diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46723.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46723.json index 106cf120ded..b5c4f1433b2 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46723.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46723.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46723", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.020", - "lastModified": "2024-11-21T07:30:58.763", + "lastModified": "2025-03-11T14:15:16.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-224xx/CVE-2023-22491.json b/CVE-2023/CVE-2023-224xx/CVE-2023-22491.json index 7936dde3c2c..cc4f7733da3 100644 --- a/CVE-2023/CVE-2023-224xx/CVE-2023-22491.json +++ b/CVE-2023/CVE-2023-224xx/CVE-2023-22491.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22491", "sourceIdentifier": "security-advisories@github.com", "published": "2023-01-13T19:15:12.407", - "lastModified": "2024-11-21T07:44:54.943", + "lastModified": "2025-03-11T14:15:16.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -124,6 +124,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22752.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22752.json index a9d0903d36a..6e46bd10153 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22752.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22752.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22752", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-03-01T08:15:12.760", - "lastModified": "2024-11-21T07:45:21.440", + "lastModified": "2025-03-11T14:15:17.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22753.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22753.json index 22583cb1b47..3737db2be49 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22753.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22753.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22753", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-03-01T08:15:12.823", - "lastModified": "2024-11-21T07:45:21.560", + "lastModified": "2025-03-11T14:15:17.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22763.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22763.json index 39df1a373fe..c02cc03f5c9 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22763.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22763.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22763", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-03-01T08:15:13.500", - "lastModified": "2024-11-21T07:45:22.727", + "lastModified": "2025-03-11T14:15:17.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22764.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22764.json index 4bd3ed79550..df39656c427 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22764.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22764.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22764", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-03-01T08:15:13.573", - "lastModified": "2024-11-21T07:45:22.847", + "lastModified": "2025-03-11T14:15:17.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22765.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22765.json index a1a8494ba50..1aba44a280d 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22765.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22765.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22765", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-03-01T08:15:13.637", - "lastModified": "2024-11-21T07:45:22.970", + "lastModified": "2025-03-11T14:15:18.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23496.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23496.json index 6aa8decd0f3..08c7fa3b6aa 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23496.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23496.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23496", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.157", - "lastModified": "2024-11-21T07:46:18.143", + "lastModified": "2025-03-11T14:15:18.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23497.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23497.json index de86a948ffd..1edf7b02a3f 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23497.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23497.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23497", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.220", - "lastModified": "2024-11-21T07:46:18.280", + "lastModified": "2025-03-11T14:15:18.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23499.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23499.json index 6f9f2847e2c..012a4664ea2 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23499.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23499.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23499", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.353", - "lastModified": "2024-11-21T07:46:18.507", + "lastModified": "2025-03-11T14:15:18.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23500.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23500.json index 55493be7a75..05f76de541e 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23500.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23500.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23500", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.423", - "lastModified": "2024-11-21T07:46:18.620", + "lastModified": "2025-03-11T14:15:19.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3317.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3317.json index 1d11aa6aafa..ad43686f7ad 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3317.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3317.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3317", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-23T18:15:14.047", - "lastModified": "2024-11-21T08:16:59.953", + "lastModified": "2025-03-11T14:15:19.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json index 0b46bae7566..514ecc55ad6 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0681", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.767", - "lastModified": "2024-11-21T08:47:08.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:33:45.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:page_restriction:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "BF7830C6-9B48-4520-9699-DC99B77486DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json index e1bf7e3cf88..c8feaef8c76 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0687", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.203", - "lastModified": "2024-11-21T08:47:08.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:32:08.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dev.institute:restrict_user_access:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6", + "matchCriteriaId": "93CDB255-CFCE-4B2B-A8C1-8CEA459A2649" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json index b83a07a3a8e..3ddef6d71d7 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0700", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.403", - "lastModified": "2024-11-21T08:47:10.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:30:56.