diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1472.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1472.json index c80a2560ccc..9b1ef369633 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1472.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1472.json @@ -2,8 +2,8 @@ "id": "CVE-2020-1472", "sourceIdentifier": "secure@microsoft.com", "published": "2020-08-17T19:15:15.117", - "lastModified": "2024-11-21T05:10:37.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-330" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2020/CVE-2020-174xx/CVE-2020-17463.json b/CVE-2020/CVE-2020-174xx/CVE-2020-17463.json index ec82eb1ba2b..7156e833a68 100644 --- a/CVE-2020/CVE-2020-174xx/CVE-2020-17463.json +++ b/CVE-2020/CVE-2020-174xx/CVE-2020-17463.json @@ -2,8 +2,8 @@ "id": "CVE-2020-17463", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-13T13:15:17.357", - "lastModified": "2025-02-04T20:15:37.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-58xx/CVE-2020-5847.json b/CVE-2020/CVE-2020-58xx/CVE-2020-5847.json index d36423c12a2..077cf3810b6 100644 --- a/CVE-2020/CVE-2020-58xx/CVE-2020-5847.json +++ b/CVE-2020/CVE-2020-58xx/CVE-2020-5847.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5847", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-16T18:15:12.713", - "lastModified": "2025-02-04T20:15:38.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-58xx/CVE-2020-5849.json b/CVE-2020/CVE-2020-58xx/CVE-2020-5849.json index 327b5025452..e04b3765181 100644 --- a/CVE-2020/CVE-2020-58xx/CVE-2020-5849.json +++ b/CVE-2020/CVE-2020-58xx/CVE-2020-5849.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5849", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-16T18:15:12.790", - "lastModified": "2025-02-04T20:15:39.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-86xx/CVE-2020-8644.json b/CVE-2020/CVE-2020-86xx/CVE-2020-8644.json index 5b02ace3b57..de0c61cbd70 100644 --- a/CVE-2020/CVE-2020-86xx/CVE-2020-8644.json +++ b/CVE-2020/CVE-2020-86xx/CVE-2020-8644.json @@ -2,8 +2,8 @@ "id": "CVE-2020-8644", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-05T22:15:11.003", - "lastModified": "2025-02-04T21:15:21.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-86xx/CVE-2020-8655.json b/CVE-2020/CVE-2020-86xx/CVE-2020-8655.json index 935ebf06ccc..cfab46dd1bd 100644 --- a/CVE-2020/CVE-2020-86xx/CVE-2020-8655.json +++ b/CVE-2020/CVE-2020-86xx/CVE-2020-8655.json @@ -2,8 +2,8 @@ "id": "CVE-2020-8655", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-07T00:15:09.613", - "lastModified": "2025-02-04T21:15:21.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-86xx/CVE-2020-8657.json b/CVE-2020/CVE-2020-86xx/CVE-2020-8657.json index 8bf48af2807..80533dcd4f2 100644 --- a/CVE-2020/CVE-2020-86xx/CVE-2020-8657.json +++ b/CVE-2020/CVE-2020-86xx/CVE-2020-8657.json @@ -2,8 +2,8 @@ "id": "CVE-2020-8657", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-06T18:15:13.963", - "lastModified": "2025-02-04T21:15:21.563", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json index 8b11e81182e..51ba569a1a5 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1647.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1647", "sourceIdentifier": "secure@microsoft.com", "published": "2021-01-12T20:15:30.727", - "lastModified": "2024-11-21T05:44:48.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -260,7 +260,11 @@ }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1647", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-268xx/CVE-2021-26855.json b/CVE-2021/CVE-2021-268xx/CVE-2021-26855.json index f24888743dc..26316bf7593 100644 --- a/CVE-2021/CVE-2021-268xx/CVE-2021-26855.json +++ b/CVE-2021/CVE-2021-268xx/CVE-2021-26855.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26855", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.103", - "lastModified": "2025-02-04T20:15:40.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json b/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json index ce5a94e8c6b..d5bd83beebc 100644 --- a/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json +++ b/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26857", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.167", - "lastModified": "2025-02-04T20:15:41.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json b/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json index b436c39c2c2..106b47d7fb6 100644 --- a/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json +++ b/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26858", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.227", - "lastModified": "2024-11-21T05:56:54.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-278xx/CVE-2021-27876.json b/CVE-2021/CVE-2021-278xx/CVE-2021-27876.json index a31503a7cd0..6d9c991679c 100644 --- a/CVE-2021/CVE-2021-278xx/CVE-2021-27876.json +++ b/CVE-2021/CVE-2021-278xx/CVE-2021-27876.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27876", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-01T22:15:14.350", - "lastModified": "2024-11-21T05:58:40.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-278xx/CVE-2021-27877.json b/CVE-2021/CVE-2021-278xx/CVE-2021-27877.json index 9a9f492421c..23f1b1bbf37 100644 --- a/CVE-2021/CVE-2021-278xx/CVE-2021-27877.json +++ b/CVE-2021/CVE-2021-278xx/CVE-2021-27877.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27877", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-01T22:15:14.460", - "lastModified": "2024-11-21T05:58:40.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-278xx/CVE-2021-27878.json b/CVE-2021/CVE-2021-278xx/CVE-2021-27878.json index 7a6b2ad0487..4758094f64e 100644 --- a/CVE-2021/CVE-2021-278xx/CVE-2021-27878.json +++ b/CVE-2021/CVE-2021-278xx/CVE-2021-27878.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27878", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-01T22:15:14.537", - "lastModified": "2024-11-21T05:58:40.347", + "lastModified": "2025-03-07T14:57:32.833", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3129.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3129.json index 9ac3e0707f8..0744094a21a 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3129.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3129.json @@ -2,8 +2,8 @@ "id": "CVE-2021-3129", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-12T15:15:16.453", - "lastModified": "2025-02-04T21:15:21.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:57:32.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-367xx/CVE-2021-36713.json b/CVE-2021/CVE-2021-367xx/CVE-2021-36713.json index 7a363d0a6be..4a84fde7bcd 100644 --- a/CVE-2021/CVE-2021-367xx/CVE-2021-36713.json +++ b/CVE-2021/CVE-2021-367xx/CVE-2021-36713.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36713", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T22:15:09.683", - "lastModified": "2024-11-21T06:13:57.817", + "lastModified": "2025-03-07T16:15:34.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3277.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3277.json index cef6ffb6ad4..61d595fe4b9 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3277.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3277.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3277", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-06T23:15:10.763", - "lastModified": "2024-11-21T07:19:11.957", + "lastModified": "2025-03-07T16:15:35.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -131,6 +151,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1988026", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129193", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3707.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3707.json index d442a844048..b213670d9c4 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3707.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3707.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3707", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-06T23:15:10.933", - "lastModified": "2024-11-21T07:20:04.870", + "lastModified": "2025-03-07T16:15:35.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index dd357eeaa61..aeab9314491 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41082", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.843", - "lastModified": "2025-02-24T15:45:38.267", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T16:15:36.047", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -141,6 +141,14 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-detection-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-mitigation-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-418xx/CVE-2022-41862.json b/CVE-2022/CVE-2022-418xx/CVE-2022-41862.json index 981635becb3..0c4d3d94f13 100644 --- a/CVE-2022/CVE-2022-418xx/CVE-2022-41862.json +++ b/CVE-2022/CVE-2022-418xx/CVE-2022-41862.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41862", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-03T16:15:09.497", - "lastModified": "2024-11-21T07:23:57.490", + "lastModified": "2025-03-07T16:15:36.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json index e1ae76a69b5..816d2f6e703 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45449", "sourceIdentifier": "security@acronis.com", "published": "2024-07-16T15:15:10.840", - "lastModified": "2024-11-21T07:29:16.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -49,16 +71,92 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15", + "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", + "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", + "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", + "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", + "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", + "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-5279", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security-advisory.acronis.com/advisories/SEC-5279", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-224xx/CVE-2023-22424.json b/CVE-2023/CVE-2023-224xx/CVE-2023-22424.json index 6b50e11a4e8..4aef7ecfa30 100644 --- a/CVE-2023/CVE-2023-224xx/CVE-2023-22424.json +++ b/CVE-2023/CVE-2023-224xx/CVE-2023-22424.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22424", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-03-06T00:15:10.640", - "lastModified": "2024-11-21T07:44:47.277", + "lastModified": "2025-03-07T16:15:36.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24757.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24757.json index 267ac0be5af..66ef3e78a27 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24757.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24757.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24757", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T15:15:11.683", - "lastModified": "2024-11-21T07:48:22.593", + "lastModified": "2025-03-07T16:15:36.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25358.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25358.json index 23707d0f37e..74814311262 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25358.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25358.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25358", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-02T15:15:10.370", - "lastModified": "2024-11-21T07:49:26.333", + "lastModified": "2025-03-07T16:15:37.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26213.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26213.json index 354f9d1d3e4..509c4748c53 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26213.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26213.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26213", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:09.840", - "lastModified": "2024-11-21T07:50:55.620", + "lastModified": "2025-03-07T16:15:37.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33979.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33979.json index aaef5bdb6de..136af333449 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33979.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33979.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33979", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-31T19:15:27.163", - "lastModified": "2024-11-21T08:06:20.273", + "lastModified": "2025-03-07T15:30:57.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,9 +86,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpt_academic_project:gpt_academic:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:binary-husky:gpt_academic:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.37", - "matchCriteriaId": "F668B717-FBAD-4982-9C25-C725A580EC34" + "matchCriteriaId": "1D81EE9C-45BE-44E6-97CC-F839A18169DA" } ] } diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3359.