Auto-Update: 2025-03-07T17:00:20.214746+00:00

This commit is contained in:
cad-safe-bot 2025-03-07 17:03:49 +00:00
parent 671807418e
commit 5d58920b43
60 changed files with 2628 additions and 271 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-1472",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-08-17T19:15:15.117",
"lastModified": "2024-11-21T05:10:37.640",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-330"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-17463",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-08-13T13:15:17.357",
"lastModified": "2025-02-04T20:15:37.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-5847",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-16T18:15:12.713",
"lastModified": "2025-02-04T20:15:38.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-5849",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-16T18:15:12.790",
"lastModified": "2025-02-04T20:15:39.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8644",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-05T22:15:11.003",
"lastModified": "2025-02-04T21:15:21.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8655",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-07T00:15:09.613",
"lastModified": "2025-02-04T21:15:21.360",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8657",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-06T18:15:13.963",
"lastModified": "2025-02-04T21:15:21.563",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1647",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.727",
"lastModified": "2024-11-21T05:44:48.307",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -260,7 +260,11 @@
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1647",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26855",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.103",
"lastModified": "2025-02-04T20:15:40.873",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26857",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.167",
"lastModified": "2025-02-04T20:15:41.077",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26858",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.227",
"lastModified": "2024-11-21T05:56:54.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27876",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-03-01T22:15:14.350",
"lastModified": "2024-11-21T05:58:40.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27877",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-03-01T22:15:14.460",
"lastModified": "2024-11-21T05:58:40.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27878",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-03-01T22:15:14.537",
"lastModified": "2024-11-21T05:58:40.347",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3129",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-12T15:15:16.453",
"lastModified": "2025-02-04T21:15:21.940",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:57:32.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36713",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-06T22:15:09.683",
"lastModified": "2024-11-21T06:13:57.817",
"lastModified": "2025-03-07T16:15:34.533",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3277",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-06T23:15:10.763",
"lastModified": "2024-11-21T07:19:11.957",
"lastModified": "2025-03-07T16:15:35.637",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -131,6 +151,23 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://bugs.launchpad.net/neutron/+bug/1988026",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129193",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3707",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-06T23:15:10.933",
"lastModified": "2024-11-21T07:20:04.870",
"lastModified": "2025-03-07T16:15:35.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41082",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-03T01:15:08.843",
"lastModified": "2025-02-24T15:45:38.267",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-07T16:15:36.047",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -141,6 +141,14 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41862",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-03T16:15:09.497",
"lastModified": "2024-11-21T07:23:57.490",
"lastModified": "2025-03-07T16:15:36.247",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45449",
"sourceIdentifier": "security@acronis.com",
"published": "2024-07-16T15:15:10.840",
"lastModified": "2024-11-21T07:29:16.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -49,16 +71,92 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15",
"matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*",
"matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-5279",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security-advisory.acronis.com/advisories/SEC-5279",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22424",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-03-06T00:15:10.640",
"lastModified": "2024-11-21T07:44:47.277",
"lastModified": "2025-03-07T16:15:36.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24757",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-01T15:15:11.683",
"lastModified": "2024-11-21T07:48:22.593",
"lastModified": "2025-03-07T16:15:36.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25358",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-02T15:15:10.370",
"lastModified": "2024-11-21T07:49:26.333",
"lastModified": "2025-03-07T16:15:37.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26213",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-03T22:15:09.840",
"lastModified": "2024-11-21T07:50:55.620",
"lastModified": "2025-03-07T16:15:37.243",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33979",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-31T19:15:27.163",
"lastModified": "2024-11-21T08:06:20.273",
"lastModified": "2025-03-07T15:30:57.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -86,9 +86,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpt_academic_project:gpt_academic:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:binary-husky:gpt_academic:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.37",
"matchCriteriaId": "F668B717-FBAD-4982-9C25-C725A580EC34"
"matchCriteriaId": "1D81EE9C-45BE-44E6-97CC-F839A18169DA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3359",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-28T22:15:09.707",
"lastModified": "2024-11-21T08:17:05.823",
"lastModified": "2025-03-07T16:15:37.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10266",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-29T11:15:03.590",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.10.61",
"matchCriteriaId": "41CD3D93-BD25-4369-887C-EC14EA82BD34"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3176303/premium-addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6102c07-2776-4963-8d16-a779c5979275?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12837",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-03-07T08:15:37.313",
"lastModified": "2025-03-07T08:15:37.313",
"lastModified": "2025-03-07T16:15:37.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33489",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:15.753",
"lastModified": "2024-11-21T09:17:00.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,75 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33490",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:16.180",
"lastModified": "2024-11-21T09:17:01.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33491",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:16.640",
"lastModified": "2024-11-21T09:17:01.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33492",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:17.060",
"lastModified": "2024-11-21T09:17:01.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33493",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:17.547",
"lastModified": "2024-11-21T09:17:01.457",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34771",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:29.187",
"lastModified": "2024-11-21T09:19:22.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,60 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34772",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:29.610",
"lastModified": "2024-11-21T09:19:22.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34773",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-05-14T16:17:30.040",
"lastModified": "2024-11-21T09:19:22.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:12.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,60 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
"versionEndExcluding": "224.0",
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37158",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T14:15:10.430",
"lastModified": "2024-11-21T09:23:19.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-691"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0.0",
"matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37159",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T14:15:10.693",
"lastModified": "2024-11-21T09:23:19.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-285"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0.0",
"matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39696",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-05T19:15:10.673",
"lastModified": "2024-11-21T09:28:14.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.0.0",
"matchCriteriaId": "2FB8E6A7-2AFB-4E0F-811C-C64344CDFA91"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50600",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-06T19:15:26.750",
"lastModified": "2025-03-06T19:15:26.750",
"lastModified": "2025-03-07T15:15:13.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, and W1000. Lack of a boundary check in STOP_KEEP_ALIVE_OFFLOAD leads to out-of-bounds access. An attacker can send a malformed message to the target through the Wi-Fi driver."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor y Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930 y W1000. La falta de una comprobaci\u00f3n de los l\u00edmites en STOP_KEEP_ALIVE_OFFLOAD provoca un acceso fuera de los l\u00edmites. Un atacante puede enviar un mensaje mal formado al objetivo a trav\u00e9s del controlador de Wi-Fi."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5685",
"sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"published": "2024-06-14T10:15:10.817",
"lastModified": "2024-11-21T09:48:09.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,48 +69,107 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.6.17",
"versionEndExcluding": "6.4.2",
"matchCriteriaId": "AF218717-840A-48E9-9DDC-BA7EB22F54D7"
}
]
}
]
}
],
"references": [
{
"url": "https://advisory.checkmarx.net/?search=CVE-2024-5685",
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/",
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1",
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/snipe/snipe-it/pull/14745",
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2",
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
"tags": [
"Release Notes"
]
},
{
"url": "https://advisory.checkmarx.net/?search=CVE-2024-5685",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/snipe/snipe-it/pull/14745",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57982",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-27T02:15:11.397",
"lastModified": "2025-02-27T02:15:11.397",
"vulnStatus": "Received",
"lastModified": "2025-03-07T15:07:16.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,92 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm: state: fix out-of-limits read during lookup lookup and resize can run in parallel. El xfrm_state_hash_generation seqlock ensures a retry, but the hash functions can observe a hmask value that is too large for the new hlist array. rehash does: rcu_assign_pointer(net->xfrm.state_bydst, ndst) [..] net->xfrm.state_hmask = nhashmask; While state lookup does: h = xfrm_dst_hash(net, daddr, saddr, tmpl->reqid, encap_family); hlist_for_each_entry_rcu(x, net->xfrm.state_bydst + h, bydst) { This is only safe in case the update to state_bydst is larger than net->xfrm.xfrm_state_hmask (or if the lookup function gets serialized via state spinlock again). Solucione esto al precargar state_hmask y los punteros asociados. El reintento de seqlock xfrm_state_hash_generation asegurar\u00e1 que el puntero y el hmask sean consistentes. Los ayudantes existentes, como xfrm_dst_hash(), ahora no son seguros para el lado de RCU, agregue afirmaciones lockdep para documentar que solo son seguros para el lado de inserci\u00f3n. xfrm_state_lookup_byaddr() usa el bloqueo giratorio en lugar de RCU. AFAICS esto es un descuido de cuando la b\u00fasqueda de estado se convirti\u00f3 a RCU, este bloqueo debe reemplazarse con RCU en un parche futuro."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9",
"versionEndExcluding": "6.12.13",
"matchCriteriaId": "1F3C05B7-5F93-443D-9334-0B93D74DDA67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.2",
"matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a16871c7832ea6435abb6e0b58289ae7dcb7e4fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch",
"Mailing List"
]
},
{
"url": "https://git.kernel.org/stable/c/dd4c2a174994238d55ab54da2545543d36f4e0d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch",
"Mailing List"
]
},
{
"url": "https://git.kernel.org/stable/c/e952837f3ddb0ff726d5b582aa1aad9aa38d024d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch",
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57983",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-27T02:15:11.503",
"lastModified": "2025-02-27T02:15:11.503",
"vulnStatus": "Received",
"lastModified": "2025-03-07T15:07:16.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,77 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: th1520: Se corrige la corrupci\u00f3n de memoria debido a un tama\u00f1o de matriz incorrecto Las funciones th1520_mbox_suspend_noirq y th1520_mbox_resume_noirq tienen como objetivo guardar y restaurar los registros de m\u00e1scara de interrupci\u00f3n en MBOX ICU0. Sin embargo, la matriz utilizada para almacenar estos registros ten\u00eda un tama\u00f1o incorrecto, lo que provocaba una corrupci\u00f3n de memoria al acceder a los cuatro registros. Esta confirmaci\u00f3n corrige el tama\u00f1o de la matriz para acomodar los cuatro registros de m\u00e1scara de interrupci\u00f3n, lo que evita la corrupci\u00f3n de memoria durante las operaciones de suspensi\u00f3n y reanudaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.2",
"matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2cd12c7fba59f30369e8647a2b726c7280903304",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch",
"Mailing List"
]
},
{
"url": "https://git.kernel.org/stable/c/db049866943a38bf46a34fa120d526663339d7a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch",
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9221",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-11T13:15:18.100",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-07T14:55:48.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "0.21.11",
"matchCriteriaId": "04CA08B8-5D2B-49BF-97AF-48A54D2C3A2A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1298",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1524",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3165873/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85a8a7df-b472-4a81-b808-a413c158c1cf?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-9458",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-07T10:15:16.497",
"lastModified": "2025-03-07T10:15:16.497",
"lastModified": "2025-03-07T15:15:14.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Reservit Hotel WordPress plugin before 3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Reservit Hotel de WordPress anterior a la versi\u00f3n 3.0 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/1157d6ae-af8b-4508-97e9-b9e86f612550/",

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-07T15:15:14.833",
"lastModified": "2025-03-07T15:15:14.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Pre-School Enrollment System up to 1.0. Affected is an unknown function of the file /admin/profile.php. The manipulation of the argument fullname/emailid/mobileNumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/SECWG/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298902",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298902",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.514974",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-07T15:15:15.033",
"lastModified": "2025-03-07T15:15:15.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in StarSea99 starsea-mall 1.0/2.X and classified as critical. Affected by this vulnerability is the function updateUserInfo of the file /personal/updateInfo of the component com.siro.mall.controller.mall.UserController. The manipulation of the argument userId leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.298903",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298903",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.514977",
"source": "cna@vuldb.com"
},
{
"url": "https://wiki.shikangsi.com/post/share/baecf028-1116-4600-ae9c-f655cc93c29b",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-07T15:15:15.220",
"lastModified": "2025-03-07T15:15:15.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php of the component Sub Admin Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/SECWG/cve/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298904",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298904",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.515017",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25617",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T16:15:38.543",
"lastModified": "2025-03-07T16:15:38.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Access Control in Unifiedtransform 2.X leads to Privilege Escalation allowing teachers to create syllabus."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/armaansidana2003/CVE-2025-25617",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-26331",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-07T08:15:43.040",
"lastModified": "2025-03-07T08:15:43.040",
"lastModified": "2025-03-07T16:15:38.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Dell ThinOS 2411 y versiones anteriores contienen una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando ('inyecci\u00f3n de comando'). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +55,10 @@
{
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107",
"source": "security_alert@emc.com"
},
{
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-27152",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-07T16:15:38.773",
"lastModified": "2025-03-07T16:15:38.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if \u2060baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/axios/axios/issues/6463",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-27518",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-07T16:15:39.187",
"lastModified": "2025-03-07T16:15:39.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. An insecure CORS configuration in the Cognita backend server allows arbitrary websites to send cross site requests to the application. This vulnerability is fixed in commit 75079c3d3cf376381489b9a82ee46c69024e1a15."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/truefoundry/cognita/commit/75079c3d3cf376381489b9a82ee46c69024e1a15",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/truefoundry/cognita/pull/424",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-27519",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-07T16:15:39.623",
"lastModified": "2025-03-07T16:15:39.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/truefoundry/cognita/commit/a78bd065e05a1b30a53a3386cc02e08c317d2243",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/truefoundry/cognita/pull/393",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-27597",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-07T16:15:39.893",
"lastModified": "2025-03-07T16:15:39.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [
{
"url": "https://github.com/intlify/vue-i18n/commit/4bb6eacda7fc2cde5687549afa0efb27ca40862a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27603",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-07T16:15:40.037",
"lastModified": "2025-03-07T16:15:40.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-95"
}
]
}
],
"references": [
{
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/commit/36cef2271bd429773698ca3a21e47b6d51d6377d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-27795",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T06:15:33.273",
"lastModified": "2025-03-07T06:15:33.273",
"lastModified": "2025-03-07T16:15:40.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits."