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wokamoto:simple_tweet:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.0.2", + "matchCriteriaId": "FC9F67DE-35E1-467A-9161-5D3E95CE19C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://wordpress.org/plugins/simple-tweet/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://wordpress.org/plugins/simple-tweet/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json index 63ef81bd2cc..ddb68d25ac5 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0827", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.610", - "lastModified": "2024-11-21T08:47:27.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:30:12.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.6.4", + "matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json index dd3ff56faf1..af17279e427 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0828", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.833", - "lastModified": "2024-11-21T08:47:27.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:29:49.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.6.4", + "matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json index cfb35260957..418c3fffb6f 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0829", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.067", - "lastModified": "2024-11-21T08:47:27.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:28:57.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1", + "matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json index 9101d18b917..406d6199979 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0830", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.307", - "lastModified": "2024-11-21T08:47:27.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:28:31.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1", + "matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json index 01d17461340..0aed4b44f42 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0839", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.537", - "lastModified": "2024-11-21T08:47:29.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:25:38.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2024.0428", + "matchCriteriaId": "A18FF440-C6F6-4646-8D82-2902526CC456" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/feedwordpress/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/feedwordpress/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json index 24296c5b69a..0866cd4dc11 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0898", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:15.593", - "lastModified": "2024-11-21T08:47:38.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:21:21.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "7382E975-FE03-4C45-8797-F03BD864E606" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/chat-bubble/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/chat-bubble/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json index 7af98731911..d158b6e09d3 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1083", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:16.940", - "lastModified": "2024-11-21T08:49:45.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:20:23.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.7", + "matchCriteriaId": "633864E5-0CDF-440B-9B83-915F0B56899B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json index 3fd20863a33..ec514f0fd99 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1158", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:17.740", - "lastModified": "2024-11-21T08:49:55.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:18:18.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.8", + "matchCriteriaId": "4BEF66A8-FC6E-4771-95A0-C692068FB670" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12546.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12546.json new file mode 100644 index 00000000000..37f2caf0747 --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12546", + "sourceIdentifier": "infosec@edk2.groups.io", + "published": "2025-03-11T14:15:20.210", + "lastModified": "2025-03-11T14:15:20.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "infosec@edk2.groups.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "infosec@edk2.groups.io", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2025/AMI-SA-2025003.pdf", + "source": "infosec@edk2.groups.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13853.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13853.json index 40b13b54520..db54b9508ee 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13853.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13853.json @@ -2,16 +2,55 @@ "id": "CVE-2024-13853", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-11T06:15:26.177", - "lastModified": "2025-03-11T06:15:26.177", + "lastModified": "2025-03-11T14:15:20.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento SEO Tools WordPress hasta la versi\u00f3n 4.0.7 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/52991dd9-41f7-4cf8-b8c9-56dd4e62bf0c/", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13864.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13864.json index 79bbed7f0ad..77fc4410e3a 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13864.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13864.json @@ -2,20 +2,51 @@ "id": "CVE-2024-13864", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-11T06:15:26.407", - "lastModified": "2025-03-11T06:15:26.407", + "lastModified": "2025-03-11T14:15:20.570", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Countdown Timer WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Countdown Timer de WordPress hasta la versi\u00f3n 1.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json index c4ebe26653f..227ad6713c6 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13873", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:09.567", - "lastModified": "2025-02-22T04:15:09.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:32:22.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.9", + "matchCriteriaId": "30FC05A7-99B6-45E6-AD44-D0767612D35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3242653/wp-job-portal/tags/2.2.9/includes/classes/uploads.php?old=3238353&old_path=wp-job-portal%2Ftags%2F2.2.8%2Fincludes%2Fclasses%2Fuploads.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdba3c5-382e-4d2b-83d8-0e0cebf2e63c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json index 04a11834d46..52cfd9f5e7e 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13899", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:09.720", - "lastModified": "2025-02-22T04:15:09.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T13:26:57.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,49 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:misterpah:mambo_joomla_importer:1.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "24192B97-AB2C-4712-B126-906AE92BD57D" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mambo-joomla-importer/trunk/mamboImporter.php#L45", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d448c2-5acc-47f8-8e86-9ef10fa01513?