diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json index 8506a73ca82..a4018b7b08d 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json @@ -2,7 +2,7 @@ "id": "CVE-2017-12637", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:01.120", - "lastModified": "2024-11-21T03:09:56.703", + "lastModified": "2025-03-19T19:15:37.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json b/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json index 528a5d1c96e..74a753eef52 100644 --- a/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json +++ b/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json @@ -2,8 +2,8 @@ "id": "CVE-2018-15133", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-09T19:29:00.333", - "lastModified": "2025-02-03T17:15:11.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T20:50:22.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-68xx/CVE-2018-6867.json b/CVE-2018/CVE-2018-68xx/CVE-2018-6867.json index e9f3a3f7fa7..c4822a3d9b0 100644 --- a/CVE-2018/CVE-2018-68xx/CVE-2018-6867.json +++ b/CVE-2018/CVE-2018-68xx/CVE-2018-6867.json @@ -2,7 +2,7 @@ "id": "CVE-2018-6867", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-23T13:29:00.307", - "lastModified": "2024-11-21T04:11:19.643", + "lastModified": "2025-03-19T20:15:13.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -103,6 +103,10 @@ "VDB Entry" ] }, + { + "url": "https://github.com/WlX-33/PoC-for-CVE/blob/main/CVE-2018-6867/Alibaba%20Clone%20Script%201.0.2%20Cross%20Site%20Scripting.txt", + "source": "cve@mitre.org" + }, { "url": "https://exploit-db.com/exploits/44171", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2019/CVE-2019-10000xx/CVE-2019-1000018.json b/CVE-2019/CVE-2019-10000xx/CVE-2019-1000018.json index 0a519901208..bcd72c40415 100644 --- a/CVE-2019/CVE-2019-10000xx/CVE-2019-1000018.json +++ b/CVE-2019/CVE-2019-10000xx/CVE-2019-1000018.json @@ -2,7 +2,7 @@ "id": "CVE-2019-1000018", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-04T21:29:01.377", - "lastModified": "2024-11-21T04:17:41.303", + "lastModified": "2025-03-19T20:15:15.843", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -186,6 +186,10 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/WlX-33/PoC-for-CVE/blob/main/CVE-2021-33216%2CCVE-2019-1000018/CommScope%20Ruckus%20IoT%20Controller%201.7.1.0%20Undocumented%20Account.txt", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00027.html", "source": "cve@mitre.org", @@ -195,15 +199,15 @@ ] }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/", "source": "cve@mitre.org" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/", "source": "cve@mitre.org" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/", "source": "cve@mitre.org" }, { diff --git a/CVE-2019/CVE-2019-130xx/CVE-2019-13029.json b/CVE-2019/CVE-2019-130xx/CVE-2019-13029.json index 83b701f3e6b..39a4855ff1e 100644 --- a/CVE-2019/CVE-2019-130xx/CVE-2019-13029.json +++ b/CVE-2019/CVE-2019-130xx/CVE-2019-13029.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13029", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-11T19:15:13.237", - "lastModified": "2024-11-21T04:24:04.627", + "lastModified": "2025-03-19T20:15:16.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -111,6 +111,10 @@ "VDB Entry" ] }, + { + "url": "https://github.com/WlX-33/PoC-for-CVE/blob/main/CVE-2019-13029/REDCap%20Cross%20Site%20Scripting.txt", + "source": "cve@mitre.org" + }, { "url": "https://gitlab.com/snippets/1874216", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-198xx/CVE-2020-19825.json b/CVE-2020/CVE-2020-198xx/CVE-2020-19825.json index b554fd611f2..386800255cb 100644 --- a/CVE-2020/CVE-2020-198xx/CVE-2020-19825.json +++ b/CVE-2020/CVE-2020-198xx/CVE-2020-19825.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19825", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:10.860", - "lastModified": "2024-11-21T05:09:25.253", + "lastModified": "2025-03-19T19:15:37.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-57xx/CVE-2020-5722.json b/CVE-2020/CVE-2020-57xx/CVE-2020-5722.json index 706a927a1eb..daf3f14ac31 100644 --- a/CVE-2020/CVE-2020-57xx/CVE-2020-5722.json +++ b/CVE-2020/CVE-2020-57xx/CVE-2020-5722.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5722", "sourceIdentifier": "vulnreport@tenable.com", "published": "2020-03-23T20:15:12.043", - "lastModified": "2025-02-06T21:15:15.403", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:56:38.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-57xx/CVE-2020-5735.json b/CVE-2020/CVE-2020-57xx/CVE-2020-5735.json index 30766463544..68164baa3a8 100644 --- a/CVE-2020/CVE-2020-57xx/CVE-2020-5735.json +++ b/CVE-2020/CVE-2020-57xx/CVE-2020-5735.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5735", "sourceIdentifier": "vulnreport@tenable.com", "published": "2020-04-08T13:15:13.003", - "lastModified": "2025-02-06T21:15:15.593", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:56:21.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-57xx/CVE-2020-5741.json b/CVE-2020/CVE-2020-57xx/CVE-2020-5741.json index f941c1482ff..21801fd9dee 100644 --- a/CVE-2020/CVE-2020-57xx/CVE-2020-5741.json +++ b/CVE-2020/CVE-2020-57xx/CVE-2020-5741.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5741", "sourceIdentifier": "vulnreport@tenable.com", "published": "2020-05-08T13:15:11.137", - "lastModified": "2025-02-06T21:15:15.817", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:56:12.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json index 6db389a8320..dc6e4f690a3 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20090", "sourceIdentifier": "vulnreport@tenable.com", "published": "2021-04-29T15:15:10.630", - "lastModified": "2025-02-06T21:15:16.230", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:56:01.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-422xx/CVE-2021-42258.json b/CVE-2021/CVE-2021-422xx/CVE-2021-42258.json index 6cac9af895f..a28890850f4 100644 --- a/CVE-2021/CVE-2021-422xx/CVE-2021-42258.json +++ b/CVE-2021/CVE-2021-422xx/CVE-2021-42258.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42258", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-22T22:15:07.907", - "lastModified": "2025-02-03T16:15:31.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T20:50:35.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-454xx/CVE-2021-45422.json b/CVE-2021/CVE-2021-454xx/CVE-2021-45422.json index 487d9def8b5..17c52cfdecd 100644 --- a/CVE-2021/CVE-2021-454xx/CVE-2021-45422.json +++ b/CVE-2021/CVE-2021-454xx/CVE-2021-45422.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45422", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.540", - "lastModified": "2024-11-21T06:32:11.640", + "lastModified": "2025-03-19T20:15:16.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,6 +101,10 @@ "Broken Link" ] }, + { + "url": "https://github.com/WlX-33/PoC-for-CVE/blob/main/CVE-2021-45422/RLM%2014.2%20Cross%20Site%20Scripting.txt", + "source": "cve@mitre.org" + }, { "url": "https://seclists.org/fulldisclosure/2022/Jan/31", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26352.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26352.json index 7f5e6559f78..153f1bff54e 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26352.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26352.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26352", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-17T22:15:08.787", - "lastModified": "2025-02-03T16:15:32.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T20:50:08.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -133,7 +133,8 @@ "url": "https://groups.google.com/g/dotcms", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Permissions Required" ] }, { @@ -149,7 +150,8 @@ "url": "https://groups.google.com/g/dotcms", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Permissions Required" ] } ] diff --git a/CVE-2022/CVE-2022-276xx/CVE-2022-27677.json b/CVE-2022/CVE-2022-276xx/CVE-2022-27677.json index 0695a989b74..e7886130070 100644 --- a/CVE-2022/CVE-2022-276xx/CVE-2022-27677.json +++ b/CVE-2022/CVE-2022-276xx/CVE-2022-27677.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27677", "sourceIdentifier": "psirt@amd.com", "published": "2023-03-01T08:15:10.407", - "lastModified": "2024-11-21T06:56:09.347", + "lastModified": "2025-03-19T19:15:37.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-324xx/CVE-2022-32478.json b/CVE-2022/CVE-2022-324xx/CVE-2022-32478.json index 773dcd3f06f..83d97d5bb06 100644 --- a/CVE-2022/CVE-2022-324xx/CVE-2022-32478.json +++ b/CVE-2022/CVE-2022-324xx/CVE-2022-32478.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32478", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T02:15:09.813", - "lastModified": "2024-11-21T07:06:24.737", + "lastModified": "2025-03-19T20:15:16.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32955.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32955.json index ba094144b4c..c4b12d160eb 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32955.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32955.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32955", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T02:15:09.940", - "lastModified": "2024-11-21T07:07:18.477", + "lastModified": "2025-03-19T19:15:38.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-388xx/CVE-2022-38868.json b/CVE-2022/CVE-2022-388xx/CVE-2022-38868.json index e099b600ddb..c8bf7994407 100644 --- a/CVE-2022/CVE-2022-388xx/CVE-2022-38868.json +++ b/CVE-2022/CVE-2022-388xx/CVE-2022-38868.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38868", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.723", - "lastModified": "2024-11-21T07:17:12.523", + "lastModified": "2025-03-19T19:15:38.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1389.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1389.json index d6157671758..0557e24829b 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1389.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1389.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1389", "sourceIdentifier": "vulnreport@tenable.com", "published": "2023-03-15T23:15:09.403", - "lastModified": "2025-01-28T17:15:10.167", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:57:29.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21014.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21014.json index d05caf627f3..fe7529c263a 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21014.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21014.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21014", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:13.073", - "lastModified": "2024-11-21T07:42:00.217", + "lastModified": "2025-03-19T19:15:38.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23004.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23004.json index a696035a04b..a61211c2396 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23004.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23004.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23004", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T20:15:14.673", - "lastModified": "2024-11-21T07:45:46.863", + "lastModified": "2025-03-19T20:15:17.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23005.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23005.json index e06effaa67c..fd2954bb71e 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23005.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23005.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23005", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T20:15:15.100", - "lastModified": "2024-11-21T07:45:47.017", + "lastModified": "2025-03-19T19:15:38.563", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23006.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23006.json index dd9eb98f0c7..34fef94657f 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23006.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23006.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23006", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T20:15:15.520", - "lastModified": "2024-11-21T07:45:47.170", + "lastModified": "2025-03-19T19:15:38.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23458.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23458.json index b2763ec29f6..f88cb8a7d0a 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23458.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23458.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23458", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-02-15T19:15:12.300", - "lastModified": "2024-11-21T07:46:14.480", + "lastModified": "2025-03-19T20:15:17.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,13 +52,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "cna@cyber.gov.il", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -68,13 +88,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23459.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23459.json index ac6fa387de6..3818cfb3e90 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23459.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23459.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23459", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-02-15T19:15:12.380", - "lastModified": "2024-11-21T07:46:14.607", + "lastModified": "2025-03-19T20:15:17.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,13 +52,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "cna@cyber.gov.il", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -68,6 +88,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23460.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23460.json index fbf569f7b44..e331d3668c9 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23460.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23460.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23460", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-02-15T19:15:12.453", - "lastModified": "2024-11-21T07:46:14.730", + "lastModified": "2025-03-19T19:15:38.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23461.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23461.json index aab71a2f90d..da83809ac91 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23461.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23461.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23461", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-02-15T19:15:12.520", - "lastModified": "2024-11-21T07:46:14.837", + "lastModified": "2025-03-19T19:15:39.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json index d42a7fcec31..047edfac75b 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25762", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.470", - "lastModified": "2024-11-21T07:50:08.430", + "lastModified": "2025-03-19T19:15:39.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json index 245fa17fadf..a9121dd098f 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25763", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.543", - "lastModified": "2024-11-21T07:50:08.563", + "lastModified": "2025-03-19T19:15:39.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json index ffaf56f0110..957fe419b94 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27992", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-06-19T12:15:09.433", - "lastModified": "2024-11-21T07:53:53.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T20:58:46.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -72,8 +72,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.21\\(aazf.13\\)c0", - "matchCriteriaId": "E1C7EF7A-7A3B-4DAB-B42A-2C84F861A5D2" + "versionEndExcluding": "5.21\\(aazf.14\\)c0", + "matchCriteriaId": "A4A72863-E165-4A25-B53F-EE5F97236C5A" } ] }, @@ -100,8 +100,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:nas540_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.21\\(aatb.10\\)c0", - "matchCriteriaId": "0E8018F0-97F9-46E1-954B-08BA1BCE33AB" + "versionEndExcluding": "5.21\\(aatb.11\\)c0", + "matchCriteriaId": "E86737DF-B02E-484D-AFB8-00D4F3B15330" } ] }, @@ -128,8 +128,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.21\\(abag.10\\)c0", - "matchCriteriaId": "1F106841-EEF2-4EFA-BD32-514AF9C74F22" + "versionEndExcluding": "5.21\\(abag.11\\)c0", + "matchCriteriaId": "DB6182FF-5301-474F-B324-651208839B0F" } ] }, diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json index 3e07b13bede..0d26e418e88 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33140", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:12.433", - "lastModified": "2025-02-28T20:15:43.667", + "lastModified": "2025-03-19T20:15:17.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -103,6 +103,10 @@ "Vendor Advisory" ] }, + { + "url": "https://github.com/WlX-33/PoC-for-CVE/blob/main/CVE-2023-33140/Microsoft%20OneNote%20(Version%202305%20Build%2016.0.16501.20074)%2064-bit%20-%20Spoofing%20Vulnerability.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json index c6509bd023c..d01f9d9b678 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42928.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42928", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.603", - "lastModified": "2024-12-04T22:34:44.777", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:40.030", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json index bae3f57e971..69685c9581e 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42962", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.430", - "lastModified": "2024-11-21T08:23:37.137", + "lastModified": "2025-03-19T20:15:18.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json index 603ba8d377b..55c0c88642c 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47846", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:51.737", - "lastModified": "2024-11-21T08:30:54.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:03:05.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:terryl:wp_githuber_md:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.16.3", + "matchCriteriaId": "6D03C742-C6B2-4018-8147-248873FF728C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-2-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-2-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json index 05c3bcbcc26..b8549011fb9 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47873", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:51.933", - "lastModified": "2024-11-21T08:30:56.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:24:55.