"value": "ReadJXLImage in JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits."
}
],
"metrics": {
@ -51,6 +51,22 @@
{
"url": "http://www.graphicsmagick.org/NEWS.html",
"source": "cve@mitre.org"
},
{
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/libjxl/libjxl/issues/3792#issuecomment-2330978387",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/libjxl/libjxl/issues/3793#issuecomment-2334843280",
"source": "cve@mitre.org"
},
{
"url": "https://issues.oss-fuzz.com/issues/42536330#comment6",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-27796",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T06:15:35.620",
"lastModified": "2025-03-07T06:15:35.620",
"lastModified": "2025-03-07T16:15:40.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation."
"value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation, resulting in out-of-bounds access to heap memory in ReadBlob."
}
],
"metrics": {
@ -52,6 +52,10 @@
"url": "http://www.graphicsmagick.org/NEWS.html",
"source": "cve@mitre.org"
},
{
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/graphicsmagick/bugs/750/",
"source": "cve@mitre.org"

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-07T15:00:19.533557+00:00
2025-03-07T17:00:20.214746+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-07T14:49:58.017000+00:00
2025-03-07T16:15:40.287000+00:00
```
### Last Data Feed Release
@ -33,46 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284475
284484
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `9`
- [CVE-2025-2086](CVE-2025/CVE-2025-20xx/CVE-2025-2086.json) (`2025-03-07T14:15:37.850`)
- [CVE-2025-2087](CVE-2025/CVE-2025-20xx/CVE-2025-2087.json) (`2025-03-07T14:15:38.030`)
- [CVE-2025-2088](CVE-2025/CVE-2025-20xx/CVE-2025-2088.json) (`2025-03-07T15:15:14.833`)
- [CVE-2025-2089](CVE-2025/CVE-2025-20xx/CVE-2025-2089.json) (`2025-03-07T15:15:15.033`)
- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-03-07T15:15:15.220`)
- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T16:15:38.543`)
- [CVE-2025-27152](CVE-2025/CVE-2025-271xx/CVE-2025-27152.json) (`2025-03-07T16:15:38.773`)
- [CVE-2025-27518](CVE-2025/CVE-2025-275xx/CVE-2025-27518.json) (`2025-03-07T16:15:39.187`)
- [CVE-2025-27519](CVE-2025/CVE-2025-275xx/CVE-2025-27519.json) (`2025-03-07T16:15:39.623`)
- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T16:15:39.893`)
- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T16:15:40.037`)
### CVEs modified in the last Commit
Recently modified CVEs: `40`
Recently modified CVEs: `49`
- [CVE-2019-20171](CVE-2019/CVE-2019-201xx/CVE-2019-20171.json) (`2025-03-07T14:24:42.067`)
- [CVE-2019-20208](CVE-2019/CVE-2019-202xx/CVE-2019-20208.json) (`2025-03-07T14:24:42.067`)
- [CVE-2019-7238](CVE-2019/CVE-2019-72xx/CVE-2019-7238.json) (`2025-03-07T14:22:47.347`)
- [CVE-2021-29621](CVE-2021/CVE-2021-296xx/CVE-2021-29621.json) (`2025-03-07T14:37:51.330`)
- [CVE-2021-32805](CVE-2021/CVE-2021-328xx/CVE-2021-32805.json) (`2025-03-07T14:37:51.330`)
- [CVE-2021-41265](CVE-2021/CVE-2021-412xx/CVE-2021-41265.json) (`2025-03-07T14:37:51.330`)
- [CVE-2022-21659](CVE-2022/CVE-2022-216xx/CVE-2022-21659.json) (`2025-03-07T14:37:51.330`)
- [CVE-2022-24776](CVE-2022/CVE-2022-247xx/CVE-2022-24776.json) (`2025-03-07T14:37:51.330`)
- [CVE-2022-31177](CVE-2022/CVE-2022-311xx/CVE-2022-31177.json) (`2025-03-07T14:37:51.330`)
- [CVE-2023-0784](CVE-2023/CVE-2023-07xx/CVE-2023-0784.json) (`2025-03-07T14:49:58.017`)
- [CVE-2023-0785](CVE-2023/CVE-2023-07xx/CVE-2023-0785.json) (`2025-03-07T14:49:58.017`)
- [CVE-2023-1962](CVE-2023/CVE-2023-19xx/CVE-2023-1962.json) (`2025-03-07T14:49:58.017`)
- [CVE-2023-29005](CVE-2023/CVE-2023-290xx/CVE-2023-29005.json) (`2025-03-07T14:37:51.330`)
- [CVE-2023-47714](CVE-2023/CVE-2023-477xx/CVE-2023-47714.json) (`2025-03-07T12:36:39.820`)
- [CVE-2023-50307](CVE-2023/CVE-2023-503xx/CVE-2023-50307.json) (`2025-03-07T12:36:39.820`)
- [CVE-2024-13668](CVE-2024/CVE-2024-136xx/CVE-2024-13668.json) (`2025-03-07T14:15:36.520`)
- [CVE-2024-5985](CVE-2024/CVE-2024-59xx/CVE-2024-5985.json) (`2025-03-07T14:49:58.017`)
- [CVE-2024-9008](CVE-2024/CVE-2024-90xx/CVE-2024-9008.json) (`2025-03-07T14:49:58.017`)
- [CVE-2025-1869](CVE-2025/CVE-2025-18xx/CVE-2025-1869.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1870](CVE-2025/CVE-2025-18xx/CVE-2025-1870.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1871](CVE-2025/CVE-2025-18xx/CVE-2025-1871.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1872](CVE-2025/CVE-2025-18xx/CVE-2025-1872.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1873](CVE-2025/CVE-2025-18xx/CVE-2025-1873.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1874](CVE-2025/CVE-2025-18xx/CVE-2025-1874.json) (`2025-03-07T14:45:38.780`)
- [CVE-2025-1875](CVE-2025/CVE-2025-18xx/CVE-2025-1875.json) (`2025-03-07T14:45:38.780`)
- [CVE-2023-26213](CVE-2023/CVE-2023-262xx/CVE-2023-26213.json) (`2025-03-07T16:15:37.243`)
- [CVE-2023-3359](CVE-2023/CVE-2023-33xx/CVE-2023-3359.json) (`2025-03-07T16:15:37.470`)
- [CVE-2023-33979](CVE-2023/CVE-2023-339xx/CVE-2023-33979.json) (`2025-03-07T15:30:57.390`)
- [CVE-2024-10266](CVE-2024/CVE-2024-102xx/CVE-2024-10266.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-12837](CVE-2024/CVE-2024-128xx/CVE-2024-12837.json) (`2025-03-07T16:15:37.893`)
- [CVE-2024-33489](CVE-2024/CVE-2024-334xx/CVE-2024-33489.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-33490](CVE-2024/CVE-2024-334xx/CVE-2024-33490.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-33491](CVE-2024/CVE-2024-334xx/CVE-2024-33491.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-33492](CVE-2024/CVE-2024-334xx/CVE-2024-33492.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-33493](CVE-2024/CVE-2024-334xx/CVE-2024-33493.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-34771](CVE-2024/CVE-2024-347xx/CVE-2024-34771.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-34772](CVE-2024/CVE-2024-347xx/CVE-2024-34772.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-34773](CVE-2024/CVE-2024-347xx/CVE-2024-34773.json) (`2025-03-07T14:55:12.087`)
- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-39696](CVE-2024/CVE-2024-396xx/CVE-2024-39696.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-07T15:15:13.750`)
- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-57982](CVE-2024/CVE-2024-579xx/CVE-2024-57982.json) (`2025-03-07T15:07:16.373`)
- [CVE-2024-57983](CVE-2024/CVE-2024-579xx/CVE-2024-57983.json) (`2025-03-07T15:07:16.373`)
- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2025-03-07T14:55:48.130`)
- [CVE-2024-9458](CVE-2024/CVE-2024-94xx/CVE-2024-9458.json) (`2025-03-07T15:15:14.370`)
- [CVE-2025-26331](CVE-2025/CVE-2025-263xx/CVE-2025-26331.json) (`2025-03-07T16:15:38.650`)
- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T16:15:40.187`)
- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T16:15:40.287`)
## Download and Usage

View File

@ -32430,7 +32430,7 @@ CVE-2008-2988,0,0,537d83846b733f191b5bd4cf9a6e680d0442cb19ac8e074de5196fef91675b
CVE-2008-2989,0,0,a564e6d73db62c279491a9c9eed59c9b55085d1c4337edf209af578b122e553a,2024-11-21T00:48:10.743000
CVE-2008-2990,0,0,eba446fdb90523cef752ec8b2816ef2f0a0180e9194e5450344ed618d41db604,2024-11-21T00:48:10.877000
CVE-2008-2991,0,0,c06441c8d15072989775165f31107538fa46ff9c6d70cb1892d9c64fc09aae99,2024-11-21T00:48:11.017000
CVE-2008-2992,0,1,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000
CVE-2008-2992,0,0,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000
CVE-2008-2993,0,0,4ff6dae709cc34854d1f786ba3620c8013380ad46239c929f68c8a8fa52a8ba5,2024-11-21T00:48:11.360000
CVE-2008-2994,0,0,0597746e117c9d7156e751fea86a7abeddefd2ede916fe2b98b5bae313c92409,2024-11-21T00:48:11.503000
CVE-2008-2995,0,0,8add2cd5a741a53ba8e416df70fbb49265d426028ba4fdf56ec03a42ffab5827,2024-11-21T00:48:11.647000
@ -37592,7 +37592,7 @@ CVE-2009-0923,0,0,9d6bc7aa2f532aeca2611a212fd1d01d7fa3b2e1808aa6c8131b0c233a67d8
CVE-2009-0924,0,0,1f976f6c0a294c03107a3b7fceebb6a46d75e27be1795d464608e48d6f4508d4,2024-11-21T01:01:14.270000
CVE-2009-0925,0,0,feec22dc0d278fb3ecad4119f3bcb4e6cc9aa8eb71fe8e012c6b352e24e4f2c1,2024-11-21T01:01:14.407000
CVE-2009-0926,0,0,912a33629cf2cefe3556a8ceedabd16b35be5a0efeac5595123bbfd790dd486c,2024-11-21T01:01:14.550000
CVE-2009-0927,0,1,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000
CVE-2009-0927,0,0,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000
CVE-2009-0928,0,0,c0fecc6255e02786116ce96b8321383c3b1ea994544a390fa423376b66ec4763,2024-11-21T01:01:14.860000
CVE-2009-0929,0,0,ae1f2ef9734ca0f38acbfbdcf2a24d40ade42afc84b7184d502d35b14ab58447,2024-11-21T01:01:15.020000
CVE-2009-0930,0,0,eff3d813782bb023f22ae8edfc659d7632990fa0410bacaa1567fb706b95087f,2024-11-21T01:01:15.157000
@ -86924,7 +86924,7 @@ CVE-2016-3638,0,0,7d10d08a9c330e8186c8b1df8131ce4ada33f48ecfa9a498b77a809b275d50
CVE-2016-3639,0,0,421db73e8a71b5ada97776de5bc41fde15eb5c7dd19ee95fa07e640c7c6c7281,2024-11-21T02:50:26.267000
CVE-2016-3640,0,0,cb1598d890a5236b6bcfc0dbf4eb736e3623e2422c26299b356149123bffa0a0,2024-11-21T02:50:26.407000
CVE-2016-3642,0,0,163b466ec35987c6c4ff6c7c3a6b6420d30f51d42875bea496195e99af2ad6a1,2024-11-21T02:50:26.543000
CVE-2016-3643,0,1,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000
CVE-2016-3643,0,0,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000
CVE-2016-3644,0,0,2f773b2080e944e29a7225da4cf2b1e15544f83aaacfce580e0be10986def148,2024-11-21T02:50:26.800000
CVE-2016-3645,0,0,e6ec797e2c73b3d4d9d38cafe825c448b9919243611ff39d36902ebe02db13f1,2024-11-21T02:50:26.927000
CVE-2016-3646,0,0,218a224d61f25a41e628ededad2ee6951c5f8d9d725370ab342b10c8c7355e56,2024-11-21T02:50:27.047000
