Auto-Update: 2025-03-11T15:00:20.452422+00:00

This commit is contained in:
cad-safe-bot 2025-03-11 15:03:50 +00:00
parent c391a86582
commit 505a797c64
63 changed files with 3352 additions and 248 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46723", "id": "CVE-2022-46723",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.020", "published": "2023-02-27T20:15:13.020",
"lastModified": "2024-11-21T07:30:58.763", "lastModified": "2025-03-11T14:15:16.430",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22491", "id": "CVE-2023-22491",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-13T19:15:12.407", "published": "2023-01-13T19:15:12.407",
"lastModified": "2024-11-21T07:44:54.943", "lastModified": "2025-03-11T14:15:16.767",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -124,6 +124,14 @@
"Exploit", "Exploit",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22752", "id": "CVE-2023-22752",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:12.760", "published": "2023-03-01T08:15:12.760",
"lastModified": "2024-11-21T07:45:21.440", "lastModified": "2025-03-11T14:15:17.410",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22753", "id": "CVE-2023-22753",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:12.823", "published": "2023-03-01T08:15:12.823",
"lastModified": "2024-11-21T07:45:21.560", "lastModified": "2025-03-11T14:15:17.590",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-120" "value": "CWE-120"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22763", "id": "CVE-2023-22763",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.500", "published": "2023-03-01T08:15:13.500",
"lastModified": "2024-11-21T07:45:22.727", "lastModified": "2025-03-11T14:15:17.760",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77" "value": "CWE-77"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22764", "id": "CVE-2023-22764",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.573", "published": "2023-03-01T08:15:13.573",
"lastModified": "2024-11-21T07:45:22.847", "lastModified": "2025-03-11T14:15:17.920",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77" "value": "CWE-77"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22765", "id": "CVE-2023-22765",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.637", "published": "2023-03-01T08:15:13.637",
"lastModified": "2024-11-21T07:45:22.970", "lastModified": "2025-03-11T14:15:18.077",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77" "value": "CWE-77"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23496", "id": "CVE-2023-23496",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.157", "published": "2023-02-27T20:15:13.157",
"lastModified": "2024-11-21T07:46:18.143", "lastModified": "2025-03-11T14:15:18.513",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23497", "id": "CVE-2023-23497",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.220", "published": "2023-02-27T20:15:13.220",
"lastModified": "2024-11-21T07:46:18.280", "lastModified": "2025-03-11T14:15:18.680",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23499", "id": "CVE-2023-23499",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.353", "published": "2023-02-27T20:15:13.353",
"lastModified": "2024-11-21T07:46:18.507", "lastModified": "2025-03-11T14:15:18.913",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23500", "id": "CVE-2023-23500",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.423", "published": "2023-02-27T20:15:13.423",
"lastModified": "2024-11-21T07:46:18.620", "lastModified": "2025-03-11T14:15:19.060",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3317", "id": "CVE-2023-3317",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-23T18:15:14.047", "published": "2023-06-23T18:15:14.047",
"lastModified": "2024-11-21T08:16:59.953", "lastModified": "2025-03-11T14:15:19.697",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0681", "id": "CVE-2024-0681",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.767", "published": "2024-03-13T16:15:12.767",
"lastModified": "2024-11-21T08:47:08.380", "lastModified": "2025-03-11T13:33:45.277",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve", "lang": "en",
"source": "security@wordfence.com" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ],
}, "configurations": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miniorange:page_restriction:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.5",
"matchCriteriaId": "BF7830C6-9B48-4520-9699-DC99B77486DD"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0687", "id": "CVE-2024-0687",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.203", "published": "2024-03-13T16:15:13.203",
"lastModified": "2024-11-21T08:47:08.990", "lastModified": "2025-03-11T13:32:08.780",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve", "lang": "en",
"source": "security@wordfence.com" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ],
}, "configurations": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dev.institute:restrict_user_access:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6",
"matchCriteriaId": "93CDB255-CFCE-4B2B-A8C1-8CEA459A2649"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0700", "id": "CVE-2024-0700",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.403", "published": "2024-03-13T16:15:13.403",
"lastModified": "2024-11-21T08:47:10.523", "lastModified": "2025-03-11T13:30:56.303",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,33 +36,101 @@
}, },
"exploitabilityScore": 3.1, "exploitabilityScore": 3.1,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wokamoto:simple_tweet:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.0.2",
"matchCriteriaId": "FC9F67DE-35E1-467A-9161-5D3E95CE19C9"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request", "url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://wordpress.org/plugins/simple-tweet/", "url": "https://wordpress.org/plugins/simple-tweet/",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request", "url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://wordpress.org/plugins/simple-tweet/", "url": "https://wordpress.org/plugins/simple-tweet/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0827", "id": "CVE-2024-0827",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.610", "published": "2024-03-13T16:15:13.610",
"lastModified": "2024-11-21T08:47:27.590", "lastModified": "2025-03-11T13:30:12.340",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,87 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.6.4",
"matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0828", "id": "CVE-2024-0828",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.833", "published": "2024-03-13T16:15:13.833",
"lastModified": "2024-11-21T08:47:27.710", "lastModified": "2025-03-11T13:29:49.430",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,87 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.6.4",
"matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php", "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0829", "id": "CVE-2024-0829",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.067", "published": "2024-03-13T16:15:14.067",
"lastModified": "2024-11-21T08:47:27.827", "lastModified": "2025-03-11T13:28:57.287",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,30 +39,78 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", "lang": "en",
"source": "security@wordfence.com" "value": "CWE-862"
}, }
{ ]
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve", }
"source": "security@wordfence.com" ],
}, "configurations": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
}, "operator": "OR",
{ "negate": false,
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", "cpeMatch": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
}, "vulnerable": true,
{ "criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve", "versionEndExcluding": "5.1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0830", "id": "CVE-2024-0830",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.307", "published": "2024-03-13T16:15:14.307",