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wensolutions:wp_child_theme_generator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "0D85E9EA-DE05-4841-B5AC-D98873EAA310" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-child-theme-generator/wordpress-wp-child-theme-generator-plugin-1-0-8-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-child-theme-generator/wordpress-wp-child-theme-generator-plugin-1-0-8-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json index b7d613dcf2e..20bcb9e96c1 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5631", "sourceIdentifier": "security@eset.com", "published": "2023-10-18T15:15:08.727", - "lastModified": "2025-02-13T18:15:59.250", - "vulnStatus": "Modified", + "lastModified": "2025-03-19T20:57:50.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1231.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1231.json index 9583974c329..f38a52834ce 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1231.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1231.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1231", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-25T05:15:50.443", - "lastModified": "2024-11-21T08:50:06.870", + "lastModified": "2025-03-19T20:15:18.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento CM Download Manager de WordPress anterior a 2.9.0 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados anulen la publicaci\u00f3n de las descargas mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21686.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21686.json index f58cc079dcf..66650bf72f8 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21686.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21686.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21686", "sourceIdentifier": "security@atlassian.com", "published": "2024-07-16T20:15:02.900", - "lastModified": "2025-02-13T17:09:31.977", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:40.200", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22880.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22880.json index 94030176b35..86fbf8d7aac 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22880.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22880", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:22.180", - "lastModified": "2025-03-13T14:15:22.180", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:40.330", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Zadarma Zadarma extension v.1.0.11 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el componente de chat web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/sAjibuu/372fd7d103218dabac95bf12580adbe4", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23962.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23962.json index 9cfc198d9cb..c8946c14bfd 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23962.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23962.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23962", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-01-31T00:15:09.367", - "lastModified": "2025-02-18T19:15:15.260", + "lastModified": "2025-03-19T19:15:40.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas de dispositivos Alpine Halo9. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la interfaz DLT, que escucha en el puerto TCP 3490 de manera predeterminada. El problema es el resultado de la falta de autenticaci\u00f3n antes de permitir el acceso a la funcionalidad. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-847/", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json index 19b9494d023..effa5bc619d 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25920", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T06:15:18.200", - "lastModified": "2024-11-21T09:01:34.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:25:32.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.4", + "matchCriteriaId": "8E3B9A86-9614-49AA-A45A-F7C4337833BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28803.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28803.json index 2362a454a66..5e613792cbe 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28803.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28803", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:24.997", - "lastModified": "2025-03-13T14:15:24.997", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:40.657", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "La vulnerabilidad de Cross Site Scripting (XSS) en Italtel SpA i-MCS NFV v.12.1.0-20211215 permite a atacantes remotos no autenticados inyectar secuencias de comandos web o HTML arbitrarios en par\u00e1metros HTTP/POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", "source": "cve@mitre.org" + }, + { + "url": "https://www.gruppotim.it/it/footer/red-team.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json index 61eb75bd45f..aa26980595b 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2859", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-27T00:15:07.010", - "lastModified": "2025-02-21T17:15:11.730", + "lastModified": "2025-03-19T19:15:40.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240628-0003/", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json index 706329c94be..7686a649c16 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2888", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T06:15:09.300", - "lastModified": "2024-11-21T09:10:45.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:02:10.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:boldgrid:post_and_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.26.3", + "matchCriteriaId": "EE43E3F9-BC79-41F4-962D-ADC622BD683B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-26-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-26-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json index 22cfe7435ef..f5e0e284312 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29915", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T07:15:53.110", - "lastModified": "2024-11-21T09:08:36.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:37:19.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.10", + "matchCriteriaId": "91B16126-D4B7-4FDF-885D-53F21147FB6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json index 21415cb722d..e7862514295 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30454", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T17:15:17.770", - "lastModified": "2024-11-21T09:11:57.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:37:29.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.6.3", + "matchCriteriaId": "E59C762E-F614-4F36-A202-65A86623FF96" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json index 7d7910ccbe7..c7db6672622 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35353", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.580", - "lastModified": "2024-11-21T09:20:11.600", + "lastModified": "2025-03-19T19:15:40.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298777/vuln8-insecure-direct-object-references-idor", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38466.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38466.json index 90458efbfb7..712936e2148 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38466.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38466", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T16:15:09.803", - "lastModified": "2024-11-21T09:25:59.697", + "lastModified": "2025-03-19T20:15:18.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39936.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39936.json index 69f41218304..a601a79e39c 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39936.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39936.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39936", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T21:15:10.180", - "lastModified": "2024-11-21T09:28:36.910", + "lastModified": "2025-03-19T20:15:18.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json index a3dc2fa4aec..d5ce1845555 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40786", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.070", - "lastModified": "2024-11-21T09:31:37.657", + "lastModified": "2025-03-19T20:15:18.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json index 938fd588364..3db19b292c6 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41107", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T11:15:03.323", - "lastModified": "2025-02-21T17:15:12.663", + "lastModified": "2025-03-19T19:15:41.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json index ed02bd241c1..7ac83a2e99a 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43767", "sourceIdentifier": "security@android.com", "published": "2025-01-03T01:15:07.847", - "lastModified": "2025-02-18T22:15:11.020", + "lastModified": "2025-03-19T19:15:41.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En prepare_to_draw_into_mask de SkBlurMaskFilterImpl.cpp, existe un posible desbordamiento de pila debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44135.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44135.json index 8890b9323c0..135526dfbb5 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44135.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44135", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:50.393", - "lastModified": "2024-09-25T13:28:09.067", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:41.400", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json index 27a7f560caa..ec1170b8bec 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44162.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44162", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.060", - "lastModified": "2024-09-29T00:16:28.033", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:41.543", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44866.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44866.json index 88db9823a53..8d591f4d266 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44866.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44866.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44866", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T19:15:22.453", - "lastModified": "2025-03-17T19:15:22.453", + "lastModified": "2025-03-19T19:15:41.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in the GuitarPro1::read function of MuseScore Studio v4.3.2 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via opening a crafted GuitarPro file." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en la funci\u00f3n GuitarPro1::read de MuseScore Studio v4.3.2 permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) al abrir un archivo GuitarPro manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/moonadon9/CVE_2024", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48428.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48428.json index 43607f49d73..93913f7b42e 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48428.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48428", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T15:15:18.827", - "lastModified": "2024-11-14T23:15:02.760", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:41.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-640" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json index 0e5d0dd1330..c6e11f963b3 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48791.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48791", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T18:15:05.420", - "lastModified": "2024-10-15T15:35:19.917", + "lastModified": "2025-03-19T19:15:42.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://www.starvedia.com/", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json new file mode 100644 index 00000000000..ab6cbd8f3c6 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51459", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-19T19:15:42.180", + "lastModified": "2025-03-19T19:15:42.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 could allow a local user to execute privileged commands due to the improper handling of permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185056", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json index 249add9fd3d..99a146d4db5 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53310", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T23:15:10.493", - "lastModified": "2025-02-13T23:15:10.493", + "lastModified": "2025-03-19T19:15:42.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en el controlador de excepciones estructurado en Effectmatrix Total Video Converter Command Line (TVCC) 2.50 cuando se pasa un archivo especialmente manipulado al par\u00e1metro -ff. La vulnerabilidad se produce debido a una gesti\u00f3n inadecuada de la entrada de archivos con caracteres demasiado largos, lo que provoca la corrupci\u00f3n de la memoria. Esto puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario o la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53310/CVE-2024-53310.md", diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53406.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53406.json index 2a19f857af8..719ab929cfe 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53406.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53406", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T17:15:33.410", - "lastModified": "2025-03-13T17:15:33.410", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:42.463", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Espressif Esp idf v5.3.0 es vulnerable a permisos inseguros, lo que resulta en la omisi\u00f3n de la autenticaci\u00f3n. Durante la fase de reconexi\u00f3n, el dispositivo reutiliza la clave de sesi\u00f3n de una sesi\u00f3n anterior, lo que permite a los atacantes ejecutar ataques de omisi\u00f3n de seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://github.com/espressif/esp-idf", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json index 9db1f0cf5bb..b5766a9913c 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54550", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.580", - "lastModified": "2025-02-18T20:15:22.183", + "lastModified": "2025-03-19T19:15:42.697", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda ver la informaci\u00f3n de contacto completada autom\u00e1ticamente de Mensajes y Correo en los registros de sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55060.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55060.json index dbdd0286d0d..f7ba8856af0 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55060.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55060.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55060", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T21:15:42.507", - "lastModified": "2025-03-13T21:15:42.507", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:42.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component index.php of Rafed CMS Website v1.44 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente index.php de Rafed CMS Website v1.44 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/bigzooooz/CVE-2024-55060", @@ -20,6 +59,10 @@ { "url": "https://www.rafed-system.org/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bigzooooz/CVE-2024-55060", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55198.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55198.json index 60c878bc38c..b9cfb98574d 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55198.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55198", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T15:15:49.460", - "lastModified": "2025-03-13T15:15:49.460", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:42.970", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Enumeraci\u00f3n de usuarios mediante discrepancias en los mensajes de error en la funcionalidad de recuperaci\u00f3n de contrase\u00f1a de Celk Sistemas Celk Saude v.3.1.252.1 que permite a un atacante remoto enumerar usuarios a trav\u00e9s de discrepancias en las respuestas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], "references": [ { "url": "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html", @@ -24,6 +59,10 @@ { "url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json index ead52a3b363..947125964a4 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55215.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55215", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.247", - "lastModified": "2025-02-18T19:15:18.970", + "lastModified": "2025-03-19T19:15:43.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en trojan v.2.0.0 a v.2.15.3 permite a un atacante remoto escalar privilegios a trav\u00e9s de la interfaz de inicializaci\u00f3n /auth/register." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/ainrm/Jrohy-trojan-unauth-poc/blob/main/README.en.md", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json index e79cd950f38..7fe5d673187 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55551", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T14:15:37.733", - "lastModified": "2025-03-19T14:15:37.733", + "lastModified": "2025-03-19T19:15:43.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Exasol jdbc driver 24.2.0. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution vulnerability." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm", diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56242.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56242.json index 0ed748f51f7..40314b8cf23 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56242.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56242", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:25.640", - "lastModified": "2025-01-02T12:15:25.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T19:52:59.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "D4CFEA71-83D2-471C-8D6D-8778A3E3E455" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/arconix-shortcodes/vulnerability/wordpress-arconix-shortcodes-plugin-2-1-14-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57061.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57061.json new file mode 100644 index 00000000000..0c1f0c14b22 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57061.