@ -87239,7 +87239,7 @@ CVE-2016-3972,0,0,142b5864b63bfc280b9196f5dc10503afea2cd42fdc57440f77dfb1cc02f80
CVE-2016-3973,0,0,64b61a4e20dfcc6c3ca1ba6b7b37a7cf1299a0185d89781ada0686a1dc724993,2024-11-21T02:51:03.727000
CVE-2016-3974,0,0,c34eaf17f1393560453bbf29c4145a745a6efb4dd9cd76f0f2476130f2bf1c7f,2024-11-21T02:51:03.880000
CVE-2016-3975,0,0,83aa673a7d7d02e9b9867fcdc1d69825fd51722f6c6ca0d8082474b374cc969a,2024-11-21T02:51:04.037000
CVE-2016-3976,0,1,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000
CVE-2016-3976,0,0,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000
CVE-2016-3977,0,0,30f3cd031e35dcbff31cbff191ebde45d75518c8acbc78d2827f448275345ded,2024-11-21T02:51:04.350000
CVE-2016-3978,0,0,12d9a451bb9f3a35f8fee4c8b8f336e7e3c81c968d06ffa2e28fc8caa37e3896,2024-11-21T02:51:04.520000
CVE-2016-3979,0,0,76d258813b652f5ee36eb61ddb3e21ddd4346c3001992c892299908e0589135b,2024-11-21T02:51:04.670000
@ -94900,9 +94900,9 @@ CVE-2017-10926,0,0,f62c5a7bdd10387979ec23b93f0720e14bc87e33ea4363d285692a17ebe09
CVE-2017-10928,0,0,54d44869550359987fb5845e6b9096f8e4145f6a6d3ec2636a22741caa760108,2024-11-21T03:06:46.333000
CVE-2017-10929,0,0,47adc303ddf736b0af14aff87fd4fdd70a41c76803e80b583b5f66671524b015,2024-11-21T03:06:46.487000
CVE-2017-1093,0,0,9a328a371d3aa43cf6e4a54b97d016716cb76fc946e11851d2774b8cd54d53f3,2024-11-21T03:21:19.047000
CVE-2017-10930,0,1,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000
CVE-2017-10931,0,1,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000
CVE-2017-10932,0,1,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000
CVE-2017-10930,0,0,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000
CVE-2017-10931,0,0,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000
CVE-2017-10932,0,0,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000
CVE-2017-10933,0,0,cf1481e7f399080dd76d32fedb30445c891211da6cb262d719bc996d1f2f5268,2024-11-21T03:06:47.010000
CVE-2017-10934,0,0,c87b419ee217d74264bc741931ad0293dfc1764a3f33086a94424f52d0d4d046,2024-11-21T03:06:47.140000
CVE-2017-10935,0,0,64594bbf331ebd26bfc841593635b6bbab0781bac59e517b90f5378544be5704,2024-11-21T03:06:47.253000
@ -106956,7 +106956,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b
CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000
CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000
CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000
CVE-2017-6862,0,1,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000
CVE-2017-6862,0,0,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000
CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000
CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000
CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000
@ -116241,7 +116241,7 @@ CVE-2018-15807,0,0,4860614cde85e0da34784a34d1164133dcee109fa857a1d60d0bf8ae79b49
CVE-2018-15808,0,0,455d016e838e06912ba454dbc791b32313c6dce517a5a90a513152cae9a1cf43,2024-11-21T03:51:29.257000
CVE-2018-15809,0,0,d16fc4ec045ff884ac854a3295369387cc90fcfaf38ac1f078e3532c4f171b3c,2024-11-21T03:51:29.397000
CVE-2018-15810,0,0,c6fa6edee7f866d094f9f9f4cd68ea2fddd6850ba36412320a4439f6e9695a5a,2024-11-21T03:51:29.550000
CVE-2018-15811,0,1,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000
CVE-2018-15811,0,0,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000
CVE-2018-15812,0,0,aa48b9c7a99f71771f1ad1123f7f4d0f9d04fd2533dc0d140bdf0a1b07ecab3e,2024-11-21T03:51:29.867000
CVE-2018-15813,0,0,eeee8e2865764565421fb3cb76851a575dd32b95666b6744fb9f429381d54523,2024-11-21T03:51:30.023000
CVE-2018-15814,0,0,1a1c1d94303941d4f6e8b2bbf713356b09dc58da2f988827b40d4a22ad567104,2024-11-21T03:51:30.190000
@ -118335,7 +118335,7 @@ CVE-2018-18320,0,0,97ef2131e3cf9d5d09d7522df5c0f116618a7d18e5a1434a7b0739869774c
CVE-2018-18322,0,0,3ac5b0f2536f99c6b307b260d1a55cde391a8faf9e3fc736535c9ab4e3b5d2a0,2024-11-21T03:55:42.483000
CVE-2018-18323,0,0,4d898a4c393c16593efb56b95759cb197bbf4dcd3f95abb7dbd9c7c9428c7760,2024-11-21T03:55:42.640000
CVE-2018-18324,0,0,9c0c3ee8983950689ca89d0570c1a9e31ca8718e87fd93485d7bd8b7254f31bb,2024-11-21T03:55:42.797000
CVE-2018-18325,0,1,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000
CVE-2018-18325,0,0,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000
CVE-2018-18326,0,0,db8f6cdd70338e3bbc4bc3623d3cc122d1e6769392767c9b840dc685704c6110,2024-11-21T03:55:43.100000
CVE-2018-18327,0,0,4566d95fb908418b3cf19ef5d0605251696471933c9dca1d2ce4ff8ff122a4a8,2024-11-21T03:55:43.250000
CVE-2018-18328,0,0,e4a1f93fd883ec209b4d0fa5026795c497287e16fe37865c3e21fd92f95f9bb2,2024-11-21T03:55:43.377000
@ -119835,7 +119835,7 @@ CVE-2018-20059,0,0,a51c9dc7c637cc654ff1697815121d270bdcff703f0c68f60fdcdc128d1e4
CVE-2018-2006,0,0,47aaf5fb46e012c3cfb603348c2121f9a9a743a62e7e9289ff736907f0b910fd,2024-11-21T04:03:34.943000
CVE-2018-20060,0,0,e1385d2fac30923e70f75b5e2c91f03777167fa23ae8a6a4823f87a95d33d42f,2024-12-27T16:15:22.593000
CVE-2018-20061,0,0,1f3af18deb366266af78da0ceefcafeb4c84a14e1efa3997c111e9f0e822cf58,2024-11-21T04:00:49.627000
CVE-2018-20062,0,1,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000
CVE-2018-20062,0,0,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000
CVE-2018-20063,0,0,34f0aa6d0bd4f9600ecd5e922724926b6fd20feacc9a5c41e95ea24a58e17160,2024-11-21T04:00:49.940000
CVE-2018-20064,0,0,db5b51f009f055b35c9ae4c72e7ff854b051d67ecaaf7e317679acbf9d48d3ab,2024-11-21T04:00:50.090000
CVE-2018-20065,0,0,b70f15819a2df13416f828d9056d4d769ce048ef842f7ebe753c4b20dcf1d0e4,2024-11-21T04:00:50.243000
@ -133934,7 +133934,7 @@ CVE-2019-15945,0,0,33a06b26e906fd5c70eb9d1ee5090af1ff5406b915cd924d396d7acb4ce33
CVE-2019-15946,0,0,5a7d83f8665502ce0831bf67797c94c5d4090dfd33f97087c0e89dbbe6c4f94c,2024-11-21T04:29:47.763000
CVE-2019-15947,0,0,0af8d327d16a5d79613ddc9e3ec9b1ba1968fa0a3ef1f7159b0ba45fea374f3c,2024-11-21T04:29:47.923000
CVE-2019-15948,0,0,f584935d7812d2d0b85a5698b7c7daec96f60298baa5fc482aedf43e9eabcd8f,2024-11-21T04:29:48.073000
CVE-2019-15949,0,1,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000
CVE-2019-15949,0,0,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000
CVE-2019-1595,0,0,88ccd21b327ff58a8ee4b0ed2c599bb7ffd0b9cdf189f7abdcf010b611bbf4aa,2024-11-21T04:36:53.020000
CVE-2019-15950,0,0,2517d3ef69503853d6312e43202c28f44abfec972870fb968db5c09e40e667af,2024-11-21T04:29:48.370000
CVE-2019-15952,0,0,28b03c0ce9770ebcb4825ab2fb26e2b2fe76a5b9be6086826eae6fbae26fc9c4,2024-11-21T04:29:48.513000
@ -134736,7 +134736,7 @@ CVE-2019-16924,0,0,9fcdfb6b12ecc8988c872cff850f9a12b1670164d1bb55acd50399f671caa
CVE-2019-16925,0,0,09e9fe08610d8c3a46ab83d8b1ba82a92ebd59df6db7a4d9bb12062c4d1e8512,2024-11-21T04:31:21.370000
CVE-2019-16926,0,0,2fd405866642062f213851dd941fd9525e358af4d2584ef5723f7ad01eeb5570,2024-11-21T04:31:21.510000
CVE-2019-16927,0,0,2fb3d9c2c8b5c2842e6547a10802b9b10a58031279b3deedbb8a89126f5833d4,2024-11-21T04:31:21.647000
CVE-2019-16928,0,1,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000
CVE-2019-16928,0,0,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000
CVE-2019-16929,0,0,c8559756654e9a62a5c6980e74381ab3fad1e9d0bea48008bca5276d026b6dd3,2024-11-21T04:31:21.970000
CVE-2019-1693,0,0,2e2222b2223836b512c461945a8a924406481fff3bb11ce5f908ab466355f121,2024-11-21T04:37:06.883000
CVE-2019-16930,0,0,2c3d17f3b220f1a83aac157676c5ab4c85646fd8c0e9135c161bdbe1973570bc,2024-11-21T04:31:22.113000
@ -135308,7 +135308,7 @@ CVE-2019-17554,0,0,fd1679d149b915ba1ebb4cd91b6406a705f82d7aacae8b24302b1d840b775
CVE-2019-17555,0,0,c79a46cc3235cb0805cf1dabe799ea3cef4664bd98a5a061bde8b9bd0bce7e2c,2024-11-21T04:32:31.097000
CVE-2019-17556,0,0,dfc45f73027f031fefc79a0156d2ab7571b3f741c49b1431a9c4c9cb608446b5,2024-11-21T04:32:31.200000
CVE-2019-17557,0,0,2765353326187bfb3caf488301fe76eb67bac10840648f333a8f5f229ab08e5e,2024-11-21T04:32:31.327000
CVE-2019-17558,0,1,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000
CVE-2019-17558,0,0,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000
CVE-2019-17559,0,0,ece668b06a6f358fb8eb3ee85628d2086d7c6e147d352d7cd06ac3d8ce38ab60,2024-11-21T04:32:31.673000
CVE-2019-1756,0,0,29e8e4aa3a8fae54efbea0ea2d8a6835f4a0fbeffc6925b6b0d4310f284e5e1c,2024-11-21T04:37:17.833000
CVE-2019-17560,0,0,9cb09af49e361a69d0d03fa2b24de3af3540cbdfdf14fe00a8f4e341c5514a63,2024-11-21T04:32:31.797000
@ -136298,7 +136298,7 @@ CVE-2019-19045,0,0,819333f2d4f317f3258589f967c788bd309aa8ecf95c668675e18c04363c1
CVE-2019-19046,0,0,8987a45d05deb3cd3a08c21378a7d20a9ee8bc3609cccafcbb5e35b01d4f4898,2024-11-21T04:34:03.773000
CVE-2019-19047,0,0,cb343d11b8c4e8202adea20892f3da33685debcea842b5b8a2288e6ea68f15eb,2024-11-21T04:34:03.933000
CVE-2019-19048,0,0,3da2b293cdb641ef1900d5f9142e3956b032b28fd106db70735bd795ec71dc93,2024-11-21T04:34:04.083000
CVE-2019-19049,0,1,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000
CVE-2019-19049,0,0,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000
CVE-2019-1905,0,0,0b0eb4362f19b07aea9340092a53aa6ec78876ad887d29a07805e338537aaff2,2024-11-21T04:37:39.443000
CVE-2019-19050,0,0,2a878b8a0e2c61d567fbdd2b56dfd6f9f43844593e9b39ce9662625233ee1896,2024-11-21T04:34:04.403000
CVE-2019-19051,0,0,125269ec287e7bfa24a3821003123e06e7e3f35db5c63efafd5dfbf9140883a0,2024-11-21T04:34:04.570000
@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e
CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000
CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000
CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000
CVE-2019-20171,0,1,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000
CVE-2019-20171,0,0,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000
CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000
CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000
CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000