"lastModified": "2024-11-21T08:47:27.947", "lastModified": "2025-03-11T13:28:31.400",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,33 +36,101 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php", "url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0839", "id": "CVE-2024-0839",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.537", "published": "2024-03-13T16:15:14.537",
"lastModified": "2024-11-21T08:47:29.143", "lastModified": "2025-03-11T13:25:38.507",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://wordpress.org/plugins/feedwordpress/", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve", "lang": "en",
"source": "security@wordfence.com" "value": "CWE-639"
}, }
{ ]
"url": "https://wordpress.org/plugins/feedwordpress/", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ],
}, "configurations": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.0428",
"matchCriteriaId": "A18FF440-C6F6-4646-8D82-2902526CC456"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/feedwordpress/",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/feedwordpress/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0898", "id": "CVE-2024-0898",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:15.593", "published": "2024-03-13T16:15:15.593",
"lastModified": "2024-11-21T08:47:38.930", "lastModified": "2025-03-11T13:21:21.240",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,87 @@
}, },
"exploitabilityScore": 1.3, "exploitabilityScore": 1.3,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "7382E975-FE03-4C45-8797-F03BD864E606"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wordpress.org/plugins/chat-bubble/", "url": "https://wordpress.org/plugins/chat-bubble/",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://wordpress.org/plugins/chat-bubble/", "url": "https://wordpress.org/plugins/chat-bubble/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1083", "id": "CVE-2024-1083",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.940", "published": "2024-03-13T16:15:16.940",
"lastModified": "2024-11-21T08:49:45.600", "lastModified": "2025-03-11T13:20:23.640",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve", "lang": "en",
"source": "security@wordfence.com" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=", }
"source": "af854a3a-2127-422b-91ae-364da2661108" ],
}, "configurations": [
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.7",
"matchCriteriaId": "633864E5-0CDF-440B-9B83-915F0B56899B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1158", "id": "CVE-2024-1158",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.740", "published": "2024-03-13T16:15:17.740",
"lastModified": "2024-11-21T08:49:55.723", "lastModified": "2025-03-11T13:18:18.670",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,30 +39,78 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80", "source": "nvd@nist.gov",
"source": "security@wordfence.com" "type": "Primary",
}, "description": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=", "lang": "en",
"source": "security@wordfence.com" "value": "CWE-862"
}, }
{ ]
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve", }
"source": "security@wordfence.com" ],
}, "configurations": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80", "nodes": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
}, "operator": "OR",
{ "negate": false,
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=", "cpeMatch": [
"source": "af854a3a-2127-422b-91ae-364da2661108" {
}, "vulnerable": true,
{ "criteria": "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve", "versionEndExcluding": "2.8.8",
"source": "af854a3a-2127-422b-91ae-364da2661108" "matchCriteriaId": "4BEF66A8-FC6E-4771-95A0-C692068FB670"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12546",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2025-03-11T14:15:20.210",
"lastModified": "2025-03-11T14:15:20.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "infosec@edk2.groups.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "infosec@edk2.groups.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-13853", "id": "CVE-2024-13853",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.177", "published": "2025-03-11T06:15:26.177",
"lastModified": "2025-03-11T06:15:26.177", "lastModified": "2025-03-11T14:15:20.417",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" "value": "The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento SEO Tools WordPress hasta la versi\u00f3n 4.0.7 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/52991dd9-41f7-4cf8-b8c9-56dd4e62bf0c/", "url": "https://wpscan.com/vulnerability/52991dd9-41f7-4cf8-b8c9-56dd4e62bf0c/",

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13864", "id": "CVE-2024-13864",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.407", "published": "2025-03-11T06:15:26.407",
"lastModified": "2025-03-11T06:15:26.407", "lastModified": "2025-03-11T14:15:20.570",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Countdown Timer WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" "value": "The Countdown Timer WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento Countdown Timer de WordPress hasta la versi\u00f3n 1.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/", "url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13873", "id": "CVE-2024-13873",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T04:15:09.567", "published": "2025-02-22T04:15:09.567",
"lastModified": "2025-02-22T04:15:09.567", "lastModified": "2025-03-11T13:32:22.040",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,26 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "security@wordfence.com", "source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -51,14 +71,38 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3242653/wp-job-portal/tags/2.2.9/includes/classes/uploads.php?old=3238353&old_path=wp-job-portal%2Ftags%2F2.2.8%2Fincludes%2Fclasses%2Fuploads.php", "nodes": [
"source": "security@wordfence.com"
},
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdba3c5-382e-4d2b-83d8-0e0cebf2e63c?source=cve", "operator": "OR",
"source": "security@wordfence.com" "negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.9",
"matchCriteriaId": "30FC05A7-99B6-45E6-AD44-D0767612D35D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3242653/wp-job-portal/tags/2.2.9/includes/classes/uploads.php?old=3238353&old_path=wp-job-portal%2Ftags%2F2.2.8%2Fincludes%2Fclasses%2Fuploads.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdba3c5-382e-4d2b-83d8-0e0cebf2e63c?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13899", "id": "CVE-2024-13899",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T04:15:09.720", "published": "2025-02-22T04:15:09.720",
"lastModified": "2025-02-22T04:15:09.720", "lastModified": "2025-03-11T13:26:57.550",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,16 +49,49 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:misterpah:mambo_joomla_importer:1.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "24192B97-AB2C-4712-B126-906AE92BD57D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/mambo-joomla-importer/trunk/mamboImporter.php#L45", "url": "https://plugins.trac.wordpress.org/browser/mambo-joomla-importer/trunk/mamboImporter.php#L45",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d448c2-5acc-47f8-8e86-9ef10fa01513?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d448c2-5acc-47f8-8e86-9ef10fa01513?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1889", "id": "CVE-2024-1889",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-26T16:27:55.130", "published": "2024-02-26T16:27:55.130",
"lastModified": "2025-02-27T22:03:40.670", "lastModified": "2025-03-11T14:51:56.797",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
@ -43,6 +43,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -68,8 +88,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:sma:clcon-10_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F" "matchCriteriaId": "6B8081E6-3552-4C2E-9516-E7B36C187E8F"
} }
] ]
}, },
@ -79,8 +99,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": false, "vulnerable": false,
"criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:h:sma:clcon-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC" "matchCriteriaId": "EFF09E8B-0A45-4D7C-8358-63DB482FFDB5"
} }
] ]
} }
@ -95,9 +115,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:sma:sunny_webbox_firmware:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:sma:clcon-s-10_firmware:01.05.01.r:*:*:*:*:*:*:*",
"versionEndIncluding": "1.61", "matchCriteriaId": "9FD528CC-B088-439A-84BE-1BA137094459"
"matchCriteriaId": "8AA41F6C-CC24-497B-99E5-F6F4205D0364"
} }
] ]
}, },
@ -107,8 +126,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": false, "vulnerable": false,
"criteria": "cpe:2.3:h:sma:sunny_webbox:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:h:sma:clcon-s-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E1D0797-846A-436A-BBEA-EA222E826CBF" "matchCriteriaId": "6660909E-9E7C-4BB6-B470-D6AA9376AF58"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1890", "id": "CVE-2024-1890",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-26T16:27:55.340", "published": "2024-02-26T16:27:55.340",
"lastModified": "2025-02-27T22:03:40.670", "lastModified": "2025-03-11T14:51:33.223",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
@ -79,33 +79,6 @@
} }
], ],
"configurations": [ "configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC"
}
]
}
]
},
{ {
"operator": "AND", "operator": "AND",
"nodes": [ "nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2546", "id": "CVE-2024-2546",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T02:15:06.190", "published": "2024-03-17T02:15:06.190",
"lastModified": "2025-01-27T17:05:46.703", "lastModified": "2025-03-11T14:07:31.350",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -42,19 +42,19 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8, "baseScore": 8.8,
"baseSeverity": "CRITICAL", "baseSeverity": "HIGH",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "LOW",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "HIGH",
"availabilityImpact": "HIGH" "availabilityImpact": "HIGH"
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
} }
], ],
@ -116,8 +116,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.07.09:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.13.07.09:*:*:*:*:*:*:*",
"matchCriteriaId": "7F318BF3-E1D1-4FDF-8016-8B8E1790BD1C" "matchCriteriaId": "B8C468F9-C992-49D5-84D8-F64CE4AF4D3F"
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43196", "id": "CVE-2024-43196",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:09.630", "published": "2025-02-20T04:15:09.630",
"lastModified": "2025-02-20T04:15:09.630", "lastModified": "2025-03-11T14:57:13.920",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,68 @@
"value": "CWE-296" "value": "CWE-296"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-44192", "id": "CVE-2024-44192",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.080", "published": "2025-03-10T19:15:38.080",
"lastModified": "2025-03-10T19:15:38.080", "lastModified": "2025-03-11T14:15:22.503",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash." "value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18 y tvOS 18. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49337", "id": "CVE-2024-49337",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:09.293", "published": "2025-02-20T12:15:09.293",
"lastModified": "2025-02-20T12:15:09.293", "lastModified": "2025-03-11T14:06:18.787",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,26 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "psirt@us.ibm.com", "source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -49,12 +69,68 @@
"value": "CWE-80" "value": "CWE-80"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49344", "id": "CVE-2024-49344",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.377", "published": "2025-02-20T12:15:10.377",
"lastModified": "2025-02-20T12:15:10.377", "lastModified": "2025-03-11T14:02:39.433",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,26 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "psirt@us.ibm.com", "source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -51,10 +71,56 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "operator": "AND",
"source": "psirt@us.ibm.com" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49355", "id": "CVE-2024-49355",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.670", "published": "2025-02-20T04:15:10.670",
"lastModified": "2025-02-20T04:15:10.670", "lastModified": "2025-03-11T14:51:01.153",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "psirt@us.ibm.com", "source": "psirt@us.ibm.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,12 +69,68 @@
"value": "CWE-117" "value": "CWE-117"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49779", "id": "CVE-2024-49779",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.527", "published": "2025-02-20T12:15:10.527",
"lastModified": "2025-02-20T12:15:10.527", "lastModified": "2025-03-11T13:55:21.797",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "psirt@us.ibm.com", "source": "psirt@us.ibm.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -51,10 +71,56 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "operator": "AND",
"source": "psirt@us.ibm.com" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49780", "id": "CVE-2024-49780",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.827", "published": "2025-02-20T04:15:10.827",
"lastModified": "2025-02-20T12:15:10.657", "lastModified": "2025-03-11T14:37:00.743",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -51,10 +71,56 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "operator": "AND",
"source": "psirt@us.ibm.com" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49781", "id": "CVE-2024-49781",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.747", "published": "2025-02-20T12:15:10.747",
"lastModified": "2025-02-20T12:15:10.747", "lastModified": "2025-03-11T13:45:47.917",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,56 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "operator": "AND",
"source": "psirt@us.ibm.com" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49782", "id": "CVE-2024-49782",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.973", "published": "2025-02-20T04:15:10.973",
"lastModified": "2025-02-20T04:15:10.973", "lastModified": "2025-03-11T14:19:11.780",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "psirt@us.ibm.com", "source": "psirt@us.ibm.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
} }
] ]
}, },
@ -49,12 +69,68 @@
"value": "CWE-297" "value": "CWE-297"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.ibm.com/support/pages/node/7183541", "url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54084",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2025-03-11T14:15:22.730",
"lastModified": "2025-03-11T14:15:22.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "biossecurity@ami.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-54085",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2025-03-11T14:15:22.893",
"lastModified": "2025-03-11T14:15:22.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AMI\u2019s SPx contains\na vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation\nof this vulnerability may lead to a loss of confidentiality, integrity, and/or\navailability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "biossecurity@ami.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54469", "id": "CVE-2024-54469",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.493", "published": "2025-03-10T19:15:38.493",
"lastModified": "2025-03-10T19:15:38.493", "lastModified": "2025-03-11T14:15:23.030",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information." "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 y iPadOS 18. Un usuario local podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/121234", "url": "https://support.apple.com/en-us/121234",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54473", "id": "CVE-2024-54473",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.600", "published": "2025-03-10T19:15:38.600",