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json index 44b77f1b522..73589cdb0f4 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1889", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-26T16:27:55.130", - "lastModified": "2025-02-27T22:03:40.670", + "lastModified": "2025-03-11T14:51:56.797", "vulnStatus": "Analyzed", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -68,8 +88,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F" + "criteria": "cpe:2.3:o:sma:clcon-10_firmware:01.05.01.r:*:*:*:*:*:*:*", + "matchCriteriaId": "6B8081E6-3552-4C2E-9516-E7B36C187E8F" } ] }, @@ -79,8 +99,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*", - "matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC" + "criteria": "cpe:2.3:h:sma:clcon-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF09E8B-0A45-4D7C-8358-63DB482FFDB5" } ] } @@ -95,9 +115,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:sma:sunny_webbox_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.61", - "matchCriteriaId": "8AA41F6C-CC24-497B-99E5-F6F4205D0364" + "criteria": "cpe:2.3:o:sma:clcon-s-10_firmware:01.05.01.r:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD528CC-B088-439A-84BE-1BA137094459" } ] }, @@ -107,8 +126,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:sma:sunny_webbox:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0E1D0797-846A-436A-BBEA-EA222E826CBF" + "criteria": "cpe:2.3:h:sma:clcon-s-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6660909E-9E7C-4BB6-B470-D6AA9376AF58" } ] } diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1890.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1890.json index f7a797c889d..96e6791a1ad 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1890.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1890.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1890", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-26T16:27:55.340", - "lastModified": "2025-02-27T22:03:40.670", + "lastModified": "2025-03-11T14:51:33.223", "vulnStatus": "Analyzed", "cveTags": [ { @@ -79,33 +79,6 @@ } ], "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*", - "matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC" - } - ] - } - ] - }, { "operator": "AND", "nodes": [ diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json index 1fe4f0f6176..70904828332 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2546", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T02:15:06.190", - "lastModified": "2025-01-27T17:05:46.703", + "lastModified": "2025-03-11T14:07:31.350", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -42,19 +42,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ], @@ -116,8 +116,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.07.09:*:*:*:*:*:*:*", - "matchCriteriaId": "7F318BF3-E1D1-4FDF-8016-8B8E1790BD1C" + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.13.07.09:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C468F9-C992-49D5-84D8-F64CE4AF4D3F" } ] }, diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json index 1ede1b4bc7b..155a515928c 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43196", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T04:15:09.630", - "lastModified": "2025-02-20T04:15:09.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:57:13.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,68 @@ "value": "CWE-296" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json index 893f1d38abd..f72dc0b0c04 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44192", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.080", - "lastModified": "2025-03-10T19:15:38.080", + "lastModified": "2025-03-11T14:15:22.503", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18 y tvOS 18. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json index e937fd8a0e8..14b272f83bd 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49337", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T12:15:09.293", - "lastModified": "2025-02-20T12:15:09.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:06:18.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,12 +69,68 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json index 653d4957897..e7c8a766ba2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49344", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T12:15:10.377", - "lastModified": "2025-02-20T12:15:10.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:02:39.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json index 97d3cd270c8..b3f3586c73f 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49355", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T04:15:10.670", - "lastModified": "2025-02-20T04:15:10.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:51:01.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,68 @@ "value": "CWE-117" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json index 06f6acb30ad..bb04c2c64c4 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49779", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T12:15:10.527", - "lastModified": "2025-02-20T12:15:10.527", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T13:55:21.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json index 2e272d409d4..d34f503c4ef 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49780", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T04:15:10.827", - "lastModified": "2025-02-20T12:15:10.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:37:00.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json index fa492642711..0a99d3b151b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49781", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T12:15:10.747", - "lastModified": "2025-02-20T12:15:10.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T13:45:47.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json index 98ce2b0d007..63a625e5039 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49782", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-20T04:15:10.973", - "lastModified": "2025-02-20T04:15:10.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T14:19:11.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -49,12 +69,68 @@ "value": "CWE-297" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.5", + "matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183541", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54084.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54084.json new file mode 100644 index 00000000000..21e20563c4d --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54084.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54084", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2025-03-11T14:15:22.730", + "lastModified": "2025-03-11T14:15:22.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json new file mode 100644 index 00000000000..84e5a5616e7 --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-54085", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2025-03-11T14:15:22.893", + "lastModified": "2025-03-11T14:15:22.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AMI\u2019s SPx contains\na vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation\nof this vulnerability may lead to a loss of confidentiality, integrity, and/or\navailability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json index e2fd517b976..9c9d076276e 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54469", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.493", - "lastModified": "2025-03-10T19:15:38.493", + "lastModified": "2025-03-11T14:15:23.030", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 y iPadOS 18. Un usuario local podr\u00eda filtrar informaci\u00f3n confidencial del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121234", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json index 4e9f6defe99..427b72df285 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54473", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.600", - "lastModified": "2025-03-10T19:15:38.600", + "lastModified": "2025-03-11T14:15:23.