15:11.910000 CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 @@ -283782,7 +283790,7 @@ CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872c CVE-2025-26182,0,0,6a92295a726305134e0425c70d4139d9e04662ca5b2a45afb0e0f0461299a57f,2025-03-04T17:15:18.363000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 -CVE-2025-26202,0,0,e7579c410a7fcc5c61f85e01ce1308fe848cd4bebfecad6f981dd4f5f089526b,2025-03-04T19:15:38.640000 +CVE-2025-26202,0,1,faf1da73f05d445d952dd532cee33fae2a2ae5a854a8d484ad2405b4354fa0d8,2025-03-05T16:15:40.130000 CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000 CVE-2025-26263,0,0,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000 CVE-2025-26264,0,0,3e1d4d30fa9513d426ec3a7ec9d2895da1266ed6b8213b35e226a5d2b686e5dc,2025-02-28T22:15:39.780000 @@ -284083,9 +284091,9 @@ CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519 CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000 CVE-2025-27157,0,0,d1dc9b4dc7f892f66b40d5a59eaf35f745dad910762a74c52136c3d66f64265b,2025-02-27T17:15:16.867000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 -CVE-2025-27219,0,1,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000 -CVE-2025-27220,0,1,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000 -CVE-2025-27221,0,1,a77e2ee5b7be7126d70eb1fc9ecc3c0c9965218d6caa5649ef94dfa24ec52f83,2025-03-05T14:05:49.230000 +CVE-2025-27219,0,0,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000 +CVE-2025-27220,0,0,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000 +CVE-2025-27221,0,0,a77e2ee5b7be7126d70eb1fc9ecc3c0c9965218d6caa5649ef94dfa24ec52f83,2025-03-05T14:05:49.230000 CVE-2025-27263,0,0,bb2fb5fbdd50586632b45bcd28ca8d1b94cc0c3d678d9350164209de7a3a7d9c,2025-03-03T14:15:57.980000 CVE-2025-27264,0,0,3266982b454bfda336470c942e22fa435d9ddfb60b41319a7c42000b556f0d3c,2025-03-03T14:15:58.123000 CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000 @@ -284156,6 +284164,8 @@ CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c510 CVE-2025-27402,0,0,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 +CVE-2025-27411,1,1,7c46620b35e5152361e25fc566c4b1f8041bb67e560a60b09944698197642d21,2025-03-05T16:15:40.310000 +CVE-2025-27412,1,1,35d995274288bd2657d5ab5ee31e6636fbd4b229526e99ad02a06a314eadb902,2025-03-05T16:15:40.457000 CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000 CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000 CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000 @@ -284169,6 +284179,7 @@ CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853 CVE-2025-27424,0,0,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000 CVE-2025-27425,0,0,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000 CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 +CVE-2025-27497,1,1,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369f59,2025-03-04T17:15:20.250000 CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000 @@ -284182,7 +284193,7 @@ CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 -CVE-2025-27637,0,0,bd65b06368724aa85f43bf430358234684dae7b15925b38f12707664db17c82f,2025-03-05T06:15:34.977000 +CVE-2025-27637,0,1,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,96ab5c5431a031e95cbb4dbdb89bf37a27538b7dfdd45653b72c3ae92f59daef,2025-03-05T06:15:35.157000 CVE-2025-27639,0,0,c123f63d9dc191cc876195dba5726246ec72fae4ad39d386a399f9970a646bc2,2025-03-05T06:15:35.297000 CVE-2025-27640,0,0,c696f54cc81730dc033f392d4715f803b782a58a86a77fe52ad90c53ecbd121b,2025-03-05T06:15:35.423000 @@ -284198,8 +284209,8 @@ CVE-2025-27649,0,0,1269208457b870adba1c11dbd8f7cfa18f4eb40e81bc0b649bbc903a5d744 CVE-2025-27650,0,0,442b478fb9f5a720296498b0972185371516b40aad684692d6f2704c9c1b08fc,2025-03-05T06:15:36.817000 CVE-2025-27651,0,0,2268f00520bf4992136d976faa8dc8169a6a419db2460587b8c479b3e1d43453,2025-03-05T06:15:36.950000 CVE-2025-27652,0,0,5148740c543bf87d5b1166b079693a23ac8922c32846a4339e8b98d0bbf9af12,2025-03-05T06:15:37.077000 -CVE-2025-27653,0,0,d8435f2ca302741f3eba50d21b1eeb7fc3666328cce2b7e8ea496a01b7a35679,2025-03-05T06:15:37.203000 -CVE-2025-27654,0,0,eb5e00dc945afe32a9fa5dc61ca70a10746e3257235cb9207c50f18c89ed73c1,2025-03-05T06:15:37.340000 +CVE-2025-27653,0,1,c5dbd899dc4e9b32ebd02b603edfdedde4876912e079c638e2ef2e2a12af53bd,2025-03-05T16:15:40.880000 +CVE-2025-27654,0,1,71bd2de24a90bbf3394e7753a34a6c0e91a286c50c9892093c8520514154b9bb,2025-03-05T16:15:41.043000 CVE-2025-27655,0,0,8df4a001ae40d00a3ff4024b1266774c0ce7e07eb323de15539d18503c93f5cb,2025-03-05T06:15:37.480000 CVE-2025-27656,0,0,acf9e6645e2050e9bbb13fe3915f9c3cce9157c0965f0589ae185177e6d9235f,2025-03-05T06:15:37.613000 CVE-2025-27657,0,0,2bf9f38c64f6e805cebff0d24d931f400577067b0c0a7035b9709e76a8b33878,2025-03-05T06:15:37.740000 @@ -284209,7 +284220,7 @@ CVE-2025-27660,0,0,4393ee78b565a74102006b20af66cbd78633812d8e1c83d30d7d6282071da CVE-2025-27661,0,0,30ef07f10b5fbc72cd3ed807dd28dc7c08468597462e187188950cfe49ae6232,2025-03-05T06:15:38.337000 CVE-2025-27662,0,0,113986b616646a122013fe169c2f446706e260dc68b79fbcd37f5af92fb9f33d,2025-03-05T06:15:38.467000 CVE-2025-27663,0,0,5c78b76fd12b8a0e3f82374c6a5218146d7d8cc8094c803893338ae7cdc1b43a,2025-03-05T06:15:38.587000 -CVE-2025-27664,0,0,9246748b6d616d992dc2d4ef9154af9132aa85e139f9b6748fa2bb3abe57577d,2025-03-05T06:15:38.717000 +CVE-2025-27664,0,1,2783c537a522312ab4b34337c2271a824caf7a36c61210c1e66b329e00e34a74,2025-03-05T16:15:41.217000 CVE-2025-27665,0,0,a1c30f1d141bf5a0c772b56c1d2031c79a2728572211947b83e103825d5cf842,2025-03-05T06:15:38.840000 CVE-2025-27666,0,0,6c9cc4a29e2417a709d6ef0cd4cd75ec3ebb86d235a3f6c61ace5d7f64120945,2025-03-05T06:15:38.970000 CVE-2025-27667,0,0,77a0a85ba07a0c48e31e3155f9f361de02ec86231b7979adc7d07b91c2cccc66,2025-03-05T06:15:39.100000 @@ -284218,16 +284229,16 @@ CVE-2025-27669,0,0,3a89060ddc9c398015cd128a3fb63131337f980375ffac91a014eccfd9101 