@ -137276,7 +137276,7 @@ CVE-2019-20202,0,0,225754f16f47c90380fccf8827c98465d47385fda3f6f7310dc138e5e178f
CVE-2019-20203,0,0,81f8f500e4dacfa1a464fa6cc2647a4e94891e1a1f31c0e2ff413ca325b05e95,2024-11-21T04:38:12.003000
CVE-2019-20204,0,0,71d4f11dc2031a94c71229ceea553dfef2723fe46a773ffae589b572ce57ceac,2024-11-21T04:38:12.147000
CVE-2019-20205,0,0,6f4bfd166b4284407214c4899f6e88fd50def278a49e724981580660eb622539,2024-11-21T04:38:12.300000
CVE-2019-20208,0,1,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000
CVE-2019-20208,0,0,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000
CVE-2019-20209,0,0,efd75c14a5c6e81194b3619da1ff2a9fc5b7f814652709cfbf81fc3f656b480c,2024-11-21T04:38:12.580000
CVE-2019-2021,0,0,fbcb1d3495d7618f920e224680b2702bc2f65966152303d5c8b5fa92f30e9868,2024-11-21T04:40:04.950000
CVE-2019-20210,0,0,2fc1ff5a0a75d3bd86e6c6aba2c77494fb2307544c863374c5a2e43cb40c28f9,2024-11-21T04:38:12.737000
@ -142018,7 +142018,7 @@ CVE-2019-7234,0,0,24df5dc286b4bcb50e15ebc5107b005238769e52042d27e8cecc9fb8011b7f
CVE-2019-7235,0,0,3a597d90344429af136670129afd8f8f1b968f443cfa523946d5fe5ae8ddcbd8,2024-11-21T04:47:48.950000
CVE-2019-7236,0,0,5fd5f2f0f96fd762fb8ebe091c4921b6cad12fc4a52b5fe15d7027ba4b34ba14,2024-11-21T04:47:49.107000
CVE-2019-7237,0,0,eb999e15c8f803705dbadbe525adac0fbf06d738ec0736da398e2c9442c45ef0,2024-11-21T04:47:49.253000
CVE-2019-7238,0,1,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000
CVE-2019-7238,0,0,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000
CVE-2019-7240,0,0,3164e6a97d0852ad445683d25bedc5673bf299019e74959848d8e4da9e568270,2024-11-21T04:47:49.550000
CVE-2019-7244,0,0,7ed3c3ac5e977098dcf1373742e698928c974f4d4a8492120a670f26b92c5dad,2024-11-21T04:47:49.697000
CVE-2019-7245,0,0,c2749efec42c5dc73a9db6e9ad9027c8d51c3b2a86f4a38a20533c1a180f9607,2024-11-21T04:47:49.867000
@ -149687,7 +149687,7 @@ CVE-2020-14716,0,0,70d66e7d8e80fb4d43f94bf54c1dc7b730315a1924c7d9ae759bc161cfff9
CVE-2020-14717,0,0,1b1936ab258b5ca2f69f41c8a28f5de330c564737f80d45b1d2ba8c5299ad536,2024-11-21T05:03:58.007000
CVE-2020-14718,0,0,47b3847c8e0ad7e1cf65e84d8ff206d05b95ba08016fc9fc25c80fe989838ad3,2024-11-21T05:03:58.150000
CVE-2020-14719,0,0,2519153b65f7a2eaa8802944bcab1a17ff477cbea89f414b1ba913633e831e3e,2024-11-21T05:03:58.290000
CVE-2020-1472,0,0,a760ecffa82ea6edd5efff66434eb8b7abaca72e312f423e2c637019f8b1099e,2024-11-21T05:10:37.640000
CVE-2020-1472,0,1,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000
CVE-2020-14720,0,0,a6a4dd928dc73ee3a2223498ff7ec3a434a9d87196fb0bba33306609b9652f67,2024-11-21T05:03:58.443000
CVE-2020-14721,0,0,677e040400c6b37d2d28fe5fe9e0570e19e78317804c8f50ac90977a0fba7930,2024-11-21T05:03:58.587000
CVE-2020-14722,0,0,bfc5f9939bc9c5fbdfa5f30f7afbd4ba716c6cfa243c24942ad536f2e510aab2,2024-11-21T05:03:58.743000
@ -151898,7 +151898,7 @@ CVE-2020-17457,0,0,304666ebed82001d08af7fb6abc759208104ca1d7c7e0e0b188d0cfb6c453
CVE-2020-17458,0,0,25cd994ed4882520597cb423f48aadd4e5bb2fac882054daf1ab25aeb596c24b,2024-11-21T05:08:09.513000
CVE-2020-1746,0,0,5ade46611c222a1c9d0844bd94b21ff8c5e86579026017bbfd7a5cd2ec833167,2024-11-21T05:11:17.757000
CVE-2020-17462,0,0,dec14e35b954be98e4f456b3da60cf7ea2601d7108dbc0df7cf9c9630fd61564,2024-11-21T05:08:09.663000
CVE-2020-17463,0,0,d2624e49add7398a1ebda0a27e4a31db9f8c1fa4637cad96a4477ded8f065489,2025-02-04T20:15:37.210000
CVE-2020-17463,0,1,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000
CVE-2020-17464,0,0,e860379cc0b2b1fe9b1929183acf4fefa76c4c56161d2bb20eef1936bf91b085,2023-11-07T03:19:11.557000
CVE-2020-17465,0,0,6fa34c2a07df8f06e1ed6962dc93c0567cc563e0eaa10999b4977a3c63529215,2024-11-21T05:08:09.990000
CVE-2020-17466,0,0,d223484e1c0a2bec6302370e40313a4d5cb6ebf8c1a04b6cfa404cbad72f30df,2024-11-21T05:08:10.137000
@ -161321,8 +161321,8 @@ CVE-2020-5842,0,0,dcb0f27f4317979c203b2c51bfab7cda27207ed5b71ee1c718a48e678a9f1e
CVE-2020-5843,0,0,8378e8ca1d755c52b556a28b9a03d7cb9bb7f46e105c7df46b82ac95ec1f9c73,2024-11-21T05:34:41.133000
CVE-2020-5844,0,0,b894bec74321616318be63acacbc6a64ba72f10a231dbf6aa0116c83f7aecd7d,2024-11-21T05:34:41.263000
CVE-2020-5846,0,0,d2f3ffda68de3ecb9a5597e60cdc311709fce66834c02bfdd0ee4735d05b664e,2024-11-21T05:34:41.400000
CVE-2020-5847,0,0,148ae289735b8653fae2fda53e3b573000c0c22251ad4d8a160c28a10fa44e8c,2025-02-04T20:15:38.803000
CVE-2020-5849,0,0,c96e336b8e81cc4b23b0122c703ba811e64671db678cb8f602f4b706461b160b,2025-02-04T20:15:39.013000
CVE-2020-5847,0,1,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000
CVE-2020-5849,0,1,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000
CVE-2020-5851,0,0,0e6b8a980d42461bdeef132eb484123c19dc7a4e5f253f6abcd12b6bfeb3765c,2024-11-21T05:34:41.807000
CVE-2020-5852,0,0,a0d14d33aa5d76474940760e02808323b0255fdfa7ef7263fbf5fb39b4b3f9c4,2024-11-21T05:34:41.950000
CVE-2020-5853,0,0,ec5939c37c53e690929c801d26a949d22ea000c2d5657b7eea502e2f09c386d8,2024-11-21T05:34:42.357000
@ -163716,15 +163716,15 @@ CVE-2020-8637,0,0,2217c7386170afe6b12de345c9c160276185b7c89e0dcda019627a55f9fb85
CVE-2020-8638,0,0,32c95e1823a3ea2f35b4d4087afa45e38f0aa3a6d2ec116bb344b25d3aabb7c5,2024-11-21T05:39:10.230000
CVE-2020-8639,0,0,8f89ab272a0ef46c31d75a3858f8022a4d9111848565bd65e9343b97ffd6fd3f,2024-11-21T05:39:10.353000
CVE-2020-8641,0,0,0d1c513fef1a173802745a61846ead8e61fdbfe5801ff740fb1aca89505c7ddb,2024-11-21T05:39:10.483000
CVE-2020-8644,0,0,4a513e833768052e94cdb586f9f4f9a5954cba100bb8afcbe81e0f148f918af4,2025-02-04T21:15:21.113000
CVE-2020-8644,0,1,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000
CVE-2020-8645,0,0,2a03db6fa2b770ea0a59249c2f2585abe34df165b555d7ac782ed537d96c9f97,2024-11-21T05:39:10.747000
CVE-2020-8647,0,0,f068f0e57339478200309cb959bd7fd17a53a6b7117775a657951595e793600e,2024-11-21T05:39:10.877000
CVE-2020-8648,0,0,8fdc221d2ebb6dc8fb93bf4742dc8dfa23ef56dd805cde8998884f9ff56ef701,2024-11-21T05:39:11.030000
CVE-2020-8649,0,0,37c65f7d0c74c220929895992a0c92fb2e2d2fac5e634773795c784a74ea10b0,2024-11-21T05:39:11.190000
CVE-2020-8654,0,0,a3a76c24f693047768fb5b923623c39d10ba6a5e4698aa407fa5faf6a5f662ed,2024-11-21T05:39:11.347000
CVE-2020-8655,0,0,178f17f1d5f32b498840e903fd14586d50751635c32fd7aeaf31b57eff3dfe16,2025-02-04T21:15:21.360000
CVE-2020-8655,0,1,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000
CVE-2020-8656,0,0,4786fc01a1c7dfdec763b31be079dfcb520c2439d320352e6b9d715294d319ca,2024-11-21T05:39:12.467000
CVE-2020-8657,0,0,438d4382b40ba7fec80b3db67b8733969df33003b03a35203155e5500813f546,2025-02-04T21:15:21.563000
CVE-2020-8657,0,1,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000
CVE-2020-8658,0,0,4573f49c55d9f3879273cc4a97630ce9e9cf8aae9a1c623e533e4c3238f46259,2024-11-21T05:39:12.757000
CVE-2020-8659,0,0,0058e06c3c4af6d2c2f20fc9f830318b2a5c5c55545999cea86f50e52d91077f,2024-11-21T05:39:12.880000
CVE-2020-8660,0,0,c8eb75df1246ad70e7d88e25da868f2489d66b14a433ad144d2fcc75766974f8,2024-11-21T05:39:13.013000
@ -166303,7 +166303,7 @@ CVE-2021-1643,0,0,4060b809fead12bb9d67f78be5df56a37d87ee4646fa6e6df86052c1df4b14
CVE-2021-1644,0,0,efef402905230983da5bdfdf12143b0e50435ebe4d4fb21c1fe5c122d402ef18,2024-11-21T05:44:47.930000
CVE-2021-1645,0,0,25258a77695180ba77c99bd2c6823d73e5a5f58b3767fb51d6c767a59a2b7412,2024-11-21T05:44:48.047000
CVE-2021-1646,0,0,dd5db096be9e6e8c998f36cbbb20089c7e8840cca55aeece215ab90e471c3d0d,2024-11-21T05:44:48.180000
CVE-2021-1647,0,0,be2c26c2dccb7ab1f8fba3c2545668363ab71b87ba8040f62766d5b531b2455c,2024-11-21T05:44:48.307000
CVE-2021-1647,0,1,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000
CVE-2021-1648,0,0,442992d9469b43ae43cc0ca7fd4e0fc4dea65be20b3af1ea5c7d4bd9dcb9c3fd,2024-11-21T05:44:48.457000
CVE-2021-1649,0,0,b02803d777e0231640dee4f5831d7188c99fb48f5d6a9a75e7a6945731355893,2024-11-21T05:44:48.590000
CVE-2021-1650,0,0,bf70b4a3c0b73b36f07cd9c7e86a8dc7f79730c1ed3fc35784abee243ce739fe,2024-11-21T05:44:48.727000
@ -172381,9 +172381,9 @@ CVE-2021-26843,0,0,e22c85b76cfecdfffe08cb6d2ad5cbb9f4c9a7db43ad8249c84af125becc2
CVE-2021-26844,0,0,02cc15f895219c53d39be6e1f4c6a51757746b0bf8fffc23217ee117f819801d,2024-11-21T05:56:53.557000
CVE-2021-26845,0,0,d16f5d1bf8b70b13ab07460aba2ea681026589dea89b8756fa7229f826d22ecf,2024-11-21T05:56:53.713000
CVE-2021-26854,0,0,c4bcbb9b671013b7c4c294d860d3419f36080d16f644917d5e58ee1c30b46045,2024-11-21T05:56:53.857000
CVE-2021-26855,0,0,c341a85fdf72b7a3ce00bfaed1a11b84082484487cfc74cf0926e4cf07311b54,2025-02-04T20:15:40.873000
CVE-2021-26857,0,0,0321dd18fa858f61ee590f6b2e93a7397316308d7e541958f0ffeb14216fac42,2025-02-04T20:15:41.077000
CVE-2021-26858,0,0,543dbe64013d93d6e82a9c895da08a2138d91ba911e38fb691df4f54f07c0d2f,2024-11-21T05:56:54.283000
CVE-2021-26855,0,1,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000
CVE-2021-26857,0,1,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000
CVE-2021-26858,0,1,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000
CVE-2021-26859,0,0,5355f8a65fd9a2daa85a7f9efe95e508d18de450153222105a4194499f856cab,2024-11-21T05:56:54.420000
CVE-2021-26860,0,0,cb9bc2194420b618bd81851fe6d2a08a1be6a880c0edf922353c2faf291197c9,2024-11-21T05:56:54.547000
CVE-2021-26861,0,0,6f3d935057cf053b76c7041731ccc09d592a8c11b4860b84ecf1bdff18fea857,2024-11-21T05:56:54.663000
@ -173152,9 +173152,9 @@ CVE-2021-27859,0,0,993f7636ab44f63e13208197998ae7db16b9d062167251918517bbcbfe7e1
CVE-2021-27860,0,0,dfab7aeaff73bc97888f133c03739b011132bd10ea3c893619d85892c04dedfc,2025-02-04T20:15:42.070000
CVE-2021-27861,0,0,2e874793f7920b781935eba26fcbb236ca8c4ecce3e14a7ee776186e960e718b,2024-11-21T05:58:39.770000
CVE-2021-27862,0,0,fc7e14948885397a858c226d74b5728d90a6f062785c550fae571d5169db34ae,2024-11-21T05:58:39.887000
CVE-2021-27876,0,0,6bed32be5997809a85bbab8ccbdc4bd432fa31f82e9d3e5c6eaa48844e22ea8d,2024-11-21T05:58:40.010000