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-57061", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-19T19:15:43.377", + "lastModified": "2025-03-19T19:15:43.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Termius Version 9.9.0 through v.9.16.0 allows a physically proximate attacker to execute arbitrary code via the insecure Electron Fuses configuration." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-electron-applications-injection", + "source": "cve@mitre.org" + }, + { + "url": "https://sha999.medium.com/cve-2024-57061-termius-insufficient-electron-fuses-configuration-limited-disclosure-ab00d0970159", + "source": "cve@mitre.org" + }, + { + "url": "https://www.electron.build/tutorials/adding-electron-fuses.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57062.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57062.json index fbaefb89395..04f8754dcd2 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57062.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57062", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T16:15:25.773", - "lastModified": "2025-03-13T16:15:25.773", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:43.523", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Un problema en la aplicaci\u00f3n SoundCloud IOS v.7.65.2 permite que un atacante local escale privilegios y obtenga informaci\u00f3n confidencial a trav\u00e9s del componente de gesti\u00f3n de sesiones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://soundcloud.com", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json index 9ec51dad49a..6af9735e017 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57081.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57081", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.397", - "lastModified": "2025-02-18T19:15:21.140", + "lastModified": "2025-03-19T19:15:43.663", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un prototipo de contaminaci\u00f3n en la funci\u00f3n lib.fromQuery de underscore-contrib v0.3.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/tariqhawis/4b2c7273054f0d70ef162aa5b6daec01", diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57151.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57151.json index aa2036e0e1f..0366b9c9174 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57151.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57151.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57151", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T21:15:31.663", - "lastModified": "2025-03-18T21:15:31.663", + "lastModified": "2025-03-19T19:15:43.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in rainrocka xinhu v.2.6.5 and before allows a remote attacker to execute arbitrary code via the inputAction.php file and the saveAjax function" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en rainrocka xinhu v.2.6.5 y anteriores permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del archivo inputAction.php y la funci\u00f3n saveAjax" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/jcxj/jcxj/blob/master/source/_posts/%E4%BF%A1%E5%91%BCoa%E5%AE%A1%E8%AE%A1.md", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json index da1b9460fd6..248cd63ce98 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6244", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-22T06:15:02.737", - "lastModified": "2024-11-21T09:49:16.333", + "lastModified": "2025-03-19T20:15:19.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7631.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7631.json new file mode 100644 index 00000000000..555b1e06408 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7631.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7631", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-03-19T19:15:43.920", + "lastModified": "2025-03-19T19:15:43.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the OpenShift Console, an endpoint for plugins to serve resources in multiple languages: /locales/resources.json. This endpoint's lng and ns parameters are used to construct a filepath in pkg/plugins/handlers unsafely.go#L112 Because of this unsafe filepath construction, an authenticated user can manipulate the path to retrieve any JSON files on the console's pod by using sequences of ../ and valid directory paths." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7631", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296053", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json index 5905bfdff62..7956bb94ed5 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0443", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.483", - "lastModified": "2025-02-18T21:15:25.007", + "lastModified": "2025-03-19T19:15:44.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La validaci\u00f3n de datos insuficiente en las extensiones de Google Chrome anteriores a la versi\u00f3n 132.0.6834.83 permiti\u00f3 que un atacante remoto convenciera a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario para realizar una escalada de privilegios a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html", diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json index 4d97902a742..11954035951 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0554", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-18T06:15:28.160", - "lastModified": "2025-01-18T06:15:28.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T19:53:31.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.0", + "matchCriteriaId": "D7088445-3ACD-47FD-8A4A-88126ABB1C37" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3217075%40podlove-podcasting-plugin-for-wordpress&new=3217075%40podlove-podcasting-plugin-for-wordpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39d41772-49f3-4bce-a170-cbe64ba99184?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json index 9ce76ca0128..9017757fc2f 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0859.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0859", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-06T10:15:08.340", - "lastModified": "2025-02-06T10:15:08.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T20:35:32.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:boldgrid:post_and_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.27.7", + "matchCriteriaId": "469FDBFB-A9C4-4C1E-85DA-7235C7415863" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/post-and-page-builder/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json index 2c683e36015..a0a9910bd35 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1383", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-06T12:15:35.937", - "lastModified": "2025-03-06T12:15:35.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T20:47:28.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.3", + "matchCriteriaId": "7A0BCD51-C042-4529-9BBC-8D02DF2ABD9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/podlove-podcasting-plugin-for-wordpress/tags/4.2.0/lib/modules/transcripts/transcripts.php#L223", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3246867/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00a95ae7-3c58-4e5e-aaef-c04d1dacf27f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json index ea3d0ced5a0..7d929c56c72 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1661.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1661", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-11T04:15:24.803", - "lastModified": "2025-03-11T04:15:24.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T20:48:03.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.6.6", + "matchCriteriaId": "E0D61F93-67D0-42D0-86C1-2FBF35CA2385" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_text/index.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae7b6fc-2120-4573-8b1b-d5422d435fa5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json index e7b7a6bb699..b4fea4e4e9f 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22907", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.630", - "lastModified": "2025-02-18T21:15:27.480", + "lastModified": "2025-03-19T19:15:44.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro selSSID en la funci\u00f3n formWlSiteSurvey." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://re11s.com", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json index e59991ebeb1..06a0a58d4e4 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24472.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24472", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-02-11T17:15:34.867", - "lastModified": "2025-03-19T01:00:02.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T20:21:38.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,12 +73,58 @@ "value": "CWE-288" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.20", + "matchCriteriaId": "1B14CD59-F557-48A0-8458-BECD3AD7DB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.13", + "matchCriteriaId": "EDC18768-0891-465E-9900-3DF5D22A5CB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.17", + "matchCriteriaId": "BD357034-B2FD-4C2E-97FE-2C54D686D885" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-535", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24605.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24605.json index 6e8a3e4ff1b..6e8682d98ff 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24605.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24605.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24605", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-03T15:15:26.473", - "lastModified": "2025-02-03T15:15:26.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T19:53:58.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.8.6", + "matchCriteriaId": "B40D857A-BF73-40FE-BA25-0DB2EB13149D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/bulk-editor/vulnerability/wordpress-wolf-plugin-1-0-8-5-path-traversal-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2476.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2476.json new file mode 100644 index 00000000000..41f1c1f871d --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2476.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-2476", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-19T19:15:50.447", + "lastModified": "2025-03-19T19:15:50.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Lens in Google Chrome prior to 134.0.6998.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_19.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/401029609", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25363.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25363.json index 08cf3ca30bf..a791e9adad0 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25363.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25363.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25363", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T18:15:50.733", - "lastModified": "2025-03-13T18:15:50.733", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:44.390", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) almacenado y autenticadas en The Plugin People Enterprise Mail Handler for Jira Data Center (JEMH) anterior a v4.1.69-dc permite a atacantes con privilegios de administrador ejecutar Javascript arbitrario en el contexto del navegador de un usuario mediante la inyecci\u00f3n de un payload manipulado en el campo HTML de una plantilla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/florkie/CVE/blob/main/CVE-2025-25363.md", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25565.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25565.json index 53ecb713265..2cec4d9e55f 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25565.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25565.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25565", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T16:15:22.660", - "lastModified": "2025-03-12T16:15:22.660", + "lastModified": "2025-03-19T19:15:44.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "SoftEther VPN 5.02.5187 es vulnerable al desbordamiento del b\u00fafer en el archivo Command.c a trav\u00e9s de las funciones PtMakeCert y PtMakeCert2048." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://lzydry.github.io/CVE-2025-25565/", "source": "cve@mitre.org" + }, + { + "url": "https://lzydry.github.io/CVE-2025-25565/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25567.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25567.json index 91f68ac1aad..595a1ed9323 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25567.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25567.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25567", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T16:15:22.840", - "lastModified": "2025-03-12T16:15:22.840", + "lastModified": "2025-03-19T19:15:44.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "SoftEther VPN 5.02.5187 es vulnerable al desbordamiento del b\u00fafer en Internat.c a trav\u00e9s de la funci\u00f3n UniToStrForSingleChars." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://lzydry.github.io/CVE-2025-25567/", "source": "cve@mitre.org" + }, + { + "url": "https://lzydry.github.io/CVE-2025-25567/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25568.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25568.json index 74a9ff04c65..2ac072f79f8 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25568.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25568.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25568", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T16:15:22.930", - "lastModified": "2025-03-12T16:15:22.930", + "lastModified": "2025-03-19T19:15:44.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "SoftEtherVPN 5.02.5187 es vulnerable a uso despu\u00e9s de la liberaci\u00f3n en el archivo Command.c a trav\u00e9s de la funci\u00f3n CheckNetworkAcceptThread." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://lzydry.github.io/CVE-2025-25568/", "source": "cve@mitre.org" + }, + { + "url": "https://lzydry.github.io/CVE-2025-25568/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json index 4e78bcfde01..9bdf57aa63e 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25580", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.123", - "lastModified": "2025-03-18T15:16:00.123", + "lastModified": "2025-03-19T19:15:44.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the listNameBySql() method at /xml/UserMapper.xml." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que yimioa anterior a v2024.07.04 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del m\u00e9todo listNameBySql() en /xml/UserMapper.xml." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI6XT", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json index 2e38b3170d5..8e64b25dd25 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25582", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T16:15:26.900", - "lastModified": "2025-03-18T16:15:26.900", + "lastModified": "2025-03-19T19:15:45.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the selectNoticeList() method at /xml/OaNoticeMapper.xml." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que yimioa anterior a v2024.07.04 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del m\u00e9todo selectNoticeList() en /xml/OaNoticeMapper.xml." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json index 17baf9cc6f0..2bc53a26ecb 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25585", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.253", - "lastModified": "2025-03-18T15:16:00.253", + "lastModified": "2025-03-19T19:15:45.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in the component /config/WebSecurityConfig.java of yimioa before v2024.07.04 allows unauthorized attackers to arbitrarily modify Administrator passwords." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en el componente /config/WebSecurityConfig.java de yimioa anterior a v2024.07.04 permite a atacantes no autorizados modificar arbitrariamente las contrase\u00f1as de administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json index 7c4ba771ef3..6acfe2c30f2 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25586", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T16:15:27.047", - "lastModified": "2025-03-18T16:15:27.047", + "lastModified": "2025-03-19T19:15:45.367", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "yimioa before v2024.07.04 was discovered to contain an information disclosure vulnerability via the component /resources/application.yml." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que yimioa anterior a v2024.07.04 conten\u00eda una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del componente /resources/application.yml." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-538" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7LR", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json index 24e94ff9713..6c992fb0c6e 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25589", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T16:15:27.200", - "lastModified": "2025-03-18T16:15:27.200", + "lastModified": "2025-03-19T19:15:45.507", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XML external entity (XXE) injection vulnerability in the component /weixin/aes/XMLParse.java of yimioa before v2024.07.04 allows attackers to execute arbitrary code via supplying a crafted XML file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de entidad externa XML (XXE) en el componente /weixin/aes/XMLParse.java de yimioa anterior a v2024.07.04 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el suministro de un archivo XML manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-91" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI81R", diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json index f6befcbaf1a..f2d1137da6c 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25590", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.373", - "lastModified": "2025-03-18T15:16:00.373", + "lastModified": "2025-03-19T19:15:45.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the component /mapper/xml/AddressDao.xml." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que yimioa anterior a v2024.07.04 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /mapper/xml/AddressDao.xml." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25625.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25625.json index 20cb4ce88f9..5f898812d53 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25625.