CVE-2025-27670,0,0,76aa85bad4babd0ebfa11c0c6a087e8e6070c146dca39075cb0bf06776882c4c,2025-03-05T06:15:39.537000 CVE-2025-27671,0,0,decd4150960a8b3c792cacd9073ee5659cc99638afb3ecb2f8efb6bccc24f08f,2025-03-05T06:15:39.903000 CVE-2025-27672,0,0,acd49e0df9fc0da4d4bd584e363cd2373f8b266a039327189d8219454a1ce995,2025-03-05T06:15:40.043000 -CVE-2025-27673,0,0,1d3cc7314678d2a4207dc8ab07afa456931e4d6522fc6873213aaba7691d3842,2025-03-05T06:15:40.167000 -CVE-2025-27674,0,0,3855abb30366ad6e14793c2e69aa55338c939b5de1594b987a9ad23d86f3f730,2025-03-05T06:15:40.293000 -CVE-2025-27675,0,0,76c4e5557b1851cf405f5c7c8906143df7d4b4e8d12436cbf13eb01446368d4e,2025-03-05T06:15:40.420000 -CVE-2025-27676,0,0,bb6d8f72ba8561f3026b10c66eeaa4bbcc3b8625d0ee6fb45ecfaf92eb69a9b7,2025-03-05T06:15:40.553000 -CVE-2025-27677,0,0,5da0f50d57e52e15f215b4d83c836e5615135ab7eca2b80ead73d6509b3db592,2025-03-05T06:15:40.683000 -CVE-2025-27678,0,0,5847af44f0e42e66a95ec9b977dcfcc070f8b739490375c15df7a5e3fe0bc8f8,2025-03-05T06:15:40.817000 -CVE-2025-27679,0,0,c0014ee1c355bdeb458d3f5ca65b92258506c769215c3f205f759ca24da34587,2025-03-05T06:15:40.933000 -CVE-2025-27680,0,0,c35fbc04b8728bf07e406e0850a708f028056c65e201d25e8a88246485e2cfea,2025-03-05T06:15:41.047000 -CVE-2025-27681,0,0,869df4c9e1dbcd5a44dd67ff1adf8c793db977f54a8a85e558b6305b8472540f,2025-03-05T06:15:41.177000 -CVE-2025-27682,0,0,a935409c164ee979f512789bfdb3a40c8351e8a31c63734f947dbd9cbbfcea58,2025-03-05T06:15:41.297000 +CVE-2025-27673,0,1,4c1f358b78269c41e8c493cec0c297a47520f604604b8e2d04a064180d029c74,2025-03-05T16:15:41.377000 +CVE-2025-27674,0,1,d8fc23610bcb24a915473f82731daddbc0f8128bbc64155dc28c05f76f1629d1,2025-03-05T16:15:41.537000 +CVE-2025-27675,0,1,88fe38f78b5c227dd0fb838c2bc395c16043de26bdf8d95f709edf11fe023d17,2025-03-05T16:15:41.700000 +CVE-2025-27676,0,1,5b129cc9a04a7d40972f6f17780118d69ece86754084b98a74c497d42d6c8b82,2025-03-05T16:15:41.863000 +CVE-2025-27677,0,1,833814a732a8b625e9b7f78e45b40eff34457949c7a873ce0c84fd64b87997b3,2025-03-05T16:15:42.030000 +CVE-2025-27678,0,1,2dfff16e837159c229575a746b42a7b5df8dbb8cc9ded33e0398789d98ec8ea8,2025-03-05T16:15:42.197000 +CVE-2025-27679,0,1,c3477c4348b04a45d06ce63488e43254eae962776a041ca86955406c1debe7fe,2025-03-05T15:15:18.623000 +CVE-2025-27680,0,1,062f918e0746cc120a47d40b4cb35ee63e42fcaf6533382d4ae3a88ae16c2385,2025-03-05T15:15:18.790000 +CVE-2025-27681,0,1,1e12361dcfb3de67956cc3fb5eef999d9e22cb46ceaa1217bcc9c81dd2bc3d92,2025-03-05T15:15:18.970000 +CVE-2025-27682,0,1,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dcd4c,2025-03-05T15:15:19.130000 CVE-2025-27683,0,0,7c3d9658bc9f46e359a510e69c5232639532e74fbe2a541d01814d0e35fcd5a8,2025-03-05T06:15:41.427000 CVE-2025-27684,0,0,16ea9daa2771b0c33d2babe4c0a47130eb590a6bc45f6fcd1c3c34c301925ec3,2025-03-05T06:15:41.540000 CVE-2025-27685,0,0,5438163b1e96d31de8dab5cde2ed9c114f6c34fffe05c690c30fa9e87c5161d3,2025-03-05T06:15:41.663000