CVE-2021-27877,0,0,6bfed69baa44a1cd79399e8251321838a3c0507783fe330d8e03847b6842defc,2024-11-21T05:58:40.160000
CVE-2021-27878,0,0,4d868fa7f3f6936eea4da2953de01b5fcf3f545e4181d522efa85c6a15e3e539,2024-11-21T05:58:40.347000
CVE-2021-27876,0,1,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000
CVE-2021-27877,0,1,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000
CVE-2021-27878,0,1,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000
CVE-2021-27884,0,0,07ef68bb7a49a5e41de55ecdb94a5317031927a7badddc4c1dcd133b77daf30c,2024-11-21T05:58:41.470000
CVE-2021-27885,0,0,6846b02647cb7751bb45d0264c610c218765b765257a96f038efde08963f4d38,2024-11-21T05:58:41.690000
CVE-2021-27886,0,0,c596fb96a9799b2965bc5d05f26e95b1ee896238a8a7188e7a76c1cda9de11e8,2024-11-21T05:58:41.943000
@ -174262,7 +174262,7 @@ CVE-2021-29617,0,0,9282d36ab379047bed777a5e35deacd1e0575ef6e75507cf39cf4dcae2e7a
CVE-2021-29618,0,0,194d4344d2fcf4ccd0f88ea5b65d6a910a0e9559a4974341f57cd78fd81ae3dc,2024-11-21T06:01:30.350000
CVE-2021-29619,0,0,00a25d6082589853bca127e06f5e411bebce27f4a00260438b8cdd300763e97d,2024-11-21T06:01:30.480000
CVE-2021-29620,0,0,704ad315ab1e6d012dbe4076f98dbc92c3ff90a91f673743cad74e3b7c18942e,2024-11-21T06:01:30.600000
CVE-2021-29621,0,1,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000
CVE-2021-29621,0,0,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000
CVE-2021-29622,0,0,d2899e830da51139c8d424727c70985c06567ad17d63b6f66ede76ef6c7d3699,2024-11-21T06:01:30.877000
CVE-2021-29623,0,0,0759820b8e134268198dc843b4c7c1ea75ddd67d65ae513f9c7f3c31e5ac3f8a,2024-11-21T06:01:31.007000
CVE-2021-29624,0,0,34811731354719bcc6bd50d5f7b3cef38f1a63b507ce803b6e12be5dffce564e,2024-11-21T06:01:31.150000
@ -175649,7 +175649,7 @@ CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b
CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000
CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000
CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000
CVE-2021-3129,0,0,9994df7613e57bf94027d16b1fba3e4148ba3fb5bc8610bf6dbcc5810386cb67,2025-02-04T21:15:21.940000
CVE-2021-3129,0,1,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000
CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000
CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000
CVE-2021-31294,0,0,d4eb37e109e629565a20435c105b1449a6efda6d20165a8248479e9ceb3a9e5b,2024-11-21T06:05:24.390000
@ -176736,7 +176736,7 @@ CVE-2021-32801,0,0,3c6dd25a05868da4a86c030a2817b3d451feae5897a19131855eb266b60fb
CVE-2021-32802,0,0,d236a8457168dbf023cd6d8ad06e6c6c3774018a64b408098c15d389cd53efd1,2024-11-21T06:07:46.450000
CVE-2021-32803,0,0,c3c9ab6affbf0a5ae127dff1b4146143431cf108914bbb69b17c8c4ca6823875,2024-11-21T06:07:46.637000
CVE-2021-32804,0,0,667d9ec0fbb9dc2bc8940f6df11d93ca5972baf8123871a037d7c2d42c269c4d,2024-11-21T06:07:46.800000
CVE-2021-32805,0,1,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000
CVE-2021-32805,0,0,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000
CVE-2021-32806,0,0,f32f9ae0cbeab289fa5cfcf1745216957a12dfe502d7378612e30036a32d4e7b,2024-11-21T06:07:47.067000
CVE-2021-32807,0,0,3a550a99818711747837014ae0e7ae011001a9c4fb372a57b534f58137b4ec4a,2024-11-21T06:07:47.197000
CVE-2021-32808,0,0,fa771f7f84d0048b919dafe1fd07575baf9244e1734ab1de2baa00dfab809c4b,2024-11-21T06:07:47.340000
@ -179564,7 +179564,7 @@ CVE-2021-3671,0,0,2e98707d05a3d5dd6bb82a24011add61bf4093e9d7d7c0ef54e15be3c44712
CVE-2021-36710,0,0,30d3f6219f02843c7db6762f93c7bb35bf6a07d0e6a066f808321a415ace3d4c,2024-11-21T06:13:57.340000
CVE-2021-36711,0,0,ff91331951413364cc0c150d1e96e169d83ffdc9156d5799838288065cb37de3,2024-11-21T06:13:57.510000
CVE-2021-36712,0,0,86f9316723405930d5e8c829281e4fa6d3291043cf5a570cded38ee796a6d85d,2024-11-21T06:13:57.670000
CVE-2021-36713,0,0,eaaf5637f08ddd66d5ca729b7b9926ffd326110fe975632fe207875bd8eae11a,2024-11-21T06:13:57.817000
CVE-2021-36713,0,1,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000
CVE-2021-36716,0,0,5662ce55ac5c83778feb49af51a4a7a09a851153e5c2c010efd65d93cb4fdbba,2024-11-21T06:13:57.973000
CVE-2021-36717,0,0,ec369d3ecfa389c0148878e8348c016478ec723b90d9011f790f892d64463eba,2024-11-21T06:13:58.143000
CVE-2021-36718,0,0,775941130e24c7529766d8f19f5e9007abe25d5d504a9926d5087c9e9f872619,2024-11-21T06:13:58.283000
@ -183272,7 +183272,7 @@ CVE-2021-41261,0,0,83bba306350529d8dabc8c83cbeb7046dc564256ae523575810b60d44e7a9
CVE-2021-41262,0,0,bf80ac48037448e6df08a82bda34068b2ac600309a6a8351eb4a6c54cdcad830,2024-11-21T06:25:54.900000
CVE-2021-41263,0,0,310b0871228f23a9b74738a9d46d0e79d3f808295715b91cd825c950ac2e0457,2024-11-21T06:25:55.033000
CVE-2021-41264,0,0,801d2fa4216ccca6242c40b3a379b65daa94386bf06f22ae3549b97d95d66978,2024-11-21T06:25:55.170000
CVE-2021-41265,0,1,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000
CVE-2021-41265,0,0,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000
CVE-2021-41266,0,0,ee67f3b30157c7c7f9739c64138b97c04e26dedcdad6f83b024214f0b6849071,2024-11-21T06:25:55.447000
CVE-2021-41267,0,0,06bdb3467f4577c7e3c0c73a0be52e604a93f0d1247e5f0d74efb2be3411d0c9,2024-11-21T06:25:55.573000
CVE-2021-41268,0,0,4802f87b6baa03fec9b494114a47b62395b260260f7c05c5038061d133694b7d,2024-11-21T06:25:55.713000
@ -191396,7 +191396,7 @@ CVE-2022-21655,0,0,0bb88de39562d74edb3c5dc14260c1aa5cbe0977dc72fbaaa5c5907520b12
CVE-2022-21656,0,0,ae7f6f10a25d538e61091eca399af275b55323a531d01051babac34f68f2ea48,2024-11-21T06:45:10.103000
CVE-2022-21657,0,0,b61506454d82cdd81703ed3b3ecbcc360c8d9cea3021356f27ad4df0658b70e4,2024-11-21T06:45:10.227000
CVE-2022-21658,0,0,d719323787fe690295be479284556910df4cce28acd3a4271d2df3c828e3c587,2024-11-21T06:45:10.343000
CVE-2022-21659,0,1,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000
CVE-2022-21659,0,0,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000
CVE-2022-2166,0,0,db40856ed54a003d747ba667ab28b0b777e7ebe27eab76bf63b0fa68659a981b,2024-11-21T07:00:27.670000
CVE-2022-21660,0,0,e50b313e5f4482d2e57a75d95baab2766781ef80064185e266441dcc35a29fac,2024-11-21T06:45:10.633000
CVE-2022-21661,0,0,ad357031852de2d6644171e49bb6eaa4f4bbf912a4d0ba884c85ab873ba8fc58,2024-11-21T06:45:10.750000
@ -194263,7 +194263,7 @@ CVE-2022-24772,0,0,6d621b212079b521cfec536bfc00e1cdf6229c234d240f6fcaf7a6d823905
CVE-2022-24773,0,0,f964173bb7f73806f9514ae8330f53cc50353516625bf354de792d9345abe2a3,2024-11-21T06:51:04.093000
CVE-2022-24774,0,0,e8bad2914e190a27904c4a729a974bff227be750d052cd8fa5b5418bfeba9c6d,2024-11-21T06:51:04.210000
CVE-2022-24775,0,0,a89d20f6084336008112954573b5daf0114c550ce2d67d379f72d396931f18a1,2024-11-21T06:51:04.337000
CVE-2022-24776,0,1,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000
CVE-2022-24776,0,0,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000
CVE-2022-24777,0,0,4ae70f6204e3c0de25fbf985bc164399cafcff14ae66595c415bd3f9563c5849,2024-11-21T06:51:04.610000
CVE-2022-24778,0,0,6a5d591d4ff287175baa38de8a91d18e5f05a33ad86097a680b95921569c0552,2024-11-21T06:51:04.737000
CVE-2022-2478,0,0,7af5e30986fb9bf51521310ba62a96e4a2422836c99ef22f37780052983c46cb,2024-11-21T07:01:04.507000
@ -199551,7 +199551,7 @@ CVE-2022-31172,0,0,7cd9bbbf9b368874155a4d61081b8e77b23805251922a97f9af3a9ddf2bec
CVE-2022-31173,0,0,2febc62e1a3a54d82009b58dd26871e86a20ff205513f52ef4ffc35f7bee528d,2024-11-21T07:04:03.200000
CVE-2022-31175,0,0,66bd23a7faf006cd60074400cfa39699bdce3330f83c19b81ff998a44cda9420,2024-11-21T07:04:03.343000
CVE-2022-31176,0,0,cc99b523e99dfb029a0458f6ebd536fbe395e927d120462d7d40e06968e26a7c,2024-11-21T07:04:03.473000
CVE-2022-31177,0,1,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000
CVE-2022-31177,0,0,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000
CVE-2022-31178,0,0,18b14454630e74a88e35da2b6639bc5f9a9a45604736c7bbddbfe831ab8237c1,2024-11-21T07:04:03.733000
CVE-2022-31179,0,0,1ed6f4ace29b1759241c40df1c9bf6b4b22a23f458fc7b8e045d5ff2502bff81,2024-11-21T07:04:03.850000
CVE-2022-3118,0,0,f5cf3681168aa2b9e58ed05115af196bca87b81960ed57d08b4414c34c75f504,2024-11-21T07:18:51.780000
@ -200879,7 +200879,7 @@ CVE-2022-32765,0,0,288c46848ca90bc0970228e4c106898962265fe5ef966fdb621059ec6e48a
CVE-2022-32766,0,0,f8af3e288bc19c30281a1d0ccfabd1595b6500716a3aad9106452d2f8828a86f,2024-11-21T07:06:55.190000
CVE-2022-32768,0,0,c7d4fb2b17fec1c41f721ec7f12f58d3dd128594cc56036f151ab10b94ff5402,2024-11-21T07:06:55.320000
CVE-2022-32769,0,0,2bcd9e4801c613d9c501665e694fc1ccc87f19f08f4bfd7ec0020d43aabddf84,2024-11-21T07:06:55.457000
CVE-2022-3277,0,0,4dcbf73632c2fb0f22f8b004b14c1b10deeeb35491ed4d14f04bf90315640cf9,2024-11-21T07:19:11.957000
CVE-2022-3277,0,1,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000
CVE-2022-32770,0,0,2117cde9ddfe9fc4190507bbd939b0b74257bcc2e26270c25a9c72ab9762f3d1,2024-11-21T07:06:55.587000
CVE-2022-32771,0,0,71c6f498ac24328dd596adccf278375f0d0157867acd5b6c9e0a42d0130dfd43,2024-11-21T07:06:55.717000
CVE-2022-32772,0,0,e3b68231aad472dc58151c5e29625a9adae7c2eb8114c08e61c9139b03dce259,2024-11-21T07:06:55.860000
@ -204363,7 +204363,7 @@ CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40
CVE-2022-37067,0,0,073a63c94609fb61c3c7478f5894b6cef5a4e645ffd2533f7feff90902f4bfe5,2024-11-21T07:14:23.250000
CVE-2022-37068,0,0,bfbc21ac6f627e851e0b40b7ed324b42c9a2dd81234107a167e1ea24c57dec94,2024-11-21T07:14:23.400000
CVE-2022-37069,0,0,dc864251b7b1e5b3758cf4caaf549434af36e31ac4247583a5727ca221971dd0,2024-11-21T07:14:23.567000
CVE-2022-3707,0,0,a9a5ba336fb0115ec23c86b7602de9c20dd6da9e7854961bc6aa1da885a432c8,2024-11-21T07:20:04.870000
CVE-2022-3707,0,1,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000
CVE-2022-37070,0,0,e2c0503dbb97f457cda6fc0db7f472cd6525c918effd3957023eb8ec3528183a,2024-11-21T07:14:23.730000
CVE-2022-37071,0,0,5425191f63dc698190eb62d1acf953318f967db9b131d7887dfce006cb96572c,2024-11-21T07:14:23.867000