"lastModified": "2025-03-10T19:15:38.600", "lastModified": "2025-03-11T14:15:23.210",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data." "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54560", "id": "CVE-2024-54560",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.883", "published": "2025-03-10T19:15:38.883",
"lastModified": "2025-03-10T19:15:38.883", "lastModified": "2025-03-11T14:15:23.417",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission." "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, watchOS 11, tvOS 18 y macOS Sequoia 15. Una aplicaci\u00f3n malintencionada podr\u00eda modificar otras aplicaciones sin tener permiso de Administraci\u00f3n de aplicaciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238",

View File

@ -2,20 +2,51 @@
"id": "CVE-2025-0629", "id": "CVE-2025-0629",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.513", "published": "2025-03-11T06:15:26.513",
"lastModified": "2025-03-11T06:15:26.513", "lastModified": "2025-03-11T14:15:24.090",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Coronavirus (COVID-19) Notice Message WordPress plugin through 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." "value": "The Coronavirus (COVID-19) Notice Message WordPress plugin through 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Coronavirus (COVID-19) Notice Message de WordPress hasta la versi\u00f3n 1.1.2 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con altos privilegios como el administrador realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/", "url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-2136", "id": "CVE-2025-2136",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.730", "published": "2025-03-10T21:15:40.730",
"lastModified": "2025-03-10T21:15:40.730", "lastModified": "2025-03-11T14:15:26.553",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" "value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "El uso posterior a la liberaci\u00f3n en Inspector en Google Chrome anterior a la versi\u00f3n 134.0.6998.88 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-2137", "id": "CVE-2025-2137",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.857", "published": "2025-03-10T21:15:40.857",
"lastModified": "2025-03-10T21:15:40.857", "lastModified": "2025-03-11T14:15:26.737",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)" "value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La lectura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 134.0.6998.88 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-2190", "id": "CVE-2025-2190",
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2025-03-11T07:15:37.950", "published": "2025-03-11T07:15:37.950",
"lastModified": "2025-03-11T07:15:37.950", "lastModified": "2025-03-11T14:15:27.163",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The mobile application (com.transsnet.store) has a man-in-the-middle attack vulnerability, which may lead to code injection risks." "value": "The mobile application (com.transsnet.store) has a man-in-the-middle attack vulnerability, which may lead to code injection risks."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n m\u00f3vil (com.transsnet.store) tiene una vulnerabilidad de ataque man-in-the-middle, que puede generar riesgos de inyecci\u00f3n de c\u00f3digo."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-2192",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T13:15:43.780",
"lastModified": "2025-03-11T14:15:27.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Stoque Zeev.it 4.24. This affects an unknown part of the file /Login?inpLostSession=1 of the component Login Page. The manipulation of the argument inpRedirectURL leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/17QAEbzVIjTUj8FDOVMwfl9-7j8LRcK4V/view?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299217",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299217",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511708",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2193",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T13:15:43.997",
"lastModified": "2025-03-11T14:15:27.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MRCMS 3.1.2 and classified as critical. This vulnerability affects the function delete of the file /admin/file/delete.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path/name leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299218",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299218",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511724",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2194",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:27.753",
"lastModified": "2025-03-11T14:15:27.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects the function list of the file /admin/file/list.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299219",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299219",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511732",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2195",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:27.937",
"lastModified": "2025-03-11T14:15:27.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is the function rename of the file /admin/file/rename.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument name/path leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299220",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299220",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511733",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2196",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:28.123",
"lastModified": "2025-03-11T14:15:28.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /admin/file/upload.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511735",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22366",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.313",
"lastModified": "2025-03-11T14:15:24.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated firmware update capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22366",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22367",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.480",
"lastModified": "2025-03-11T14:15:24.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated time setting capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22367",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22368",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.627",
"lastModified": "2025-03-11T14:15:24.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated SCU firmware command of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS commands are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22368",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22369",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.767",
"lastModified": "2025-03-11T14:15:24.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22369",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22370",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.917",
"lastModified": "2025-03-11T14:15:24.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Many fields for the web configuration interface of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to execute arbitrary SQL commands because the values are insufficiently neutralized."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22370",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27363",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2025-03-11T14:15:25.427",
"lastModified": "2025-03-11T14:15:25.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-assign@fb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.facebook.com/security/advisories/cve-2025-27363",
"source": "cve-assign@fb.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27893", "id": "CVE-2025-27893",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T09:15:25.457", "published": "2025-03-11T09:15:25.457",
"lastModified": "2025-03-11T09:15:25.457", "lastModified": "2025-03-11T14:15:26.033",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls." "value": "In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls."