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3359.json index 9d132465225..31b7243e070 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3359.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3359.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3359", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-28T22:15:09.707", - "lastModified": "2024-11-21T08:17:05.823", + "lastModified": "2025-03-07T16:15:37.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json index c0c2085e6b3..b8d446a8be2 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10266", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.590", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.10.61", + "matchCriteriaId": "41CD3D93-BD25-4369-887C-EC14EA82BD34" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3176303/premium-addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6102c07-2776-4963-8d16-a779c5979275?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12837.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12837.json index 9a5d57f374c..89c9b8ef276 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12837.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12837.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12837", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-03-07T08:15:37.313", - "lastModified": "2025-03-07T08:15:37.313", + "lastModified": "2025-03-07T16:15:37.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json index 9dae8bcf4ee..65d3fb55d0f 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33489", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:15.753", - "lastModified": "2024-11-21T09:17:00.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,75 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33490.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33490.json index bb2305e3b90..975e0edaad0 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33490.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33490", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:16.180", - "lastModified": "2024-11-21T09:17:01.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33491.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33491.json index ac4763f08de..f2633976893 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33491.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33491", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:16.640", - "lastModified": "2024-11-21T09:17:01.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33492.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33492.json index 9b9542fd884..6da1a5367e1 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33492.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33492", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:17.060", - "lastModified": "2024-11-21T09:17:01.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33493.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33493.json index a3c99a26006..2dde7559db8 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33493.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33493", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:17.547", - "lastModified": "2024-11-21T09:17:01.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json index db2b11439de..a69f3212dd1 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34771", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:29.187", - "lastModified": "2024-11-21T09:19:22.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,60 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34772.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34772.json index c719daf27a4..7686223ae93 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34772.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34772", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:29.610", - "lastModified": "2024-11-21T09:19:22.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34773.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34773.json index 21bcfc4385a..b67bba9c3ad 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34773.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34773", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:17:30.040", - "lastModified": "2024-11-21T09:19:22.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:12.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,60 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37158.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37158.json index 9a201ebcfad..60011afb045 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37158.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37158.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37158", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-17T14:15:10.430", - "lastModified": "2024-11-21T09:23:19.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-691" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0.0", + "matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json index fc633e678eb..c3013e8c5fa 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37159", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-17T14:15:10.693", - "lastModified": "2024-11-21T09:23:19.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0.0", + "matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json index a15d90f56f5..69b00656dd2 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39696", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T19:15:10.673", - "lastModified": "2024-11-21T09:28:14.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0.0", + "matchCriteriaId": "2FB8E6A7-2AFB-4E0F-811C-C64344CDFA91" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50600.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50600.json index 77e2cb9edac..3aa9894fc19 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50600.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50600.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50600", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T19:15:26.750", - "lastModified": "2025-03-06T19:15:26.750", + "lastModified": "2025-03-07T15:15:13.750", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, and W1000. Lack of a boundary check in STOP_KEEP_ALIVE_OFFLOAD leads to out-of-bounds access. An attacker can send a malformed message to the target through the Wi-Fi driver." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor y Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930 y W1000. La falta de una comprobaci\u00f3n de los l\u00edmites en STOP_KEEP_ALIVE_OFFLOAD provoca un acceso fuera de los l\u00edmites. Un atacante puede enviar un mensaje mal formado al objetivo a trav\u00e9s del controlador de Wi-Fi." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json index c9e7cac45e4..364037c91c1 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5685", "sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647", "published": "2024-06-14T10:15:10.817", - "lastModified": "2024-11-21T09:48:09.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,48 +69,107 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6.17", + "versionEndExcluding": "6.4.2", + "matchCriteriaId": "AF218717-840A-48E9-9DDC-BA7EB22F54D7" + } + ] + } + ] } ], "references": [ { "url": "https://advisory.checkmarx.net/?search=CVE-2024-5685", - "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/", - "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1", - "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/snipe/snipe-it/pull/14745", - "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2", - "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647" + "source": "596c5446-0ce5-4ba2-aa66-48b3b757a647", + "tags": [ + "Release Notes" + ] }, { "url": "https://advisory.checkmarx.net/?search=CVE-2024-5685", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/snipe/snipe-it/pull/14745", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json index b7a7168609a..3cd3864f395 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.397", - "lastModified": "2025-02-27T02:15:11.397", - "vulnStatus": "Received", + "lastModified": "2025-03-07T15:07:16.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,92 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm: state: fix out-of-limits read during lookup lookup and resize can run in parallel. El xfrm_state_hash_generation seqlock ensures a retry, but the hash functions can observe a hmask value that is too large for the new hlist array. rehash does: rcu_assign_pointer(net->xfrm.state_bydst, ndst) [..] net->xfrm.state_hmask = nhashmask; While state lookup does: h = xfrm_dst_hash(net, daddr, saddr, tmpl->reqid, encap_family); hlist_for_each_entry_rcu(x, net->xfrm.state_bydst + h, bydst) { This is only safe in case the update to state_bydst is larger than net->xfrm.xfrm_state_hmask (or if the lookup function gets serialized via state spinlock again). Solucione esto al precargar state_hmask y los punteros asociados. El reintento de seqlock xfrm_state_hash_generation asegurar\u00e1 que el puntero y el hmask sean consistentes. Los ayudantes existentes, como xfrm_dst_hash(), ahora no son seguros para el lado de RCU, agregue afirmaciones lockdep para documentar que solo son seguros para el lado de inserci\u00f3n. xfrm_state_lookup_byaddr() usa el bloqueo giratorio en lugar de RCU. AFAICS esto es un descuido de cuando la b\u00fasqueda de estado se convirti\u00f3 a RCU, este bloqueo debe reemplazarse con RCU en un parche futuro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "1F3C05B7-5F93-443D-9334-0B93D74DDA67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a16871c7832ea6435abb6e0b58289ae7dcb7e4fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dd4c2a174994238d55ab54da2545543d36f4e0d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e952837f3ddb0ff726d5b582aa1aad9aa38d024d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json index 01d37c809f0..65f6954e2c0 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57983", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.503", - "lastModified": "2025-02-27T02:15:11.503", - "vulnStatus": "Received", + "lastModified": "2025-03-07T15:07:16.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: th1520: Se corrige la corrupci\u00f3n de memoria debido a un tama\u00f1o de matriz incorrecto Las funciones th1520_mbox_suspend_noirq y th1520_mbox_resume_noirq tienen como objetivo guardar y restaurar los registros de m\u00e1scara de interrupci\u00f3n en MBOX ICU0. Sin embargo, la matriz utilizada para almacenar estos registros ten\u00eda un tama\u00f1o incorrecto, lo que provocaba una corrupci\u00f3n de memoria al acceder a los cuatro registros. Esta confirmaci\u00f3n corrige el tama\u00f1o de la matriz para acomodar los cuatro registros de m\u00e1scara de interrupci\u00f3n, lo que evita la corrupci\u00f3n de memoria durante las operaciones de suspensi\u00f3n y reanudaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2cd12c7fba59f30369e8647a2b726c7280903304", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/db049866943a38bf46a34fa120d526663339d7a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9221.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9221.json index d3f7ed205c1..7cfb93dafff 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9221.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9221", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:18.100", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T14:55:48.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.21.11", + "matchCriteriaId": "04CA08B8-5D2B-49BF-97AF-48A54D2C3A2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1298", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1524", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3165873/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85a8a7df-b472-4a81-b808-a413c158c1cf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9458.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9458.json index d20aef9386c..b7b4fdf0430 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9458.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9458.