CVE-2022-37072,0,0,246171d66413946e2e9259efcef4d1da86ac9de1e57e619f1e332302396b624c,2024-11-21T07:14:24.013000
@ -207254,7 +207254,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
CVE-2022-41082,0,0,942e30fea4d0eecc0abe3c211227f03814e3efec7d8323fcfd99cfc64386418d,2025-02-24T15:45:38.267000
CVE-2022-41082,0,1,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000
CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000
CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000
CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000
@ -207941,7 +207941,7 @@ CVE-2022-41859,0,0,d7fddb015ce8a0ef2f9a3d1b5b02e117163f8e04fd79fce2bb8d303b5ea5f
CVE-2022-4186,0,0,a065f65e44e81acbb6156b41d02f078148d8a8ce8b985b43a5a4cbc8cf2e82b3,2024-11-21T07:34:44.520000
CVE-2022-41860,0,0,3902c9c181b31779a24cf74edb67fc91cfafe626663e3b5347822186d946f0ad,2024-11-21T07:23:57.257000
CVE-2022-41861,0,0,5444bba71b3cc5fb61cb2dfa5e4122b78a7ec8e4b4721212a077748536b0c745,2024-11-21T07:23:57.380000
CVE-2022-41862,0,0,8f3427fbd84b514e55a79ecd45f0f60e5ff35c06e448419eb79f19ddcfabccba,2024-11-21T07:23:57.490000
CVE-2022-41862,0,1,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000
CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000
CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000
CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000
@ -210552,7 +210552,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad
CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000
CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000
CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000
CVE-2022-45449,0,0,e43469c42fc1c14bec5f1182c8f9a484b17b151350cb8f57745968b28fa5cbc2,2024-11-21T07:29:16.553000
CVE-2022-45449,0,1,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000
CVE-2022-4545,0,0,99841b6aae53e9700cdfd19011146a18beac019ddefac29bac4f0b93aa4a600f,2024-11-21T07:35:27.730000
CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000
CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000
@ -214676,8 +214676,8 @@ CVE-2023-0780,0,0,e8e2f0426cdd391a26483e8789d8e86bae4ddde8ba9e52dd1088ac20ab8a01
CVE-2023-0781,0,0,8a8496d4416dfe6d64d43bbc8f0ea270163cd648da6a03d2e8ed80772b9c0df2,2024-11-21T07:37:48.583000
CVE-2023-0782,0,0,4c0a4f642aa7a24d1014890feba5b408c26166a66aaebbacc58ff4d99b333dd8,2024-11-21T07:37:48.710000
CVE-2023-0783,0,0,7e5bbb2038eedc37222715c2a900e05f94d758a225842991071596a750a7532a,2024-11-21T07:37:48.847000
CVE-2023-0784,0,1,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000
CVE-2023-0785,0,1,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000
CVE-2023-0784,0,0,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000
CVE-2023-0785,0,0,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000
CVE-2023-0786,0,0,9f4d2c852d70de6724f12a5989e00d1cabeb5b77f3984843da8a00c626444350,2024-11-21T07:37:49.993000
CVE-2023-0787,0,0,a3af2d4a739da41e2884d7213d2426d7f2c8d7b0d7fc8836c1642926bdcd28e8,2024-11-21T07:37:50.117000
CVE-2023-0788,0,0,43aa586f6fa0a93609ae74ba14816485c32634f75c8eca48cbdcb9e90180815e,2024-11-21T07:37:50.237000
@ -215798,7 +215798,7 @@ CVE-2023-1958,0,0,92b4f50e187cfa91ad93be6d6d801bee29d9b901407aeff8e0e2f748923518
CVE-2023-1959,0,0,b832511920dd34b2ee0f5b4e70369efeae5989e5e23e518c8ce4fb48ae9fce14,2024-11-21T07:40:13.837000
CVE-2023-1960,0,0,9275175137e515b03393dfde9235ce20d55b233e6b1150889fdb7d9c43a816ea,2024-11-21T07:40:13.977000
CVE-2023-1961,0,0,f7b49d3ff2f2449aa867b1ae7d36cb9a2f65278c430922c36a9efc58d3df23f9,2024-11-21T07:40:14.100000
CVE-2023-1962,0,1,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000
CVE-2023-1962,0,0,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000
CVE-2023-1963,0,0,bd9346ac887c2f85ca33ac9a902dc041c51d793a6679b19dc89f9d01d98115f6,2024-11-21T07:40:14.363000
CVE-2023-1964,0,0,fd2361ec5e3f1e6b036a6afb1d0c9643aa4d204c0955876c690a65ac50a9464b,2024-11-21T07:40:14.490000
CVE-2023-1965,0,0,5788896c0bd8259fdbe118d4f434ec1b5b72febc35e1293735cf277a92a20ade,2024-11-21T07:40:14.613000
@ -218008,7 +218008,7 @@ CVE-2023-22419,0,0,c1dd2f72f61814803cdf63bcf8dca22320a762690c8cf4b60f814521f088e
CVE-2023-2242,0,0,4a937452ab57b5296438a1ae14dc38bfed91efb6c5653c71648121b31c6163c1,2024-11-21T07:58:13.417000
CVE-2023-22421,0,0,c679e58c8416e77061e0c043851f1c9eb505ade7b79525a95ca89620b33fbb40,2024-11-21T07:44:47.053000
CVE-2023-22422,0,0,1b35c84e2fb89995518f67e9309c4c9dbec4b7abbbf1d9cf247ec0366eeb4240,2024-11-21T07:44:47.157000
CVE-2023-22424,0,0,58569a9f37da5822a4cfe472f89ab226a874d33a18a9993834627594ce70ea09,2024-11-21T07:44:47.277000
CVE-2023-22424,0,1,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000
CVE-2023-22425,0,0,2d237c6de59422283df9a7c8f88cb08b1ea8054670ffba4dcb711a39f4fb4683,2024-11-21T07:44:47.387000
CVE-2023-22427,0,0,f490e42af5d94874676af58f877fe1ac393f7611b6800a738a6ae9c18e557f30,2024-11-21T07:44:47.500000
CVE-2023-22428,0,0,b3eeca8a1daaffa1f36da6254dfad723add1cced54ccf9190fb4f8dda34204b0,2024-11-21T07:44:47.613000
@ -219837,7 +219837,7 @@ CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f010
CVE-2023-24754,0,0,42885f8db3ea1d2ab38e7fd061eee4daf1de514fe3c8843b43f6d2b02ce3d3d6,2024-11-21T07:48:22.170000
CVE-2023-24755,0,0,c88f7e592135bce8a4a5ea2bfd86138da220b85446e7ae5773d7d7fa6bfa0910,2024-11-21T07:48:22.310000
CVE-2023-24756,0,0,dc204becde6645b45c0da365ffdacca71444ef90cbef402419c82247d10a38d3,2024-11-21T07:48:22.457000
CVE-2023-24757,0,0,927193cc66af039bb894275e2ed8ffc12dd8afb68a614b33cccd191514d8954a,2024-11-21T07:48:22.593000
CVE-2023-24757,0,1,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000
CVE-2023-24758,0,0,441e45920579ec0bfea433f0388c75e94eda4c0aa96df2e80a289332a4894341,2024-11-21T07:48:22.733000
CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a48,2024-11-21T07:58:41.490000
CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000
@ -220337,7 +220337,7 @@ CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94
CVE-2023-25350,0,0,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000
CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000
CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000
CVE-2023-25358,0,0,c293b186724c778961eaee7691e3edb8240ff2943c5c22a7bf4907fb0cf4942c,2024-11-21T07:49:26.333000
CVE-2023-25358,0,1,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000
CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000
CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000
CVE-2023-25361,0,0,d8143811fa2fbed2aa47a7bb1803e2898e8970fe423990f5709306cbdb47446e,2024-11-21T07:49:26.613000
@ -221082,7 +221082,7 @@ CVE-2023-26209,0,0,a892a2695c5017ffca11881763f9e45ffa97f8d9fd3ef81673d2b4d81967e
CVE-2023-2621,0,0,46a71fd277c5850785baccb07629db57c3e33b88c0c891670a7f4746f333c8ea,2024-11-21T07:58:56.940000
CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1002,2024-11-21T07:50:55.397000
CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000
CVE-2023-26213,0,0,918cbfbd489d618354d4dc527419766f5a31b4b4653d8b2671ae25fc3f1414fe,2024-11-21T07:50:55.620000
CVE-2023-26213,0,1,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000
CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000
CVE-2023-26215,0,0,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000
CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000
@ -223416,7 +223416,7 @@ CVE-2023-29001,0,0,2e01e43c951dfdd64db54cc8ed52f50c39b9c76eb2af1a84feb2cc7e9477c
CVE-2023-29002,0,0,f84b0106ce5dfa611795d04e5b91ff679923e08e69b7621ebdc4b6f3de2466ac,2024-11-21T07:56:22.330000
CVE-2023-29003,0,0,3dc97278bcf396ba949725879aafa267b4fd447ad7cf66d92d1a33f01881edb7,2024-11-21T07:56:22.440000
CVE-2023-29004,0,0,39a71876fb5a5115d257c4713449564c4dac4051956179716e0c87bebf78cdf0,2024-11-21T07:56:22.557000
CVE-2023-29005,0,1,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000
CVE-2023-29005,0,0,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000
CVE-2023-29006,0,0,585a9d369737c7a352c58b58b365b45a9d31ebed1f7309dd0ee532fac3a88eb2,2024-11-21T07:56:22.780000
CVE-2023-29007,0,0,0634e7fd207d3299b36698cb4116ba6c4a03b9e3bda5f501964e3a5debfcec85,2024-11-21T07:56:22.897000
CVE-2023-29008,0,0,6dde19320b4cb68b21db819fafbd03f8289902bc4418aa90e213c506e9aa4a0d,2024-11-21T07:56:23.037000
@ -226961,7 +226961,7 @@ CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726
CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000
CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000
CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000
CVE-2023-3359,0,0,6b4ba371c859d2e32ceef7547121e7afee7570752bec99ae04789bf27b0c8d71,2024-11-21T08:17:05.823000
CVE-2023-3359,0,1,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000
CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000
CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000
CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000
@ -227252,7 +227252,7 @@ CVE-2023-33974,0,0,531e41d5b879646dc4c7aa0d04a15823a13b7b33472a4070b6d3df6d25837
CVE-2023-33975,0,0,2fa415f380f19ec93055bc47f99763c1a62ccb69b74cc7e124876cbb580a8af1,2024-11-21T08:06:19.843000
CVE-2023-33976,0,0,89ad541a1971f4e6c687199980a0c351ef4f09e89d264cf9da92848cc8d79bd3,2024-11-21T08:06:19.983000
CVE-2023-33977,0,0,7f9ae9cf63258eb45b3160b45e0b54f8cf115775476935085e3f3f6ae5de4077,2024-11-21T08:06:20.147000
CVE-2023-33979,0,0,099fb6dffcbc022c374218fb16825863b988bbe792a606c32f7a8b68a5254d6e,2024-11-21T08:06:20.273000
CVE-2023-33979,0,1,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000
CVE-2023-3398,0,0,ac532334ebc2ea5d377a047eed3a69a21b57b1a2389b634cb5b7a8c9c83c1db6,2024-11-21T08:17:11.240000
CVE-2023-33980,0,0,b711df1691783ee08c058e35e642804a3b9c96d290c14ba311f8a31f13881963,2025-01-16T16:15:30.280000