},
{
"lang": "es",
"value": "En Archer Platform 6 a 6.14.00202.10024, un usuario autenticado con privilegios de creaci\u00f3n de registros puede manipular campos inmutables, como la fecha de creaci\u00f3n, interceptando y modificando una solicitud de copia a trav\u00e9s de un URI GenericContent/Record.aspx?id=. Esto permite la modificaci\u00f3n no autorizada de metadatos generados por el sistema, lo que compromete la integridad de los datos y potencialmente afecta los controles de auditor\u00eda, cumplimiento y seguridad."
} }
], ],
"metrics": { "metrics": {
@ -55,6 +59,10 @@
{ {
"url": "https://github.com/NastyCrow/CVE-2025-27893", "url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-03-11T13:00:19.228097+00:00 2025-03-11T15:00:20.452422+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-03-11T12:15:12.277000+00:00 2025-03-11T14:57:13.920000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,22 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
284751 284765
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `2` Recently added CVEs: `14`
- [CVE-2025-2189](CVE-2025/CVE-2025-21xx/CVE-2025-2189.json) (`2025-03-11T12:15:12.057`) - [CVE-2024-12546](CVE-2024/CVE-2024-125xx/CVE-2024-12546.json) (`2025-03-11T14:15:20.210`)
- [CVE-2025-2191](CVE-2025/CVE-2025-21xx/CVE-2025-2191.json) (`2025-03-11T12:15:12.277`) - [CVE-2024-54084](CVE-2024/CVE-2024-540xx/CVE-2024-54084.json) (`2025-03-11T14:15:22.730`)
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-03-11T14:15:22.893`)
- [CVE-2025-2192](CVE-2025/CVE-2025-21xx/CVE-2025-2192.json) (`2025-03-11T13:15:43.780`)
- [CVE-2025-2193](CVE-2025/CVE-2025-21xx/CVE-2025-2193.json) (`2025-03-11T13:15:43.997`)
- [CVE-2025-2194](CVE-2025/CVE-2025-21xx/CVE-2025-2194.json) (`2025-03-11T14:15:27.753`)
- [CVE-2025-2195](CVE-2025/CVE-2025-21xx/CVE-2025-2195.json) (`2025-03-11T14:15:27.937`)
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T14:15:28.123`)
- [CVE-2025-22366](CVE-2025/CVE-2025-223xx/CVE-2025-22366.json) (`2025-03-11T14:15:24.313`)
- [CVE-2025-22367](CVE-2025/CVE-2025-223xx/CVE-2025-22367.json) (`2025-03-11T14:15:24.480`)
- [CVE-2025-22368](CVE-2025/CVE-2025-223xx/CVE-2025-22368.json) (`2025-03-11T14:15:24.627`)
- [CVE-2025-22369](CVE-2025/CVE-2025-223xx/CVE-2025-22369.json) (`2025-03-11T14:15:24.767`)
- [CVE-2025-22370](CVE-2025/CVE-2025-223xx/CVE-2025-22370.json) (`2025-03-11T14:15:24.917`)
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-11T14:15:25.427`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `47`
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-11T12:15:11.820`) - [CVE-2024-1158](CVE-2024/CVE-2024-11xx/CVE-2024-1158.json) (`2025-03-11T13:18:18.670`)
- [CVE-2024-13853](CVE-2024/CVE-2024-138xx/CVE-2024-13853.json) (`2025-03-11T14:15:20.417`)
- [CVE-2024-13864](CVE-2024/CVE-2024-138xx/CVE-2024-13864.json) (`2025-03-11T14:15:20.570`)
- [CVE-2024-13873](CVE-2024/CVE-2024-138xx/CVE-2024-13873.json) (`2025-03-11T13:32:22.040`)
- [CVE-2024-13899](CVE-2024/CVE-2024-138xx/CVE-2024-13899.json) (`2025-03-11T13:26:57.550`)
- [CVE-2024-1889](CVE-2024/CVE-2024-18xx/CVE-2024-1889.json) (`2025-03-11T14:51:56.797`)
- [CVE-2024-1890](CVE-2024/CVE-2024-18xx/CVE-2024-1890.json) (`2025-03-11T14:51:33.223`)
- [CVE-2024-2546](CVE-2024/CVE-2024-25xx/CVE-2024-2546.json) (`2025-03-11T14:07:31.350`)
- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-03-11T14:57:13.920`)
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-11T14:15:22.503`)
- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-03-11T14:06:18.787`)
- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-03-11T14:02:39.433`)
- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-03-11T14:51:01.153`)
- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-03-11T13:55:21.797`)
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-03-11T14:37:00.743`)
- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-03-11T13:45:47.917`)
- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-03-11T14:19:11.780`)
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-11T14:15:23.030`)
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-11T14:15:23.210`)
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-11T14:15:23.417`)
- [CVE-2025-0629](CVE-2025/CVE-2025-06xx/CVE-2025-0629.json) (`2025-03-11T14:15:24.090`)
- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-11T14:15:26.553`)
- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-11T14:15:26.737`)
- [CVE-2025-2190](CVE-2025/CVE-2025-21xx/CVE-2025-2190.json) (`2025-03-11T14:15:27.163`)
- [CVE-2025-27893](CVE-2025/CVE-2025-278xx/CVE-2025-27893.json) (`2025-03-11T14:15:26.033`)
## Download and Usage ## Download and Usage

View File

@ -211457,7 +211457,7 @@ CVE-2022-4672,0,0,3da0ab4af959d0d56059ed0a777501b4f92187b9acb6980457fef52c63560f
CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000 CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000
CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000 CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000
CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000 CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000
CVE-2022-46723,0,0,21271aa41cfe7d1eecb2df8cbff28dff4ae52ddd305c0eef5b0ef67f56e7f43c,2024-11-21T07:30:58.763000 CVE-2022-46723,0,1,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000 CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000
CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000 CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000
CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000 CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000
@ -218075,7 +218075,7 @@ CVE-2023-22488,0,0,0aaf54ba6aaa396e5eeed906e25dc3eb9cf8d78bd4004aaf6fe7cfeb792ac
CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000 CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000
CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000 CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000
CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000 CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000
CVE-2023-22491,0,0,6634f80ae040bc7b08ba4beb028108a2ff8452c29178c902c90708269a64dfc3,2024-11-21T07:44:54.943000 CVE-2023-22491,0,1,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000 CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000
CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000 CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000
CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000 CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000
@ -218296,8 +218296,8 @@ CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5
CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000 CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000
CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000 CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000
CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000 CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000
CVE-2023-22752,0,0,01119cf3f2ade5d14e2214357d7a91d0e54d36e26c8908b7f5730ea75c68e1b8,2024-11-21T07:45:21.440000 CVE-2023-22752,0,1,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
CVE-2023-22753,0,0,acc0fd192a8331b5b7371e3977ae7d7d9b20b6aab22671ada345b8e874154239,2024-11-21T07:45:21.560000 CVE-2023-22753,0,1,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000 CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000
CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000 CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000
CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000 CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000
@ -218308,9 +218308,9 @@ CVE-2023-2276,0,0,2a89d36eee46d6c101100028368db05883bc5be65d5b25d57a5e3d361c3f71
CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000 CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000
CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000 CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000
CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000 CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000
CVE-2023-22763,0,0,a5c31e6188f03546dd6ee88a2e5d85ca0e3076f445fc034cfd958e90d98e1838,2024-11-21T07:45:22.727000 CVE-2023-22763,0,1,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
CVE-2023-22764,0,0,bf719ab1f22aa2cd387d7dca2190a85fc105bbf50566d696ca7a5eeba41f6836,2024-11-21T07:45:22.847000 CVE-2023-22764,0,1,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
CVE-2023-22765,0,0,6a660dc0329d4c6b90e9a98b46cfac1b4010d4fe1c6579a51a237190475e662d,2024-11-21T07:45:22.970000 CVE-2023-22765,0,1,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000 CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000
CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000 CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000
CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000 CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000
@ -218774,12 +218774,12 @@ CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43
CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000 CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000
CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000 CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000
CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000 CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000
CVE-2023-23496,0,0,dafb3f4725b70154a6e53f67b672fb292718a764b2e880110ac1f3bf5d9e212a,2024-11-21T07:46:18.143000 CVE-2023-23496,0,1,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
CVE-2023-23497,0,0,0eac8f137473676bea54f2e11923e3c9090ba30ff46320e35f376068b557bd56,2024-11-21T07:46:18.280000 CVE-2023-23497,0,1,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000 CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000
CVE-2023-23499,0,0,a4a292e17748d068cfac1e5e7bd68bca751b1def0e1e07b6d0e260c9bf77ca77,2024-11-21T07:46:18.507000 CVE-2023-23499,0,1,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000 CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000
CVE-2023-23500,0,0,e85eb6b6c5c962cfeb7e7e7b7e2bc4d345105a05cfcc9fe06bce7dc92e613721,2024-11-21T07:46:18.620000 CVE-2023-23500,0,1,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000 CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000
CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000 CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000
CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000 CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000
@ -226676,7 +226676,7 @@ CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df627
CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000 CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000
CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000 CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000
CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000 CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000
CVE-2023-3317,0,0,a809aef9c1ae7b0e78356e31d72e1338c0c053ed2f52c542e4e4a7721824a99f,2024-11-21T08:16:59.953000 CVE-2023-3317,0,1,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000 CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000
CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000 CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000
CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000 CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000
@ -243967,13 +243967,13 @@ CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ff
CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08 CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08
CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000 CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000
CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000 CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000
CVE-2024-0681,0,0,f645422d5607df145d2f13ec1fde9bcc05e65e868187ec4712f7463c2b7296a7,2024-11-21T08:47:08.380000 CVE-2024-0681,0,1,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000 CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000
CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000 CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000
CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000 CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000
CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000 CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000
CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000 CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000
CVE-2024-0687,0,0,534bfeb19e6ba9869a11b31a1ca1a982071d11c9ca518a7d172a828a4300754f,2024-11-21T08:47:08.990000 CVE-2024-0687,0,1,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000 CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000
CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000 CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000
CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
@ -243986,7 +243986,7 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8
CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000 CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000
CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000 CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000
CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000 CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000
CVE-2024-0700,0,0,bfabb4efa6fdf9f50f68320c2d044f053fedad17789b2542e360155a24cbd155,2024-11-21T08:47:10.523000 CVE-2024-0700,0,1,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000 CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000
CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000 CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000
CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000 CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000
@ -244109,10 +244109,10 @@ CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d09
CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000 CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000
CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000 CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000
CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000 CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000
CVE-2024-0827,0,0,b8d473bae80c3786e457c5f783fedf263c8e674dd54031a1e24f4324c8dcd46d,2024-11-21T08:47:27.590000 CVE-2024-0827,0,1,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
CVE-2024-0828,0,0,ba93b2394e0f54da2d83908a611a0c569bc1e1721bd856d1be4c756b613e20be,2024-11-21T08:47:27.710000 CVE-2024-0828,0,1,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
CVE-2024-0829,0,0,dfb75e76094313d0c7f20b8821d20ba5cb2f5a375032f4535dee50287735b733,2024-11-21T08:47:27.827000 CVE-2024-0829,0,1,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
CVE-2024-0830,0,0,f3f28bf82ea176a81ed1bccad42ef59ad4aaefe36de7d06fc80fd37f620a7454,2024-11-21T08:47:27.947000 CVE-2024-0830,0,1,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000 CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000
CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000 CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000
CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000 CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000
@ -244121,7 +244121,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000 CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000 CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000 CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