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9458", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-07T10:15:16.497", - "lastModified": "2025-03-07T10:15:16.497", + "lastModified": "2025-03-07T15:15:14.370", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Reservit Hotel WordPress plugin before 3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Reservit Hotel de WordPress anterior a la versi\u00f3n 3.0 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1157d6ae-af8b-4508-97e9-b9e86f612550/", diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2088.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2088.json new file mode 100644 index 00000000000..4e507f26f45 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2088.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2088", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-07T15:15:14.833", + "lastModified": "2025-03-07T15:15:14.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Pre-School Enrollment System up to 1.0. Affected is an unknown function of the file /admin/profile.php. The manipulation of the argument fullname/emailid/mobileNumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/SECWG/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298902", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298902", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.514974", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2089.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2089.json new file mode 100644 index 00000000000..c49f9ce0de2 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2089.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2089", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-07T15:15:15.033", + "lastModified": "2025-03-07T15:15:15.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in StarSea99 starsea-mall 1.0/2.X and classified as critical. Affected by this vulnerability is the function updateUserInfo of the file /personal/updateInfo of the component com.siro.mall.controller.mall.UserController. The manipulation of the argument userId leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.298903", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298903", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.514977", + "source": "cna@vuldb.com" + }, + { + "url": "https://wiki.shikangsi.com/post/share/baecf028-1116-4600-ae9c-f655cc93c29b", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json new file mode 100644 index 00000000000..391a8691ce2 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2090", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-07T15:15:15.220", + "lastModified": "2025-03-07T15:15:15.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php of the component Sub Admin Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/SECWG/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298904", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298904", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.515017", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json new file mode 100644 index 00000000000..f0d980525a7 --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25617", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-07T16:15:38.543", + "lastModified": "2025-03-07T16:15:38.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Access Control in Unifiedtransform 2.X leads to Privilege Escalation allowing teachers to create syllabus." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/armaansidana2003/CVE-2025-25617", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/changeweb/Unifiedtransform", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26331.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26331.json index cc233bd9191..b17d76a531e 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26331.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26331.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26331", "sourceIdentifier": "security_alert@emc.com", "published": "2025-03-07T08:15:43.040", - "lastModified": "2025-03-07T08:15:43.040", + "lastModified": "2025-03-07T16:15:38.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Dell ThinOS 2411 y versiones anteriores contienen una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando ('inyecci\u00f3n de comando'). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107", "source": "security_alert@emc.com" + }, + { + "url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27152.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27152.json new file mode 100644 index 00000000000..b838d538410 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27152.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27152", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T16:15:38.773", + "lastModified": "2025-03-07T16:15:38.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if \u2060baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/axios/axios/issues/6463", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27518.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27518.json new file mode 100644 index 00000000000..608da4b65ef --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27518.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-27518", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T16:15:39.187", + "lastModified": "2025-03-07T16:15:39.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. An insecure CORS configuration in the Cognita backend server allows arbitrary websites to send cross site requests to the application. This vulnerability is fixed in commit 75079c3d3cf376381489b9a82ee46c69024e1a15." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/truefoundry/cognita/commit/75079c3d3cf376381489b9a82ee46c69024e1a15", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/truefoundry/cognita/pull/424", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27519.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27519.json new file mode 100644 index 00000000000..7523ec07905 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27519.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-27519", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T16:15:39.623", + "lastModified": "2025-03-07T16:15:39.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/truefoundry/cognita/commit/a78bd065e05a1b30a53a3386cc02e08c317d2243", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/truefoundry/cognita/pull/393", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json new file mode 100644 index 00000000000..346ecc3f711 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27597", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T16:15:39.893", + "lastModified": "2025-03-07T16:15:39.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/intlify/vue-i18n/commit/4bb6eacda7fc2cde5687549afa0efb27ca40862a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json new file mode 100644 index 00000000000..5313bdea9f8 --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27603", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T16:15:40.037", + "lastModified": "2025-03-07T16:15:40.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwikisas/application-confluence-migrator-pro/commit/36cef2271bd429773698ca3a21e47b6d51d6377d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27795.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27795.json index 2e744f86457..14bc6533c4d 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27795.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27795.json @@ -2,13 +2,13 @@ "id": "CVE-2025-27795", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-07T06:15:33.273", - "lastModified": "2025-03-07T06:15:33.273", + "lastModified": "2025-03-07T16:15:40.187", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits." + "value": "ReadJXLImage in JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits." } ], "metrics": { @@ -51,6 +51,22 @@ { "url": "http://www.graphicsmagick.org/NEWS.html", "source": "cve@mitre.org" + }, + { + "url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/libjxl/libjxl/issues/3792#issuecomment-2330978387", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/libjxl/libjxl/issues/3793#issuecomment-2334843280", + "source": "cve@mitre.org" + }, + { + "url": "https://issues.oss-fuzz.com/issues/42536330#comment6", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27796.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27796.json index 8defc95e2c3..17c2b87cb93 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27796.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27796.json @@ -2,13 +2,13 @@ "id": "CVE-2025-27796", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-07T06:15:35.620", - "lastModified": "2025-03-07T06:15:35.620", + "lastModified": "2025-03-07T16:15:40.287", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation." + "value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation, resulting in out-of-bounds access to heap memory in ReadBlob." } ], "metrics": { @@ -52,6 +52,10 @@ "url": "http://www.graphicsmagick.org/NEWS.html", "source": "cve@mitre.org" }, + { + "url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f", + "source": "cve@mitre.org" + }, { "url": "https://sourceforge.net/p/graphicsmagick/bugs/750/", "source": "cve@mitre.org" diff --git a/README.md b/README.md index e4040524b2e..ed435d3d986 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-07T15:00:19.533557+00:00 +2025-03-07T17:00:20.214746+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-07T14:49:58.017000+00:00 +2025-03-07T16:15:40.287000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284475 +284484 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `9` -- [CVE-2025-2086](CVE-2025/CVE-2025-20xx/CVE-2025-2086.json) (`2025-03-07T14:15:37.850`) -- [CVE-2025-2087](CVE-2025/CVE-2025-20xx/CVE-2025-2087.json) (`2025-03-07T14:15:38.030`) +- [CVE-2025-2088](CVE-2025/CVE-2025-20xx/CVE-2025-2088.json) (`2025-03-07T15:15:14.833`) +- [CVE-2025-2089](CVE-2025/CVE-2025-20xx/CVE-2025-2089.json) (`2025-03-07T15:15:15.033`) +- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-03-07T15:15:15.220`) +- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T16:15:38.543`) +- [CVE-2025-27152](CVE-2025/CVE-2025-271xx/CVE-2025-27152.json) (`2025-03-07T16:15:38.773`) +- [CVE-2025-27518](CVE-2025/CVE-2025-275xx/CVE-2025-27518.json) (`2025-03-07T16:15:39.187`) +- [CVE-2025-27519](CVE-2025/CVE-2025-275xx/CVE-2025-27519.json) (`2025-03-07T16:15:39.623`) +- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T16:15:39.893`) +- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T16:15:40.037`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `49` -- [CVE-2019-20171](CVE-2019/CVE-2019-201xx/CVE-2019-20171.json) (`2025-03-07T14:24:42.067`) -- [CVE-2019-20208](CVE-2019/CVE-2019-202xx/CVE-2019-20208.json) (`2025-03-07T14:24:42.067`) -- [CVE-2019-7238](CVE-2019/CVE-2019-72xx/CVE-2019-7238.json) (`2025-03-07T14:22:47.347`) -- [CVE-2021-29621](CVE-2021/CVE-2021-296xx/CVE-2021-29621.json) (`2025-03-07T14:37:51.330`) -- [CVE-2021-32805](CVE-2021/CVE-2021-328xx/CVE-2021-32805.json) (`2025-03-07T14:37:51.330`) -- [CVE-2021-41265](CVE-2021/CVE-2021-412xx/CVE-2021-41265.json) (`2025-03-07T14:37:51.330`) -- [CVE-2022-21659](CVE-2022/CVE-2022-216xx/CVE-2022-21659.json) (`2025-03-07T14:37:51.330`) -- [CVE-2022-24776](CVE-2022/CVE-2022-247xx/CVE-2022-24776.json) (`2025-03-07T14:37:51.330`) -- [CVE-2022-31177](CVE-2022/CVE-2022-311xx/CVE-2022-31177.json) (`2025-03-07T14:37:51.330`) -- [CVE-2023-0784](CVE-2023/CVE-2023-07xx/CVE-2023-0784.json) (`2025-03-07T14:49:58.017`) -- [CVE-2023-0785](CVE-2023/CVE-2023-07xx/CVE-2023-0785.json) (`2025-03-07T14:49:58.017`) -- [CVE-2023-1962](CVE-2023/CVE-2023-19xx/CVE-2023-1962.json) (`2025-03-07T14:49:58.017`) -- [CVE-2023-29005](CVE-2023/CVE-2023-290xx/CVE-2023-29005.json) (`2025-03-07T14:37:51.330`) -- [CVE-2023-47714](CVE-2023/CVE-2023-477xx/CVE-2023-47714.json) (`2025-03-07T12:36:39.820`) -- [CVE-2023-50307](CVE-2023/CVE-2023-503xx/CVE-2023-50307.json) (`2025-03-07T12:36:39.820`) -- [CVE-2024-13668](CVE-2024/CVE-2024-136xx/CVE-2024-13668.json) (`2025-03-07T14:15:36.520`) -- [CVE-2024-5985](CVE-2024/CVE-2024-59xx/CVE-2024-5985.json) (`2025-03-07T14:49:58.017`) -- [CVE-2024-9008](CVE-2024/CVE-2024-90xx/CVE-2024-9008.json) (`2025-03-07T14:49:58.017`) -- [CVE-2025-1869](CVE-2025/CVE-2025-18xx/CVE-2025-1869.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1870](CVE-2025/CVE-2025-18xx/CVE-2025-1870.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1871](CVE-2025/CVE-2025-18xx/CVE-2025-1871.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1872](CVE-2025/CVE-2025-18xx/CVE-2025-1872.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1873](CVE-2025/CVE-2025-18xx/CVE-2025-1873.