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json index 7313f586829..9bb92728c2e 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54560", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.883", - "lastModified": "2025-03-10T19:15:38.883", + "lastModified": "2025-03-11T14:15:23.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, watchOS 11, tvOS 18 y macOS Sequoia 15. Una aplicaci\u00f3n malintencionada podr\u00eda modificar otras aplicaciones sin tener permiso de Administraci\u00f3n de aplicaciones." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0629.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0629.json index 6807381e4e8..c9b726ac4ab 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0629.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0629.json @@ -2,20 +2,51 @@ "id": "CVE-2025-0629", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-11T06:15:26.513", - "lastModified": "2025-03-11T06:15:26.513", + "lastModified": "2025-03-11T14:15:24.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Coronavirus (COVID-19) Notice Message WordPress plugin through 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Coronavirus (COVID-19) Notice Message de WordPress hasta la versi\u00f3n 1.1.2 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con altos privilegios como el administrador realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json index 1f9c666d19b..b0d6ded9246 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json @@ -2,20 +2,47 @@ "id": "CVE-2025-2136", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-10T21:15:40.730", - "lastModified": "2025-03-10T21:15:40.730", + "lastModified": "2025-03-11T14:15:26.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "El uso posterior a la liberaci\u00f3n en Inspector en Google Chrome anterior a la versi\u00f3n 134.0.6998.88 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json index f2a20ae2474..b02e8515cae 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json @@ -2,20 +2,47 @@ "id": "CVE-2025-2137", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-03-10T21:15:40.857", - "lastModified": "2025-03-10T21:15:40.857", + "lastModified": "2025-03-11T14:15:26.737", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 134.0.6998.88 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2190.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2190.json index 7f925450db2..1289228b1c1 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2190.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2190.json @@ -2,16 +2,43 @@ "id": "CVE-2025-2190", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2025-03-11T07:15:37.950", - "lastModified": "2025-03-11T07:15:37.950", + "lastModified": "2025-03-11T14:15:27.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mobile application (com.transsnet.store) has a man-in-the-middle attack vulnerability, which may lead to code injection risks." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n m\u00f3vil (com.transsnet.store) tiene una vulnerabilidad de ataque man-in-the-middle, que puede generar riesgos de inyecci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2192.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2192.json new file mode 100644 index 00000000000..abfb5cbcbe4 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2192.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2192", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-11T13:15:43.780", + "lastModified": "2025-03-11T14:15:27.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Stoque Zeev.it 4.24. This affects an unknown part of the file /Login?inpLostSession=1 of the component Login Page. The manipulation of the argument inpRedirectURL leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, + "accessVector": "NETWORK", + "accessComplexity": "MEDIUM", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.6, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/17QAEbzVIjTUj8FDOVMwfl9-7j8LRcK4V/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299217", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299217", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511708", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json new file mode 100644 index 00000000000..b24f18ae482 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2193", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-11T13:15:43.997", + "lastModified": "2025-03-11T14:15:27.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in MRCMS 3.1.2 and classified as critical. This vulnerability affects the function delete of the file /admin/file/delete.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path/name leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299218", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299218", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511724", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json new file mode 100644 index 00000000000..68dd40e66d1 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2194", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-11T14:15:27.753", + "lastModified": "2025-03-11T14:15:27.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects the function list of the file /admin/file/list.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299219", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299219", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511732", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json new file mode 100644 index 00000000000..9d94a363842 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2195", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-11T14:15:27.937", + "lastModified": "2025-03-11T14:15:27.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is the function rename of the file /admin/file/rename.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument name/path leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299220", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299220", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511733", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json new file mode 100644 index 00000000000..dc5adff64b6 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2196", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-11T14:15:28.123", + "lastModified": "2025-03-11T14:15:28.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MRCMS 3.1.2. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /admin/file/upload.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299221", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299221", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511735", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22366.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22366.json new file mode 100644 index 00000000000..95fb58ee564 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22366.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-22366", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-03-11T14:15:24.313", + "lastModified": "2025-03-11T14:15:24.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The authenticated firmware update capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + }, + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-22366", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00003", + "source": "csirt@divd.nl" + }, + { + "url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22367.