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25625.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25625", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T15:15:53.650", - "lastModified": "2025-03-18T17:15:46.357", + "lastModified": "2025-03-19T19:15:45.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "FS Inc S3150 8T2F Switch s3150-8t2f-switch-fsos-220d_118101 tiene una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la interfaz de administraci\u00f3n web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/whitewhale-dmb/Vulnerability-Research/tree/main/CVE-2025-25625", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25650.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25650.json index 4cf4965b06d..3ebc049d56f 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25650.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25650.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25650", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T15:15:44.293", - "lastModified": "2025-03-17T15:15:44.293", + "lastModified": "2025-03-19T19:15:45.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication." + }, + { + "lang": "es", + "value": "Un problema en el almacenamiento de datos de tarjetas NFC en Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 permite a los atacantes producir tarjetas NFC clonadas para eludir la autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/AbhijithAJ/Dorset_SmartLock_Vulnerability/blob/main/Dorset_Smart_Lock_Security_Assessment_Report.pdf", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25684.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25684.json index 3fe5ab517f1..0e289a654f5 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25684.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25684.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25684", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T17:15:39.463", - "lastModified": "2025-03-17T17:15:39.463", + "lastModified": "2025-03-19T20:15:19.383", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of validation in the path parameter (/download) of GL-INet Beryl AX GL-MT3000 v4.7.0 allows attackers to download arbitrary files from the device's file system via a crafted POST request." + }, + { + "lang": "es", + "value": "La falta de validaci\u00f3n en el par\u00e1metro de ruta (/download) de GL-INet Beryl AX GL-MT3000 v4.7.0 permite a los atacantes descargar archivos arbitrarios del sistema de archivos del dispositivo a trav\u00e9s de una solicitud POST manipulada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://medium.com/@tfortinsec/multiple-path-traversal-vulnerabilities-in-the-beryl-ax-gl-mt300-router-e7f856d14af9", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25871.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25871.json index 5d41b97650b..f61e064b51e 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25871.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25871.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25871", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T16:15:40.767", - "lastModified": "2025-03-14T16:15:40.767", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:46.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Open Panel v.0.3.4 allows a remote attacker to escalate privileges via the Fix Permissions function" + }, + { + "lang": "es", + "value": "Un problema en Open Panel v.0.3.4 permite que un atacante remoto escale privilegios a trav\u00e9s de la funci\u00f3n Fix Permissions" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://openpanel.com/docs/changelog/0.3.5/#%EF%B8%8F-security-fixes", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25872.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25872.json index 8de04d06068..16acf9282ea 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25872.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25872.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25872", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T16:15:40.870", - "lastModified": "2025-03-14T16:15:40.870", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:46.183", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Open Panel v.0.3.4 allows a remote attacker to escalate privileges via the Fix Permissions function" + }, + { + "lang": "es", + "value": "Un problema en Open Panel v.0.3.4 permite que un atacante remoto escale privilegios a trav\u00e9s de la funci\u00f3n Fix Permissions" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://openpanel.com/docs/changelog/0.3.5/#%EF%B8%8F-security-fixes", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25873.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25873.json index 910bf7982c7..7fdc9c23f4f 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25873.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25873.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25873", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T16:15:40.980", - "lastModified": "2025-03-14T16:15:40.980", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:46.320", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in Open Panel OpenAdmin v.0.3.4 allows a remote attacker to escalate privileges via the Change Root Password function" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Request Forgery en Open Panel OpenAdmin v.0.3.4 permite que un atacante remoto escale privilegios a trav\u00e9s de la funci\u00f3n Cambiar contrase\u00f1a de superusuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://openpanel.com/docs/", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25975.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25975.json index 6ff946d9692..1cdbbd2f14d 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25975.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25975.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25975", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T19:15:40.147", - "lastModified": "2025-03-12T19:15:40.147", + "lastModified": "2025-03-19T19:15:46.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Un problema en parse-git-config v.3.0.0 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n expandKeys" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/jonschlinkert/parse-git-config/issues/14", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/jonschlinkert/parse-git-config/issues/14", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2536.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2536.json new file mode 100644 index 00000000000..0ccde54f3da --- /dev/null +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2536.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2536", + "sourceIdentifier": "security@liferay.com", + "published": "2025-03-19T19:15:50.560", + "lastModified": "2025-03-19T19:15:50.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting (XSS) vulnerability on Liferay Portal 7.4.3.82 through 7.4.3.128, and Liferay DXP 2024.Q3.0, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 82 through update 92 in the Frontend JS module's layout-taglib/__liferay__/index.js allows remote attackers to inject arbitrary web script or HTML via toastData parameter" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@liferay.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@liferay.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-2536", + "source": "security@liferay.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26042.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26042.json index b60e216dfbe..8beb44c0317 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26042.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26042.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26042", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T19:15:26.587", - "lastModified": "2025-03-17T19:15:26.587", + "lastModified": "2025-03-19T19:15:46.587", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uptime Kuma >== 1.23.0 has a ReDoS vulnerability, specifically when an administrator creates a notification through the web service. If a string is provided it triggers catastrophic backtracking in the regular expression, leading to a ReDoS attack." + }, + { + "lang": "es", + "value": "Uptime Kuma >== 1.23.0 presenta una vulnerabilidad de ReDoS, espec\u00edficamente cuando un administrador crea una notificaci\u00f3n a trav\u00e9s del servicio web. Si se proporciona una cadena, se desencadena un retroceso catastr\u00f3fico en la expresi\u00f3n regular, lo que provoca un ataque de ReDoS." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/louislam/uptime-kuma/issues/5574", diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json index ffcded45674..47e7c6da921 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26125", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T18:15:21.763", - "lastModified": "2025-03-17T18:15:21.763", + "lastModified": "2025-03-19T19:15:46.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposed ioctl in the IMFForceDelete driver of IObit Malware Fighter v12.1.0 allows attackers to arbitrarily delete files and escalate privileges." + }, + { + "lang": "es", + "value": "Un ioctl expuesto en el controlador IMFForceDelete de IObit Malware Fighter v12.1.0 permite a los atacantes eliminar archivos arbitrariamente y escalar privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26163.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26163.json index 3620de869f7..d14ecc6403a 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26163.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26163", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T03:15:44.333", - "lastModified": "2025-03-14T03:15:44.333", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:46.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que CM Soluces Informatica Ltda Auto Atendimento 1.x.x contiene una inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro CPF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Fr1t0viski/PoCs/blob/main/SQL_Injection_AutoAtendimento", diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26260.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26260.json index b88333ed86e..dc03d00689c 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26260.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26260.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26260", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-12T16:15:23.907", - "lastModified": "2025-03-12T16:15:23.907", + "lastModified": "2025-03-19T19:15:46.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Plenti <= 0.7.16 es vulnerable a la ejecuci\u00f3n de c\u00f3digo. Los usuarios que suben archivos '.svelte' con el endpoint /postLocal pueden definir el nombre del archivo como c\u00f3digo JavaScript. El servidor ejecuta el nombre del archivo subido en el host y provoca la ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://ahmetakan.com/2025/02/14/cve-2025-26260/", @@ -32,6 +67,10 @@ { "url": "https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26699.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26699.json index 73d554a500d..fb81fe2f1ca 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26699.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26699.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26699", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T19:15:27.683", - "lastModified": "2025-03-06T19:15:27.683", + "lastModified": "2025-03-19T20:15:19.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -67,6 +67,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/06/12", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json index a3e0705e397..b4758aa5a01 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26775", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-17T12:15:29.260", - "lastModified": "2025-02-17T12:15:29.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T20:39:46.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.4.5", + "matchCriteriaId": "79FAF810-404C-49C2-A4F6-D9D9985F77D8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/woo-bulk-editor/vulnerability/wordpress-bear-plugin-1-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27018.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27018.json index e7978c0ff24..8af124e8ce6 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27018.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27018.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27018", "sourceIdentifier": "security@apache.org", "published": "2025-03-19T09:15:14.457", - "lastModified": "2025-03-19T09:15:14.457", + "lastModified": "2025-03-19T19:15:47.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -40,6 +40,10 @@ { "url": "https://lists.apache.org/thread/m8ohgkwz4mq9njohf66sjwqjdy28gvzf", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/03/19/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27415.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27415.json new file mode 100644 index 00000000000..92d0715602b --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27415.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27415", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-19T19:15:47.257", + "lastModified": "2025-03-19T19:15:47.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site. It is possible to craft a request, such as https://mysite.com/?/_payload.json which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site. An attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable. This vulnerability is fixed in 3.16.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-jvhm-gjrh-3h93", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27704.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27704.json new file mode 100644 index 00000000000..059038a6379 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27704.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-27704", + "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", + "published": "2025-03-19T19:15:47.390", + "lastModified": "2025-03-19T19:15:47.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a cross-site scripting vulnerability in the Secure\nAccess administrative console of Absolute Secure Access prior to version 13.53.\nAttackers with system administrator permissions can interfere with another\nsystem administrator\u2019s use of the management console when the second\nadministrator logs in. Attack complexity is high, attack requirements are\npresent, privileges required are none, user interaction is required. The impact\nto confidentiality is low, the impact to availability is none, and the impact\nto system integrity is none." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1353/", + "source": "SecurityResponse@netmotionsoftware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27705.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27705.json new file mode 100644 index 00000000000..357f3c4e3b8 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27705.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-27705", + "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", + "published": "2025-03-19T20:15:19.727", + "lastModified": "2025-03-19T20:15:19.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a cross-site scripting vulnerability in the Secure\nAccess administrative console of Absolute Secure Access prior to version 13.53.\nAttackers with system administrator permissions can interfere with another\nsystem administrator\u2019s use of the management console when the second\nadministrator logs in. Attack complexity is high, attack requirements are\npresent, privileges required are none, user interaction is required. The impact\nto confidentiality is low, the impact to availability is none, and the impact\nto system integrity is none." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1353/", + "source": "SecurityResponse@netmotionsoftware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28011.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28011.json index 73b498db0bf..a48b89d9ceb 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28011.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28011.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28011", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T17:15:37.530", - "lastModified": "2025-03-13T17:15:37.530", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:47.517", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una inyecci\u00f3n SQL en loginsystem/change-password.php en PHPGurukul User Registration & Login and User Management System v3.3 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST currentpassword." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Change-password-sql-injection.pdf", diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json index cdd28bc39d3..6f8ac5a1329 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28015", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T16:15:27.810", - "lastModified": "2025-03-13T16:15:27.810", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:47.650", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n HTML en loginsystem/edit-profile.php de PHPGurukul User Registration & Login and User Management System V3.3. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo HTML arbitrario mediante los par\u00e1metros fname, lname y contact." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/HTML%20Injection%20-%20edit-profile.md", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json index d0feae5e48b..79128d9126c 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29030", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T14:15:18.200", - "lastModified": "2025-03-17T19:52:00.090", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:47.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json index 067f13214ae..715b574dd00 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29031", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T14:15:18.430", - "lastModified": "2025-03-17T19:51:38.883", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:47.940", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json index 55e99d4f730..4d378f3b212 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29032", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T14:15:18.623", - "lastModified": "2025-03-14T14:15:18.623", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tenda AC9 v15.03.05.19(6318) conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s de la funci\u00f3n formWifiWpsOOB." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/WhereisDoujo/CVE/issues/6", diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29118.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29118.json index b00b3f24e6f..63f658548fe 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29118.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29118.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29118", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T17:15:41.377", - "lastModified": "2025-03-19T17:15:41.377", + "lastModified": "2025-03-19T19:15:48.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Tenda AC8 V16.03.34.06 was discovered to contain a stack overflow via the src parameter in the function sub_47D878." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_47D878.md", diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29358.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29358.json index 68e43786eec..89f4f92b1cb 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29358.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29358.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29358", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:36.407", - "lastModified": "2025-03-13T14:15:36.407", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.350", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro firewallEn en /goform/SetFirewallCfg. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_2.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_2.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29359.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29359.json index ae0be1b98cf..bc988d77b0a 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29359.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29359.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29359", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:36.547", - "lastModified": "2025-03-13T14:15:36.547", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.480", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro deviceId en /goform/saveParentControlInfo. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_6.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_6.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29360.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29360.json index 20b4e00b59c..c13b9115564 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29360.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29360.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29360", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:36.690", - "lastModified": "2025-03-13T14:15:36.690", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.610", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer mediante los par\u00e1metros time y timeZone en /goform/SetSysTimeCfg. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_1.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_1.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29361.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29361.json index 6f007f20f19..2937519bab1 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29361.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29361.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29361", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:36.833", - "lastModified": "2025-03-13T14:15:36.833", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.743", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro de lista en /goform/SetVirtualServerCfg. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_5.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_5.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29362.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29362.json index 8954e8d4aee..518ba2ab18c 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29362.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29362.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29362", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:36.963", - "lastModified": "2025-03-13T14:15:36.963", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:48.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro de lista en /goform/setPptpUserList. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_3.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_3.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29363.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29363.json index 8ebb72eb315..832348d37f0 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29363.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29363.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29363", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T14:15:37.103", - "lastModified": "2025-03-13T14:15:37.103", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:49.003", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Tenda RX3 US_RX3V1.0br_V16.03.13.11_multi_TDE01 es vulnerable a un desbordamiento de b\u00fafer mediante los par\u00e1metros schedStartTime y schedEndTime en /goform/saveParentControlInfo. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_7.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/Tenda/RX3/tenda_rx3_bof_7.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29384.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29384.json index 4b3c449a69e..ca1b39c1dfc 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29384.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29384.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29384", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T17:15:52.230", - "lastModified": "2025-03-17T19:51:31.257", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:49.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29385.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29385.json index c2508c3b644..f198706a889 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29385.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29385.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29385", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T17:15:52.393", - "lastModified": "2025-03-17T19:51:23.683", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:49.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29386.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29386.json index 6b51594db84..a5e4b91c9ef 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29386.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29386.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29386", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T17:15:52.557", - "lastModified": "2025-03-17T19:51:15.270", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T19:15:49.423", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29405.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29405.json index ef0315e3f3b..841a3174629 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29405.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29405.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29405", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T18:15:25.023", - "lastModified": "2025-03-19T18:15:25.023", + "lastModified": "2025-03-19T19:15:49.567", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An arbitrary file upload vulnerability in the component /admin/template.php of emlog pro 2.5.0 and pro 2.5.* allows attackers to execute arbitrary code via uploading a crafted PHP file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/bGl1o/19a141ee6e899884fa85f3a52898bcc6", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29425.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29425.json index df54b2fa857..f6b3ee30c05 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29425.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29425.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29425", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T19:15:26.957", - "lastModified": "2025-03-17T19:15:26.957", + "lastModified": "2025-03-19T19:15:49.697", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System 1.0 is vulnerable to SQL Injection in exam_save.php via the parameters member and first." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System 1.0 es vulnerable a una inyecci\u00f3n SQL en exam_save.php a trav\u00e9s de los par\u00e1metros member y first." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System.md", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29426.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29426.json index 855d4fb0366..2c589324c5e 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29426.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29426.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29426", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T21:15:14.190", - "lastModified": "2025-03-17T21:15:14.190", + "lastModified": "2025-03-19T19:15:49.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in /pages/class.php via the id and cys parameters." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System V1.0 es vulnerable a cross site scripting (XSS) en /pages/class.php a trav\u00e9s de los par\u00e1metros id y cys." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System-class.php.md", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29427.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29427.json index 87c84d8d3e3..b9076f9b53f 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29427.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29427.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29427", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T19:15:27.067", - "lastModified": "2025-03-17T19:15:27.067", + "lastModified": "2025-03-19T19:15:49.970", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in profile.php via the member_first and member_last parameters." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System V1.0 es vulnerable a cross site scripting (XSS) en profile.php a trav\u00e9s de los par\u00e1metros member_first y member_last." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System-profile.pdf", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29430.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29430.json index 6ee687d0018..acd751f74a5 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29430.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29430.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29430", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T18:15:22.113", - "lastModified": "2025-03-17T18:15:22.113", + "lastModified": "2025-03-19T19:15:50.097", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in /pages/room.php via the id and rome parameters." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System V1.0 es vulnerable a cross site scripting (XSS) en /pages/room.php a trav\u00e9s de los par\u00e1metros id y rome." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System-room.php.md", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29431.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29431.json index 20a7ad85119..415a1e201b0 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29431.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29431.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29431", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T17:15:40.177", - "lastModified": "2025-03-17T17:15:40.177", + "lastModified": "2025-03-19T19:15:50.223", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in /pages/department.php via the id, code, and name parameters." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System V1.0 es vulnerable a cross site scripting (XSS) en /pages/department.php a trav\u00e9s de los par\u00e1metros id, code y name." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 3.2, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System-department.php.md", diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json index 9703a807a9a..f5b631a47b0 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29924", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-19T18:15:25.147", - "lastModified": "2025-03-19T18:15:25.147", + "lastModified": "2025-03-19T20:15:19.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -81,6 +81,10 @@ { "url": "https://jira.xwiki.org/browse/XWIKI-22640", "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22640", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json index 09b48849db8..be4ac625a89 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29925", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-19T18:15:25.300", - "lastModified": "2025-03-19T18:15:25.300", + "lastModified": "2025-03-19T20:15:19.987", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -89,6 +89,14 @@ { "url": "https://jira.xwiki.org/browse/XWIKI-22639", "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22630", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22639", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30022.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30022.json index c5720caa309..56b931a04a3 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30022.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30022.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30022", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-14T03:15:45.257", - "lastModified": "2025-03-14T03:15:45.257", - "vulnStatus": "Received", + "lastModified": "2025-03-19T19:15:50.703", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que CM Soluces Informatica Ltda Auto Atendimento 1.x.x contiene una inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro DATANASC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Fr1t0viski/PoCs/blob/main/SQL_Injection_AutoAtendimento", diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json index 510446fc17a..2997a5b54f1 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30066", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-15T06:15:12.193", - "lastModified": "2025-03-19T01:00:02.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T20:26:04.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 } ] }, @@ -53,88 +73,183 @@ "value": "CWE-506" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tj-actions:changed-files:*:*:*:*:*:*:*:*", + "versionEndIncluding": "45.0.7", + "matchCriteriaId": "23B2BE4B-AC69-4088-9ABD-ACDB46ABAA9A" + } + ] + } + ] } ], "references": [ { "url": "https://blog.gitguardian.com/compromised-tj-actions/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/chains-project/maven-lockfile/pull/1111", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/espressif/arduino-esp32/issues/11127", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/modal-labs/modal-examples/issues/1100", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/rackerlabs/genestack/pull/903", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tj-actions/changed-files/issues/2463", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/tj-actions/changed-files/issues/2464", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/tj-actions/changed-files/issues/2477", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://news.ycombinator.com/item?id=43367987", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://news.ycombinator.com/item?id=43368870", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://web.archive.org/web/20250315060250/https://github.com/tj-actions/changed-files/issues/2463", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respond", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attack", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30196.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30196.json index c691f4a1e8e..e45935b579a 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30196.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30196.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30196", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-03-19T16:15:33.950", - "lastModified": "2025-03-19T16:15:33.950", + "lastModified": "2025-03-19T19:15:50.980", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control the input file for the Anchor Chain post-build step." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3529", diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30258.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30258.json new file mode 100644 index 00000000000..42257899a68 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30258.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30258", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-19T20:15:20.140", + "lastModified": "2025-03-19T20:15:20.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \"verification DoS.\"" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://dev.gnupg.org/T7527", + "source": "cve@mitre.org" + }, + { + "url": "https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6ee2ca252dd..e8132585f87 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-19T19:00:20.180496+00:00 +2025-03-19T21:00:19.839456+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-19T18:52:24.573000+00:00 +2025-03-19T20:58:46.307000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285697 +285706 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `9` -- [CVE-2024-25132](CVE-2024/CVE-2024-251xx/CVE-2024-25132.json) (`2025-03-19T18:15:20.513`) -- [CVE-2024-53967](CVE-2024/CVE-2024-539xx/CVE-2024-53967.json) (`2025-03-19T17:15:40.313`) -- [CVE-2024-53968](CVE-2024/CVE-2024-539xx/CVE-2024-53968.json) (`2025-03-19T17:15:40.467`) -- [CVE-2024-53969](CVE-2024/CVE-2024-539xx/CVE-2024-53969.json) (`2025-03-19T17:15:40.610`) -- [CVE-2024-53970](CVE-2024/CVE-2024-539xx/CVE-2024-53970.json) (`2025-03-19T17:15:40.750`) -- [CVE-2025-0431](CVE-2025/CVE-2025-04xx/CVE-2025-0431.json) (`2025-03-19T17:15:41.217`) -- [CVE-2025-29118](CVE-2025/CVE-2025-291xx/CVE-2025-29118.json) (`2025-03-19T17:15:41.377`) -- [CVE-2025-29405](CVE-2025/CVE-2025-294xx/CVE-2025-29405.json) (`2025-03-19T18:15:25.023`) -- [CVE-2025-29924](CVE-2025/CVE-2025-299xx/CVE-2025-29924.json) (`2025-03-19T18:15:25.147`) -- [CVE-2025-29925](CVE-2025/CVE-2025-299xx/CVE-2025-29925.json) (`2025-03-19T18:15:25.300`) -- [CVE-2025-29926](CVE-2025/CVE-2025-299xx/CVE-2025-29926.json) (`2025-03-19T18:15:25.770`) +- [CVE-2024-51459](CVE-2024/CVE-2024-514xx/CVE-2024-51459.json) (`2025-03-19T19:15:42.180`) +- [CVE-2024-57061](CVE-2024/CVE-2024-570xx/CVE-2024-57061.json) (`2025-03-19T19:15:43.377`) +- [CVE-2024-7631](CVE-2024/CVE-2024-76xx/CVE-2024-7631.json) (`2025-03-19T19:15:43.920`) +- [CVE-2025-2476](CVE-2025/CVE-2025-24xx/CVE-2025-2476.json) (`2025-03-19T19:15:50.447`) +- [CVE-2025-2536](CVE-2025/CVE-2025-25xx/CVE-2025-2536.json) (`2025-03-19T19:15:50.560`) +- [CVE-2025-27415](CVE-2025/CVE-2025-274xx/CVE-2025-27415.json) (`2025-03-19T19:15:47.257`) +- [CVE-2025-27704](CVE-2025/CVE-2025-277xx/CVE-2025-27704.json) (`2025-03-19T19:15:47.390`) +- [CVE-2025-27705](CVE-2025/CVE-2025-277xx/CVE-2025-27705.json) (`2025-03-19T20:15:19.727`) +- [CVE-2025-30258](CVE-2025/CVE-2025-302xx/CVE-2025-30258.json) (`2025-03-19T20:15:20.