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1874](CVE-2025/CVE-2025-18xx/CVE-2025-1874.json) (`2025-03-07T14:45:38.780`) -- [CVE-2025-1875](CVE-2025/CVE-2025-18xx/CVE-2025-1875.json) (`2025-03-07T14:45:38.780`) +- [CVE-2023-26213](CVE-2023/CVE-2023-262xx/CVE-2023-26213.json) (`2025-03-07T16:15:37.243`) +- [CVE-2023-3359](CVE-2023/CVE-2023-33xx/CVE-2023-3359.json) (`2025-03-07T16:15:37.470`) +- [CVE-2023-33979](CVE-2023/CVE-2023-339xx/CVE-2023-33979.json) (`2025-03-07T15:30:57.390`) +- [CVE-2024-10266](CVE-2024/CVE-2024-102xx/CVE-2024-10266.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-12837](CVE-2024/CVE-2024-128xx/CVE-2024-12837.json) (`2025-03-07T16:15:37.893`) +- [CVE-2024-33489](CVE-2024/CVE-2024-334xx/CVE-2024-33489.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-33490](CVE-2024/CVE-2024-334xx/CVE-2024-33490.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-33491](CVE-2024/CVE-2024-334xx/CVE-2024-33491.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-33492](CVE-2024/CVE-2024-334xx/CVE-2024-33492.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-33493](CVE-2024/CVE-2024-334xx/CVE-2024-33493.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-34771](CVE-2024/CVE-2024-347xx/CVE-2024-34771.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-34772](CVE-2024/CVE-2024-347xx/CVE-2024-34772.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-34773](CVE-2024/CVE-2024-347xx/CVE-2024-34773.json) (`2025-03-07T14:55:12.087`) +- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-39696](CVE-2024/CVE-2024-396xx/CVE-2024-39696.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-07T15:15:13.750`) +- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-57982](CVE-2024/CVE-2024-579xx/CVE-2024-57982.json) (`2025-03-07T15:07:16.373`) +- [CVE-2024-57983](CVE-2024/CVE-2024-579xx/CVE-2024-57983.json) (`2025-03-07T15:07:16.373`) +- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2025-03-07T14:55:48.130`) +- [CVE-2024-9458](CVE-2024/CVE-2024-94xx/CVE-2024-9458.json) (`2025-03-07T15:15:14.370`) +- [CVE-2025-26331](CVE-2025/CVE-2025-263xx/CVE-2025-26331.json) (`2025-03-07T16:15:38.650`) +- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T16:15:40.187`) +- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T16:15:40.287`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fb76661bf9e..537904eabf8 100644 --- a/_state.csv +++ b/_state.csv @@ -32430,7 +32430,7 @@ CVE-2008-2988,0,0,537d83846b733f191b5bd4cf9a6e680d0442cb19ac8e074de5196fef91675b CVE-2008-2989,0,0,a564e6d73db62c279491a9c9eed59c9b55085d1c4337edf209af578b122e553a,2024-11-21T00:48:10.743000 CVE-2008-2990,0,0,eba446fdb90523cef752ec8b2816ef2f0a0180e9194e5450344ed618d41db604,2024-11-21T00:48:10.877000 CVE-2008-2991,0,0,c06441c8d15072989775165f31107538fa46ff9c6d70cb1892d9c64fc09aae99,2024-11-21T00:48:11.017000 -CVE-2008-2992,0,1,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000 +CVE-2008-2992,0,0,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000 CVE-2008-2993,0,0,4ff6dae709cc34854d1f786ba3620c8013380ad46239c929f68c8a8fa52a8ba5,2024-11-21T00:48:11.360000 CVE-2008-2994,0,0,0597746e117c9d7156e751fea86a7abeddefd2ede916fe2b98b5bae313c92409,2024-11-21T00:48:11.503000 CVE-2008-2995,0,0,8add2cd5a741a53ba8e416df70fbb49265d426028ba4fdf56ec03a42ffab5827,2024-11-21T00:48:11.647000 @@ -37592,7 +37592,7 @@ CVE-2009-0923,0,0,9d6bc7aa2f532aeca2611a212fd1d01d7fa3b2e1808aa6c8131b0c233a67d8 CVE-2009-0924,0,0,1f976f6c0a294c03107a3b7fceebb6a46d75e27be1795d464608e48d6f4508d4,2024-11-21T01:01:14.270000 CVE-2009-0925,0,0,feec22dc0d278fb3ecad4119f3bcb4e6cc9aa8eb71fe8e012c6b352e24e4f2c1,2024-11-21T01:01:14.407000 CVE-2009-0926,0,0,912a33629cf2cefe3556a8ceedabd16b35be5a0efeac5595123bbfd790dd486c,2024-11-21T01:01:14.550000 -CVE-2009-0927,0,1,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000 +CVE-2009-0927,0,0,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000 CVE-2009-0928,0,0,c0fecc6255e02786116ce96b8321383c3b1ea994544a390fa423376b66ec4763,2024-11-21T01:01:14.860000 CVE-2009-0929,0,0,ae1f2ef9734ca0f38acbfbdcf2a24d40ade42afc84b7184d502d35b14ab58447,2024-11-21T01:01:15.020000 CVE-2009-0930,0,0,eff3d813782bb023f22ae8edfc659d7632990fa0410bacaa1567fb706b95087f,2024-11-21T01:01:15.157000 @@ -86924,7 +86924,7 @@ CVE-2016-3638,0,0,7d10d08a9c330e8186c8b1df8131ce4ada33f48ecfa9a498b77a809b275d50 CVE-2016-3639,0,0,421db73e8a71b5ada97776de5bc41fde15eb5c7dd19ee95fa07e640c7c6c7281,2024-11-21T02:50:26.267000 CVE-2016-3640,0,0,cb1598d890a5236b6bcfc0dbf4eb736e3623e2422c26299b356149123bffa0a0,2024-11-21T02:50:26.407000 CVE-2016-3642,0,0,163b466ec35987c6c4ff6c7c3a6b6420d30f51d42875bea496195e99af2ad6a1,2024-11-21T02:50:26.543000 -CVE-2016-3643,0,1,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000 +CVE-2016-3643,0,0,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000 CVE-2016-3644,0,0,2f773b2080e944e29a7225da4cf2b1e15544f83aaacfce580e0be10986def148,2024-11-21T02:50:26.800000 CVE-2016-3645,0,0,e6ec797e2c73b3d4d9d38cafe825c448b9919243611ff39d36902ebe02db13f1,2024-11-21T02:50:26.927000 CVE-2016-3646,0,0,218a224d61f25a41e628ededad2ee6951c5f8d9d725370ab342b10c8c7355e56,2024-11-21T02:50:27.047000 @@ -87239,7 +87239,7 @@ CVE-2016-3972,0,0,142b5864b63bfc280b9196f5dc10503afea2cd42fdc57440f77dfb1cc02f80 CVE-2016-3973,0,0,64b61a4e20dfcc6c3ca1ba6b7b37a7cf1299a0185d89781ada0686a1dc724993,2024-11-21T02:51:03.727000 CVE-2016-3974,0,0,c34eaf17f1393560453bbf29c4145a745a6efb4dd9cd76f0f2476130f2bf1c7f,2024-11-21T02:51:03.880000 CVE-2016-3975,0,0,83aa673a7d7d02e9b9867fcdc1d69825fd51722f6c6ca0d8082474b374cc969a,2024-11-21T02:51:04.037000 -CVE-2016-3976,0,1,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000 +CVE-2016-3976,0,0,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000 CVE-2016-3977,0,0,30f3cd031e35dcbff31cbff191ebde45d75518c8acbc78d2827f448275345ded,2024-11-21T02:51:04.350000 CVE-2016-3978,0,0,12d9a451bb9f3a35f8fee4c8b8f336e7e3c81c968d06ffa2e28fc8caa37e3896,2024-11-21T02:51:04.520000 CVE-2016-3979,0,0,76d258813b652f5ee36eb61ddb3e21ddd4346c3001992c892299908e0589135b,2024-11-21T02:51:04.670000 @@ -94900,9 +94900,9 @@ CVE-2017-10926,0,0,f62c5a7bdd10387979ec23b93f0720e14bc87e33ea4363d285692a17ebe09 CVE-2017-10928,0,0,54d44869550359987fb5845e6b9096f8e4145f6a6d3ec2636a22741caa760108,2024-11-21T03:06:46.333000 CVE-2017-10929,0,0,47adc303ddf736b0af14aff87fd4fdd70a41c76803e80b583b5f66671524b015,2024-11-21T03:06:46.487000 CVE-2017-1093,0,0,9a328a371d3aa43cf6e4a54b97d016716cb76fc946e11851d2774b8cd54d53f3,2024-11-21T03:21:19.047000 -CVE-2017-10930,0,1,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000 -CVE-2017-10931,0,1,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000 -CVE-2017-10932,0,1,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000 +CVE-2017-10930,0,0,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000 +CVE-2017-10931,0,0,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000 +CVE-2017-10932,0,0,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000 CVE-2017-10933,0,0,cf1481e7f399080dd76d32fedb30445c891211da6cb262d719bc996d1f2f5268,2024-11-21T03:06:47.010000 CVE-2017-10934,0,0,c87b419ee217d74264bc741931ad0293dfc1764a3f33086a94424f52d0d4d046,2024-11-21T03:06:47.140000 CVE-2017-10935,0,0,64594bbf331ebd26bfc841593635b6bbab0781bac59e517b90f5378544be5704,2024-11-21T03:06:47.253000 @@ -106956,7 +106956,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000 CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000 CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000 -CVE-2017-6862,0,1,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000 +CVE-2017-6862,0,0,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000 CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000 CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000 CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000 @@ -116241,7 +116241,7 @@ CVE-2018-15807,0,0,4860614cde85e0da34784a34d1164133dcee109fa857a1d60d0bf8ae79b49 CVE-2018-15808,0,0,455d016e838e06912ba454dbc791b32313c6dce517a5a90a513152cae9a1cf43,2024-11-21T03:51:29.257000 CVE-2018-15809,0,0,d16fc4ec045ff884ac854a3295369387cc90fcfaf38ac1f078e3532c4f171b3c,2024-11-21T03:51:29.397000 CVE-2018-15810,0,0,c6fa6edee7f866d094f9f9f4cd68ea2fddd6850ba36412320a4439f6e9695a5a,2024-11-21T03:51:29.550000 -CVE-2018-15811,0,1,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000 +CVE-2018-15811,0,0,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000 CVE-2018-15812,0,0,aa48b9c7a99f71771f1ad1123f7f4d0f9d04fd2533dc0d140bdf0a1b07ecab3e,2024-11-21T03:51:29.867000 CVE-2018-15813,0,0,eeee8e2865764565421fb3cb76851a575dd32b95666b6744fb9f429381d54523,2024-11-21T03:51:30.023000 CVE-2018-15814,0,0,1a1c1d94303941d4f6e8b2bbf713356b09dc58da2f988827b40d4a22ad567104,2024-11-21T03:51:30.190000 @@ -118335,7 +118335,7 @@ CVE-2018-18320,0,0,97ef2131e3cf9d5d09d7522df5c0f116618a7d18e5a1434a7b0739869774c CVE-2018-18322,0,0,3ac5b0f2536f99c6b307b260d1a55cde391a8faf9e3fc736535c9ab4e3b5d2a0,2024-11-21T03:55:42.483000 CVE-2018-18323,0,0,4d898a4c393c16593efb56b95759cb197bbf4dcd3f95abb7dbd9c7c9428c7760,2024-11-21T03:55:42.640000 CVE-2018-18324,0,0,9c0c3ee8983950689ca89d0570c1a9e31ca8718e87fd93485d7bd8b7254f31bb,2024-11-21T03:55:42.797000 -CVE-2018-18325,0,1,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000 +CVE-2018-18325,0,0,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000 CVE-2018-18326,0,0,db8f6cdd70338e3bbc4bc3623d3cc122d1e6769392767c9b840dc685704c6110,2024-11-21T03:55:43.100000 CVE-2018-18327,0,0,4566d95fb908418b3cf19ef5d0605251696471933c9dca1d2ce4ff8ff122a4a8,2024-11-21T03:55:43.250000 CVE-2018-18328,0,0,e4a1f93fd883ec209b4d0fa5026795c497287e16fe37865c3e21fd92f95f9bb2,2024-11-21T03:55:43.377000 @@ -119835,7 +119835,7 @@ CVE-2018-20059,0,0,a51c9dc7c637cc654ff1697815121d270bdcff703f0c68f60fdcdc128d1e4 CVE-2018-2006,0,0,47aaf5fb46e012c3cfb603348c2121f9a9a743a62e7e9289ff736907f0b910fd,2024-11-21T04:03:34.943000 CVE-2018-20060,0,0,e1385d2fac30923e70f75b5e2c91f03777167fa23ae8a6a4823f87a95d33d42f,2024-12-27T16:15:22.593000 CVE-2018-20061,0,0,1f3af18deb366266af78da0ceefcafeb4c84a14e1efa3997c111e9f0e822cf58,2024-11-21T04:00:49.627000 -CVE-2018-20062,0,1,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000 +CVE-2018-20062,0,0,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000 CVE-2018-20063,0,0,34f0aa6d0bd4f9600ecd5e922724926b6fd20feacc9a5c41e95ea24a58e17160,2024-11-21T04:00:49.940000 CVE-2018-20064,0,0,db5b51f009f055b35c9ae4c72e7ff854b051d67ecaaf7e317679acbf9d48d3ab,2024-11-21T04:00:50.090000 CVE-2018-20065,0,0,b70f15819a2df13416f828d9056d4d769ce048ef842f7ebe753c4b20dcf1d0e4,2024-11-21T04:00:50.243000 @@ -133934,7 +133934,7 @@ CVE-2019-15945,0,0,33a06b26e906fd5c70eb9d1ee5090af1ff5406b915cd924d396d7acb4ce33 CVE-2019-15946,0,0,5a7d83f8665502ce0831bf67797c94c5d4090dfd33f97087c0e89dbbe6c4f94c,2024-11-21T04:29:47.763000 CVE-2019-15947,0,0,0af8d327d16a5d79613ddc9e3ec9b1ba1968fa0a3ef1f7159b0ba45fea374f3c,2024-11-21T04:29:47.923000 CVE-2019-15948,0,0,f584935d7812d2d0b85a5698b7c7daec96f60298baa5fc482aedf43e9eabcd8f,2024-11-21T04:29:48.073000 -CVE-2019-15949,0,1,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000 +CVE-2019-15949,0,0,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000 CVE-2019-1595,0,0,88ccd21b327ff58a8ee4b0ed2c599bb7ffd0b9cdf189f7abdcf010b611bbf4aa,2024-11-21T04:36:53.020000 CVE-2019-15950,0,0,2517d3ef69503853d6312e43202c28f44abfec972870fb968db5c09e40e667af,2024-11-21T04:29:48.370000 CVE-2019-15952,0,0,28b03c0ce9770ebcb4825ab2fb26e2b2fe76a5b9be6086826eae6fbae26fc9c4,2024-11-21T04:29:48.513000 @@ -134736,7 +134736,7 @@ CVE-2019-16924,0,0,9fcdfb6b12ecc8988c872cff850f9a12b1670164d1bb55acd50399f671caa CVE-2019-16925,0,0,09e9fe08610d8c3a46ab83d8b1ba82a92ebd59df6db7a4d9bb12062c4d1e8512,2024-11-21T04:31:21.370000 CVE-2019-16926,0,0,2fd405866642062f213851dd941fd9525e358af4d2584ef5723f7ad01eeb5570,2024-11-21T04:31:21.510000 CVE-2019-16927,0,0,2fb3d9c2c8b5c2842e6547a10802b9b10a58031279b3deedbb8a89126f5833d4,2024-11-21T04:31:21.647000 -CVE-2019-16928,0,1,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000 +CVE-2019-16928,0,0,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000 CVE-2019-16929,0,0,c8559756654e9a62a5c6980e74381ab3fad1e9d0bea48008bca5276d026b6dd3,2024-11-21T04:31:21.970000 CVE-2019-1693,0,0,2e2222b2223836b512c461945a8a924406481fff3bb11ce5f908ab466355f121,2024-11-21T04:37:06.883000 CVE-2019-16930,0,0,2c3d17f3b220f1a83aac157676c5ab4c85646fd8c0e9135c161bdbe1973570bc,2024-11-21T04:31:22.113000 @@ -135308,7 +135308,7 @@ CVE-2019-17554,0,0,fd1679d149b915ba1ebb4cd91b6406a705f82d7aacae8b24302b1d840b775 