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22367.json new file mode 100644 index 00000000000..88f0327016e --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22367.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-22367", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-03-11T14:15:24.480", + "lastModified": "2025-03-11T14:15:24.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The authenticated time setting capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + }, + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-22367", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00003", + "source": "csirt@divd.nl" + }, + { + "url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22368.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22368.json new file mode 100644 index 00000000000..21eda94209e --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22368.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-22368", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-03-11T14:15:24.627", + "lastModified": "2025-03-11T14:15:24.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The authenticated SCU firmware command of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS commands are improperly neutralized when certain fields are passed to the underlying OS." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + }, + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-22368", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00003", + "source": "csirt@divd.nl" + }, + { + "url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22369.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22369.json new file mode 100644 index 00000000000..e5dbb087ea9 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22369.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22369", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-03-11T14:15:24.767", + "lastModified": "2025-03-11T14:15:24.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-22369", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00003", + "source": "csirt@divd.nl" + }, + { + "url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22370.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22370.json new file mode 100644 index 00000000000..a9868a16396 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22370.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22370", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-03-11T14:15:24.917", + "lastModified": "2025-03-11T14:15:24.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Many fields for the web configuration interface of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to execute arbitrary SQL commands because the values are insufficiently neutralized." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-22370", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00003", + "source": "csirt@divd.nl" + }, + { + "url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json new file mode 100644 index 00000000000..16fc3fe27b5 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27363", + "sourceIdentifier": "cve-assign@fb.com", + "published": "2025-03-11T14:15:25.427", + "lastModified": "2025-03-11T14:15:25.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-assign@fb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.facebook.com/security/advisories/cve-2025-27363", + "source": "cve-assign@fb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27893.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27893.json index d8612a36a02..a6d82b07d90 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27893.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27893.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27893", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-11T09:15:25.457", - "lastModified": "2025-03-11T09:15:25.457", + "lastModified": "2025-03-11T14:15:26.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls." + }, + { + "lang": "es", + "value": "En Archer Platform 6 a 6.14.00202.10024, un usuario autenticado con privilegios de creaci\u00f3n de registros puede manipular campos inmutables, como la fecha de creaci\u00f3n, interceptando y modificando una solicitud de copia a trav\u00e9s de un URI GenericContent/Record.aspx?id=. Esto permite la modificaci\u00f3n no autorizada de metadatos generados por el sistema, lo que compromete la integridad de los datos y potencialmente afecta los controles de auditor\u00eda, cumplimiento y seguridad." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://github.com/NastyCrow/CVE-2025-27893", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/NastyCrow/CVE-2025-27893", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index afce56f145b..25746481242 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-11T13:00:19.228097+00:00 +2025-03-11T15:00:20.452422+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-11T12:15:12.277000+00:00 +2025-03-11T14:57:13.920000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284751 +284765 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `14` -- [CVE-2025-2189](CVE-2025/CVE-2025-21xx/CVE-2025-2189.json) (`2025-03-11T12:15:12.057`) -- [CVE-2025-2191](CVE-2025/CVE-2025-21xx/CVE-2025-2191.json) (`2025-03-11T12:15:12.277`) +- [CVE-2024-12546](CVE-2024/CVE-2024-125xx/CVE-2024-12546.json) (`2025-03-11T14:15:20.210`) +- [CVE-2024-54084](CVE-2024/CVE-2024-540xx/CVE-2024-54084.json) (`2025-03-11T14:15:22.730`) +- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-03-11T14:15:22.893`) +- [CVE-2025-2192](CVE-2025/CVE-2025-21xx/CVE-2025-2192.json) (`2025-03-11T13:15:43.780`) +- [CVE-2025-2193](CVE-2025/CVE-2025-21xx/CVE-2025-2193.json) (`2025-03-11T13:15:43.997`) +- [CVE-2025-2194](CVE-2025/CVE-2025-21xx/CVE-2025-2194.json) (`2025-03-11T14:15:27.753`) +- [CVE-2025-2195](CVE-2025/CVE-2025-21xx/CVE-2025-2195.json) (`2025-03-11T14:15:27.937`) +- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T14:15:28.123`) +- [CVE-2025-22366](CVE-2025/CVE-2025-223xx/CVE-2025-22366.json) (`2025-03-11T14:15:24.313`) +- [CVE-2025-22367](CVE-2025/CVE-2025-223xx/CVE-2025-22367.json) (`2025-03-11T14:15:24.480`) +- [CVE-2025-22368](CVE-2025/CVE-2025-223xx/CVE-2025-22368.json) (`2025-03-11T14:15:24.627`) +- [CVE-2025-22369](CVE-2025/CVE-2025-223xx/CVE-2025-22369.json) (`2025-03-11T14:15:24.767`) +- [CVE-2025-22370](CVE-2025/CVE-2025-223xx/CVE-2025-22370.json) (`2025-03-11T14:15:24.917`) +- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-11T14:15:25.427`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `47` -- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-11T12:15:11.820`) +- [CVE-2024-1158](CVE-2024/CVE-2024-11xx/CVE-2024-1158.json) (`2025-03-11T13:18:18.670`) +- [CVE-2024-13853](CVE-2024/CVE-2024-138xx/CVE-2024-13853.json) (`2025-03-11T14:15:20.417`) +- [CVE-2024-13864](CVE-2024/CVE-2024-138xx/CVE-2024-13864.json) (`2025-03-11T14:15:20.570`) +- [CVE-2024-13873](CVE-2024/CVE-2024-138xx/CVE-2024-13873.json) (`2025-03-11T13:32:22.040`) +- [CVE-2024-13899](CVE-2024/CVE-2024-138xx/CVE-2024-13899.json) (`2025-03-11T13:26:57.550`) +- [CVE-2024-1889](CVE-2024/CVE-2024-18xx/CVE-2024-1889.json) (`2025-03-11T14:51:56.797`) +- [CVE-2024-1890](CVE-2024/CVE-2024-18xx/CVE-2024-1890.json) (`2025-03-11T14:51:33.223`) +- [CVE-2024-2546](CVE-2024/CVE-2024-25xx/CVE-2024-2546.json) (`2025-03-11T14:07:31.350`) +- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-03-11T14:57:13.920`) +- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-11T14:15:22.503`) +- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-03-11T14:06:18.787`) +- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-03-11T14:02:39.433`) +- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-03-11T14:51:01.153`) +- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-03-11T13:55:21.797`) +- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-03-11T14:37:00.743`) +- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-03-11T13:45:47.917`) +- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-03-11T14:19:11.780`) +- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-11T14:15:23.030`) +- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-11T14:15:23.210`) +- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-11T14:15:23.417`) +- [CVE-2025-0629](CVE-2025/CVE-2025-06xx/CVE-2025-0629.json) (`2025-03-11T14:15:24.090`) +- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-11T14:15:26.553`) +- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-11T14:15:26.737`) +- [CVE-2025-2190](CVE-2025/CVE-2025-21xx/CVE-2025-2190.json) (`2025-03-11T14:15:27.163`) +- [CVE-2025-27893](CVE-2025/CVE-2025-278xx/CVE-2025-27893.json) (`2025-03-11T14:15:26.033`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2f67ae972be..f0acf2798b8 100644 --- a/_state.csv +++ b/_state.csv @@ -211457,7 +211457,7 @@ CVE-2022-4672,0,0,3da0ab4af959d0d56059ed0a777501b4f92187b9acb6980457fef52c63560f CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000 CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000 CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000 -CVE-2022-46723,0,0,21271aa41cfe7d1eecb2df8cbff28dff4ae52ddd305c0eef5b0ef67f56e7f43c,2024-11-21T07:30:58.763000 +CVE-2022-46723,0,1,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000 CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000 CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000 CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000 @@ -218075,7 +218075,7 @@ CVE-2023-22488,0,0,0aaf54ba6aaa396e5eeed906e25dc3eb9cf8d78bd4004aaf6fe7cfeb792ac CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000 CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000 CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000 -CVE-2023-22491,0,0,6634f80ae040bc7b08ba4beb028108a2ff8452c29178c902c90708269a64dfc3,2024-11-21T07:44:54.943000 +CVE-2023-22491,0,1,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000 CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000 CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000 CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000 @@ -218296,8 +218296,8 @@ CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5 CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000 CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000 CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000 -CVE-2023-22752,0,0,01119cf3f2ade5d14e2214357d7a91d0e54d36e26c8908b7f5730ea75c68e1b8,2024-11-21T07:45:21.440000 -CVE-2023-22753,0,0,acc0fd192a8331b5b7371e3977ae7d7d9b20b6aab22671ada345b8e874154239,2024-11-21T07:45:21.560000 +CVE-2023-22752,0,1,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000 +CVE-2023-22753,0,1,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000 CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000 CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000 CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000 @@ -218308,9 +218308,9 @@ CVE-2023-2276,0,0,2a89d36eee46d6c101100028368db05883bc5be65d5b25d57a5e3d361c3f71 CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000 CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000 CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000 -CVE-2023-22763,0,0,a5c31e6188f03546dd6ee88a2e5d85ca0e3076f445fc034cfd958e90d98e1838,2024-11-21T07:45:22.727000 -CVE-2023-22764,0,0,bf719ab1f22aa2cd387d7dca2190a85fc105bbf50566d696ca7a5eeba41f6836,2024-11-21T07:45:22.847000 -CVE-2023-22765,0,0,6a660dc0329d4c6b90e9a98b46cfac1b4010d4fe1c6579a51a237190475e662d,2024-11-21T07:45:22.970000 +CVE-2023-22763,0,1,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000 +CVE-2023-22764,0,1,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000 +CVE-2023-22765,0,1,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000 CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000 CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000 CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000 @@ -218774,12 +218774,12 @@ CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43 CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000 CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000 CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000 -CVE-2023-23496,0,0,dafb3f4725b70154a6e53f67b672fb292718a764b2e880110ac1f3bf5d9e212a,2024-11-21T07:46:18.143000 -CVE-2023-23497,0,0,0eac8f137473676bea54f2e11923e3c9090ba30ff46320e35f376068b557bd56,2024-11-21T07:46:18.280000 +CVE-2023-23496,0,1,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000 +CVE-2023-23497,0,1,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000 CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000 -CVE-2023-23499,0,0,a4a292e17748d068cfac1e5e7bd68bca751b1def0e1e07b6d0e260c9bf77ca77,2024-11-21T07:46:18.507000 +CVE-2023-23499,0,1,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000 CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000 -CVE-2023-23500,0,0,e85eb6b6c5c962cfeb7e7e7b7e2bc4d345105a05cfcc9fe06bce7dc92e613721,2024-11-21T07:46:18.620000 +CVE-2023-23500,0,1,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000 CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000 CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000 CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000 @@ -226676,7 +226676,7 @@ CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df627 CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000 CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000 CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000 -CVE-2023-3317,0,0,a809aef9c1ae7b0e78356e31d72e1338c0c053ed2f52c542e4e4a7721824a99f,2024-11-21T08:16:59.953000 +CVE-2023-3317,0,1,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000 CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000 CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000 CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000 @@ -243967,13 +243967,13 @@ CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ff CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08 CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000 CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000 -CVE-2024-0681,0,0,f645422d5607df145d2f13ec1fde9bcc05e65e868187ec4712f7463c2b7296a7,2024-11-21T08:47:08.380000 +CVE-2024-0681,0,1,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000 CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000 CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000 CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000 CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000 CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000 -CVE-2024-0687,0,0,534bfeb19e6ba9869a11b31a1ca1a982071d11c9ca518a7d172a828a4300754f,2024-11-21T08:47:08.990000 +CVE-2024-0687,0,1,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000 CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000 CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000 CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 @@ -243986,7 +243986,7 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8 CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000 CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000 CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000 -CVE-2024-0700,0,0,bfabb4efa6fdf9f50f68320c2d044f053fedad17789b2542e360155a24cbd155,2024-11-21T08:47:10.523000 +CVE-2024-0700,0,1,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000 CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000 CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000 CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000 @@ -244109,10 +244109,10 @@ CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d09 CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000 CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000 CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000 -CVE-2024-0827,0,0,b8d473bae80c3786e457c5f783fedf263c8e674dd54031a1e24f4324c8dcd46d,2024-11-21T08:47:27.590000 -CVE-2024-0828,0,0,ba93b2394e0f54da2d83908a611a0c569bc1e1721bd856d1be4c756b613e20be,2024-11-21T08:47:27.710000 -CVE-2024-0829,0,0,dfb75e76094313d0c7f20b8821d20ba5cb2f5a375032f4535dee50287735b733,2024-11-21T08:47:27.827000 -CVE-2024-0830,0,0,f3f28bf82ea176a81ed1bccad42ef59ad4aaefe36de7d06fc80fd37f620a7454,2024-11-21T08:47:27.947000 +CVE-2024-0827,0,1,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000 +CVE-2024-0828,0,1,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000 +CVE-2024-0829,0,1,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000 +CVE-2024-0830,0,1,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000 CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000 CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000 CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000 @@ -244121,7 +244121,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866 CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000 CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000 CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000 -CVE-2024-0839,0,0,7140f6314accc17b94e194d6f89d0691ad19ff9958d076096c8fdaebd4f845ed,2024-11-21T08:47:29.143000 +CVE-2024-0839,0,1,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000 CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000 CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000 CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000 @@ -244171,7 +244171,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000 CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 -CVE-2024-0898,0,0,37fe6f69a0f959f2e8b7339b10784223f09060868383c6ffa044458e6391fea0,2024-11-21T08:47:38.930000 +CVE-2024-0898,0,1,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000 CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000 CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000 CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000 @@ -245016,7 +245016,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000 CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000 -CVE-2024-1083,0,0,79156d1367776f4d20d6384b4d457002d1339967a843ba4dca88dafc27af4287,2024-11-21T08:49:45.600000 +CVE-2024-1083,0,1,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000 CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000 CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000 CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000 @@ -245704,7 +245704,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7 CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000 CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000 -CVE-2024-1158,0,0,ad9d5682c34a625ef9ba2b2db44b1ff292a1ce3bf02e19968ef34d4e9784a17b,2024-11-21T08:49:55.723000 +CVE-2024-1158,0,1,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000 @@ -246633,6 +246633,7 @@ CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 +CVE-2024-12546,1,1,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000 CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000 CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000 @@ -247813,19 +247814,19 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050 CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 -CVE-2024-13853,0,0,d34bbd5bd3f86a655fce1c22ada75cd2ce7bf4f4617c25eaa377aed2c9f982a0,2025-03-11T06:15:26.177000 +CVE-2024-13853,0,1,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000 CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000 -CVE-2024-13864,0,0,7d429872f41fcdbfec23e809b2625f752ecf05f7b1470e0e2d0cb4dd30d985c9,2025-03-11T06:15:26.407000 +CVE-2024-13864,0,1,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000 CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 -CVE-2024-13873,0,0,6c96e990e2774245ef5b434d5e9fd883c701128558fbe3a5272bb275ffb354b4,2025-02-22T04:15:09.567000 +CVE-2024-13873,0,1,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000 CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000 @@ -247838,7 +247839,7 @@ CVE-2024-13893,0,0,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b69588 CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000 CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000 CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000 -CVE-2024-13899,0,0,870bc582b4e5e54ec271b834ba532de1ec152c1fd74f806dea51cde0522fe6e3,2025-02-22T04:15:09.720000 +CVE-2024-13899,0,1,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000 CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000 @@ -248323,8 +248324,8 @@ CVE-2024-1885,0,0,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000 CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000 -CVE-2024-1889,0,0,6f1c394355d61fd3dfd86d4099249eb53a2f4907f747ba36a260148264b84ed8,2025-02-27T22:03:40.670000 -CVE-2024-1890,0,0,04472b515f8f4dd3f0362d8c1884d3ae0c78171c034b7a407836288f05db8e0e,2025-02-27T22:03:40.670000 +CVE-2024-1889,0,1,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000 +CVE-2024-1890,0,1,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000 CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000 CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000 CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000 @@ -252695,7 +252696,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000 CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000 CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000 -CVE-2024-2546,0,0,8cb295d8ab81570954347714079e5875b99b5e3e86e85d39f0c1833ed2a0a1cd,2025-01-27T17:05:46.703000 +CVE-2024-2546,0,1,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000 CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000 CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000 CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000 @@ -266323,7 +266324,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216 CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000 CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000 CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000 -CVE-2024-43196,0,0,8b2a836cbbe6658eba7cefd495a0d5c3f6f241a2ada1aa215976ab8247b3a542,2025-02-20T04:15:09.630000 +CVE-2024-43196,0,1,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 @@ -267312,7 +267313,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 -CVE-2024-44192,0,0,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000 +CVE-2024-44192,0,1,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000 CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000 @@ -270756,19 +270757,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881 CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000 CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000 CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000 -CVE-2024-49337,0,0,c94a8992a3019786bdcd4878609c71de57805da8b6a6c804be0db4d3d61ffa65,2025-02-20T12:15:09.293000 +CVE-2024-49337,0,1,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000 CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000 CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 -CVE-2024-49344,0,0,9e0687ee0ea9f1fd5f04cb21dbca91cbc677688bf0b1cd9b6ad399260cb28371,2025-02-20T12:15:10.377000 +CVE-2024-49344,0,1,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000 CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000 -CVE-2024-49355,0,0,186776d570fdfec970f861699b80810dbdc70bd53f23355d5b199311a5b2f90d,2025-02-20T04:15:10.670000 +CVE-2024-49355,0,1,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000 CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000 CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000 CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000 @@ -271084,11 +271085,11 @@ CVE-2024-49775,0,0,80561302864ea58e0b8a0928ce56db4a412fa4e922f0595e7642f4c103198 CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 -CVE-2024-49779,0,0,ee5133546983a60a3acab2f18a8ecfc963b831a46e120464a0614632bc57ef21,2025-02-20T12:15:10.527000 +CVE-2024-49779,0,1,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000 CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000 -CVE-2024-49780,0,0,490307f593047424f4c7c23dc48b5795cc2f2aee84d770c500f0b4a8f6bf3499,2025-02-20T12:15:10.657000 -CVE-2024-49781,0,0,bd6cb8ef4203ad5b05c7f45eb9fc358902fba622f544c93da6a5c26c2f399df1,2025-02-20T12:15:10.747000 -CVE-2024-49782,0,0,7ebf6eadab5e8506e34106adeb5616ef7773ec0635152435a2ffcd54d1329cf8,2025-02-20T04:15:10.973000 +CVE-2024-49780,0,1,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000 +CVE-2024-49781,0,1,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000 +CVE-2024-49782,0,1,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000 CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 @@ -274251,6 +274252,8 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 +CVE-2024-54084,1,1,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000 +CVE-2024-54085,1,1,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000 CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 @@ -274619,11 +274622,11 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 -CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 +CVE-2024-54469,0,1,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 -CVE-2024-54473,0,0,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000 +CVE-2024-54473,0,1,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -274697,7 +274700,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 -CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 +CVE-2024-54560,0,1,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 @@ -280573,10 +280576,10 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 -CVE-2025-0624,0,1,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000 +CVE-2025-0624,0,0,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000 CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 -CVE-2025-0629,0,0,684072a6698eff7a3081e9f638cb3dbf320c35eb66cb0b4475230767ce44b0ad,2025-03-11T06:15:26.513000 +CVE-2025-0629,0,1,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000 CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000 CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000 CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000 @@ -281786,7 +281789,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000 CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000 -CVE-2025-2136,0,0,6f7b0d27733ecd5995b75026a215f5a404b68c1ef1ebb012b469dc667f933f0e,2025-03-10T21:15:40.730000 +CVE-2025-2136,0,1,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000 CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 @@ -281797,7 +281800,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000 CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000 CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000 -CVE-2025-2137,0,0,574f8116782e68fbf81613d426d526d5951a69f54af0f3511fb6eb1e9bdb0a9c,2025-03-10T21:15:40.857000 +CVE-2025-2137,0,1,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000 CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 @@ -282184,9 +282187,14 @@ CVE-2025-21840,0,0,79e0fdabfbd29cc80f75cdf397a49e5d1ecc594978efa8294abd14922129d CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d787,2025-03-07T09:15:17.137000 CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000 CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000 -CVE-2025-2189,1,1,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000 -CVE-2025-2190,0,0,839caafb3eeab456c5f4b886150312f72b739a240b7a1e49c7f3e07e0a4dd95e,2025-03-11T07:15:37.950000 -CVE-2025-2191,1,1,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000 +CVE-2025-2189,0,0,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000 +CVE-2025-2190,0,1,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000 +CVE-2025-2191,0,0,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000 +CVE-2025-2192,1,1,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000 +CVE-2025-2193,1,1,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000 +CVE-2025-2194,1,1,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000 +CVE-2025-2195,1,1,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000 +CVE-2025-2196,1,1,59e5a21c779c1b597e73c1ddba8e0655dec15010418379179d66140aea5d4385,2025-03-11T14:15:28.123000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 @@ -282320,6 +282328,11 @@ CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000 CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000 CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000 +CVE-2025-22366,1,1,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000 +CVE-2025-22367,1,1,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000 +CVE-2025-22368,1,1,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000 +CVE-2025-22369,1,1,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000 +CVE-2025-22370,1,1,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000 CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000 CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000 CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000 @@ -284606,6 +284619,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000 CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000 +CVE-2025-27363,1,1,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 @@ -284742,7 +284756,7 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 -CVE-2025-27893,0,0,dbf8992f02cfd0901930576b77bdc424b78b7f410ce35e6828c7e6c7bc393fb1,2025-03-11T09:15:25.457000 +CVE-2025-27893,0,1,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000 CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000 CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000 CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000