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `71` +Recently modified CVEs: `126` -- [CVE-2024-40852](CVE-2024/CVE-2024-408xx/CVE-2024-40852.json) (`2025-03-19T18:15:21.487`) -- [CVE-2024-41443](CVE-2024/CVE-2024-414xx/CVE-2024-41443.json) (`2025-03-19T18:15:21.627`) -- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2025-03-19T18:15:21.827`) -- [CVE-2024-43331](CVE-2024/CVE-2024-433xx/CVE-2024-43331.json) (`2025-03-19T18:52:24.573`) -- [CVE-2024-43984](CVE-2024/CVE-2024-439xx/CVE-2024-43984.json) (`2025-03-19T17:13:49.970`) -- [CVE-2024-44188](CVE-2024/CVE-2024-441xx/CVE-2024-44188.json) (`2025-03-19T17:15:40.147`) -- [CVE-2024-44449](CVE-2024/CVE-2024-444xx/CVE-2024-44449.json) (`2025-03-19T18:15:22.013`) -- [CVE-2024-44684](CVE-2024/CVE-2024-446xx/CVE-2024-44684.json) (`2025-03-19T18:15:22.233`) -- [CVE-2024-46553](CVE-2024/CVE-2024-465xx/CVE-2024-46553.json) (`2025-03-19T18:15:22.473`) -- [CVE-2024-46561](CVE-2024/CVE-2024-465xx/CVE-2024-46561.json) (`2025-03-19T18:15:22.667`) -- [CVE-2024-47487](CVE-2024/CVE-2024-474xx/CVE-2024-47487.json) (`2025-03-19T18:15:22.890`) -- [CVE-2024-47803](CVE-2024/CVE-2024-478xx/CVE-2024-47803.json) (`2025-03-19T18:15:23.033`) -- [CVE-2024-50656](CVE-2024/CVE-2024-506xx/CVE-2024-50656.json) (`2025-03-19T18:15:23.200`) -- [CVE-2024-54658](CVE-2024/CVE-2024-546xx/CVE-2024-54658.json) (`2025-03-19T18:15:23.533`) -- [CVE-2024-56222](CVE-2024/CVE-2024-562xx/CVE-2024-56222.json) (`2025-03-19T17:45:39.500`) -- [CVE-2024-57162](CVE-2024/CVE-2024-571xx/CVE-2024-57162.json) (`2025-03-19T18:15:23.717`) -- [CVE-2024-6219](CVE-2024/CVE-2024-62xx/CVE-2024-6219.json) (`2025-03-19T17:15:40.890`) -- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2025-03-19T17:15:41.057`) -- [CVE-2024-8394](CVE-2024/CVE-2024-83xx/CVE-2024-8394.json) (`2025-03-19T18:15:23.957`) -- [CVE-2024-9403](CVE-2024/CVE-2024-94xx/CVE-2024-9403.json) (`2025-03-19T18:15:24.137`) -- [CVE-2025-20636](CVE-2025/CVE-2025-206xx/CVE-2025-20636.json) (`2025-03-19T18:15:24.400`) -- [CVE-2025-22759](CVE-2025/CVE-2025-227xx/CVE-2025-22759.json) (`2025-03-19T17:53:18.300`) -- [CVE-2025-22760](CVE-2025/CVE-2025-227xx/CVE-2025-22760.json) (`2025-03-19T17:52:06.277`) -- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-03-19T18:15:24.580`) -- [CVE-2025-24124](CVE-2025/CVE-2025-241xx/CVE-2025-24124.json) (`2025-03-19T18:15:24.787`) +- [CVE-2025-28015](CVE-2025/CVE-2025-280xx/CVE-2025-28015.json) (`2025-03-19T19:15:47.650`) +- [CVE-2025-29030](CVE-2025/CVE-2025-290xx/CVE-2025-29030.json) (`2025-03-19T19:15:47.790`) +- [CVE-2025-29031](CVE-2025/CVE-2025-290xx/CVE-2025-29031.json) (`2025-03-19T19:15:47.940`) +- [CVE-2025-29032](CVE-2025/CVE-2025-290xx/CVE-2025-29032.json) (`2025-03-19T19:15:48.083`) +- [CVE-2025-29118](CVE-2025/CVE-2025-291xx/CVE-2025-29118.json) (`2025-03-19T19:15:48.220`) +- [CVE-2025-29358](CVE-2025/CVE-2025-293xx/CVE-2025-29358.json) (`2025-03-19T19:15:48.350`) +- [CVE-2025-29359](CVE-2025/CVE-2025-293xx/CVE-2025-29359.json) (`2025-03-19T19:15:48.480`) +- [CVE-2025-29360](CVE-2025/CVE-2025-293xx/CVE-2025-29360.json) (`2025-03-19T19:15:48.610`) +- [CVE-2025-29361](CVE-2025/CVE-2025-293xx/CVE-2025-29361.json) (`2025-03-19T19:15:48.743`) +- [CVE-2025-29362](CVE-2025/CVE-2025-293xx/CVE-2025-29362.json) (`2025-03-19T19:15:48.877`) +- [CVE-2025-29363](CVE-2025/CVE-2025-293xx/CVE-2025-29363.json) (`2025-03-19T19:15:49.003`) +- [CVE-2025-29384](CVE-2025/CVE-2025-293xx/CVE-2025-29384.json) (`2025-03-19T19:15:49.133`) +- [CVE-2025-29385](CVE-2025/CVE-2025-293xx/CVE-2025-29385.json) (`2025-03-19T19:15:49.280`) +- [CVE-2025-29386](CVE-2025/CVE-2025-293xx/CVE-2025-29386.json) (`2025-03-19T19:15:49.423`) +- [CVE-2025-29405](CVE-2025/CVE-2025-294xx/CVE-2025-29405.json) (`2025-03-19T19:15:49.567`) +- [CVE-2025-29425](CVE-2025/CVE-2025-294xx/CVE-2025-29425.json) (`2025-03-19T19:15:49.697`) +- [CVE-2025-29426](CVE-2025/CVE-2025-294xx/CVE-2025-29426.json) (`2025-03-19T19:15:49.830`) +- [CVE-2025-29427](CVE-2025/CVE-2025-294xx/CVE-2025-29427.json) (`2025-03-19T19:15:49.970`) +- [CVE-2025-29430](CVE-2025/CVE-2025-294xx/CVE-2025-29430.json) (`2025-03-19T19:15:50.097`) +- [CVE-2025-29431](CVE-2025/CVE-2025-294xx/CVE-2025-29431.json) (`2025-03-19T19:15:50.223`) +- [CVE-2025-29924](CVE-2025/CVE-2025-299xx/CVE-2025-29924.json) (`2025-03-19T20:15:19.873`) +- [CVE-2025-29925](CVE-2025/CVE-2025-299xx/CVE-2025-29925.json) (`2025-03-19T20:15:19.987`) +- [CVE-2025-30022](CVE-2025/CVE-2025-300xx/CVE-2025-30022.json) (`2025-03-19T19:15:50.703`) +- [CVE-2025-30066](CVE-2025/CVE-2025-300xx/CVE-2025-30066.json) (`2025-03-19T20:26:04.510`) +- [CVE-2025-30196](CVE-2025/CVE-2025-301xx/CVE-2025-30196.json) (`2025-03-19T19:15:50.980`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6b25bad579c..d3dedf907ad 100644 --- a/_state.csv +++ b/_state.csv @@ -96408,7 +96408,7 @@ CVE-2017-12633,0,0,85930a2bf778b4f4f57357436c86ab256c46744871048698c82901a2fcb3e CVE-2017-12634,0,0,285fa30501b95fd53aff13c49a313d2354c790284dfb455fff910e16905e8854,2024-11-21T03:09:56.363000 CVE-2017-12635,0,0,ef5830d432984d0f0a23c315dc13e543960e983cd8544c887f73d7e90991e23d,2024-11-21T03:09:56.480000 CVE-2017-12636,0,0,d1dc922161316d5bf30343a79f560dc7590c7dc5e131b4739914d7cd825b4a40,2024-11-21T03:09:56.593000 -CVE-2017-12637,0,0,0fa367843dc5e7cbd76ac4df6f470ef205c8c117394a31901329bb4ac2158924,2024-11-21T03:09:56.703000 +CVE-2017-12637,0,1,90c727329d6b05ca838ad8777a219c3312f810b9aa3f68ff745f707f8bacc207,2025-03-19T19:15:37.440000 CVE-2017-12638,0,0,95f4d9075726c3dad3050ad010c865ba00b979be48ef168b1a789aded5bcc9f3,2024-11-21T03:09:56.837000 CVE-2017-12639,0,0,44b0ae40eb65ce63a9e70a0d6bfcaa7064777a627e9853ee1888fb1639a9523b,2024-11-21T03:09:56.960000 CVE-2017-1264,0,0,01d2f39bf96f3f81c69f7d13a8cea1c49d8936ff57f7f6846754b9f4979ca941,2024-11-21T03:21:36.107000 @@ -115695,7 +115695,7 @@ CVE-2018-1513,0,0,6cda270e22bc115129fb7cc8951ab25c70103e7808dc5c2d634f430d372e65 CVE-2018-15130,0,0,7de56146f245a65b86b19d9825d4ea7e5b1c6e25b5be9aff7ce173d630525086,2024-11-21T03:50:22.250000 CVE-2018-15131,0,0,b9d55bfea7d19e65f86f8fe245d01831be4b7b53d6b79a30ae91e11182e1b51e,2024-11-21T03:50:22.400000 CVE-2018-15132,0,0,a674515e901bc12829e5dc19a54327b8ced3f32b41d11ea79b1b56e1639b7105,2024-11-21T03:50:22.557000 -CVE-2018-15133,0,0,8c76d782622a0f57613c48367ed38f8a2fee1f75be8ebef3f72812294dd7b290,2025-02-03T17:15:11.260000 +CVE-2018-15133,0,1,00ddb87b5104d1e1823860b4f6749b33883dec11ab0aeeb7f5b2006078c042e2,2025-03-19T20:50:22.950000 CVE-2018-15136,0,0,ec32920866b3caf7f95e7b73ea601002fa286d3c02fa93191be3270046396af9,2024-11-21T03:50:22.870000 CVE-2018-15137,0,0,71fc17076a1dc630b4fd600e78df68560a1e899be7cc8de3f73e7b4df8a31eb6,2024-11-21T03:50:23.037000 CVE-2018-15138,0,0,72f6971caea73fa4974403b30aa335acbeac5ffe674304e54bc8413f19f145ec,2024-11-21T03:50:23.190000 @@ -125027,7 +125027,7 @@ CVE-2018-6862,0,0,86c8baef37aae6ef6c3a26e702ed5584af31488489321be55a0d6057e3ff91 CVE-2018-6863,0,0,4949740fbcaf9fc6e7cf3e81ab955b075a002aa9170b472d47006e439edb44ae,2024-11-21T04:11:19.200000 CVE-2018-6864,0,0,55065b2154cffa8359e23758803213e949d9d08536e70e504a752604db8b1d03,2024-11-21T04:11:19.347000 CVE-2018-6866,0,0,42edb473477c06ee5c2fa2730148138a8b21df2b8d1f73123c1455703c86face,2024-11-21T04:11:19.497000 -CVE-2018-6867,0,0,09f329f7e96813aa80d6e8ad884bec82fb8d851dd7a35a2167a850af87d35a78,2024-11-21T04:11:19.643000 +CVE-2018-6867,0,1,81f16181143e60fb10047510c3728341969cf17d603c8a07d270c782148541d6,2025-03-19T20:15:13.777000 CVE-2018-6868,0,0,d6e5f4388f00a85b06af7855c2fce9e4069a5696b53bbadb82c52391605e8856,2024-11-21T04:11:19.797000 CVE-2018-6869,0,0,d535de9f2c1238a3d71db5c19f56aeb673342eba563535c44c5864c1b5ab269b,2024-11-21T04:11:19.947000 CVE-2018-6870,0,0,9acfdc43a4046c82460752ec16314e9ce6afca05b9f61dea284c44a70d87e6ec,2024-11-21T04:11:20.097000 @@ -126999,7 +126999,7 @@ CVE-2018-9408,0,0,d789fa912b087296f24deff1e2d30bd08f527fbce9788bd053320debca25ac CVE-2018-9409,0,0,235ab4240b8f6a16f10dabebfc2a425e04d6055e3ccbd4af869fd3cdbdaa4a6d,2024-11-20T20:35:04.480000 CVE-2018-9410,0,0,df3ce3e6de4ffedbc96ebc88b1ffcfb3a929df188608608b94d23d5330115d42,2024-11-22T22:28:51.533000 CVE-2018-9411,0,0,18c6fd45cb373e5ef137d027fafac63305394d9c07fa2389a65d99934cccf131,2024-11-22T22:30:25.617000 -CVE-2018-9412,0,1,6ed119d4f46428ac6f12a2306001a2fdd49571407a3afa3c031d6b3c92354d00,2025-03-19T18:15:16.067000 +CVE-2018-9412,0,0,6ed119d4f46428ac6f12a2306001a2fdd49571407a3afa3c031d6b3c92354d00,2025-03-19T18:15:16.067000 CVE-2018-9413,0,0,36638c2107e21aedf8349bbddda35b46864bf2377ad1e51c93869304d9c4c461,2024-12-18T19:34:36.097000 CVE-2018-9414,0,0,01c613dd351dcf0030f77486a5930a7a16e898607949746cf6497d0f498e0390,2024-12-18T19:28:40.127000 CVE-2018-9415,0,0,7bbac4461eea15ff5d707d056a8513003ba0bf9a8f89123a2d316e590dd4f098,2024-11-21T04:15:26.040000 @@ -128101,7 +128101,7 @@ CVE-2019-1000014,0,0,b65fc8f6af4bb2900aced273598363285ca01280ddbe205d84b584d06e2 CVE-2019-1000015,0,0,c17b3c8fdce667592aaf91e272a2f84711cde63dc9e9c3a3da46c39da5ddb118,2024-11-21T04:17:40.887000 CVE-2019-1000016,0,0,002929b10fbd8c72b5f90095dff77c82caca244da29c76c02e85dbd8ad2f03af,2024-11-21T04:17:41.023000 CVE-2019-1000017,0,0,54dc94b30e0dd86ce79ad5fa7006b67e3f8f87236a4a5ef622e73579e0a3d42f,2024-11-21T04:17:41.160000 -CVE-2019-1000018,0,0,b1f3810a6113dabcf6d12a65c328224e97c16f514a1d67133c170bada38a3065,2024-11-21T04:17:41.303000 +CVE-2019-1000018,0,1,1e5392b68070f19a6d46dd932eada737fe118636c8f75d83911d2fc926c28d52,2025-03-19T20:15:15.843000 CVE-2019-1000019,0,0,6499080d7f457a0e5d7a75bf70e11d7d202ef06b217f85135359bf74b6aaf0f2,2024-11-21T04:17:41.483000 CVE-2019-1000020,0,0,b5422b59c29e6aca7369f0c4cf50c64483717fbbc02eba1df8b9fee2c47d8311,2024-11-21T04:17:41.660000 CVE-2019-1000021,0,0,5190571674d258900250183281b33891a921cd179c430bef59416244c8e2a2e3,2024-11-21T04:17:41.830000 @@ -131252,7 +131252,7 @@ CVE-2019-13025,0,0,1f1e01c325d2e7ee3245024c915a3360f94b8f645a76d4b9d406be9264a9a CVE-2019-13026,0,0,7adfae9af065c1d1006c93f3516dc369294b930326fc7814eb7ccaad8a9e0317,2024-11-21T04:24:03.593000 CVE-2019-13027,0,0,5de6aff797f58cdd550c6aa90a71d7b947052f6d10458c3b2feecc9735d6b73b,2024-11-21T04:24:03.773000 CVE-2019-13028,0,0,a3b42aa6972b10c2a17f8fe78be471e0db253bae35c578ecb93e51b60db46c28,2024-11-21T04:24:03.947000 -CVE-2019-13029,0,0,d6bbe0e1fbbe3bfc664eddc582023a93070f2f70e20fc3e7c0629a89c77e3e45,2024-11-21T04:24:04.627000 +CVE-2019-13029,0,1,ea508c4dcdcd742f252189891742bd8ae733cd891c3f95ef06cd66dbb7a27969,2025-03-19T20:15:16.460000 CVE-2019-1303,0,0,2176b454721a50fbaad96bd22b59323b18940d5c218d06a23615b001bbe570ed,2024-11-21T04:36:26.227000 CVE-2019-13030,0,0,0946ecfab4d2b9b29cc7f0c59a46474b75ded40451703a436c6116ebf08b9476,2024-11-21T04:24:04.787000 CVE-2019-13031,0,0,86e5c44784e24fb0b05bd624cd8e5fe872c6bfda5f155f5c7343a595e5e346de,2024-11-21T04:24:04.953000 @@ -152630,7 +152630,7 @@ CVE-2020-1982,0,0,4a9e2b5a1c9d442b6df4fc592f767edee7be2ccc64915c64acc6b192c190fc CVE-2020-19821,0,0,0e83761e10899224edf09b1ba999ff79619cf214827022d0dc31a1f8c728ecc2,2024-11-21T05:09:24.793000 CVE-2020-19822,0,0,97070ab759a3be554584de586ea301eb07a7396d9c55f4a7387014304adff71e,2024-11-21T05:09:24.943000 CVE-2020-19824,0,0,dea7dea7c01930bedb51967090b3aa70be2aaf8bb6357ede383b80624b7c4a49,2025-03-19T15:15:33.997000 -CVE-2020-19825,0,0,189f1af15e49e46824d726dc47119f60983cc6bac318100b209d1ae6ce3c02ec,2024-11-21T05:09:25.253000 +CVE-2020-19825,0,1,237182afe1b10906c31cfe8ee481c063232da9f343bd13394f2623488e563a39,2025-03-19T19:15:37.733000 CVE-2020-1983,0,0,5e287741e0f5bf6ef97e2ce43bc184b7f25da1abe5bb9ea1438827852402429d,2024-11-21T05:11:47.053000 CVE-2020-1984,0,0,1e1571a51b22a46f28eef2a9c5feee1570da9fe97c67f2c9a0e13dff7a76f69e,2024-11-21T05:11:47.203000 CVE-2020-1985,0,0,a37a6a1008ce99482134b7c084d9066a5a57957066e7756df45f43cddcf3ad8a,2024-11-21T05:11:47.330000 @@ -161225,7 +161225,7 @@ CVE-2020-5685,0,0,3ec07674a946404380680590050e1f202b209ebee4b286a5a3fefce2853128 CVE-2020-5686,0,0,c670916d310532541fd4a829663b29374fc48d5f165b3c08f2946cbf5c88a6f9,2024-11-21T05:34:28.793000 CVE-2020-5720,0,0,97b0c6cd8d70e9ffdbb1a640dedb1a964b70a214ede5f9da8ff364dd902a99a6,2024-11-21T05:34:28.890000 CVE-2020-5721,0,0,0efdebf4664c56a6da185bb2db1a46936709af37065307df17738f16e75c21f8,2024-11-21T05:34:28.990000 -CVE-2020-5722,0,0,c82af08cbd4c0253907827557ebf66032c5085e66db5e068c101977a30b511c0,2025-02-06T21:15:15.403000 +CVE-2020-5722,0,1,ef055c7c82d1985ddead4de33718383f6b784b6cdbcd9e7950e4562e9b9a958a,2025-03-19T20:56:38.223000 CVE-2020-5723,0,0,de1e613ccca4deb952358e8ee152f5cf5266aa13bc59cb43524c428470e5df85,2024-11-21T05:34:29.200000 CVE-2020-5724,0,0,7e0ad174436ed3df017a8b6ae4cd69300f87f6c16364aceb7cc9d443c70baa9c,2024-11-21T05:34:29.297000 CVE-2020-5725,0,0,949235d5fc0be296f4b90fc6617d1db7481681867f746c62fa3aabff2e6e73cc,2024-11-21T05:34:29.400000 @@ -161238,13 +161238,13 @@ CVE-2020-5731,0,0,59dde44cc24998739a047f6f305a1515b17145885410bd9c9b43bb977c5106 CVE-2020-5732,0,0,90b8b9ab025e6e00fd7ea504ee6ef42f9f52fcb8e712c63d2bc0be409e7bdf3e,2024-11-21T05:34:30.090000 CVE-2020-5733,0,0,6fb68f769f63a24d06bbc109b461fde1c2d99be9ca83e94eb9eb1e7e2cb83cc0,2024-11-21T05:34:30.183000 CVE-2020-5734,0,0,98b3ef23673dae44cbe0c4a4cc30e942f05ef9796a39afd911a1b86e34aba63b,2024-11-21T05:34:30.280000 -CVE-2020-5735,0,0,59301d8dafe0d6040ef97d850045ee84fed1070cb6c08ab1b9510ddb324ae92f,2025-02-06T21:15:15.593000 +CVE-2020-5735,0,1,2265ef9fa5ea181ca3c9630c4f2ff6dfe828368c6f465157766841a3c547768f,2025-03-19T20:56:21.727000 CVE-2020-5736,0,0,7d92d168955aadab5f39bf16172baf68f7654916299ee74fa995fb398195e930,2024-11-21T05:34:30.500000 CVE-2020-5737,0,0,b1e9ac0ea9596d9b98b38765c9f185c072c627338eb2331f93c6b608f5dcbed6,2024-11-21T05:34:30.617000 CVE-2020-5738,0,0,1bc045d6938959bf6c0698b410fe4c1217ec4d2907b932255ace49b13afdbf32,2024-11-21T05:34:30.727000 CVE-2020-5739,0,0,3758cc9e2b3a2048dd2b049409c761a3968ef2c9d1e62d43b597150fc3814149,2024-11-21T05:34:30.837000 CVE-2020-5740,0,0,bcd1b815d320ca419ca071e3fa7ce87ca089649728f9e52796f365aa5338e98a,2024-11-21T05:34:30.957000 -CVE-2020-5741,0,0,4c3724cf2562b8723c9640a4ba1d7495c32b138656e968e3b6f9d44dc0e08b46,2025-02-06T21:15:15.817000 +CVE-2020-5741,0,1,b0fb3d0654826d65be3cf180d6773c7621973911f0cbca1291f27b7ff1facff6,2025-03-19T20:56:12.090000 CVE-2020-5742,0,0,eb099f9c45d75a796b660763301230f2a54f516d6d621342b3d6067f8cd331b9,2024-11-21T05:34:31.180000 CVE-2020-5743,0,0,faaf8640e18865031ea3cbb8d9536b306514ea9f614eccd6dfe0e396516f3e12,2024-11-21T05:34:31.280000 CVE-2020-5744,0,0,35bd464e0829cac36a004aa69ed844626173f8cdb587ddb66ca797de9aa96580,2024-11-21T05:34:31.380000 @@ -166730,7 +166730,7 @@ CVE-2021-20087,0,0,d21a676d645c3b7fe580c2498acbcb9f4f46041bc21a50424269f0a1604c7 CVE-2021-20088,0,0,5c6d29134799c03e85c7b3915d604ee74a41d18d997446b30b1828b6671361aa,2024-11-21T05:45:54.243000 CVE-2021-20089,0,0,dce1bb5ba020dd04926fb1431c2f94e524a72dd4008ef239a9850a6c22982c0d,2024-11-21T05:45:54.350000 CVE-2021-2009,0,0,c68f02f20e281b7be6a12e28bd74fda2e085f105ace71e4fa7bbdabdbd14b15d,2024-11-21T06:02:10.187000 -CVE-2021-20090,0,0,76e1cdefd83dc57c604cf5060e7b4daceef60896d2d0db7020f30bb1709ef60f,2025-02-06T21:15:16.230000 +CVE-2021-20090,0,1,2e47ab7e15bcfb806f18a0e025106100d841de7be27d16016f2cdd2d88f73da2,2025-03-19T20:56:01.547000 CVE-2021-20091,0,0,6b93086d8b6408c40fc83b861de04629dafe0016d49c944ca7f6c224a6762f7a,2024-11-21T05:45:54.603000 CVE-2021-20092,0,0,91694c74f34ab04011032be0154feb6ef10be18b395f9c53634a6f598f2bc5d2,2024-11-21T05:45:54.730000 CVE-2021-20093,0,0,3e912e110fc9f7e8724d902e5339c88e385604b742aac6fe2eddc6b3ad2316c8,2024-11-21T05:45:54.840000 @@ -184024,7 +184024,7 @@ CVE-2021-42252,0,0,9c2cf00a65f49299594d72d8e2e100e4be6dc966049ce110f802aaa9751ef CVE-2021-42254,0,0,b90034661d441bb11364f63a23904f831b5269f060e5bb0f940f85e7e1eee937,2024-11-21T06:27:27.830000 CVE-2021-42255,0,0,6b5736b7f328dbe37ce0185120062dbe79ba4bbd76ca3d2ee40ed994b801347f,2024-11-21T06:27:27.983000 CVE-2021-42257,0,0,64a0608d6af8110170829a8647c933135c318dde18477575667aedcd6cc43634,2024-11-21T06:27:28.133000 -CVE-2021-42258,0,0,675e45a94694b3c91d5e5876172897ecc49b5f2424708415956f8bbce26996a9,2025-02-03T16:15:31.850000 +CVE-2021-42258,0,1,c054667e5d9086bc48a612343455f8e8a35db04ad2b77c6016962683b520c07e,2025-03-19T20:50:35.467000 CVE-2021-4226,0,0,9633e68f3ab69f8b8366f1ba014700235a8f25614c72b815afc0d0fabc3a9463,2024-11-21T06:37:11.163000 CVE-2021-42260,0,0,8129bd1c385ab088f0c5fb2ccffab21a9c6ae567497d38c30d53885b55f820b4,2024-11-21T06:27:28.440000 CVE-2021-42261,0,0,1cf6991fe14a09939d4dc338fe157804882e0800d673b85991b4d9b3dd490fa5,2024-11-21T06:27:28.600000 @@ -186123,7 +186123,7 @@ CVE-2021-45418,0,0,c0c6dcb11308364cd4fa0e09854cfbf2384b41fac37017e0ccce30d16793a CVE-2021-45419,0,0,29b6c495f5343b276c7c28a21a8e657c37c3c2b923c9d5b30129033a7d1507f6,2024-11-21T06:32:11.137000 CVE-2021-45420,0,0,53818c4f4e6ff555db7c2e537ea1ae33fb2c137cf45f1a9d28eb717bc9c5708e,2024-11-21T06:32:11.290000 CVE-2021-45421,0,0,efcde2318634c7d9c0b1df344cebb150fc495b60cbe391f66df7549c6db483e4,2024-11-21T06:32:11.470000 -CVE-2021-45422,0,0,af8917dd1e1489959efbb94ae6c4650e8572b6e287be650abee78a5077958ffd,2024-11-21T06:32:11.640000 +CVE-2021-45422,0,1,6be3649807c1ff41f6cffb35d60d9777abc433e85a96116340eb700130db465c,2025-03-19T20:15:16.623000 CVE-2021-45423,0,0,00a66b200cd1c3ecff7f6522d3ca73c7acd87cbc7553cb95c0139460f5504295,2025-03-03T21:15:12.083000 CVE-2021-45425,0,0,373556910b068fa33580a63e2ba9f6d5da9dd9d8800acf52c73d6c1fc40d1977,2024-11-21T06:32:11.970000 CVE-2021-45427,0,0,582f23a74848349a5fb7077fb3b6a8423312a48d6be1bfd33f7755b292acd5b5,2024-11-21T06:32:12.123000 @@ -195615,7 +195615,7 @@ CVE-2022-26348,0,0,b0680b90c128fb5bba120d58a5ecd2fb48fba70340ebbce6c2f4e6fc33a9e CVE-2022-26349,0,0,01eb10ca0f40c6cd2deae87e9234a4d169a4a081d546d6df604b425aab6a74c2,2024-11-21T06:53:48.200000 