CVE-2019-17555,0,0,c79a46cc3235cb0805cf1dabe799ea3cef4664bd98a5a061bde8b9bd0bce7e2c,2024-11-21T04:32:31.097000 CVE-2019-17556,0,0,dfc45f73027f031fefc79a0156d2ab7571b3f741c49b1431a9c4c9cb608446b5,2024-11-21T04:32:31.200000 CVE-2019-17557,0,0,2765353326187bfb3caf488301fe76eb67bac10840648f333a8f5f229ab08e5e,2024-11-21T04:32:31.327000 -CVE-2019-17558,0,1,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000 +CVE-2019-17558,0,0,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000 CVE-2019-17559,0,0,ece668b06a6f358fb8eb3ee85628d2086d7c6e147d352d7cd06ac3d8ce38ab60,2024-11-21T04:32:31.673000 CVE-2019-1756,0,0,29e8e4aa3a8fae54efbea0ea2d8a6835f4a0fbeffc6925b6b0d4310f284e5e1c,2024-11-21T04:37:17.833000 CVE-2019-17560,0,0,9cb09af49e361a69d0d03fa2b24de3af3540cbdfdf14fe00a8f4e341c5514a63,2024-11-21T04:32:31.797000 @@ -136298,7 +136298,7 @@ CVE-2019-19045,0,0,819333f2d4f317f3258589f967c788bd309aa8ecf95c668675e18c04363c1 CVE-2019-19046,0,0,8987a45d05deb3cd3a08c21378a7d20a9ee8bc3609cccafcbb5e35b01d4f4898,2024-11-21T04:34:03.773000 CVE-2019-19047,0,0,cb343d11b8c4e8202adea20892f3da33685debcea842b5b8a2288e6ea68f15eb,2024-11-21T04:34:03.933000 CVE-2019-19048,0,0,3da2b293cdb641ef1900d5f9142e3956b032b28fd106db70735bd795ec71dc93,2024-11-21T04:34:04.083000 -CVE-2019-19049,0,1,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000 +CVE-2019-19049,0,0,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000 CVE-2019-1905,0,0,0b0eb4362f19b07aea9340092a53aa6ec78876ad887d29a07805e338537aaff2,2024-11-21T04:37:39.443000 CVE-2019-19050,0,0,2a878b8a0e2c61d567fbdd2b56dfd6f9f43844593e9b39ce9662625233ee1896,2024-11-21T04:34:04.403000 CVE-2019-19051,0,0,125269ec287e7bfa24a3821003123e06e7e3f35db5c63efafd5dfbf9140883a0,2024-11-21T04:34:04.570000 @@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000 CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000 CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000 -CVE-2019-20171,0,1,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000 +CVE-2019-20171,0,0,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000 CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000 CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000 CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000 @@ -137276,7 +137276,7 @@ CVE-2019-20202,0,0,225754f16f47c90380fccf8827c98465d47385fda3f6f7310dc138e5e178f CVE-2019-20203,0,0,81f8f500e4dacfa1a464fa6cc2647a4e94891e1a1f31c0e2ff413ca325b05e95,2024-11-21T04:38:12.003000 CVE-2019-20204,0,0,71d4f11dc2031a94c71229ceea553dfef2723fe46a773ffae589b572ce57ceac,2024-11-21T04:38:12.147000 CVE-2019-20205,0,0,6f4bfd166b4284407214c4899f6e88fd50def278a49e724981580660eb622539,2024-11-21T04:38:12.300000 -CVE-2019-20208,0,1,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000 +CVE-2019-20208,0,0,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000 CVE-2019-20209,0,0,efd75c14a5c6e81194b3619da1ff2a9fc5b7f814652709cfbf81fc3f656b480c,2024-11-21T04:38:12.580000 CVE-2019-2021,0,0,fbcb1d3495d7618f920e224680b2702bc2f65966152303d5c8b5fa92f30e9868,2024-11-21T04:40:04.950000 CVE-2019-20210,0,0,2fc1ff5a0a75d3bd86e6c6aba2c77494fb2307544c863374c5a2e43cb40c28f9,2024-11-21T04:38:12.737000 @@ -142018,7 +142018,7 @@ CVE-2019-7234,0,0,24df5dc286b4bcb50e15ebc5107b005238769e52042d27e8cecc9fb8011b7f CVE-2019-7235,0,0,3a597d90344429af136670129afd8f8f1b968f443cfa523946d5fe5ae8ddcbd8,2024-11-21T04:47:48.950000 CVE-2019-7236,0,0,5fd5f2f0f96fd762fb8ebe091c4921b6cad12fc4a52b5fe15d7027ba4b34ba14,2024-11-21T04:47:49.107000 CVE-2019-7237,0,0,eb999e15c8f803705dbadbe525adac0fbf06d738ec0736da398e2c9442c45ef0,2024-11-21T04:47:49.253000 -CVE-2019-7238,0,1,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000 +CVE-2019-7238,0,0,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000 CVE-2019-7240,0,0,3164e6a97d0852ad445683d25bedc5673bf299019e74959848d8e4da9e568270,2024-11-21T04:47:49.550000 CVE-2019-7244,0,0,7ed3c3ac5e977098dcf1373742e698928c974f4d4a8492120a670f26b92c5dad,2024-11-21T04:47:49.697000 CVE-2019-7245,0,0,c2749efec42c5dc73a9db6e9ad9027c8d51c3b2a86f4a38a20533c1a180f9607,2024-11-21T04:47:49.867000 @@ -149687,7 +149687,7 @@ CVE-2020-14716,0,0,70d66e7d8e80fb4d43f94bf54c1dc7b730315a1924c7d9ae759bc161cfff9 CVE-2020-14717,0,0,1b1936ab258b5ca2f69f41c8a28f5de330c564737f80d45b1d2ba8c5299ad536,2024-11-21T05:03:58.007000 CVE-2020-14718,0,0,47b3847c8e0ad7e1cf65e84d8ff206d05b95ba08016fc9fc25c80fe989838ad3,2024-11-21T05:03:58.150000 CVE-2020-14719,0,0,2519153b65f7a2eaa8802944bcab1a17ff477cbea89f414b1ba913633e831e3e,2024-11-21T05:03:58.290000 -CVE-2020-1472,0,0,a760ecffa82ea6edd5efff66434eb8b7abaca72e312f423e2c637019f8b1099e,2024-11-21T05:10:37.640000 +CVE-2020-1472,0,1,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000 CVE-2020-14720,0,0,a6a4dd928dc73ee3a2223498ff7ec3a434a9d87196fb0bba33306609b9652f67,2024-11-21T05:03:58.443000 CVE-2020-14721,0,0,677e040400c6b37d2d28fe5fe9e0570e19e78317804c8f50ac90977a0fba7930,2024-11-21T05:03:58.587000 CVE-2020-14722,0,0,bfc5f9939bc9c5fbdfa5f30f7afbd4ba716c6cfa243c24942ad536f2e510aab2,2024-11-21T05:03:58.743000 @@ -151898,7 +151898,7 @@ CVE-2020-17457,0,0,304666ebed82001d08af7fb6abc759208104ca1d7c7e0e0b188d0cfb6c453 CVE-2020-17458,0,0,25cd994ed4882520597cb423f48aadd4e5bb2fac882054daf1ab25aeb596c24b,2024-11-21T05:08:09.513000 CVE-2020-1746,0,0,5ade46611c222a1c9d0844bd94b21ff8c5e86579026017bbfd7a5cd2ec833167,2024-11-21T05:11:17.757000 CVE-2020-17462,0,0,dec14e35b954be98e4f456b3da60cf7ea2601d7108dbc0df7cf9c9630fd61564,2024-11-21T05:08:09.663000 -CVE-2020-17463,0,0,d2624e49add7398a1ebda0a27e4a31db9f8c1fa4637cad96a4477ded8f065489,2025-02-04T20:15:37.210000 +CVE-2020-17463,0,1,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000 CVE-2020-17464,0,0,e860379cc0b2b1fe9b1929183acf4fefa76c4c56161d2bb20eef1936bf91b085,2023-11-07T03:19:11.557000 CVE-2020-17465,0,0,6fa34c2a07df8f06e1ed6962dc93c0567cc563e0eaa10999b4977a3c63529215,2024-11-21T05:08:09.990000 CVE-2020-17466,0,0,d223484e1c0a2bec6302370e40313a4d5cb6ebf8c1a04b6cfa404cbad72f30df,2024-11-21T05:08:10.137000 @@ -161321,8 +161321,8 @@ CVE-2020-5842,0,0,dcb0f27f4317979c203b2c51bfab7cda27207ed5b71ee1c718a48e678a9f1e CVE-2020-5843,0,0,8378e8ca1d755c52b556a28b9a03d7cb9bb7f46e105c7df46b82ac95ec1f9c73,2024-11-21T05:34:41.133000 CVE-2020-5844,0,0,b894bec74321616318be63acacbc6a64ba72f10a231dbf6aa0116c83f7aecd7d,2024-11-21T05:34:41.263000 CVE-2020-5846,0,0,d2f3ffda68de3ecb9a5597e60cdc311709fce66834c02bfdd0ee4735d05b664e,2024-11-21T05:34:41.400000 -CVE-2020-5847,0,0,148ae289735b8653fae2fda53e3b573000c0c22251ad4d8a160c28a10fa44e8c,2025-02-04T20:15:38.803000 -CVE-2020-5849,0,0,c96e336b8e81cc4b23b0122c703ba811e64671db678cb8f602f4b706461b160b,2025-02-04T20:15:39.013000 +CVE-2020-5847,0,1,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000 +CVE-2020-5849,0,1,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000 CVE-2020-5851,0,0,0e6b8a980d42461bdeef132eb484123c19dc7a4e5f253f6abcd12b6bfeb3765c,2024-11-21T05:34:41.807000 CVE-2020-5852,0,0,a0d14d33aa5d76474940760e02808323b0255fdfa7ef7263fbf5fb39b4b3f9c4,2024-11-21T05:34:41.950000 CVE-2020-5853,0,0,ec5939c37c53e690929c801d26a949d22ea000c2d5657b7eea502e2f09c386d8,2024-11-21T05:34:42.357000 @@ -163716,15 +163716,15 @@ CVE-2020-8637,0,0,2217c7386170afe6b12de345c9c160276185b7c89e0dcda019627a55f9fb85 CVE-2020-8638,0,0,32c95e1823a3ea2f35b4d4087afa45e38f0aa3a6d2ec116bb344b25d3aabb7c5,2024-11-21T05:39:10.230000 CVE-2020-8639,0,0,8f89ab272a0ef46c31d75a3858f8022a4d9111848565bd65e9343b97ffd6fd3f,2024-11-21T05:39:10.353000 CVE-2020-8641,0,0,0d1c513fef1a173802745a61846ead8e61fdbfe5801ff740fb1aca89505c7ddb,2024-11-21T05:39:10.483000 -CVE-2020-8644,0,0,4a513e833768052e94cdb586f9f4f9a5954cba100bb8afcbe81e0f148f918af4,2025-02-04T21:15:21.113000 +CVE-2020-8644,0,1,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000 CVE-2020-8645,0,0,2a03db6fa2b770ea0a59249c2f2585abe34df165b555d7ac782ed537d96c9f97,2024-11-21T05:39:10.747000 CVE-2020-8647,0,0,f068f0e57339478200309cb959bd7fd17a53a6b7117775a657951595e793600e,2024-11-21T05:39:10.877000 CVE-2020-8648,0,0,8fdc221d2ebb6dc8fb93bf4742dc8dfa23ef56dd805cde8998884f9ff56ef701,2024-11-21T05:39:11.030000 CVE-2020-8649,0,0,37c65f7d0c74c220929895992a0c92fb2e2d2fac5e634773795c784a74ea10b0,2024-11-21T05:39:11.190000 CVE-2020-8654,0,0,a3a76c24f693047768fb5b923623c39d10ba6a5e4698aa407fa5faf6a5f662ed,2024-11-21T05:39:11.347000 -CVE-2020-8655,0,0,178f17f1d5f32b498840e903fd14586d50751635c32fd7aeaf31b57eff3dfe16,2025-02-04T21:15:21.360000 +CVE-2020-8655,0,1,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000 CVE-2020-8656,0,0,4786fc01a1c7dfdec763b31be079dfcb520c2439d320352e6b9d715294d319ca,2024-11-21T05:39:12.467000 -CVE-2020-8657,0,0,438d4382b40ba7fec80b3db67b8733969df33003b03a35203155e5500813f546,2025-02-04T21:15:21.563000 +CVE-2020-8657,0,1,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000 CVE-2020-8658,0,0,4573f49c55d9f3879273cc4a97630ce9e9cf8aae9a1c623e533e4c3238f46259,2024-11-21T05:39:12.757000 CVE-2020-8659,0,0,0058e06c3c4af6d2c2f20fc9f830318b2a5c5c55545999cea86f50e52d91077f,2024-11-21T05:39:12.880000 CVE-2020-8660,0,0,c8eb75df1246ad70e7d88e25da868f2489d66b14a433ad144d2fcc75766974f8,2024-11-21T05:39:13.013000 @@ -166303,7 +166303,7 @@ CVE-2021-1643,0,0,4060b809fead12bb9d67f78be5df56a37d87ee4646fa6e6df86052c1df4b14 CVE-2021-1644,0,0,efef402905230983da5bdfdf12143b0e50435ebe4d4fb21c1fe5c122d402ef18,2024-11-21T05:44:47.930000 CVE-2021-1645,0,0,25258a77695180ba77c99bd2c6823d73e5a5f58b3767fb51d6c767a59a2b7412,2024-11-21T05:44:48.047000 CVE-2021-1646,0,0,dd5db096be9e6e8c998f36cbbb20089c7e8840cca55aeece215ab90e471c3d0d,2024-11-21T05:44:48.180000 -CVE-2021-1647,0,0,be2c26c2dccb7ab1f8fba3c2545668363ab71b87ba8040f62766d5b531b2455c,2024-11-21T05:44:48.307000 +CVE-2021-1647,0,1,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000 CVE-2021-1648,0,0,442992d9469b43ae43cc0ca7fd4e0fc4dea65be20b3af1ea5c7d4bd9dcb9c3fd,2024-11-21T05:44:48.457000 CVE-2021-1649,0,0,b02803d777e0231640dee4f5831d7188c99fb48f5d6a9a75e7a6945731355893,2024-11-21T05:44:48.590000 CVE-2021-1650,0,0,bf70b4a3c0b73b36f07cd9c7e86a8dc7f79730c1ed3fc35784abee243ce739fe,2024-11-21T05:44:48.727000 @@ -172381,9 +172381,9 @@ CVE-2021-26843,0,0,e22c85b76cfecdfffe08cb6d2ad5cbb9f4c9a7db43ad8249c84af125becc2 CVE-2021-26844,0,0,02cc15f895219c53d39be6e1f4c6a51757746b0bf8fffc23217ee117f819801d,2024-11-21T05:56:53.557000 CVE-2021-26845,0,0,d16f5d1bf8b70b13ab07460aba2ea681026589dea89b8756fa7229f826d22ecf,2024-11-21T05:56:53.713000 CVE-2021-26854,0,0,c4bcbb9b671013b7c4c294d860d3419f36080d16f644917d5e58ee1c30b46045,2024-11-21T05:56:53.857000 -CVE-2021-26855,0,0,c341a85fdf72b7a3ce00bfaed1a11b84082484487cfc74cf0926e4cf07311b54,2025-02-04T20:15:40.873000 -CVE-2021-26857,0,0,0321dd18fa858f61ee590f6b2e93a7397316308d7e541958f0ffeb14216fac42,2025-02-04T20:15:41.077000 -CVE-2021-26858,0,0,543dbe64013d93d6e82a9c895da08a2138d91ba911e38fb691df4f54f07c0d2f,2024-11-21T05:56:54.283000 +CVE-2021-26855,0,1,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000 +CVE-2021-26857,0,1,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000 +CVE-2021-26858,0,1,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000 CVE-2021-26859,0,0,5355f8a65fd9a2daa85a7f9efe95e508d18de450153222105a4194499f856cab,2024-11-21T05:56:54.420000 CVE-2021-26860,0,0,cb9bc2194420b618bd81851fe6d2a08a1be6a880c0edf922353c2faf291197c9,2024-11-21T05:56:54.547000 CVE-2021-26861,0,0,6f3d935057cf053b76c7041731ccc09d592a8c11b4860b84ecf1bdff18fea857,2024-11-21T05:56:54.663000 @@ -173152,9 +173152,9 @@ CVE-2021-27859,0,0,993f7636ab44f63e13208197998ae7db16b9d062167251918517bbcbfe7e1 CVE-2021-27860,0,0,dfab7aeaff73bc97888f133c03739b011132bd10ea3c893619d85892c04dedfc,2025-02-04T20:15:42.070000 CVE-2021-27861,0,0,2e874793f7920b781935eba26fcbb236ca8c4ecce3e14a7ee776186e960e718b,2024-11-21T05:58:39.770000 CVE-2021-27862,0,0,fc7e14948885397a858c226d74b5728d90a6f062785c550fae571d5169db34ae,2024-11-21T05:58:39.887000 -CVE-2021-27876,0,0,6bed32be5997809a85bbab8ccbdc4bd432fa31f82e9d3e5c6eaa48844e22ea8d,2024-11-21T05:58:40.010000 -CVE-2021-27877,0,0,6bfed69baa44a1cd79399e8251321838a3c0507783fe330d8e03847b6842defc,2024-11-21T05:58:40.160000 -CVE-2021-27878,0,0,4d868fa7f3f6936eea4da2953de01b5fcf3f545e4181d522efa85c6a15e3e539,2024-11-21T05:58:40.347000 +CVE-2021-27876,0,1,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000 +CVE-2021-27877,0,1,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000 +CVE-2021-27878,0,1,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000 CVE-2021-27884,0,0,07ef68bb7a49a5e41de55ecdb94a5317031927a7badddc4c1dcd133b77daf30c,2024-11-21T05:58:41.470000 