CVE-2024-0839,0,0,7140f6314accc17b94e194d6f89d0691ad19ff9958d076096c8fdaebd4f845ed,2024-11-21T08:47:29.143000 CVE-2024-0839,0,1,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000 CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000 CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000
CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000 CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000
@ -244171,7 +244171,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb
CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000 CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000
CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000
CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000
CVE-2024-0898,0,0,37fe6f69a0f959f2e8b7339b10784223f09060868383c6ffa044458e6391fea0,2024-11-21T08:47:38.930000 CVE-2024-0898,0,1,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000 CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000
CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000 CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000
CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000 CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000
@ -245016,7 +245016,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb
CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000
CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000 CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000
CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000 CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000
CVE-2024-1083,0,0,79156d1367776f4d20d6384b4d457002d1339967a843ba4dca88dafc27af4287,2024-11-21T08:49:45.600000 CVE-2024-1083,0,1,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000 CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000
CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000 CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000
CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000 CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000
@ -245704,7 +245704,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7
CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000 CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000
CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000
CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000 CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000
CVE-2024-1158,0,0,ad9d5682c34a625ef9ba2b2db44b1ff292a1ce3bf02e19968ef34d4e9784a17b,2024-11-21T08:49:55.723000 CVE-2024-1158,0,1,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000 CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000
@ -246633,6 +246633,7 @@ CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000 CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
CVE-2024-12546,1,1,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000 CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000 CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
@ -247813,19 +247814,19 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000 CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
CVE-2024-13853,0,0,d34bbd5bd3f86a655fce1c22ada75cd2ce7bf4f4617c25eaa377aed2c9f982a0,2025-03-11T06:15:26.177000 CVE-2024-13853,0,1,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000 CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000 CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000 CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000
CVE-2024-13864,0,0,7d429872f41fcdbfec23e809b2625f752ecf05f7b1470e0e2d0cb4dd30d985c9,2025-03-11T06:15:26.407000 CVE-2024-13864,0,1,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000 CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000
CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13873,0,0,6c96e990e2774245ef5b434d5e9fd883c701128558fbe3a5272bb275ffb354b4,2025-02-22T04:15:09.567000 CVE-2024-13873,0,1,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000 CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000 CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000
@ -247838,7 +247839,7 @@ CVE-2024-13893,0,0,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b69588
CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000 CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000
CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000 CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000
CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000 CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000
CVE-2024-13899,0,0,870bc582b4e5e54ec271b834ba532de1ec152c1fd74f806dea51cde0522fe6e3,2025-02-22T04:15:09.720000 CVE-2024-13899,0,1,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000 CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000
CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000 CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000
@ -248323,8 +248324,8 @@ CVE-2024-1885,0,0,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d
CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000 CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000
CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000
CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000 CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000
CVE-2024-1889,0,0,6f1c394355d61fd3dfd86d4099249eb53a2f4907f747ba36a260148264b84ed8,2025-02-27T22:03:40.670000 CVE-2024-1889,0,1,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
CVE-2024-1890,0,0,04472b515f8f4dd3f0362d8c1884d3ae0c78171c034b7a407836288f05db8e0e,2025-02-27T22:03:40.670000 CVE-2024-1890,0,1,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000 CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000 CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000 CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
@ -252695,7 +252696,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d
CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000 CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000
CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000 CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000
CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000 CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000
CVE-2024-2546,0,0,8cb295d8ab81570954347714079e5875b99b5e3e86e85d39f0c1833ed2a0a1cd,2025-01-27T17:05:46.703000 CVE-2024-2546,0,1,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000 CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000 CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000 CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
@ -266323,7 +266324,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216
CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000 CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000 CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000 CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
CVE-2024-43196,0,0,8b2a836cbbe6658eba7cefd495a0d5c3f6f241a2ada1aa215976ab8247b3a542,2025-02-20T04:15:09.630000 CVE-2024-43196,0,1,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000
CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000
@ -267312,7 +267313,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000 CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44192,0,0,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000 CVE-2024-44192,0,1,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000 CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000 CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
@ -270756,19 +270757,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000 CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000 CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000 CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000