CVE-2023-33981,0,0,1b80f20492609165165bcb0710c37d0eb63e70c48a11fc8a6a92dff7de8524f9,2025-01-16T16:15:30.487000
@ -237563,7 +237563,7 @@ CVE-2023-4771,0,0,1012847fc256ae9ff3628aa2a1fb6186f4f8c6f51233026703d280e3101d9a
CVE-2023-47710,0,0,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
CVE-2023-47711,0,0,77a15db2641f647545705c0975f3dcc067ad400a66996c3ed04d43cdacf82a1a,2025-01-14T21:06:23.587000
CVE-2023-47712,0,0,8b46a8284f80a981721e7d29628c18ac4d5882204e99756c9a6971ec6710e9b1,2025-01-14T21:06:54.440000
CVE-2023-47714,0,1,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000
CVE-2023-47714,0,0,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000
CVE-2023-47715,0,0,f4fb27b0d4cb498487b45580c56700f79ca96278065bdf34fcab592745b89aaa,2024-11-21T08:30:43.703000
CVE-2023-47716,0,0,f8aed9cae96f774992c57d65bc6710f8f6684bd42029405056f1fb8b451995c3,2024-11-21T08:30:43.847000
CVE-2023-47717,0,0,d96caec94781e03ee35867e94de91fe6c0b557c8ca5c1e7570fe7751b23a7bf0,2024-12-06T22:15:19.067000
@ -239486,7 +239486,7 @@ CVE-2023-50303,0,0,577942694687bbb9d20d9e62b97c43d31e6741104a6e0355ef83180bf4146
CVE-2023-50304,0,0,8d7cf710ec0b485f385fbbc85e013f83f0695f8067df88dc02b330fdfee0f44f,2024-11-21T08:36:49.433000
CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414d61,2024-11-21T08:36:49.587000
CVE-2023-50306,0,0,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000
CVE-2023-50307,0,1,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000
CVE-2023-50307,0,0,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000
CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000
CVE-2023-50309,0,0,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d6fb,2025-03-04T21:36:47.970000
CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000
@ -244483,7 +244483,7 @@ CVE-2024-10261,0,0,6398f8d67bdd17ab366f9416d4ddf7ff0254d493e1fa2fab241a87e725ac9
CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000
CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000
CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000
CVE-2024-10266,0,0,0e9c586a7b52bf6ef37d72c609708f87e3711d72e33bcee296d0f4f532850c3d,2024-10-29T14:34:04.427000
CVE-2024-10266,0,1,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000
CVE-2024-10268,0,0,d0402bfb3091ce685faa51f2c4c40b45ff8d34a58666307c0eb05cdde79cb95c,2025-01-17T14:57:54.120000
CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf733,2024-11-13T17:59:27.717000
CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000
@ -246854,7 +246854,7 @@ CVE-2024-12833,0,0,677c1333060f073d8c9581aaa17178e60be70e85d81a38adf3dadf4f16429
CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000
CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08
CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000
CVE-2024-12837,0,0,7df4ed7bbe4d67e6c1f92bf1270dfa3b3ef56a4db6a64af99757ce1c6f91d042,2025-03-07T08:15:37.313000
CVE-2024-12837,0,1,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000
CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585ebbdd,2024-12-31T02:15:05.877000
CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
@ -247631,7 +247631,7 @@ CVE-2024-13663,0,0,880b175977ec5581b5d821dbb9009cc924e13e2d7908761bee2204a2ca2d3
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
CVE-2024-13665,0,0,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000
CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000
CVE-2024-13668,0,1,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000
CVE-2024-13668,0,0,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000
CVE-2024-13669,0,0,8903b9e05cf18c6fbdaa9659ddbe3a812ca2295bd3ea5e29169ff59ba112842b,2025-02-26T15:15:23.263000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
@ -258780,12 +258780,12 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d
CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000
CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000
CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000
CVE-2024-33489,0,0,2fd64b47d87f02d515219db09afc61b80c2c20178417c6cb5c2c7a2d57e839f9,2024-11-21T09:17:00.957000
CVE-2024-33489,0,1,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000
CVE-2024-3349,0,0,77627706952ed9b21bd8fe86802e39c3a79b47bff5aa5a4099e6b50f2da27242,2025-02-11T14:43:45.883000
CVE-2024-33490,0,0,5f563e8d0fcf5bb9893e7a6b4ddad19d85792bbefdd87ad3291c208cc1d74439,2024-11-21T09:17:01.093000
CVE-2024-33491,0,0,f15743d3eb5df305a4b45f3d973b5d970af8ae7ee1fcac5043f4f950e58f32d1,2024-11-21T09:17:01.220000
CVE-2024-33492,0,0,a1e0034b75eae4ea6bde8f071b76995b720b973a7fdced8d8ca1379be366e030,2024-11-21T09:17:01.340000
CVE-2024-33493,0,0,ce6a19354e3fb2802f99261979f8a8e7c3468de824b4a201c73017a11b6f67e4,2024-11-21T09:17:01.457000
CVE-2024-33490,0,1,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000
CVE-2024-33491,0,1,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000
CVE-2024-33492,0,1,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000
CVE-2024-33493,0,1,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000
CVE-2024-33494,0,0,59f5d90daeffa43cbbfaba78c93fa678a165d69a45e730b3cc8593deb34df95b,2024-11-21T09:17:01.577000
CVE-2024-33495,0,0,57b81efae96a7f5a9931902412b22bf475f5cadbad96517560fbcc807d2b75f3,2024-11-21T09:17:01.720000
CVE-2024-33496,0,0,3e0339b75603b80172a8dd08f9727b029d985209c64e779cc52c646d8e6027ce,2024-11-21T09:17:01.867000
@ -259861,9 +259861,9 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a
CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000
CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000
CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000
CVE-2024-34771,0,0,8c1c3d9b82c5eaba33f3f71e8ec577fb6085b5be8a8cf547169d3de6d9ceed6f,2024-11-21T09:19:22.167000
CVE-2024-34772,0,0,42418edd3388b62bba8cbdd0a0fcca3217c6812a8eba145942ce31a8d87ea14d,2024-11-21T09:19:22.297000
CVE-2024-34773,0,0,c5b5c21cb0bb74417c7eb47914baa08816f098875208657202f0022fcf33232d,2024-11-21T09:19:22.427000
CVE-2024-34771,0,1,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000
CVE-2024-34772,0,1,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000
CVE-2024-34773,0,1,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000
CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000
CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210544,2024-11-21T09:19:22.627000
CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000
@ -261684,8 +261684,8 @@ CVE-2024-37154,0,0,79775441c2eac00a4330a7a5e5b73461a1a9196f77dbc6e682df7449a12cc
CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d9094aa,2024-11-18T17:11:17.393000
CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000
CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000
CVE-2024-37158,0,0,7967b9c1ebde000c094bdb4985911add75942f3d07b607308ff63def742cbd68,2024-11-21T09:23:19.610000
CVE-2024-37159,0,0,01dc70008a30432b7be4ecd03b55457f1cc54167266fd56547628aa9ed98e6d6,2024-11-21T09:23:19.740000
CVE-2024-37158,0,1,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000
CVE-2024-37159,0,1,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000
CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000
CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000
CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000
@ -263831,7 +263831,7 @@ CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138
CVE-2024-39693,0,0,2a0c67223a67a4cd6565b19d41f2906bca2653f8f96542a5b62429b6479c76d0,2024-11-21T09:28:14.067000
CVE-2024-39694,0,0,b33f1bc6cdf86d31af1545130725483f2391aa4c76f60be75b33572bad66ef8f,2024-08-01T12:42:36.933000
CVE-2024-39695,0,0,4c6a4448c06a4c8d6ff6c2304228798d4d4aaab51edb52346088ef9cd9927593,2024-11-21T09:28:14.270000
CVE-2024-39696,0,0,666eb1f28251dd112bc801e4df6720711bf4e41071fc9f1d21b98fd713510ce3,2024-11-21T09:28:14.413000
CVE-2024-39696,0,1,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000
CVE-2024-39697,0,0,f3a7cdaaf41d6cf05c77fea55d7ff9924821768d6a8fc884c5523aed59207e8a,2024-11-21T09:28:14.540000
CVE-2024-39698,0,0,118caf2e6cd58e2f99a9fe181f4d1112f02ddf5bbdd7ff18cf94ce3936612acc,2024-11-21T09:28:14.690000
CVE-2024-39699,0,0,09c189588d9dd611b59094ba3bc24c1b4e450d4d41ea906404b5a63c4aa31b07,2024-11-21T09:28:14.827000
@ -271848,7 +271848,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c
CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000
CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000
CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000
CVE-2024-50600,0,0,57862be166b5927f92dbf71c7c467534c7341eebf3c63252e3212f6e509437ca,2025-03-06T19:15:26.750000
CVE-2024-50600,0,1,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
@ -275759,7 +275759,7 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3
CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000
CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000
CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000
CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f87,2024-11-21T09:48:09.570000
CVE-2024-5685,0,1,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000
CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
@ -276343,8 +276343,8 @@ CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b6564
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
CVE-2024-57980,0,0,10c77fb6a23488df204986089ebb05944e9c0539ba2e4d3b8fea5d9e62a33d18,2025-02-27T02:15:11.190000
CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000
CVE-2024-57982,0,0,983763b25b3653755c18e45f478486ce505422e8727217a6a78afd1a479cf237,2025-02-27T02:15:11.397000
CVE-2024-57983,0,0,cc8076edbca9e9bc9f261b52c60d6967a1fc1ae72d285983b9b2f4988ca1a8e4,2025-02-27T02:15:11.503000
CVE-2024-57982,0,1,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000
CVE-2024-57983,0,1,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000
CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000
CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000
CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000
@ -276606,7 +276606,7 @@ CVE-2024-5981,0,0,120e9491ac8bdb806523fa724951e345b102ad6f09efad6d29148104d1c7a5
CVE-2024-5982,0,0,a70aacb82fb750efd13a720d435a192d8684b9dce2eabb99aac962fe30d3c0ee,2024-11-14T18:52:16.567000
CVE-2024-5983,0,0,7c4833bfc7781d97f423faf674a27a12c2e287e8e9ab5652388348843317c92b,2024-11-21T09:48:41.653000
CVE-2024-5984,0,0,e9007c02bfe46315499412adec83135fbd824808ac1333f399716005b27c2dfa,2024-11-21T09:48:41.800000
CVE-2024-5985,0,1,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000
CVE-2024-5985,0,0,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000
CVE-2024-5987,0,0,beef228f72c05791dd04d199520be64d8eda1e129dbc1533ccdca0b455b9e6d7,2024-10-04T12:56:47.997000
CVE-2024-5988,0,0,a9d27d5415bf1cd68cc2a13a9af856f779f310aa287fd46fc01b11e432f43874,2024-11-21T09:48:42.173000
CVE-2024-5989,0,0,9b83ceb061ae8ffbb320f8308cc19d7b2b6774dd575e9b1f0942d3764bfb16da,2024-11-21T09:48:42.330000
@ -279273,7 +279273,7 @@ CVE-2024-9004,0,0,a2437445f28c6fd040101cd729185112636146c841348f5ffdb5cbb6a1a6cc
CVE-2024-9005,0,0,cf7157c1ddadca0c84dad1af4c725274926a9a73df3737beaab7889328488f57,2024-10-10T12:56:30.817000
CVE-2024-9006,0,0,8cc842e07a08255babd245e69b3c1353761d1387b094a4d6d6af3b01cc92dc8e,2024-09-25T18:44:48.940000
CVE-2024-9007,0,0,fb9872a3e10e14f154983a561c697eb19f4cc80a62005f6fed3864bfefb98241,2024-09-25T18:40:31.320000
CVE-2024-9008,0,1,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000
CVE-2024-9008,0,0,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000
CVE-2024-9009,0,0,8063a9dee9ed37ad66d07d57c72f73b0e30cf8e7efc6c0a9bad9e9eb439197fa,2024-09-25T17:46:59.077000
CVE-2024-9010,0,0,f1142db89cc1b709fb322bfbe809a95742487f2e35e71f8aae3232553465d8d6,2025-02-11T02:15:36.580000
CVE-2024-9011,0,0,24ced7d06552bc9d1dd30636af61f2f64e910b6c47eefac677c31a4765d5a4db,2024-09-25T17:48:14.820000
@ -279451,7 +279451,7 @@ CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8a
CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000
CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000
CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000
CVE-2024-9221,0,0,fe6dbc87d919c0427e67adb0b387a38f2ac1a522edeae3829279e72baef9a807,2024-10-15T12:58:51.050000
CVE-2024-9221,0,1,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000
CVE-2024-9222,0,0,a4a3a09199c7d8b09b4738998d8104dbe367bbcd208fb9266439d154c7f5ddaa,2024-10-08T15:34:13.250000
CVE-2024-9223,0,0,34caff13ef1092c98bf872963a60e7b0f874ac576cd17eef87075b656fb0164c,2024-11-23T04:15:10.037000
CVE-2024-9224,0,0,39d8d5cb3a7793ab0481956574ccd81167c7fcdc46c2c7fe36e709b73a8dce1c,2024-10-07T19:19:38.157000
@ -279645,7 +279645,7 @@ CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84b
CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000
CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000
CVE-2024-9457,0,0,237bf133deeeb6ce22bd7cb82b0da8d260edebfa1038d864508e5e70f23de04e,2024-10-15T14:23:57.307000
CVE-2024-9458,0,0,80e3d14c9e2b213feb06fb9083f0b2f590246f33dde9293b093890a3cbc600a9,2025-03-07T10:15:16.497000
CVE-2024-9458,0,1,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000
CVE-2024-9459,0,0,b5f8918700d9fe4520a35b012c84c07b7eef34f306e657c26f87c88066e73f05,2024-11-06T15:29:04.917000
CVE-2024-9460,0,0,a4133ee84221254d0c0b2ee042e3007266c6114612acf7d4db07e6602d682abe,2024-10-08T14:33:42.703000
CVE-2024-9461,0,0,7d9c91cbe544cc2689e175f532112ea98289124a3780c869e31650a971e49d9c,2024-11-26T14:15:22.533000
@ -281147,13 +281147,13 @@ CVE-2025-1864,0,0,5dcde85bed1ed1221f07f6484eca3855203db58c6f1815d82cefcaf7b5c072
CVE-2025-1866,0,0,d0afd76161369e92718a3d901fc0c2664a4a6cd4b550406fdc5521568f9355a3,2025-03-03T09:15:39.370000
CVE-2025-1867,0,0,8e365b83cef7b7a5f391f2005dcb9922258f062cedfa81b30500ba43743068fa,2025-03-03T09:15:39.520000
CVE-2025-1868,0,0,458001b298730476004eac6d19a8af50c907ad4cd889604956695720bc492f98,2025-03-03T12:15:34.610000
CVE-2025-1869,0,1,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000
CVE-2025-1870,0,1,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000
CVE-2025-1871,0,1,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000
CVE-2025-1872,0,1,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000
CVE-2025-1873,0,1,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000
CVE-2025-1874,0,1,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000
CVE-2025-1875,0,1,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000
CVE-2025-1869,0,0,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000
CVE-2025-1870,0,0,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000
CVE-2025-1871,0,0,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000
CVE-2025-1872,0,0,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000
CVE-2025-1873,0,0,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000
CVE-2025-1874,0,0,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000
CVE-2025-1875,0,0,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000
CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000
CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000
CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000
@ -281356,8 +281356,9 @@ CVE-2025-2066,0,0,5dca3a37881c3080b5ed7399cf07d794623bec104102f99020f28f3358b971
CVE-2025-2067,0,0,3e39862fd040dc0c3c929624d43984557b3839cb6c47b4edad23eed5ac7ebc44,2025-03-07T05:15:17.527000
CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e863,2025-03-07T12:15:34.260000
CVE-2025-2085,0,0,191ae6560abe8476fe190d0474dcec83084d054bdfc1b3da1737410b52c6b5f9,2025-03-07T12:15:35.270000
CVE-2025-2086,1,1,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000
CVE-2025-2087,1,1,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000
CVE-2025-2086,0,0,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000
CVE-2025-2087,0,0,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000
CVE-2025-2088,1,1,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000
CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000
CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000
CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000
@ -281367,6 +281368,7 @@ CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0f
CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000
CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000
CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000
CVE-2025-2089,1,1,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000
CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000
CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000
CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000
@ -281377,6 +281379,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9
CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000
CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000
CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000
CVE-2025-2090,1,1,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000
CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000
CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000
CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000
@ -283890,6 +283893,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
CVE-2025-25617,1,1,865fa4993189a6053ac23342f82c40fff5f1cf19a2ef6e091748583a81dd852b,2025-03-07T16:15:38.543000
CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
@ -284020,7 +284024,7 @@ CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a
CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000
CVE-2025-26331,0,0,60841d10062852a459306e6530bd7352dea18c104b031056802fcc3f586c4028,2025-03-07T08:15:43.040000
CVE-2025-26331,0,1,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
@ -284302,6 +284306,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75
CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000
CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000
CVE-2025-27152,1,1,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000
CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000
CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000
CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000
@ -284409,6 +284414,8 @@ CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000
CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
CVE-2025-27518,1,1,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000
CVE-2025-27519,1,1,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
@ -284416,8 +284423,10 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000
CVE-2025-27597,1,1,6cd2d27e6f70c8b8dc560cd90930a7c6cca00c2cfb8b49c56b00236be1fb725c,2025-03-07T16:15:39.893000
CVE-2025-27598,0,0,d2c5c2693a9de5786fd83ab9383213352b59e0b62bd0678134b8bb8975df0743,2025-03-06T23:15:12.183000
CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000
CVE-2025-27603,1,1,f47d7ab377c12d55b3fa6ae6bb3381884e202826994bb1575cdd6dffba4dc2d5,2025-03-07T16:15:40.037000
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
@ -284471,6 +284480,6 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc
CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000
CVE-2025-27795,0,0,6c63d0de52e5a5ce88dd4527b7e8b14e866b38ecb9c86e71d93fb66eb57c3f4f,2025-03-07T06:15:33.273000
CVE-2025-27796,0,0,b3f979689e5dbaabbfdb2bf1ea0d456e5639782116f2a087e75a8e0f34304828,2025-03-07T06:15:35.620000
CVE-2025-27795,0,1,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000
CVE-2025-27796,0,1,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000
CVE-2025-27816,0,0,5b2e23c42ea7b22c782ca4f40314ad964756890209d1d752208955d5f400b7bd,2025-03-07T08:15:44.527000

Can't render this file because it is too large.