CVE-2021-27885,0,0,6846b02647cb7751bb45d0264c610c218765b765257a96f038efde08963f4d38,2024-11-21T05:58:41.690000 CVE-2021-27886,0,0,c596fb96a9799b2965bc5d05f26e95b1ee896238a8a7188e7a76c1cda9de11e8,2024-11-21T05:58:41.943000 @@ -174262,7 +174262,7 @@ CVE-2021-29617,0,0,9282d36ab379047bed777a5e35deacd1e0575ef6e75507cf39cf4dcae2e7a CVE-2021-29618,0,0,194d4344d2fcf4ccd0f88ea5b65d6a910a0e9559a4974341f57cd78fd81ae3dc,2024-11-21T06:01:30.350000 CVE-2021-29619,0,0,00a25d6082589853bca127e06f5e411bebce27f4a00260438b8cdd300763e97d,2024-11-21T06:01:30.480000 CVE-2021-29620,0,0,704ad315ab1e6d012dbe4076f98dbc92c3ff90a91f673743cad74e3b7c18942e,2024-11-21T06:01:30.600000 -CVE-2021-29621,0,1,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000 +CVE-2021-29621,0,0,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000 CVE-2021-29622,0,0,d2899e830da51139c8d424727c70985c06567ad17d63b6f66ede76ef6c7d3699,2024-11-21T06:01:30.877000 CVE-2021-29623,0,0,0759820b8e134268198dc843b4c7c1ea75ddd67d65ae513f9c7f3c31e5ac3f8a,2024-11-21T06:01:31.007000 CVE-2021-29624,0,0,34811731354719bcc6bd50d5f7b3cef38f1a63b507ce803b6e12be5dffce564e,2024-11-21T06:01:31.150000 @@ -175649,7 +175649,7 @@ CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000 CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000 CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000 -CVE-2021-3129,0,0,9994df7613e57bf94027d16b1fba3e4148ba3fb5bc8610bf6dbcc5810386cb67,2025-02-04T21:15:21.940000 +CVE-2021-3129,0,1,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000 CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000 CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000 CVE-2021-31294,0,0,d4eb37e109e629565a20435c105b1449a6efda6d20165a8248479e9ceb3a9e5b,2024-11-21T06:05:24.390000 @@ -176736,7 +176736,7 @@ CVE-2021-32801,0,0,3c6dd25a05868da4a86c030a2817b3d451feae5897a19131855eb266b60fb CVE-2021-32802,0,0,d236a8457168dbf023cd6d8ad06e6c6c3774018a64b408098c15d389cd53efd1,2024-11-21T06:07:46.450000 CVE-2021-32803,0,0,c3c9ab6affbf0a5ae127dff1b4146143431cf108914bbb69b17c8c4ca6823875,2024-11-21T06:07:46.637000 CVE-2021-32804,0,0,667d9ec0fbb9dc2bc8940f6df11d93ca5972baf8123871a037d7c2d42c269c4d,2024-11-21T06:07:46.800000 -CVE-2021-32805,0,1,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000 +CVE-2021-32805,0,0,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000 CVE-2021-32806,0,0,f32f9ae0cbeab289fa5cfcf1745216957a12dfe502d7378612e30036a32d4e7b,2024-11-21T06:07:47.067000 CVE-2021-32807,0,0,3a550a99818711747837014ae0e7ae011001a9c4fb372a57b534f58137b4ec4a,2024-11-21T06:07:47.197000 CVE-2021-32808,0,0,fa771f7f84d0048b919dafe1fd07575baf9244e1734ab1de2baa00dfab809c4b,2024-11-21T06:07:47.340000 @@ -179564,7 +179564,7 @@ CVE-2021-3671,0,0,2e98707d05a3d5dd6bb82a24011add61bf4093e9d7d7c0ef54e15be3c44712 CVE-2021-36710,0,0,30d3f6219f02843c7db6762f93c7bb35bf6a07d0e6a066f808321a415ace3d4c,2024-11-21T06:13:57.340000 CVE-2021-36711,0,0,ff91331951413364cc0c150d1e96e169d83ffdc9156d5799838288065cb37de3,2024-11-21T06:13:57.510000 CVE-2021-36712,0,0,86f9316723405930d5e8c829281e4fa6d3291043cf5a570cded38ee796a6d85d,2024-11-21T06:13:57.670000 -CVE-2021-36713,0,0,eaaf5637f08ddd66d5ca729b7b9926ffd326110fe975632fe207875bd8eae11a,2024-11-21T06:13:57.817000 +CVE-2021-36713,0,1,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000 CVE-2021-36716,0,0,5662ce55ac5c83778feb49af51a4a7a09a851153e5c2c010efd65d93cb4fdbba,2024-11-21T06:13:57.973000 CVE-2021-36717,0,0,ec369d3ecfa389c0148878e8348c016478ec723b90d9011f790f892d64463eba,2024-11-21T06:13:58.143000 CVE-2021-36718,0,0,775941130e24c7529766d8f19f5e9007abe25d5d504a9926d5087c9e9f872619,2024-11-21T06:13:58.283000 @@ -183272,7 +183272,7 @@ CVE-2021-41261,0,0,83bba306350529d8dabc8c83cbeb7046dc564256ae523575810b60d44e7a9 CVE-2021-41262,0,0,bf80ac48037448e6df08a82bda34068b2ac600309a6a8351eb4a6c54cdcad830,2024-11-21T06:25:54.900000 CVE-2021-41263,0,0,310b0871228f23a9b74738a9d46d0e79d3f808295715b91cd825c950ac2e0457,2024-11-21T06:25:55.033000 CVE-2021-41264,0,0,801d2fa4216ccca6242c40b3a379b65daa94386bf06f22ae3549b97d95d66978,2024-11-21T06:25:55.170000 -CVE-2021-41265,0,1,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000 +CVE-2021-41265,0,0,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000 CVE-2021-41266,0,0,ee67f3b30157c7c7f9739c64138b97c04e26dedcdad6f83b024214f0b6849071,2024-11-21T06:25:55.447000 CVE-2021-41267,0,0,06bdb3467f4577c7e3c0c73a0be52e604a93f0d1247e5f0d74efb2be3411d0c9,2024-11-21T06:25:55.573000 CVE-2021-41268,0,0,4802f87b6baa03fec9b494114a47b62395b260260f7c05c5038061d133694b7d,2024-11-21T06:25:55.713000 @@ -191396,7 +191396,7 @@ CVE-2022-21655,0,0,0bb88de39562d74edb3c5dc14260c1aa5cbe0977dc72fbaaa5c5907520b12 CVE-2022-21656,0,0,ae7f6f10a25d538e61091eca399af275b55323a531d01051babac34f68f2ea48,2024-11-21T06:45:10.103000 CVE-2022-21657,0,0,b61506454d82cdd81703ed3b3ecbcc360c8d9cea3021356f27ad4df0658b70e4,2024-11-21T06:45:10.227000 CVE-2022-21658,0,0,d719323787fe690295be479284556910df4cce28acd3a4271d2df3c828e3c587,2024-11-21T06:45:10.343000 -CVE-2022-21659,0,1,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000 +CVE-2022-21659,0,0,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000 CVE-2022-2166,0,0,db40856ed54a003d747ba667ab28b0b777e7ebe27eab76bf63b0fa68659a981b,2024-11-21T07:00:27.670000 CVE-2022-21660,0,0,e50b313e5f4482d2e57a75d95baab2766781ef80064185e266441dcc35a29fac,2024-11-21T06:45:10.633000 CVE-2022-21661,0,0,ad357031852de2d6644171e49bb6eaa4f4bbf912a4d0ba884c85ab873ba8fc58,2024-11-21T06:45:10.750000 @@ -194263,7 +194263,7 @@ CVE-2022-24772,0,0,6d621b212079b521cfec536bfc00e1cdf6229c234d240f6fcaf7a6d823905 CVE-2022-24773,0,0,f964173bb7f73806f9514ae8330f53cc50353516625bf354de792d9345abe2a3,2024-11-21T06:51:04.093000 CVE-2022-24774,0,0,e8bad2914e190a27904c4a729a974bff227be750d052cd8fa5b5418bfeba9c6d,2024-11-21T06:51:04.210000 CVE-2022-24775,0,0,a89d20f6084336008112954573b5daf0114c550ce2d67d379f72d396931f18a1,2024-11-21T06:51:04.337000 -CVE-2022-24776,0,1,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000 +CVE-2022-24776,0,0,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000 CVE-2022-24777,0,0,4ae70f6204e3c0de25fbf985bc164399cafcff14ae66595c415bd3f9563c5849,2024-11-21T06:51:04.610000 CVE-2022-24778,0,0,6a5d591d4ff287175baa38de8a91d18e5f05a33ad86097a680b95921569c0552,2024-11-21T06:51:04.737000 CVE-2022-2478,0,0,7af5e30986fb9bf51521310ba62a96e4a2422836c99ef22f37780052983c46cb,2024-11-21T07:01:04.507000 @@ -199551,7 +199551,7 @@ CVE-2022-31172,0,0,7cd9bbbf9b368874155a4d61081b8e77b23805251922a97f9af3a9ddf2bec CVE-2022-31173,0,0,2febc62e1a3a54d82009b58dd26871e86a20ff205513f52ef4ffc35f7bee528d,2024-11-21T07:04:03.200000 CVE-2022-31175,0,0,66bd23a7faf006cd60074400cfa39699bdce3330f83c19b81ff998a44cda9420,2024-11-21T07:04:03.343000 CVE-2022-31176,0,0,cc99b523e99dfb029a0458f6ebd536fbe395e927d120462d7d40e06968e26a7c,2024-11-21T07:04:03.473000 -CVE-2022-31177,0,1,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000 +CVE-2022-31177,0,0,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000 CVE-2022-31178,0,0,18b14454630e74a88e35da2b6639bc5f9a9a45604736c7bbddbfe831ab8237c1,2024-11-21T07:04:03.733000 CVE-2022-31179,0,0,1ed6f4ace29b1759241c40df1c9bf6b4b22a23f458fc7b8e045d5ff2502bff81,2024-11-21T07:04:03.850000 CVE-2022-3118,0,0,f5cf3681168aa2b9e58ed05115af196bca87b81960ed57d08b4414c34c75f504,2024-11-21T07:18:51.780000 @@ -200879,7 +200879,7 @@ CVE-2022-32765,0,0,288c46848ca90bc0970228e4c106898962265fe5ef966fdb621059ec6e48a CVE-2022-32766,0,0,f8af3e288bc19c30281a1d0ccfabd1595b6500716a3aad9106452d2f8828a86f,2024-11-21T07:06:55.190000 CVE-2022-32768,0,0,c7d4fb2b17fec1c41f721ec7f12f58d3dd128594cc56036f151ab10b94ff5402,2024-11-21T07:06:55.320000 CVE-2022-32769,0,0,2bcd9e4801c613d9c501665e694fc1ccc87f19f08f4bfd7ec0020d43aabddf84,2024-11-21T07:06:55.457000 -CVE-2022-3277,0,0,4dcbf73632c2fb0f22f8b004b14c1b10deeeb35491ed4d14f04bf90315640cf9,2024-11-21T07:19:11.957000 +CVE-2022-3277,0,1,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000 CVE-2022-32770,0,0,2117cde9ddfe9fc4190507bbd939b0b74257bcc2e26270c25a9c72ab9762f3d1,2024-11-21T07:06:55.587000 CVE-2022-32771,0,0,71c6f498ac24328dd596adccf278375f0d0157867acd5b6c9e0a42d0130dfd43,2024-11-21T07:06:55.717000 CVE-2022-32772,0,0,e3b68231aad472dc58151c5e29625a9adae7c2eb8114c08e61c9139b03dce259,2024-11-21T07:06:55.860000 @@ -204363,7 +204363,7 @@ CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40 CVE-2022-37067,0,0,073a63c94609fb61c3c7478f5894b6cef5a4e645ffd2533f7feff90902f4bfe5,2024-11-21T07:14:23.250000 CVE-2022-37068,0,0,bfbc21ac6f627e851e0b40b7ed324b42c9a2dd81234107a167e1ea24c57dec94,2024-11-21T07:14:23.400000 CVE-2022-37069,0,0,dc864251b7b1e5b3758cf4caaf549434af36e31ac4247583a5727ca221971dd0,2024-11-21T07:14:23.567000 -CVE-2022-3707,0,0,a9a5ba336fb0115ec23c86b7602de9c20dd6da9e7854961bc6aa1da885a432c8,2024-11-21T07:20:04.870000 +CVE-2022-3707,0,1,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000 CVE-2022-37070,0,0,e2c0503dbb97f457cda6fc0db7f472cd6525c918effd3957023eb8ec3528183a,2024-11-21T07:14:23.730000 CVE-2022-37071,0,0,5425191f63dc698190eb62d1acf953318f967db9b131d7887dfce006cb96572c,2024-11-21T07:14:23.867000 CVE-2022-37072,0,0,246171d66413946e2e9259efcef4d1da86ac9de1e57e619f1e332302396b624c,2024-11-21T07:14:24.013000 @@ -207254,7 +207254,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 -CVE-2022-41082,0,0,942e30fea4d0eecc0abe3c211227f03814e3efec7d8323fcfd99cfc64386418d,2025-02-24T15:45:38.267000 +CVE-2022-41082,0,1,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000 CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000 @@ -207941,7 +207941,7 @@ CVE-2022-41859,0,0,d7fddb015ce8a0ef2f9a3d1b5b02e117163f8e04fd79fce2bb8d303b5ea5f CVE-2022-4186,0,0,a065f65e44e81acbb6156b41d02f078148d8a8ce8b985b43a5a4cbc8cf2e82b3,2024-11-21T07:34:44.520000 CVE-2022-41860,0,0,3902c9c181b31779a24cf74edb67fc91cfafe626663e3b5347822186d946f0ad,2024-11-21T07:23:57.257000 CVE-2022-41861,0,0,5444bba71b3cc5fb61cb2dfa5e4122b78a7ec8e4b4721212a077748536b0c745,2024-11-21T07:23:57.380000 -CVE-2022-41862,0,0,8f3427fbd84b514e55a79ecd45f0f60e5ff35c06e448419eb79f19ddcfabccba,2024-11-21T07:23:57.490000 +CVE-2022-41862,0,1,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000 CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000 CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000 CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000 @@ -210552,7 +210552,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000 CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000 CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000 -CVE-2022-45449,0,0,e43469c42fc1c14bec5f1182c8f9a484b17b151350cb8f57745968b28fa5cbc2,2024-11-21T07:29:16.553000 +CVE-2022-45449,0,1,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000 CVE-2022-4545,0,0,99841b6aae53e9700cdfd19011146a18beac019ddefac29bac4f0b93aa4a600f,2024-11-21T07:35:27.730000 CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000 CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000 @@ -214676,8 +214676,8 @@ CVE-2023-0780,0,0,e8e2f0426cdd391a26483e8789d8e86bae4ddde8ba9e52dd1088ac20ab8a01 CVE-2023-0781,0,0,8a8496d4416dfe6d64d43bbc8f0ea270163cd648da6a03d2e8ed80772b9c0df2,2024-11-21T07:37:48.583000 CVE-2023-0782,0,0,4c0a4f642aa7a24d1014890feba5b408c26166a66aaebbacc58ff4d99b333dd8,2024-11-21T07:37:48.710000 CVE-2023-0783,0,0,7e5bbb2038eedc37222715c2a900e05f94d758a225842991071596a750a7532a,2024-11-21T07:37:48.847000 -CVE-2023-0784,0,1,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000 -CVE-2023-0785,0,1,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000 +CVE-2023-0784,0,0,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000 +CVE-2023-0785,0,0,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000 CVE-2023-0786,0,0,9f4d2c852d70de6724f12a5989e00d1cabeb5b77f3984843da8a00c626444350,2024-11-21T07:37:49.993000 CVE-2023-0787,0,0,a3af2d4a739da41e2884d7213d2426d7f2c8d7b0d7fc8836c1642926bdcd28e8,2024-11-21T07:37:50.117000 CVE-2023-0788,0,0,43aa586f6fa0a93609ae74ba14816485c32634f75c8eca48cbdcb9e90180815e,2024-11-21T07:37:50.237000 @@ -215798,7 +215798,7 @@ CVE-2023-1958,0,0,92b4f50e187cfa91ad93be6d6d801bee29d9b901407aeff8e0e2f748923518 CVE-2023-1959,0,0,b832511920dd34b2ee0f5b4e70369efeae5989e5e23e518c8ce4fb48ae9fce14,2024-11-21T07:40:13.837000 CVE-2023-1960,0,0,9275175137e515b03393dfde9235ce20d55b233e6b1150889fdb7d9c43a816ea,2024-11-21T07:40:13.977000 CVE-2023-1961,0,0,f7b49d3ff2f2449aa867b1ae7d36cb9a2f65278c430922c36a9efc58d3df23f9,2024-11-21T07:40:14.100000 -CVE-2023-1962,0,1,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000 +CVE-2023-1962,0,0,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000 