CVE-2024-49337,0,0,c94a8992a3019786bdcd4878609c71de57805da8b6a6c804be0db4d3d61ffa65,2025-02-20T12:15:09.293000 CVE-2024-49337,0,1,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000 CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000 CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49344,0,0,9e0687ee0ea9f1fd5f04cb21dbca91cbc677688bf0b1cd9b6ad399260cb28371,2025-02-20T12:15:10.377000 CVE-2024-49344,0,1,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000
CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000 CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000 CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
CVE-2024-49355,0,0,186776d570fdfec970f861699b80810dbdc70bd53f23355d5b199311a5b2f90d,2025-02-20T04:15:10.670000 CVE-2024-49355,0,1,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000 CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000 CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000 CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
@ -271084,11 +271085,11 @@ CVE-2024-49775,0,0,80561302864ea58e0b8a0928ce56db4a412fa4e922f0595e7642f4c103198
CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000 CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
CVE-2024-49779,0,0,ee5133546983a60a3acab2f18a8ecfc963b831a46e120464a0614632bc57ef21,2025-02-20T12:15:10.527000 CVE-2024-49779,0,1,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000 CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000
CVE-2024-49780,0,0,490307f593047424f4c7c23dc48b5795cc2f2aee84d770c500f0b4a8f6bf3499,2025-02-20T12:15:10.657000 CVE-2024-49780,0,1,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
CVE-2024-49781,0,0,bd6cb8ef4203ad5b05c7f45eb9fc358902fba622f544c93da6a5c26c2f399df1,2025-02-20T12:15:10.747000 CVE-2024-49781,0,1,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
CVE-2024-49782,0,0,7ebf6eadab5e8506e34106adeb5616ef7773ec0635152435a2ffcd54d1329cf8,2025-02-20T04:15:10.973000 CVE-2024-49782,0,1,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000 CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
@ -274251,6 +274252,8 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,1,1,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
CVE-2024-54085,1,1,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@ -274619,11 +274622,11 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000 CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 CVE-2024-54469,0,1,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54473,0,0,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000 CVE-2024-54473,0,1,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000 CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
@ -274697,7 +274700,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000 CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 CVE-2024-54560,0,1,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
@ -280573,10 +280576,10 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000 CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0624,0,1,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000 CVE-2025-0624,0,0,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000 CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0629,0,0,684072a6698eff7a3081e9f638cb3dbf320c35eb66cb0b4475230767ce44b0ad,2025-03-11T06:15:26.513000 CVE-2025-0629,0,1,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000 CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000 CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000
CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000 CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000
@ -281786,7 +281789,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000 CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000 CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000
CVE-2025-2136,0,0,6f7b0d27733ecd5995b75026a215f5a404b68c1ef1ebb012b469dc667f933f0e,2025-03-10T21:15:40.730000 CVE-2025-2136,0,1,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
@ -281797,7 +281800,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea
CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000 CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000
CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000 CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000
CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000 CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000
CVE-2025-2137,0,0,574f8116782e68fbf81613d426d526d5951a69f54af0f3511fb6eb1e9bdb0a9c,2025-03-10T21:15:40.857000 CVE-2025-2137,0,1,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000 CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
@ -282184,9 +282187,14 @@ CVE-2025-21840,0,0,79e0fdabfbd29cc80f75cdf397a49e5d1ecc594978efa8294abd14922129d
CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d787,2025-03-07T09:15:17.137000 CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d787,2025-03-07T09:15:17.137000
CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000 CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000
CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000 CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000
CVE-2025-2189,1,1,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000 CVE-2025-2189,0,0,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000
CVE-2025-2190,0,0,839caafb3eeab456c5f4b886150312f72b739a240b7a1e49c7f3e07e0a4dd95e,2025-03-11T07:15:37.950000 CVE-2025-2190,0,1,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
CVE-2025-2191,1,1,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000 CVE-2025-2191,0,0,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000
CVE-2025-2192,1,1,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
CVE-2025-2193,1,1,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
CVE-2025-2194,1,1,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
CVE-2025-2195,1,1,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
CVE-2025-2196,1,1,59e5a21c779c1b597e73c1ddba8e0655dec15010418379179d66140aea5d4385,2025-03-11T14:15:28.123000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
@ -282320,6 +282328,11 @@ CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf
CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000 CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000
CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000 CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000
CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000 CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000
CVE-2025-22366,1,1,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
CVE-2025-22367,1,1,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
CVE-2025-22368,1,1,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
CVE-2025-22369,1,1,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
CVE-2025-22370,1,1,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000 CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000 CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000 CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
@ -284606,6 +284619,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000 CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000 CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
CVE-2025-27363,1,1,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
@ -284742,7 +284756,7 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27893,0,0,dbf8992f02cfd0901930576b77bdc424b78b7f410ce35e6828c7e6c7bc393fb1,2025-03-11T09:15:25.457000 CVE-2025-27893,0,1,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000 CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000
CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000 CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000
CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000 CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000

Can't render this file because it is too large.