CVE-2023-1963,0,0,bd9346ac887c2f85ca33ac9a902dc041c51d793a6679b19dc89f9d01d98115f6,2024-11-21T07:40:14.363000 CVE-2023-1964,0,0,fd2361ec5e3f1e6b036a6afb1d0c9643aa4d204c0955876c690a65ac50a9464b,2024-11-21T07:40:14.490000 CVE-2023-1965,0,0,5788896c0bd8259fdbe118d4f434ec1b5b72febc35e1293735cf277a92a20ade,2024-11-21T07:40:14.613000 @@ -218008,7 +218008,7 @@ CVE-2023-22419,0,0,c1dd2f72f61814803cdf63bcf8dca22320a762690c8cf4b60f814521f088e CVE-2023-2242,0,0,4a937452ab57b5296438a1ae14dc38bfed91efb6c5653c71648121b31c6163c1,2024-11-21T07:58:13.417000 CVE-2023-22421,0,0,c679e58c8416e77061e0c043851f1c9eb505ade7b79525a95ca89620b33fbb40,2024-11-21T07:44:47.053000 CVE-2023-22422,0,0,1b35c84e2fb89995518f67e9309c4c9dbec4b7abbbf1d9cf247ec0366eeb4240,2024-11-21T07:44:47.157000 -CVE-2023-22424,0,0,58569a9f37da5822a4cfe472f89ab226a874d33a18a9993834627594ce70ea09,2024-11-21T07:44:47.277000 +CVE-2023-22424,0,1,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000 CVE-2023-22425,0,0,2d237c6de59422283df9a7c8f88cb08b1ea8054670ffba4dcb711a39f4fb4683,2024-11-21T07:44:47.387000 CVE-2023-22427,0,0,f490e42af5d94874676af58f877fe1ac393f7611b6800a738a6ae9c18e557f30,2024-11-21T07:44:47.500000 CVE-2023-22428,0,0,b3eeca8a1daaffa1f36da6254dfad723add1cced54ccf9190fb4f8dda34204b0,2024-11-21T07:44:47.613000 @@ -219837,7 +219837,7 @@ CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f010 CVE-2023-24754,0,0,42885f8db3ea1d2ab38e7fd061eee4daf1de514fe3c8843b43f6d2b02ce3d3d6,2024-11-21T07:48:22.170000 CVE-2023-24755,0,0,c88f7e592135bce8a4a5ea2bfd86138da220b85446e7ae5773d7d7fa6bfa0910,2024-11-21T07:48:22.310000 CVE-2023-24756,0,0,dc204becde6645b45c0da365ffdacca71444ef90cbef402419c82247d10a38d3,2024-11-21T07:48:22.457000 -CVE-2023-24757,0,0,927193cc66af039bb894275e2ed8ffc12dd8afb68a614b33cccd191514d8954a,2024-11-21T07:48:22.593000 +CVE-2023-24757,0,1,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000 CVE-2023-24758,0,0,441e45920579ec0bfea433f0388c75e94eda4c0aa96df2e80a289332a4894341,2024-11-21T07:48:22.733000 CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a48,2024-11-21T07:58:41.490000 CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000 @@ -220337,7 +220337,7 @@ CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94 CVE-2023-25350,0,0,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000 CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000 CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000 -CVE-2023-25358,0,0,c293b186724c778961eaee7691e3edb8240ff2943c5c22a7bf4907fb0cf4942c,2024-11-21T07:49:26.333000 +CVE-2023-25358,0,1,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000 CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000 CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000 CVE-2023-25361,0,0,d8143811fa2fbed2aa47a7bb1803e2898e8970fe423990f5709306cbdb47446e,2024-11-21T07:49:26.613000 @@ -221082,7 +221082,7 @@ CVE-2023-26209,0,0,a892a2695c5017ffca11881763f9e45ffa97f8d9fd3ef81673d2b4d81967e CVE-2023-2621,0,0,46a71fd277c5850785baccb07629db57c3e33b88c0c891670a7f4746f333c8ea,2024-11-21T07:58:56.940000 CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1002,2024-11-21T07:50:55.397000 CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000 -CVE-2023-26213,0,0,918cbfbd489d618354d4dc527419766f5a31b4b4653d8b2671ae25fc3f1414fe,2024-11-21T07:50:55.620000 +CVE-2023-26213,0,1,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000 CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000 CVE-2023-26215,0,0,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000 CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000 @@ -223416,7 +223416,7 @@ CVE-2023-29001,0,0,2e01e43c951dfdd64db54cc8ed52f50c39b9c76eb2af1a84feb2cc7e9477c CVE-2023-29002,0,0,f84b0106ce5dfa611795d04e5b91ff679923e08e69b7621ebdc4b6f3de2466ac,2024-11-21T07:56:22.330000 CVE-2023-29003,0,0,3dc97278bcf396ba949725879aafa267b4fd447ad7cf66d92d1a33f01881edb7,2024-11-21T07:56:22.440000 CVE-2023-29004,0,0,39a71876fb5a5115d257c4713449564c4dac4051956179716e0c87bebf78cdf0,2024-11-21T07:56:22.557000 -CVE-2023-29005,0,1,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000 +CVE-2023-29005,0,0,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000 CVE-2023-29006,0,0,585a9d369737c7a352c58b58b365b45a9d31ebed1f7309dd0ee532fac3a88eb2,2024-11-21T07:56:22.780000 CVE-2023-29007,0,0,0634e7fd207d3299b36698cb4116ba6c4a03b9e3bda5f501964e3a5debfcec85,2024-11-21T07:56:22.897000 CVE-2023-29008,0,0,6dde19320b4cb68b21db819fafbd03f8289902bc4418aa90e213c506e9aa4a0d,2024-11-21T07:56:23.037000 @@ -226961,7 +226961,7 @@ CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726 CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000 CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000 CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000 -CVE-2023-3359,0,0,6b4ba371c859d2e32ceef7547121e7afee7570752bec99ae04789bf27b0c8d71,2024-11-21T08:17:05.823000 +CVE-2023-3359,0,1,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000 CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000 CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000 CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000 @@ -227252,7 +227252,7 @@ CVE-2023-33974,0,0,531e41d5b879646dc4c7aa0d04a15823a13b7b33472a4070b6d3df6d25837 CVE-2023-33975,0,0,2fa415f380f19ec93055bc47f99763c1a62ccb69b74cc7e124876cbb580a8af1,2024-11-21T08:06:19.843000 CVE-2023-33976,0,0,89ad541a1971f4e6c687199980a0c351ef4f09e89d264cf9da92848cc8d79bd3,2024-11-21T08:06:19.983000 CVE-2023-33977,0,0,7f9ae9cf63258eb45b3160b45e0b54f8cf115775476935085e3f3f6ae5de4077,2024-11-21T08:06:20.147000 -CVE-2023-33979,0,0,099fb6dffcbc022c374218fb16825863b988bbe792a606c32f7a8b68a5254d6e,2024-11-21T08:06:20.273000 +CVE-2023-33979,0,1,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000 CVE-2023-3398,0,0,ac532334ebc2ea5d377a047eed3a69a21b57b1a2389b634cb5b7a8c9c83c1db6,2024-11-21T08:17:11.240000 CVE-2023-33980,0,0,b711df1691783ee08c058e35e642804a3b9c96d290c14ba311f8a31f13881963,2025-01-16T16:15:30.280000 CVE-2023-33981,0,0,1b80f20492609165165bcb0710c37d0eb63e70c48a11fc8a6a92dff7de8524f9,2025-01-16T16:15:30.487000 @@ -237563,7 +237563,7 @@ CVE-2023-4771,0,0,1012847fc256ae9ff3628aa2a1fb6186f4f8c6f51233026703d280e3101d9a CVE-2023-47710,0,0,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000 CVE-2023-47711,0,0,77a15db2641f647545705c0975f3dcc067ad400a66996c3ed04d43cdacf82a1a,2025-01-14T21:06:23.587000 CVE-2023-47712,0,0,8b46a8284f80a981721e7d29628c18ac4d5882204e99756c9a6971ec6710e9b1,2025-01-14T21:06:54.440000 -CVE-2023-47714,0,1,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000 +CVE-2023-47714,0,0,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000 CVE-2023-47715,0,0,f4fb27b0d4cb498487b45580c56700f79ca96278065bdf34fcab592745b89aaa,2024-11-21T08:30:43.703000 CVE-2023-47716,0,0,f8aed9cae96f774992c57d65bc6710f8f6684bd42029405056f1fb8b451995c3,2024-11-21T08:30:43.847000 CVE-2023-47717,0,0,d96caec94781e03ee35867e94de91fe6c0b557c8ca5c1e7570fe7751b23a7bf0,2024-12-06T22:15:19.067000 @@ -239486,7 +239486,7 @@ CVE-2023-50303,0,0,577942694687bbb9d20d9e62b97c43d31e6741104a6e0355ef83180bf4146 CVE-2023-50304,0,0,8d7cf710ec0b485f385fbbc85e013f83f0695f8067df88dc02b330fdfee0f44f,2024-11-21T08:36:49.433000 CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414d61,2024-11-21T08:36:49.587000 CVE-2023-50306,0,0,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000 -CVE-2023-50307,0,1,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000 +CVE-2023-50307,0,0,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000 CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000 CVE-2023-50309,0,0,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d6fb,2025-03-04T21:36:47.970000 CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000 @@ -244483,7 +244483,7 @@ CVE-2024-10261,0,0,6398f8d67bdd17ab366f9416d4ddf7ff0254d493e1fa2fab241a87e725ac9 CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000 CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000 CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000 -CVE-2024-10266,0,0,0e9c586a7b52bf6ef37d72c609708f87e3711d72e33bcee296d0f4f532850c3d,2024-10-29T14:34:04.427000 +CVE-2024-10266,0,1,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000 CVE-2024-10268,0,0,d0402bfb3091ce685faa51f2c4c40b45ff8d34a58666307c0eb05cdde79cb95c,2025-01-17T14:57:54.120000 CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf733,2024-11-13T17:59:27.717000 CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000 @@ -246854,7 +246854,7 @@ CVE-2024-12833,0,0,677c1333060f073d8c9581aaa17178e60be70e85d81a38adf3dadf4f16429 CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000 CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08 CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000 -CVE-2024-12837,0,0,7df4ed7bbe4d67e6c1f92bf1270dfa3b3ef56a4db6a64af99757ce1c6f91d042,2025-03-07T08:15:37.313000 +CVE-2024-12837,0,1,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000 CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585ebbdd,2024-12-31T02:15:05.877000 CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 @@ -247631,7 +247631,7 @@ CVE-2024-13663,0,0,880b175977ec5581b5d821dbb9009cc924e13e2d7908761bee2204a2ca2d3 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 CVE-2024-13665,0,0,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000 CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000 -CVE-2024-13668,0,1,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000 +CVE-2024-13668,0,0,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000 CVE-2024-13669,0,0,8903b9e05cf18c6fbdaa9659ddbe3a812ca2295bd3ea5e29169ff59ba112842b,2025-02-26T15:15:23.263000 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 @@ -258780,12 +258780,12 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000 CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000 -CVE-2024-33489,0,0,2fd64b47d87f02d515219db09afc61b80c2c20178417c6cb5c2c7a2d57e839f9,2024-11-21T09:17:00.957000 +CVE-2024-33489,0,1,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000 CVE-2024-3349,0,0,77627706952ed9b21bd8fe86802e39c3a79b47bff5aa5a4099e6b50f2da27242,2025-02-11T14:43:45.883000 -CVE-2024-33490,0,0,5f563e8d0fcf5bb9893e7a6b4ddad19d85792bbefdd87ad3291c208cc1d74439,2024-11-21T09:17:01.093000 -CVE-2024-33491,0,0,f15743d3eb5df305a4b45f3d973b5d970af8ae7ee1fcac5043f4f950e58f32d1,2024-11-21T09:17:01.220000 -CVE-2024-33492,0,0,a1e0034b75eae4ea6bde8f071b76995b720b973a7fdced8d8ca1379be366e030,2024-11-21T09:17:01.340000 -CVE-2024-33493,0,0,ce6a19354e3fb2802f99261979f8a8e7c3468de824b4a201c73017a11b6f67e4,2024-11-21T09:17:01.457000 +CVE-2024-33490,0,1,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000 +CVE-2024-33491,0,1,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000 +CVE-2024-33492,0,1,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000 +CVE-2024-33493,0,1,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000 CVE-2024-33494,0,0,59f5d90daeffa43cbbfaba78c93fa678a165d69a45e730b3cc8593deb34df95b,2024-11-21T09:17:01.577000 CVE-2024-33495,0,0,57b81efae96a7f5a9931902412b22bf475f5cadbad96517560fbcc807d2b75f3,2024-11-21T09:17:01.720000 CVE-2024-33496,0,0,3e0339b75603b80172a8dd08f9727b029d985209c64e779cc52c646d8e6027ce,2024-11-21T09:17:01.867000 @@ -259861,9 +259861,9 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000 CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000 CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000 -CVE-2024-34771,0,0,8c1c3d9b82c5eaba33f3f71e8ec577fb6085b5be8a8cf547169d3de6d9ceed6f,2024-11-21T09:19:22.167000 -CVE-2024-34772,0,0,42418edd3388b62bba8cbdd0a0fcca3217c6812a8eba145942ce31a8d87ea14d,2024-11-21T09:19:22.297000 -CVE-2024-34773,0,0,c5b5c21cb0bb74417c7eb47914baa08816f098875208657202f0022fcf33232d,2024-11-21T09:19:22.427000 +CVE-2024-34771,0,1,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000 +CVE-2024-34772,0,1,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000 +CVE-2024-34773,0,1,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000 CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000 CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210544,2024-11-21T09:19:22.627000 CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000 @@ -261684,8 +261684,8 @@ CVE-2024-37154,0,0,79775441c2eac00a4330a7a5e5b73461a1a9196f77dbc6e682df7449a12cc CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d9094aa,2024-11-18T17:11:17.393000 CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000 CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000 -CVE-2024-37158,0,0,7967b9c1ebde000c094bdb4985911add75942f3d07b607308ff63def742cbd68,2024-11-21T09:23:19.610000 -CVE-2024-37159,0,0,01dc70008a30432b7be4ecd03b55457f1cc54167266fd56547628aa9ed98e6d6,2024-11-21T09:23:19.740000 +CVE-2024-37158,0,1,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000 +CVE-2024-37159,0,1,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000 CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000 CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000 CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000 @@ -263831,7 +263831,7 @@ CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138 CVE-2024-39693,0,0,2a0c67223a67a4cd6565b19d41f2906bca2653f8f96542a5b62429b6479c76d0,2024-11-21T09:28:14.067000 CVE-2024-39694,0,0,b33f1bc6cdf86d31af1545130725483f2391aa4c76f60be75b33572bad66ef8f,2024-08-01T12:42:36.933000 CVE-2024-39695,0,0,4c6a4448c06a4c8d6ff6c2304228798d4d4aaab51edb52346088ef9cd9927593,2024-11-21T09:28:14.270000 -CVE-2024-39696,0,0,666eb1f28251dd112bc801e4df6720711bf4e41071fc9f1d21b98fd713510ce3,2024-11-21T09:28:14.413000 +CVE-2024-39696,0,1,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000 CVE-2024-39697,0,0,f3a7cdaaf41d6cf05c77fea55d7ff9924821768d6a8fc884c5523aed59207e8a,2024-11-21T09:28:14.540000 CVE-2024-39698,0,0,118caf2e6cd58e2f99a9fe181f4d1112f02ddf5bbdd7ff18cf94ce3936612acc,2024-11-21T09:28:14.690000 CVE-2024-39699,0,0,09c189588d9dd611b59094ba3bc24c1b4e450d4d41ea906404b5a63c4aa31b07,2024-11-21T09:28:14.827000 @@ -271848,7 +271848,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000 CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000 -CVE-2024-50600,0,0,57862be166b5927f92dbf71c7c467534c7341eebf3c63252e3212f6e509437ca,2025-03-06T19:15:26.750000 +CVE-2024-50600,0,1,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000 @@ -275759,7 +275759,7 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3 CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000 CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000 -CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f87,2024-11-21T09:48:09.570000 +CVE-2024-5685,0,1,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000 CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 @@ -276343,8 +276343,8 @@ CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b6564 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-57980,0,0,10c77fb6a23488df204986089ebb05944e9c0539ba2e4d3b8fea5d9e62a33d18,2025-02-27T02:15:11.190000 CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000 -CVE-2024-57982,0,0,983763b25b3653755c18e45f478486ce505422e8727217a6a78afd1a479cf237,2025-02-27T02:15:11.397000 -CVE-2024-57983,0,0,cc8076edbca9e9bc9f261b52c60d6967a1fc1ae72d285983b9b2f4988ca1a8e4,2025-02-27T02:15:11.503000 +CVE-2024-57982,0,1,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000 +CVE-2024-57983,0,1,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000 CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000 CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000 CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000 @@ -276606,7 +276606,7 @@ CVE-2024-5981,0,0,120e9491ac8bdb806523fa724951e345b102ad6f09efad6d29148104d1c7a5 CVE-2024-5982,0,0,a70aacb82fb750efd13a720d435a192d8684b9dce2eabb99aac962fe30d3c0ee,2024-11-14T18:52:16.567000 CVE-2024-5983,0,0,7c4833bfc7781d97f423faf674a27a12c2e287e8e9ab5652388348843317c92b,2024-11-21T09:48:41.653000 CVE-2024-5984,0,0,e9007c02bfe46315499412adec83135fbd824808ac1333f399716005b27c2dfa,2024-11-21T09:48:41.800000 -CVE-2024-5985,0,1,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000 +CVE-2024-5985,0,0,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000 CVE-2024-5987,0,0,beef228f72c05791dd04d199520be64d8eda1e129dbc1533ccdca0b455b9e6d7,2024-10-04T12:56:47.997000 CVE-2024-5988,0,0,a9d27d5415bf1cd68cc2a13a9af856f779f310aa287fd46fc01b11e432f43874,2024-11-21T09:48:42.173000 CVE-2024-5989,0,0,9b83ceb061ae8ffbb320f8308cc19d7b2b6774dd575e9b1f0942d3764bfb16da,2024-11-21T09:48:42.330000 @@ -279273,7 +279273,7 @@ CVE-2024-9004,0,0,a2437445f28c6fd040101cd729185112636146c841348f5ffdb5cbb6a1a6cc CVE-2024-9005,0,0,cf7157c1ddadca0c84dad1af4c725274926a9a73df3737beaab7889328488f57,2024-10-10T12:56:30.817000 CVE-2024-9006,0,0,8cc842e07a08255babd245e69b3c1353761d1387b094a4d6d6af3b01cc92dc8e,2024-09-25T18:44:48.940000 CVE-2024-9007,0,0,fb9872a3e10e14f154983a561c697eb19f4cc80a62005f6fed3864bfefb98241,2024-09-25T18:40:31.320000 -CVE-2024-9008,0,1,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000 +CVE-2024-9008,0,0,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000 CVE-2024-9009,0,0,8063a9dee9ed37ad66d07d57c72f73b0e30cf8e7efc6c0a9bad9e9eb439197fa,2024-09-25T17:46:59.077000 CVE-2024-9010,0,0,f1142db89cc1b709fb322bfbe809a95742487f2e35e71f8aae3232553465d8d6,2025-02-11T02:15:36.580000 CVE-2024-9011,0,0,24ced7d06552bc9d1dd30636af61f2f64e910b6c47eefac677c31a4765d5a4db,2024-09-25T17:48:14.820000 @@ -279451,7 +279451,7 @@ CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8a CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000 CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000 CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000 -CVE-2024-9221,0,0,fe6dbc87d919c0427e67adb0b387a38f2ac1a522edeae3829279e72baef9a807,2024-10-15T12:58:51.050000 +CVE-2024-9221,0,1,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000 CVE-2024-9222,0,0,a4a3a09199c7d8b09b4738998d8104dbe367bbcd208fb9266439d154c7f5ddaa,2024-10-08T15:34:13.250000 CVE-2024-9223,0,0,34caff13ef1092c98bf872963a60e7b0f874ac576cd17eef87075b656fb0164c,2024-11-23T04:15:10.037000 CVE-2024-9224,0,0,39d8d5cb3a7793ab0481956574ccd81167c7fcdc46c2c7fe36e709b73a8dce1c,2024-10-07T19:19:38.157000 @@ -279645,7 +279645,7 @@ CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84b CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000 CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000 CVE-2024-9457,0,0,237bf133deeeb6ce22bd7cb82b0da8d260edebfa1038d864508e5e70f23de04e,2024-10-15T14:23:57.307000 -CVE-2024-9458,0,0,80e3d14c9e2b213feb06fb9083f0b2f590246f33dde9293b093890a3cbc600a9,2025-03-07T10:15:16.497000 +CVE-2024-9458,0,1,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000 CVE-2024-9459,0,0,b5f8918700d9fe4520a35b012c84c07b7eef34f306e657c26f87c88066e73f05,2024-11-06T15:29:04.917000 CVE-2024-9460,0,0,a4133ee84221254d0c0b2ee042e3007266c6114612acf7d4db07e6602d682abe,2024-10-08T14:33:42.703000 CVE-2024-9461,0,0,7d9c91cbe544cc2689e175f532112ea98289124a3780c869e31650a971e49d9c,2024-11-26T14:15:22.533000 @@ -281147,13 +281147,13 @@ CVE-2025-1864,0,0,5dcde85bed1ed1221f07f6484eca3855203db58c6f1815d82cefcaf7b5c072 CVE-2025-1866,0,0,d0afd76161369e92718a3d901fc0c2664a4a6cd4b550406fdc5521568f9355a3,2025-03-03T09:15:39.370000 CVE-2025-1867,0,0,8e365b83cef7b7a5f391f2005dcb9922258f062cedfa81b30500ba43743068fa,2025-03-03T09:15:39.520000 CVE-2025-1868,0,0,458001b298730476004eac6d19a8af50c907ad4cd889604956695720bc492f98,2025-03-03T12:15:34.610000 -CVE-2025-1869,0,1,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000 -CVE-2025-1870,0,1,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000 -CVE-2025-1871,0,1,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000 -CVE-2025-1872,0,1,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000 -CVE-2025-1873,0,1,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000 -CVE-2025-1874,0,1,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000 -CVE-2025-1875,0,1,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000 +CVE-2025-1869,0,0,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000 +CVE-2025-1870,0,0,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000 +CVE-2025-1871,0,0,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000 +CVE-2025-1872,0,0,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000 +CVE-2025-1873,0,0,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000 +CVE-2025-1874,0,0,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000 +CVE-2025-1875,0,0,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000 CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000 CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000 CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000 @@ -281356,8 +281356,9 @@ CVE-2025-2066,0,0,5dca3a37881c3080b5ed7399cf07d794623bec104102f99020f28f3358b971 CVE-2025-2067,0,0,3e39862fd040dc0c3c929624d43984557b3839cb6c47b4edad23eed5ac7ebc44,2025-03-07T05:15:17.527000 CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e863,2025-03-07T12:15:34.260000 CVE-2025-2085,0,0,191ae6560abe8476fe190d0474dcec83084d054bdfc1b3da1737410b52c6b5f9,2025-03-07T12:15:35.270000 -CVE-2025-2086,1,1,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000 -CVE-2025-2087,1,1,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000 +CVE-2025-2086,0,0,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000 +CVE-2025-2087,0,0,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000 +CVE-2025-2088,1,1,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000 CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000 @@ -281367,6 +281368,7 @@ CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0f CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000 CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000 CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000 +CVE-2025-2089,1,1,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000 CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000 CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000 CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000 @@ -281377,6 +281379,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9 CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000 CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000 CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000 +CVE-2025-2090,1,1,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000 CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 @@ -283890,6 +283893,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 +CVE-2025-25617,1,1,865fa4993189a6053ac23342f82c40fff5f1cf19a2ef6e091748583a81dd852b,2025-03-07T16:15:38.543000 CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284020,7 +284024,7 @@ CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000 CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000 -CVE-2025-26331,0,0,60841d10062852a459306e6530bd7352dea18c104b031056802fcc3f586c4028,2025-03-07T08:15:43.040000 +CVE-2025-26331,0,1,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 @@ -284302,6 +284306,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75 CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000 CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000 CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000 +CVE-2025-27152,1,1,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000 CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000 CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000 CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000 @@ -284409,6 +284414,8 @@ CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000 CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000 CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000 +CVE-2025-27518,1,1,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000 +CVE-2025-27519,1,1,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000 CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000 CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 @@ -284416,8 +284423,10 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 +CVE-2025-27597,1,1,6cd2d27e6f70c8b8dc560cd90930a7c6cca00c2cfb8b49c56b00236be1fb725c,2025-03-07T16:15:39.893000 CVE-2025-27598,0,0,d2c5c2693a9de5786fd83ab9383213352b59e0b62bd0678134b8bb8975df0743,2025-03-06T23:15:12.183000 CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000 +CVE-2025-27603,1,1,f47d7ab377c12d55b3fa6ae6bb3381884e202826994bb1575cdd6dffba4dc2d5,2025-03-07T16:15:40.037000 CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 @@ -284471,6 +284480,6 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000 CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000 CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000 -CVE-2025-27795,0,0,6c63d0de52e5a5ce88dd4527b7e8b14e866b38ecb9c86e71d93fb66eb57c3f4f,2025-03-07T06:15:33.273000 -CVE-2025-27796,0,0,b3f979689e5dbaabbfdb2bf1ea0d456e5639782116f2a087e75a8e0f34304828,2025-03-07T06:15:35.620000 +CVE-2025-27795,0,1,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000 +CVE-2025-27796,0,1,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000 CVE-2025-27816,0,0,5b2e23c42ea7b22c782ca4f40314ad964756890209d1d752208955d5f400b7bd,2025-03-07T08:15:44.527000