CVE-2022-2635,0,0,83082b6720cd3c13b9ea5ede65cf7850a6f96da9365968c75e39ee7d80c40b74,2024-11-21T07:01:24.787000 CVE-2022-26351,0,0,7d5a82fef064981d7bd1ed6a1ead3b2eb1cefed382f111daf8a86f634e257ea7,2023-11-07T03:44:58.470000 -CVE-2022-26352,0,0,a17f5b46877df2e1afe34ead6809a8948cedc4885580c0ac0978f6b279b3fffc,2025-02-03T16:15:32.033000 +CVE-2022-26352,0,1,b03a5aa680edb31a8f39fc52293f55b16430c708fdd7f06d7dd2137a91f8c6ba,2025-03-19T20:50:08.570000 CVE-2022-26353,0,0,f795d8efa58caab77d9872da6ca6e55acbe91aae0aece7157e5588d8f0e20cbd,2024-11-21T06:53:48.570000 CVE-2022-26354,0,0,f071bc0dad955e22ea0f6c534301dd1507d800bc89daad10c364c6feceae0afa,2024-11-21T06:53:48.723000 CVE-2022-26355,0,0,bceb9c26b5974f26a41f6fd9f84ae8fb4cd3fbca5efea1f70bc4bf9bc7d8ecbd,2024-11-21T06:53:48.900000 @@ -196687,7 +196687,7 @@ CVE-2022-27673,0,0,9fd38de4fd8424f514bedd37c42925deaa80292735325242c1696e9b13f08 CVE-2022-27674,0,0,8c33ad9e09c91567c030907bab78955210229d3e9a37da4dab6f9e9a552338e5,2024-11-21T06:56:09.207000 CVE-2022-27675,0,0,fac7f3f7cd16c3726e4aee156eb68e57730173877959761a94a45014db1db743,2023-11-07T03:45:23.127000 CVE-2022-27676,0,0,c156dda04c0b0d4963bf4e79236170360defcc84c9f6f59075b58c600ec63e8e,2023-11-07T03:45:23.417000 -CVE-2022-27677,0,0,0d95061bc29d9d4475ca28dbd99076a4cc0e9800b9b67831d1a72c2d39d419e2,2024-11-21T06:56:09.347000 +CVE-2022-27677,0,1,9df43528a595f17a3d8c7e1f5f876c72f8bff438d6d6e4edd866049d7effe12c,2025-03-19T19:15:37.900000 CVE-2022-2768,0,0,6d4167745e510412bcc562fdb66bb1a463e0755a6f90fc793719e366288e3798,2024-11-21T07:01:40.097000 CVE-2022-2769,0,0,0a844a2ffd42cca21d6f51b5ac4862f6121bd98e5085d13f313a81bf5265018c,2024-11-21T07:01:40.197000 CVE-2022-2770,0,0,0ddba31d44c2cbe2edd91de3a0f93ad9ac160f7db7522fe62f4064d3887af6fc,2024-11-21T07:01:40.297000 @@ -197433,7 +197433,7 @@ CVE-2022-28652,0,0,c0dd4e0155bd508af193538404378fbf3544b1b5fe45067edb33294b8f619 CVE-2022-28653,0,0,d13c3f36957fca230432cdd0ecb997a93a13525ae20f7494a40a5c2d5082955d,2025-02-07T16:15:33.613000 CVE-2022-28654,0,0,ea07dcf35d2fa10ac051dfced437214661594eb15bc3e628b5c69dde3cb8a7f9,2024-11-21T06:57:39.657000 CVE-2022-28655,0,0,6b77792ec87f797aee68224d1bc6414a65e7c103ed9a59f3cfb492af4b19a47e,2024-11-21T06:57:39.837000 -CVE-2022-28656,0,1,4b91ac5d08b415e2f86c3316c2b72b830c6fa23e40d4f4e259803043d26fdac7,2025-03-19T18:15:17.147000 +CVE-2022-28656,0,0,4b91ac5d08b415e2f86c3316c2b72b830c6fa23e40d4f4e259803043d26fdac7,2025-03-19T18:15:17.147000 CVE-2022-28657,0,0,b65240d84ddc84eec9a0027c9f1fd824151d115babbf11c1618ab1a4341be1bd,2024-11-21T06:57:40.123000 CVE-2022-28658,0,0,4323336078f53841188ae40e4cb2ea78f8827b16fa74506f3a7b55094635c0d7,2024-11-21T06:57:40.303000 CVE-2022-2866,0,0,fba397a935f738afd79b86035d838ae0945948bd5cb68ef7fffaae0dfea58ca6,2024-11-21T07:01:50.247000 @@ -200627,7 +200627,7 @@ CVE-2022-32474,0,0,8d455aa0c29194a413549d12877eb83fcec7e4343efa0aef295f29d8c5662 CVE-2022-32475,0,0,f347cbd24aedaedf7e5e97450c28482a05994447dac6e58fc9e721b827f19f22,2024-11-21T07:06:24.297000 CVE-2022-32476,0,0,3af25dc3b2102c8c104dc3df29ca7a72e195bad746eeb73446397b5ee82f2702,2024-11-21T07:06:24.440000 CVE-2022-32477,0,0,26582c00ca030080289a837743c442fc7b082d9d1ae1beba6237a39c060639a0,2024-11-21T07:06:24.597000 -CVE-2022-32478,0,0,22b5dbcc7858ff1bc0da1c725010604e689d80d2c335fdefbb6f94244daf9ba3,2024-11-21T07:06:24.737000 +CVE-2022-32478,0,1,2edc523937d4238ad6a7033de23edd0bc3edd1028bf8474b8a52e10133b25393,2025-03-19T20:15:16.767000 CVE-2022-32479,0,0,bc3ac35450c3f850d6754078b7ff1cde8053f41b1972c00559e5461f02215b17,2023-11-07T03:47:49.050000 CVE-2022-3248,0,0,9438ca787e1cc244718a3d95fc95d4fa02e325ba253d75c1f72abc6a35e2bb84,2024-11-21T07:19:08.380000 CVE-2022-32480,0,0,bd6df154cb2b0eb3563f2aa05819c5a717bb096ac194e5972c7e6faea661aa66,2024-11-21T07:06:24.890000 @@ -201120,7 +201120,7 @@ CVE-2022-32951,0,0,b96d61791b8207aaf07580a98b54dcd97a93e82ecebe71b19053d4f65d07f CVE-2022-32952,0,0,4c65f44edddbaa0ec60369afda8c5dbb5ddac1da0a1d1cb299bd11c8899ef8ac,2023-11-07T03:48:16.603000 CVE-2022-32953,0,0,c62d3f56ff4ce118c5b18b3a469b79ce65ccee49a64a75ba1e5c875aa948aecc,2024-11-21T07:07:18.110000 CVE-2022-32954,0,0,a8b806a7b1fa962e491484caa94f03dea177963b1fab003c2ed269138806210c,2024-11-21T07:07:18.293000 -CVE-2022-32955,0,0,baf045b1b4bba00f4c80362a9beac7eff0887a2f0e64d63598cf5e1189b019df,2024-11-21T07:07:18.477000 +CVE-2022-32955,0,1,693c88d6807ab13b185285fe7d3b8e6e33b50d24efe71c4b44c01709554d1378,2025-03-19T19:15:38.053000 CVE-2022-32958,0,0,30b036a3c66fa5e660306ddc71576785c2e81d2ced310ce080bd26ed9b2a04d5,2024-11-21T07:07:18.650000 CVE-2022-32959,0,0,2dd9decbfaaeb3b2c4f44c2ff7a9ae87816fbc6481e6d0c22e0b463d32f2adc4,2024-11-21T07:07:18.783000 CVE-2022-3296,0,0,4f0045511d05977092708960a0cba1a13ec2bb722661e8c70fbfa8600da50602,2024-11-21T07:19:14.457000 @@ -205683,7 +205683,7 @@ CVE-2022-38864,0,0,23454ec5150aef4bd1bbf50be4b8ae615e16bc7b89f814340dbc35c5672dd CVE-2022-38865,0,0,ca7868c6e33cfb4994360666952707212ca0d9cc39250c17b2465a2f1d9d30e5,2024-11-21T07:17:12.040000 CVE-2022-38866,0,0,b4bdbdddf7a428983c00cf65d4ed7171e814c0565e4e4091351dfd65c1a97c28,2024-11-21T07:17:12.203000 CVE-2022-38867,0,0,11f65a20895a9a7c0d1ae7ae11e215507ccd2c7f8181f46ab3685fd197296401,2025-03-18T19:15:40.333000 -CVE-2022-38868,0,0,c009e5a533f97b32aba01ce99f2e2593933b71897e88faa5b92a24593a69b9dc,2024-11-21T07:17:12.523000 +CVE-2022-38868,0,1,a329e5aa5f67a0e1f151d9c71d61b4d476d8a4b5fcbcfd6d9c7a6c8fe931c8a4,2025-03-19T19:15:38.210000 CVE-2022-3887,0,0,06c658cfbdd81eef4d6500a637650189da6a52b1e7f7631d7ae6ba5ec9938709,2024-11-21T07:20:26.720000 CVE-2022-38870,0,0,e70b6b96c4141983a674b240e16125c6a6a7f9ff2f0a05dd5d6b5a6c0a0c5ece,2024-11-21T07:17:12.687000 CVE-2022-38871,0,0,653879fc9609700ed09ec778b9771c266a8d9b487aa13665630d7387a356abe3,2024-11-21T07:17:12.870000 @@ -205715,7 +205715,7 @@ CVE-2022-3893,0,0,169977ea85d0f87efc6cc15872f3136d1ff5790f1b49d91b9e93fa4cc18a83 CVE-2022-38931,0,0,63708f1f0fec781abc03b238820cd8696f0c8dcb998e2d4c808a709948897300,2024-11-21T07:17:16.023000 CVE-2022-38932,0,0,4fbcf04648ec48b9776eb4f6f8e67445b5540150079fa0800f24418529c5ee66,2024-11-21T07:17:16.177000 CVE-2022-38934,0,0,40d670d084123a35b6cf8e015d52100eba55e2e591a681d9be36901d5638d2d3,2024-11-21T07:17:16.330000 -CVE-2022-38935,0,1,2867d602c6816f4aac26b935d0fc4fa197c9c6383b9487da9bba57d30962066a,2025-03-19T18:15:17.327000 +CVE-2022-38935,0,0,2867d602c6816f4aac26b935d0fc4fa197c9c6383b9487da9bba57d30962066a,2025-03-19T18:15:17.327000 CVE-2022-38936,0,0,b3e505552a6410e493866b78c37513e198bc95afcfc929838b193c22c9abfd36,2024-11-21T07:17:16.647000 CVE-2022-3894,0,0,b65672f2b7fa6c87ba7d4ddc2f311715efba1c64fcf556984e6c7ac4fdc452c5,2025-02-26T19:15:13.690000 CVE-2022-38946,0,0,2a0a1fab6e1d2d5740acbe58559acfed91cc83f62958692e58c8b2f9649a1818,2024-12-11T16:15:05.783000 @@ -206438,7 +206438,7 @@ CVE-2022-40009,0,0,26c0350798515d24962c84f26b250922fe5a90143ac50486e2d208571371a CVE-2022-4001,0,0,d7f6245e94dded50b0995e17b6b8e668e8e44274195283ce0fca6baeade2f570,2024-08-01T12:42:36.933000 CVE-2022-40010,0,0,dabcc1ad0e808ef11676ea91f191a06230ba454073d4ae4419b68944ea2535c7,2024-11-21T07:20:43.683000 CVE-2022-40011,0,0,afde86f05caa85423e96a915d5e6f15a12e9fb2250dec80f61842c792bc02776,2024-11-21T07:20:43.840000 -CVE-2022-40016,0,1,100b5b79a376baf443c3be9376df72f4d615eff2e19857689b9ef583275af587,2025-03-19T18:15:17.503000 +CVE-2022-40016,0,0,100b5b79a376baf443c3be9376df72f4d615eff2e19857689b9ef583275af587,2025-03-19T18:15:17.503000 CVE-2022-4002,0,0,03ff78a7f3bf72b254b65f244d7ab9ecbd438043995767e6c6c4a3facc300bed,2024-08-13T15:23:51.097000 CVE-2022-40021,0,0,7c39516cdd288184e582fc0863677682d76c7162f5872be1d2184272623c3009,2025-03-18T17:15:39.603000 CVE-2022-40022,0,0,fe8acd9171464928f69c7a6bc926435df55ddc16dfe0530de6f9463c8ea485b2,2024-11-21T07:20:44.307000 @@ -208488,7 +208488,7 @@ CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc4381 CVE-2022-42452,0,0,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 CVE-2022-42453,0,0,6efb2f3324a4ebb1a36d6eb4c118e6f5231faa0d0a3a0599ef663f4876b97dba,2024-11-21T07:24:59.570000 CVE-2022-42454,0,0,dc1c2309d8e52319695997954620c1223cab3041e006ca32b24e1b7568ef7ef5,2024-11-21T07:24:59.690000 -CVE-2022-42455,0,1,783e43b392fc9b0141bc2ada0d100faa85e098adba36bac49e4324cff507e3bf,2025-03-19T18:15:17.673000 +CVE-2022-42455,0,0,783e43b392fc9b0141bc2ada0d100faa85e098adba36bac49e4324cff507e3bf,2025-03-19T18:15:17.673000 CVE-2022-42457,0,0,82d873c661a8575b44de78424c67708dae961f1b72619f778c431037c082ca72,2024-11-21T07:24:59.960000 CVE-2022-42458,0,0,2672d004b1a382006142381dccd49bef17e1d966c0f3ad60ce1a2c18058b64ef,2024-11-21T07:25:00.130000 CVE-2022-42459,0,0,c16dece39744140ecd2ec9dd9630d0d6e53bda5e2db6d0b55fa8509b491051b7,2024-11-21T07:25:00.240000 @@ -210680,9 +210680,9 @@ CVE-2022-4554,0,0,a97da00156b7748a680eda3809e2df882f59d07c9cdc1000b9d27728a3716d CVE-2022-45540,0,0,39edfbaef5949823b58c18a99060c36a951dc35b68f02a2bfd026620c0c24489,2024-11-21T07:29:25.233000 CVE-2022-45541,0,0,8b74ae0be8d7aaf93cf1c037df8af7e4b177ed1356128f942175d300ba0b180b,2024-11-21T07:29:25.377000 CVE-2022-45542,0,0,369adbdbb54cf5c469859e7ae13f82536ed008013c16741907e2c382c8b1fe2b,2024-11-21T07:29:25.507000 -CVE-2022-45543,0,1,57df8231bdcbfa04ec20c44f1d273781ccddb41f85eb01cdb6128a6157c06666,2025-03-19T18:15:17.850000 +CVE-2022-45543,0,0,57df8231bdcbfa04ec20c44f1d273781ccddb41f85eb01cdb6128a6157c06666,2025-03-19T18:15:17.850000 CVE-2022-45544,0,0,6c123bd793963ec2a6da5b069642014a08a4f75e27c16e1f03e1f77d92b61f6c,2024-11-21T07:29:25.777000 -CVE-2022-45546,0,1,6b4567ba293bd3b2ac0d6f31bc16f5570e7a2014f7b4578cc679c9523730a2cd,2025-03-19T18:15:18.033000 +CVE-2022-45546,0,0,6b4567ba293bd3b2ac0d6f31bc16f5570e7a2014f7b4578cc679c9523730a2cd,2025-03-19T18:15:18.033000 CVE-2022-45548,0,0,e95a0b1f599986c19a82840fd26c1ada5e6cfb5cd55dee60741d610dc0fe0eb9,2024-11-21T07:29:26.143000 CVE-2022-4555,0,0,ab9573e8007e94879618723fe294ad8ddef575de9e9b6c5e7923556dd3555888,2024-11-21T07:35:28.900000 CVE-2022-45550,0,0,547c8bb332eedbeb52103741d5d16740a06bf4a7179e1dfd6e4ad53c93d1f4f4,2024-11-21T07:29:26.290000 @@ -210697,8 +210697,8 @@ CVE-2022-45564,0,0,0b61cc5f8890727a7c6ae53e028bb4479d9700a9a74c090076df2c0bf0f1f CVE-2022-4557,0,0,837e641c1b3c20f0b4132a441142985bfb8a4cdcb5fd01bb45d746cd70290cc1,2024-11-21T07:35:29.153000 CVE-2022-4558,0,0,f970fd3928efea1b5554441e3c916d6a6fb91be99fd3c95ebcc40ad27c610f0b,2024-11-21T07:35:29.273000 CVE-2022-45582,0,0,fb6a5aed09df447052c1080f0f3ca25b9f4b331d8aa159276f71f5084b3a6430,2024-11-21T07:29:27.527000 -CVE-2022-45586,0,1,041fa1f98c0e1032e8b0aafdc00e59807da3284dce298c31ebac48655500539e,2025-03-19T18:15:18.210000 -CVE-2022-45587,0,1,731ab094c4fb5d3f2a6aaa031bb360b562e520d91c461801d15198f9701e2885,2025-03-19T18:15:18.393000 +CVE-2022-45586,0,0,041fa1f98c0e1032e8b0aafdc00e59807da3284dce298c31ebac48655500539e,2025-03-19T18:15:18.210000 +CVE-2022-45587,0,0,731ab094c4fb5d3f2a6aaa031bb360b562e520d91c461801d15198f9701e2885,2025-03-19T18:15:18.393000 CVE-2022-45588,0,0,f651447f5e5fc174047e99ac9407f3993e7874c1df7eb94c69df3555d1053d88,2024-11-21T07:29:27.947000 CVE-2022-45589,0,0,d2cbd0b21cc854599a5bf98b4bf9fd15aa327385b3261b879e672caf3293e319,2024-11-21T07:29:28.097000 CVE-2022-4559,0,0,3edd289e50a04a6ce45932a9d361eae123cc1d9b5b3d9fadc6d754bcc210ceee,2024-11-21T07:35:29.397000 @@ -211662,7 +211662,7 @@ CVE-2022-46889,0,0,bd1ad8c9756bd80a5153f3303915e1b67cfae78d7f750ed70710210b30d70 CVE-2022-4689,0,0,e3ecb10eb93d790d7c10c5fb4bca0fcfcfd80f89c4c97ab9c5199d444cb3c369,2024-11-21T07:35:44.400000 CVE-2022-46890,0,0,d69e60eca86f930501c52b695cc04c06aa9ee721988b099937c5fdfb5b836e23,2024-11-21T07:31:15.307000 CVE-2022-46891,0,0,338ed870ab4d36745bd165833d3bc94dc064c19bab29d636370f5249d84beaaa,2024-11-21T07:31:15.453000 -CVE-2022-46892,0,1,aed08df9da0746eefd7855074f55002ef87a3db62609b63f9f4849054d755591,2025-03-19T18:15:18.570000 +CVE-2022-46892,0,0,aed08df9da0746eefd7855074f55002ef87a3db62609b63f9f4849054d755591,2025-03-19T18:15:18.570000 CVE-2022-46897,0,0,ba53137ecd568f4fab0981ebb387799610a2c8af877be455e5bf13f25149225f,2024-11-21T07:31:15.780000 CVE-2022-46898,0,0,994d4b12ff3a253c27e952cd4ff6dd570b0e3a566f6723be8d7cca4f21d6abdf,2024-11-21T07:31:16.027000 CVE-2022-46899,0,0,d4e22e5578361ce1441c314ea2b73c47702eb68f1307328bbdcd833291c7e8e6,2024-11-21T07:31:16.207000 @@ -214331,7 +214331,7 @@ CVE-2023-0357,0,0,0a308a698ed896bc4258b2173474599b713af205b6eb6b79c32c5c489c630c CVE-2023-0358,0,0,c76f56a5e573bf147f67d80dd377ef4284d646ecfb1543431df6e48e3bc94c1b,2024-11-21T07:37:02.490000 CVE-2023-0359,0,0,2b80ed9bcc2fbbdddb61ac73799612ee64f0a12f0878fc43f8f3989ef7355dc7,2024-11-21T07:37:02.623000 CVE-2023-0360,0,0,6b7654c5aa663d97c571204cb30ceca675e1339e8f1dd6d89702203544a2e613,2024-11-21T07:37:02.760000 -CVE-2023-0361,0,1,6edef5de2848a5851bd931d5c1dd3612533629e06333048aac0536e3e029792b,2025-03-19T18:15:18.747000 +CVE-2023-0361,0,0,6edef5de2848a5851bd931d5c1dd3612533629e06333048aac0536e3e029792b,2025-03-19T18:15:18.747000 CVE-2023-0362,0,0,4abe6b60580899ecdb18fea050a16b36cec253adfaa2539c4708ec635b65b154,2024-11-21T07:37:03.007000 CVE-2023-0363,0,0,1cd79a0486a160da83f5ac09c2c0776dc6991ac996722fb6ea969fe966332bca,2025-02-11T16:15:30.060000 CVE-2023-0364,0,0,663a39c3237744bec44dbd34a7c48db0a263a0130df6ce5e432e101cb03c53e0,2025-02-26T15:15:18.123000 @@ -215313,7 +215313,7 @@ CVE-2023-1385,0,0,f4730f4c2553bfeb0e604f17e12e8db99d18e397b3d43e414768bd333fdc66 CVE-2023-1386,0,0,6a8f74aa440f2d0a2d832e90d4ff11d3fff3ffff3c712540d05584c700a164b4,2024-11-21T07:39:05.003000 CVE-2023-1387,0,0,6f5af51d3408e924870eed08d8abaf87fc900a199c8a5c02749dd375474b9196,2025-02-13T17:15:58.360000 CVE-2023-1388,0,0,61491955fbf08f96f9dda67bb4675d7b983660c4a4844e2bd1ddb53a61ff4965,2024-11-21T07:39:05.287000 -CVE-2023-1389,0,0,8f89074c1a8c711e2bea4af4fa5338deb195b223e2e7cd99c3f8e764bed12e56,2025-01-28T17:15:10.167000 +CVE-2023-1389,0,1,0a17f4bd4010f1030d7f62c077728db55c6496a47e85cb9d015160e193e4f201,2025-03-19T20:57:29.073000 CVE-2023-1390,0,0,7331f03e3563907490d577cc29d15ce6567f80dbbe2b65c66cec2bf6df79abee,2024-11-21T07:39:05.540000 CVE-2023-1391,0,0,dd784b997154ae9f5feebc422fa4117056b904bb755b97ad2709765998f29aae,2024-11-21T07:39:05.680000 CVE-2023-1392,0,0,cde70ca055d8e11ec46365f3d51bb4ad97c60b1b0f1dc3f20fa372e18083459c,2024-11-21T07:39:05.823000 @@ -216601,7 +216601,7 @@ CVE-2023-20923,0,0,9dc13ff94f64319ba5a69ce2238d81109342e5918c1f585b3d889d2ab9155 CVE-2023-20924,0,0,d84467dd44645e91008e4a5067ca93b3fb54577715dfc644217e9b7c5f44639a,2024-11-21T07:41:49.767000 CVE-2023-20925,0,0,1a017025fc8b8652743faeb9c4ba2d24d1447b0c9e6551368e95693fd46f3f63,2024-11-21T07:41:49.873000 CVE-2023-20926,0,0,ed1d966ed7b0fd939101d6c28a01d9eb83a8056b14ad960594bf9927b10eda51,2025-02-28T21:15:19.837000 -CVE-2023-20927,0,1,e53fa8265bd7d9aba1a6171457b4cf3481b868345f96e653c025813d241227a1,2025-03-19T18:15:18.960000 +CVE-2023-20927,0,0,e53fa8265bd7d9aba1a6171457b4cf3481b868345f96e653c025813d241227a1,2025-03-19T18:15:18.960000 CVE-2023-20928,0,0,892415b0bbb1a273c0c4d0684975a78c5df304016f119c1b4ce59426590449f0,2024-11-21T07:41:50.197000 CVE-2023-20929,0,0,f5bea6d8e0c447b309bbeca42a44f30750465229df5bcafa0925f9a21cc47e70,2025-02-28T21:15:19.983000 CVE-2023-2093,0,0,f5d0e4a8e9249b4db32d41150a1e407490a3e931edcb3c038b611890842c7c04,2024-11-21T07:57:55.413000 @@ -216625,7 +216625,7 @@ CVE-2023-20945,0,0,3305736470fa992faa31daf683edade84e7b223ee819db71a5b457c381bcd CVE-2023-20946,0,0,36c2432608ac697eddbe172d6f5aa7a6658c07a83192a438d8f5b9a3cfa0140c,2024-11-21T07:41:52.320000 CVE-2023-20947,0,0,b391e7da3f33513655e0b1f7fc2d60d1931a7f221187f4ae6383b147c42bf55d,2025-02-28T21:15:20.323000 CVE-2023-20948,0,0,155732fc8e664f43579fa64f3f07c329b2c0033708f238ec58daab6d7bf5d5af,2025-03-18T16:15:16.227000 -CVE-2023-20949,0,1,a180a65c7e20f8022afda774c537a83bd8d6e160eb6909d62a9176d7e762674e,2025-03-19T18:15:19.153000 +CVE-2023-20949,0,0,a180a65c7e20f8022afda774c537a83bd8d6e160eb6909d62a9176d7e762674e,2025-03-19T18:15:19.153000 CVE-2023-2095,0,0,3c7b61baa8b47451def86a213a49c3157f17a9c9137789a496fd564cd76ce4fe,2024-11-21T07:57:55.663000 CVE-2023-20950,0,0,4865c61fce00fa55d1b6920408abf2784e24ef60f3b70a471e467b43c20a5d2c,2025-02-05T19:15:11.983000 CVE-2023-20951,0,0,4c3c4407c6ae482d6aba4e117f2c782c814d9d6efcc7c01f64a5d9bacf17594e,2025-02-25T22:15:12.467000 @@ -216695,7 +216695,7 @@ CVE-2023-21010,0,0,ef4913b1a6e1d5fb8904174e9a417721c26fc125c53bc4236815ca69b1198 CVE-2023-21011,0,0,549f09986aab20ad19442233235a51d8e85f828d3df14a12fcfcd5af8c57baff,2025-02-26T21:15:14.167000 CVE-2023-21012,0,0,47d2dad02e92d3dd62afbfe86ce7c6864d5b8679aad699a64b02509759701271,2024-11-21T07:42:00 CVE-2023-21013,0,0,6202d8fcf40d7c80712bddb18361caa29807716168d225c3c58a6973073cdcc1,2025-02-24T15:15:11.543000 -CVE-2023-21014,0,0,8195a93a3f014f4cf458e110487e8c0c3a75319f87c5150ff2f9e6814072af75,2024-11-21T07:42:00.217000 +CVE-2023-21014,0,1,85c3248004b33859c9e6593df25892be019679c09844aaf341c3d3bd9e88f278,2025-03-19T19:15:38.360000 CVE-2023-21015,0,0,4252649189495d141e0202ef6f71ca03b3ca47e7d9098ead156e9015b026748d,2025-03-17T19:15:18.080000 CVE-2023-21016,0,0,c5703153abb92a5a9cd83b23597ae9ec7cd0fe637307cfbb926eefd45b3c67b6,2025-03-17T19:15:18.330000 CVE-2023-21017,0,0,21c23ee6d5b17a8b80131c1b089dd9288c80dd7155e53f8634110af462ab6e7f,2025-03-17T19:15:18.570000 @@ -218007,7 +218007,7 @@ CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16a CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000 CVE-2023-22366,0,0,5991631113ce1b42a908a9a0426d3287b4099cb509108b26c5d4f9869a0ff26e,2024-11-21T07:44:38.497000 CVE-2023-22367,0,0,42416113ee9e53f5a5694021f13d2870131a5f170383a27faf2c8e16008c12ca,2024-11-21T07:44:38.603000 -CVE-2023-22368,0,1,cb3fb718da2252072c3d476c84c4757ffd3dc1b4fa6245dd865995af8d98c221,2025-03-19T18:15:19.333000 +CVE-2023-22368,0,0,cb3fb718da2252072c3d476c84c4757ffd3dc1b4fa6245dd865995af8d98c221,2025-03-19T18:15:19.333000 CVE-2023-22369,0,0,49822d547bcc3c52fa9563119902793a795753d16d4032780b60f024044227ed,2023-11-07T04:06:51.880000 CVE-2023-2237,0,0,d33921b5468d94a59063e0ce1eebeee3e79b3b3a67cc8e51c609d1a8bae369bf,2024-11-21T07:58:12.890000 CVE-2023-22370,0,0,78a845507030948240766d86a6b1689c674e75cf92b052bb6cec6ffc5a5308b7,2024-11-21T07:44:38.840000 @@ -218017,7 +218017,7 @@ CVE-2023-22373,0,0,ed937daa6cdfcbfc5e8be3ccd242c1e336e4707dbb232727701359603d314 CVE-2023-22374,0,0,2acac63b2bf4281280a1c3f5cb2c6d3f9f651b87435a569664f46aef77b374de,2024-11-21T07:44:39.350000 CVE-2023-22375,0,0,a3f01ebdae9f56c1c4e5d3ea0650e9eb59f4f2488ac8386eb5dd2a1c95d2022f,2024-11-21T07:44:39.483000 CVE-2023-22376,0,0,25c2ee65a8f2464e5eba2089aec5cc508cf9a11830f043b73bffafe4f04e867b,2024-11-21T07:44:39.597000 -CVE-2023-22377,0,1,8e49c9cb4c8cc677a2bcccc03b6f6ae8ab7f746ee1f752810d0d7547e65253ef,2025-03-19T18:15:19.503000 +CVE-2023-22377,0,0,8e49c9cb4c8cc677a2bcccc03b6f6ae8ab7f746ee1f752810d0d7547e65253ef,2025-03-19T18:15:19.503000 CVE-2023-22378,0,0,8f9b5efc26d81e62f36fd27b7b22dcb6a761f3ebb625bac296e47b44aa17e5b5,2024-11-21T07:44:39.813000 CVE-2023-22379,0,0,99271a571e5cc9e651bca76985881fa96b5a300342b3b35abaae2b4e58edaf06,2024-11-21T07:44:39.977000 CVE-2023-2238,0,0,9621f81f1b7496ac67ac0ce96d1ed89a971bd5f978f5cabad9efa3d6cb5b21d7,2025-02-11T02:15:31.280000 @@ -218447,7 +218447,7 @@ CVE-2023-22851,0,0,7f681e88445e67db1d39e73e2dc11aa76792110b87375b24aacbe1136dc11 CVE-2023-22852,0,0,66108b315d0eca11a213165e3737878a45c9d34ae9abe7c3d18fc36632f0c225,2024-11-21T07:45:31.590000 CVE-2023-22853,0,0,1f7186860aea35784cc219965fd0801bae1636171471f0c06416d0be23f0d9ac,2024-11-21T07:45:31.753000 CVE-2023-22854,0,0,9ff8259267d6c3148208431d4a920e4c37e2c2dbefd90c52a6f507e70f337f1b,2024-11-21T07:45:31.907000 -CVE-2023-22855,0,1,68b4e93b556e10c26b1d7c39cc87f27b8c76b81c6e5d80cadb08eeaa5c1e64c6,2025-03-19T17:15:37.147000 +CVE-2023-22855,0,0,68b4e93b556e10c26b1d7c39cc87f27b8c76b81c6e5d80cadb08eeaa5c1e64c6,2025-03-19T17:15:37.147000 CVE-2023-22856,0,0,78756136f00e6234e39fb39fe262b2c5d71391d63b0aa3e254274db7914d8dba,2024-11-21T07:45:32.277000 CVE-2023-22857,0,0,1d5839b5d877ad6120901dfca455e2556c4ecf11b681504ffd1d8a38fcee17fe,2024-11-21T07:45:32.420000 CVE-2023-22858,0,0,050db3124134bc57df2cc34343669e82125d808e1b2618071d27f42f81a88acc,2024-11-21T07:45:32.550000 @@ -218556,16 +218556,16 @@ CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee8 CVE-2023-22995,0,0,93e6265683ddad7b70d16ea39dd84aa9bcf8f539c4ef1ce28d88da0e81fedf71,2024-11-21T07:45:45.550000 CVE-2023-22996,0,0,fe442cb87d4861b04715d9721093b1f2e793cffbe47ffe19ce9d81d6e93c6a1f,2024-11-21T07:45:45.700000 CVE-2023-22997,0,0,ba7a171d88bdc94e6a16ad207cb397253f006e42152c29e3ad803f92ac423e0b,2024-11-21T07:45:45.840000 -CVE-2023-22998,0,1,89912e724c147c3e80fcb7b0e9bdd938e2e1aeaefe6425f222b6a1947881067e,2025-03-19T17:15:38.153000 +CVE-2023-22998,0,0,89912e724c147c3e80fcb7b0e9bdd938e2e1aeaefe6425f222b6a1947881067e,2025-03-19T17:15:38.153000 CVE-2023-22999,0,0,13d2ce31de8578a2b4f10df11670429bd319eae470d8665b2898bc8464a5b8f2,2024-11-21T07:45:46.130000 CVE-2023-2300,0,0,4d0333c0849a3394a36c01d24481b8468668f58f824a1f529b6407ef1a517a0f,2024-11-21T07:58:20.440000 CVE-2023-23000,0,0,901761c6222d7d1188999afad6c3eac83b6ac8077a1f5a490e4484566401ed18,2024-11-21T07:45:46.280000 CVE-2023-23001,0,0,d81737a6538c29931b09dd655876b2de82dac9cd1f641de7670cca8e4be0183f,2024-11-21T07:45:46.430000 CVE-2023-23002,0,0,4db4148f492955f92921c06b74498ec3b6d9f21bfdb354bb740d79c41c0f4847,2024-11-21T07:45:46.567000 CVE-2023-23003,0,0,f0792e782dce5c5fe5f15bd8d0061c6e00716557ac3381b38190d80f674837a9,2024-11-21T07:45:46.707000 -CVE-2023-23004,0,0,ac130295d050193d02458109e23a3740be804911590fced3875d2f673ade5aa9,2024-11-21T07:45:46.863000 -CVE-2023-23005,0,0,07097262a254eacbdb7fe0a19d71fd50833defda2e2095476000fae7e138de60,2024-11-21T07:45:47.017000 -CVE-2023-23006,0,0,84901b6d76c82f7b11cb775bb18e53d272c3625022f0683931165808cc22ed05,2024-11-21T07:45:47.170000 +CVE-2023-23004,0,1,14c7cafb414ec4cafc742b3ec3e79b05bd70465d365880d205377cdc5ee5bbb9,2025-03-19T20:15:17.083000 +CVE-2023-23005,0,1,8ab9ad69a18fae36f57c98cdd07a95d2ee85900f71c27edd540e7f3c759e3b88,2025-03-19T19:15:38.563000 +CVE-2023-23006,0,1,ebf415782dffc538485a9e869682d4aeb4ee086c7978cbc5bca76fb569a74198,2025-03-19T19:15:38.733000 CVE-2023-23007,0,0,8cf1a9a8db04d68b49b3bcbdd803770ff4fcbe312564ba2120812c7b776a4d08,2025-03-18T16:15:16.440000 CVE-2023-23009,0,0,8ad515f5911b9fcf65cf6cea06a5a525ae69bb49f95cac56284bfb3185444340,2025-03-17T17:15:15.920000 CVE-2023-2301,0,0,ca3d934402fb15ec6cb8ae895916b620e4b3addf26aacb9efac8bf5b1c34a9d9,2024-11-21T07:58:20.560000 @@ -218796,12 +218796,12 @@ CVE-2023-23454,0,0,17508cb1e4954dff4fe359b63cd793535c5eb6e9ab057c38dcf9e40f67ea5 CVE-2023-23455,0,0,bccc3b4c3dc9a1fa58f316f1ea309499a8a108862fc3643350f262ed37959ca5,2024-11-21T07:46:14.060000 CVE-2023-23456,0,0,8fa4a5d56d9209dd58b00b8d725524663c8501554fb2f87038ef80179f9ad719,2024-12-12T01:15:48.337000 CVE-2023-23457,0,0,b8210c205a09cf5397de58e97722e58cefa9d4bc93ca2bd9c9d8d9394a4d203c,2024-11-21T07:46:14.360000 -CVE-2023-23458,0,0,d3f7761c2ee13515fd4ca6ff09345f2fde9e4b66c23b7c6638b9d1406092bdce,2024-11-21T07:46:14.480000 -CVE-2023-23459,0,0,24b4de90c5aa3ff773e6109203500a3c4f9a57ac3a380093739ae389909e2548,2024-11-21T07:46:14.607000 +CVE-2023-23458,0,1,95790506bc7695e9a64b4d5453d42528db47f04586fef23b0a237bd7ec19f0c0,2025-03-19T20:15:17.273000 +CVE-2023-23459,0,1,6997afaf63c32c374f8ebde83cd9ac3f4c58f4bc43ed044dad08d59a9c06a31f,2025-03-19T20:15:17.500000 CVE-2023-2346,0,0,d4b44eb9ad99b9e62d4ea6e82bb4b45957375764802e5cc426c30a14c4c8e1c2,2024-11-21T07:58:25.753000 -CVE-2023-23460,0,0,c22672f7204e453ade2d7206a4f2025fa66180620c0ff3068caf44d1d1156e50,2024-11-21T07:46:14.730000 -CVE-2023-23461,0,0,ed67774e04ce4b3d1fd59e7f42526e51586585683d7c8a82d05a2ae2e4b65848,2024-11-21T07:46:14.837000 -CVE-2023-23462,0,1,7ec2870738c7b74433e35737c0583dc3221c213adc3c4ee7c8373567a4df43a6,2025-03-19T17:15:38.330000 +CVE-2023-23460,0,1,23afb2cb6339e93747d6a6652b195777348b1a3a30715d078c182820b6ecd45c,2025-03-19T19:15:38.927000 +CVE-2023-23461,0,1,55a97e2995747eae5323376212af6b84094bcb1dbd002669b393a89e93f43384,2025-03-19T19:15:39.133000 +CVE-2023-23462,0,0,7ec2870738c7b74433e35737c0583dc3221c213adc3c4ee7c8373567a4df43a6,2025-03-19T17:15:38.330000 CVE-2023-23463,0,0,a1e96178d4974fbcfb2d8c036b4763bb6b43950bca776ba66ac23b6c8e4fafaa,2024-11-21T07:46:15.053000 CVE-2023-23464,0,0,08f0c1d85b5b00ccfb362d0a39c29f11a8bfa6a70c842409118aba431160f5ad,2025-03-19T16:15:18.540000 CVE-2023-23465,0,0,35f79e6483d774afe3641fc5c164afc4fd11cd820acd051aac3c7defee608d45,2024-11-21T07:46:15.283000 @@ -220477,7 +220477,7 @@ CVE-2023-25477,0,0,ec14156a94e30123d14d4de03496a8ef0c19cd8a314d9b961591e37637c2a CVE-2023-25478,0,0,7e4d64cee19f8df455042a1c08efb733096eaa4c73070af9cd02e8ecc2d7d575,2024-11-21T07:49:35.093000 CVE-2023-25479,0,0,0cdec7c0163677c76b49f8ad37d0a85eb7c9a03e5a1e135ec547e4a021c3a137,2024-11-21T07:49:35.220000 CVE-2023-2548,0,0,c00d4c071f89fa1da3ff76a58de8785dbd589c4ee952c1bd404fa9bb8d3edf9e,2024-11-21T07:58:48.493000 -CVE-2023-25480,0,1,223a75cc630e176c0b5abe06f88681ef5a5e1961b432e3bd404a808a0c55f176,2025-03-19T18:02:26.483000 +CVE-2023-25480,0,0,223a75cc630e176c0b5abe06f88681ef5a5e1961b432e3bd404a808a0c55f176,2025-03-19T18:02:26.483000 CVE-2023-25481,0,0,780ee72bb7bcc562d3520b1b1f97faea9803e06986bd314662222964dfe85dbb,2024-11-21T07:49:35.487000 CVE-2023-25482,0,0,7a1533ca0490e2a5b0561fe2e7784cbf74226cbf7b01e23598b72b8cd71e5ac4,2024-11-21T07:49:35.620000 CVE-2023-25483,0,0,5f41c7f8a98744ef5d182b8720aa534259a1ce3155d2c5ed73adb2072173066e,2024-11-21T07:49:35.743000 @@ -220751,13 +220751,13 @@ CVE-2023-25759,0,0,0afeea35e5c6d06722ba61e897527acb356d67ad44e78789f4114028282d9 CVE-2023-2576,0,0,b34673ecdfcf4f5d2e116af6c6f211e927a96092cbb5af029ee86fe3ded5e65e,2024-11-21T07:58:51.890000 CVE-2023-25760,0,0,45916bf9f2fe9896b4711de8c6c6bb92063846479311a8b431b74bae3ccc5c44,2025-02-05T17:15:18.933000 CVE-2023-25761,0,0,6a4f3119f4851ddfe1d336dd5a39886a9589eb23c229f39baa83991a734c7038,2025-03-19T16:15:21.030000 -CVE-2023-25762,0,0,1599f815a505ef98c9f6261e53798bee4a539ad9dda862301bf37255f77dc704,2024-11-21T07:50:08.430000 -CVE-2023-25763,0,0,8f2ada5b3f6c2b913e4e9811b38633d08725c783a157e7c90e697e9839ba6dfb,2024-11-21T07:50:08.563000 -CVE-2023-25764,0,1,d202f57d7fa794f132e899f41ffb8436ba127bfe03870d6e9cf54246ddb1ec79,2025-03-19T17:15:38.530000 -CVE-2023-25765,0,1,a468b3dfd591aee4af0bcad4ffddbe18cbea723392a2e5622709e9cd997df4c9,2025-03-19T17:15:38.733000 -CVE-2023-25766,0,1,43dabfcba919a16f959870ffea9f1b23a3fc206f772df0a97ceb4771db4a9076,2025-03-19T17:15:38.900000 -CVE-2023-25767,0,1,18fec2c754479070cb22941f5a76531e55051508b3b291520c55a6d6ec2af6ec,2025-03-19T17:15:39.070000 -CVE-2023-25768,0,1,b6fd504eb302484751d233d5059deb92fea29df135feb217c75bfd76b68b6d71,2025-03-19T17:15:39.227000 +CVE-2023-25762,0,1,cf5bd0fbde4e8380788689ee17b82cc0eb021583bf8c44927bb4746d026f75ed,2025-03-19T19:15:39.727000 +CVE-2023-25763,0,1,81716569ea9084168eb6487b71bcd8ddcbc3bcea2e295cb62a08646f2a66acd8,2025-03-19T19:15:39.867000 +CVE-2023-25764,0,0,d202f57d7fa794f132e899f41ffb8436ba127bfe03870d6e9cf54246ddb1ec79,2025-03-19T17:15:38.530000 +CVE-2023-25765,0,0,a468b3dfd591aee4af0bcad4ffddbe18cbea723392a2e5622709e9cd997df4c9,2025-03-19T17:15:38.733000 +CVE-2023-25766,0,0,43dabfcba919a16f959870ffea9f1b23a3fc206f772df0a97ceb4771db4a9076,2025-03-19T17:15:38.900000 +CVE-2023-25767,0,0,18fec2c754479070cb22941f5a76531e55051508b3b291520c55a6d6ec2af6ec,2025-03-19T17:15:39.070000 +CVE-2023-25768,0,0,b6fd504eb302484751d233d5059deb92fea29df135feb217c75bfd76b68b6d71,2025-03-19T17:15:39.227000 CVE-2023-25769,0,0,e969cfa57da7ad9f466b57cae727617f8ae3c8258ba87d28afc4dc2e84ad634f,2024-11-21T07:50:09.847000 CVE-2023-25770,0,0,3239f060afc14a9bfd1aab1fc131591ae2db29ac7e1eda93cdc634df8b2f803c,2024-11-21T07:50:10.037000 CVE-2023-25771,0,0,db2a3be22e92964b88d95ceeb0065c5e603880580102f7346c661affba920db0,2024-11-21T07:50:10.200000 @@ -222511,7 +222511,7 @@ CVE-2023-27989,0,0,f80df68ca27e65f0bb50a2b0cab0d9cd6ce63b52de8bbc50901fb550d1131 CVE-2023-2799,0,0,650e1cf9f23fba2f16442f4c78a9c4f2ce09b21a506026d2c0f0db495a24e048,2024-11-21T07:59:18.790000 CVE-2023-27990,0,0,13ca578152b8f92da81d51f4cc13e0854f3ec9150f0f34695270095a1d53b82c,2024-11-21T07:53:53.193000 CVE-2023-27991,0,0,ae386e414790310904cad57a7ab0c86d2add8d2b23d2c0bd83f8bf4459ec2ae7,2024-11-21T07:53:53.360000 -CVE-2023-27992,0,0,73dba4bfe69f1f3207372d88ec35374e75504ceb0a9f035f61eb9037e551c159,2024-11-21T07:53:53.520000 +CVE-2023-27992,0,1,90978c8896d00f626645f5a4c4582b584091baabd09431e4a69d4c3cf5ccb142,2025-03-19T20:58:46.307000 CVE-2023-27993,0,0,381be364cc9d6288e0e5d24511b17ccfced7f5158dc4972632c50512547df5b9,2024-11-21T07:53:53.663000 CVE-2023-27995,0,0,2666db313c0f904b4b586e8ac04fda948323b8acfa168c1039de8f38c2d2d291,2024-11-21T07:53:53.820000 CVE-2023-27997,0,0,6e73e7b7396dbf7d8b71882f537c09113597151460fc53330f31005e4e675b18,2025-03-10T20:40:57.323000 @@ -223866,7 +223866,7 @@ CVE-2023-29425,0,0,814fe5e1aa624832ffc2ed99b98099c48ea7ef9954664d06b64b967413254 CVE-2023-29426,0,0,a9a0775e7a095f9af064d5f1ec1a7ec57d669fd9da8844fbc864cee60822b174,2024-11-21T07:57:02.400000 CVE-2023-29427,0,0,c3f185731551e1dc3b4381190c485869e1ff1bfac202fdc8aba63082116b271b,2024-11-21T07:57:02.510000 CVE-2023-29428,0,0,643e2c3b1759b52fb95aff415533390ab629ebe019c6b44b67678f635b0b4a2d,2025-02-19T22:15:17.290000 -CVE-2023-29429,0,1,a18be79a2bb241485cf3750a94c94c9a68c7390136e699f5835dc35596f5d134,2025-03-19T17:24:57.587000 +CVE-2023-29429,0,0,a18be79a2bb241485cf3750a94c94c9a68c7390136e699f5835dc35596f5d134,2025-03-19T17:24:57.587000 CVE-2023-2943,0,0,482e2fca5bd06d4dbe1d1bfd18b1410422640f087316da4277d7e230c59463fa,2024-11-21T07:59:37.070000 CVE-2023-29430,0,0,3356f464c8766b2d49e0bc8f94c756cb77d8d1859e0ba398e889ba81f6670998,2024-11-21T07:57:02.740000 CVE-2023-29431,0,0,8a62b1704088a172061a7e2a7f64d6836eb4c818909be35339704b485675d24e,2024-12-09T13:15:27.283000 @@ -226702,7 +226702,7 @@ CVE-2023-33136,0,0,99eba898fff23d82c47f2c792c222f3f3ca6ed5327fb5baca69d268d06909 CVE-2023-33137,0,0,103ba212dcba54c28261d5a1e10e51442a71026eccdde0a1b3adbe2e820d70c0,2024-11-21T08:04:57.960000 CVE-2023-33139,0,0,c5c93e304d7d4040bc790da55af757379ee9f4747fd79e0fed8e66046830fc4c,2024-11-21T08:04:58.090000 CVE-2023-3314,0,0,66b3623bcd12750794511e8de7bd12735c80df59f69ad19e4e2815979a9cb344,2024-11-21T08:16:59.577000 -CVE-2023-33140,0,0,d9e381ad509b58ac46da41efd8240df88f173a11c24023b55bad15d8cf8a8e3b,2025-02-28T20:15:43.667000 +CVE-2023-33140,0,1,71e7195e4e3aa0b4146698ea2f2091bc573c5497e19c5fffd2c4ec84847c271d,2025-03-19T20:15:17.950000 CVE-2023-33141,0,0,e880fe3c971966a3951b20760badd2a5635eb6ba4eef38878fc8dd765bea29bd,2024-11-21T08:04:58.350000 CVE-2023-33142,0,0,cfbfdce9ccb97bc615b3e8847adfcc51cf9b6f48a434bfa7862a5ca2dad7fdd6,2024-11-21T08:04:58.470000 CVE-2023-33143,0,0,39b8f2547e4a4602a4caf4bdb0635a664485290ebbdc3d4fdc4e3d2d068fd000,2025-01-01T02:15:46.503000 @@ -230758,7 +230758,7 @@ CVE-2023-38471,0,0,ed72debb9e149f771f483abe6c6821aaa3036a5068c628e6ad28b4f557f28 CVE-2023-38472,0,0,48e241cd61cea1be1f13e90ce6b6da489a5e7786c7659cf515f978fccb988d91,2024-11-21T08:13:38.970000 CVE-2023-38473,0,0,03625c51a67421142ff4eb379a6d7bdb3ebd785bcb4e174aec31c41912d69e73,2024-11-21T08:13:39.107000 CVE-2023-38474,0,0,c59ae4f042abaaf2fb4df42d79302019ad68f6cc148dfab6ac63179205f62242,2024-11-21T08:13:39.237000 -CVE-2023-38475,0,1,42b6e3c18bcacdf6676ba61eab9dd382f5a30903bdd11687319b3bc8454a492f,2025-03-19T17:44:03.740000 +CVE-2023-38475,0,0,42b6e3c18bcacdf6676ba61eab9dd382f5a30903bdd11687319b3bc8454a492f,2025-03-19T17:44:03.740000 CVE-2023-38476,0,0,1c3e3a8bc6d9e95e25745b7263d1203b94c8d5ab4492734f493fbe9650b4b9cc,2024-11-21T08:13:39.370000 CVE-2023-38477,0,0,07f300b5083e6879e5aa5466dcd79b90c658ebd0a0d407e057e16029426632f6,2024-12-13T15:15:19.473000 CVE-2023-38478,0,0,93399ec4915925a59e42af4ec9676ab8e39d053eabc9fcbc06a9b92ec37ccb0f,2024-11-21T08:13:39.500000 @@ -234306,7 +234306,7 @@ CVE-2023-42924,0,0,6b99f09dcff0e5a38494359777378c4e0d1701a5bae862f018b23691a1d34 CVE-2023-42925,0,0,d2cdfc9934fba3521ca53b3953d07674531d44e76e318faa00d48bf43075c30b,2024-11-21T08:23:31.643000 CVE-2023-42926,0,0,8392df43c2b4e28bd4ec17abdcb13df2d0cbcf9b6c0001ab69184a56ab75131e,2024-11-21T08:23:31.770000 CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000 -CVE-2023-42928,0,0,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000 +CVE-2023-42928,0,1,3c4c5d0d90e42aacc4e69b7e8e124b58da6e319fe3c84a1e904b72ba83662ea5,2025-03-19T19:15:40.030000 CVE-2023-42929,0,0,22e391c78b0bc708ad36e097e0efa7984486dffc0ca1c4dde9bea2af85485826,2025-01-27T18:15:36.240000 CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589dbd9,2024-11-21T08:34:47.947000 CVE-2023-42930,0,0,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000 @@ -234341,7 +234341,7 @@ CVE-2023-42957,0,0,f030c110e0a0001d394f908c34f4f2bbd027e6916b4a140d52a4471a32c8b CVE-2023-42958,0,0,e2cabd6d75272766e223aa048939175893009bd5724fd529afe4959c76c23f4d,2024-12-09T21:34:41.793000 CVE-2023-42959,0,0,e0711eaa631fd202edf70b35af742cf22eb3e7c7935db69f51becbb0419eaf7c,2024-12-09T21:29:53.040000 CVE-2023-4296,0,0,ef4645291fd27dfb929f96ab18ed877244a7e4ce23ac2038371fce14a4f8f089,2025-02-13T17:17:17.657000 -CVE-2023-42962,0,0,eae5b5f8f8786c59ec83e045e5108238e720128cfd3c327cba0cde631527ec1f,2024-11-21T08:23:37.137000 +CVE-2023-42962,0,1,a72dbc7a51289317b16a14450695e4cfea7099b88aa9e3e01c0fc23746d8cf38,2025-03-19T20:15:18.083000 CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000 CVE-2023-42974,0,0,d29cf4c12f6bfc30add86b56c7cddf36ff797f915e589c9ccb7d83e046515203,2024-12-12T14:26:18.893000 CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000 @@ -234958,7 +234958,7 @@ CVE-2023-43960,0,0,cb9f587c2076d2cc3e6b162d728882e2ca0cc4f582aa12cc86c2ff36accbe CVE-2023-43961,0,0,b0da0c9c90e56ee0fb0ab58c3be4a325af3611079aebc3edf7e7e4214416d9b2,2024-11-21T08:25:01.343000 CVE-2023-43962,0,0,4d1f871132e83488ef7bcbce628fa464ea998003490a46c081c785eb3a59dc1b,2024-12-12T01:30:29.560000 CVE-2023-4397,0,0,4949d510643971fca920f347981af99093b00c6abb778dc316a34c8d8d31f26f,2024-11-21T08:35:03.707000 -CVE-2023-43971,0,1,078287e44654436c913a3322fadbc2ce06a0f358455939fb939acd1fbe5569f9,2025-03-19T18:15:19.683000 +CVE-2023-43971,0,0,078287e44654436c913a3322fadbc2ce06a0f358455939fb939acd1fbe5569f9,2025-03-19T18:15:19.683000 CVE-2023-43976,0,0,4c907705315556b177cdb72974fab7f1e8c606e3978f7955890965d88da55946,2024-11-21T08:25:01.757000 CVE-2023-43979,0,0,742f32cdc7d35c97c637ff54e9150af89778b1b61e1135dab7cc968c90dd5a0f,2024-11-21T08:25:01.927000 CVE-2023-4398,0,0,94193960697b88a30e7cab1101c1db2258ec672f100f0a6dac26c17f2e644a1f,2024-11-21T08:35:03.840000 @@ -237751,7 +237751,7 @@ CVE-2023-47842,0,0,d8cdddad2e1ff4a906f4bdb5ba33e3efa8065f6c9d411a355ecb64a569138 CVE-2023-47843,0,0,52c3e8ba9365447b1d0ee677bfb6182daba4563fc1ff82d4384c9de166c2aa86,2024-11-21T08:30:53.840000 CVE-2023-47844,0,0,6d1743ee8d08f47c5eeaf003eb63b155e5b894f2e742a3945499f074b8ab548f,2024-11-21T08:30:54.023000 CVE-2023-47845,0,0,c5c0774170f52d5261df96ec948cddedc85dd51b50571ce872255eb2278a1122,2024-11-21T08:30:54.147000 -CVE-2023-47846,0,0,04888ff501562bc81227718544b0bcbd766383de811d3cd22339c35daf8f1baf,2024-11-21T08:30:54.270000 +CVE-2023-47846,0,1,4a51ad180f7867d7b94803cf1626cfb41ba52a6759381500f8bc27bd668430d6,2025-03-19T19:03:05.937000 CVE-2023-47847,0,0,f80d277f89340d3f25c3f3571c1e1816d2281f0d3883d2b6dd7769b5558c58b7,2024-12-09T13:15:32.370000 CVE-2023-47848,0,0,dd6561a8697fa838c81a10ffedcdbec1e7bc1da94ee56c2bae4bc9d57b70be09,2024-11-21T08:30:54.400000 CVE-2023-47849,0,0,85e7aedfb56e6545468727b38bfe281b3e7be4bf7a79abdf461699c048600399,2024-12-09T13:15:32.500000 @@ -237775,7 +237775,7 @@ CVE-2023-47869,0,0,b35b27c08772a831526de253648208dd2ef611c6306e6e622fe171b93bd4b CVE-2023-47870,0,0,90674fc91b00935ca55935ec9e84b5dee66e5d5688f9bbe6b4de4aadd6227527,2024-11-21T08:30:56.450000 CVE-2023-47871,0,0,cfdfec4a2737d45b346eac498c6969c85dd01b0c9f8e21357df31b1205cc6225,2024-12-09T13:15:32.767000 CVE-2023-47872,0,0,a6f12169ef04d4b51dfcd627c18e60f534b596ef65ec72eced96dd248e771f87,2024-11-21T08:30:56.573000 -CVE-2023-47873,0,0,5dd5961a1e29615f7c85b89f6ca1d6467e0d9aa45488b1665947ab1206c9e06c,2024-11-21T08:30:56.700000 +CVE-2023-47873,0,1,c80cf9ac4caf0c82ceae2a097bcdcac1ea76105e772f3d559578e1e08400a4df,2025-03-19T19:24:55.360000 CVE-2023-47874,0,0,c9c460bb8c45e037b6d94dc281a302aaac33bdbc40ad3bc34517c19b5f1996e9,2024-12-31T17:29:07.187000 CVE-2023-47875,0,0,dfa066e7628f4ad6f4d51d4f7df32367a25258bc741871f3618113c0e9ee150c,2024-11-21T08:30:56.943000 CVE-2023-47876,0,0,6289baa82f79bb3e0548172170021c28f918791e25a4b59fff372b2a1421f295,2024-11-21T08:30:57.063000 @@ -241912,7 +241912,7 @@ CVE-2023-5626,0,0,89b8ebd4d1c7f1942a37b00475974736d9eac2863a1608fa4432891f3ffefa CVE-2023-5627,0,0,7b0bcde2fc0123738866cf0fb88f9c984cb3778e0474460a09010dbb618fe56d,2024-11-21T08:42:08.887000 CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000 CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000 -CVE-2023-5631,0,0,16096bc1a2cf8238f20c0e183dd1c7588b2c7e2cd4258bbb4a374df3080bd3a3,2025-02-13T18:15:59.250000 +CVE-2023-5631,0,1,a32d4f7d333b4d827827657c5a3712653d70de78185cf2b33e4324aacc9a9532,2025-03-19T20:57:50.170000 CVE-2023-5632,0,0,fda3526a3a02979d0ebc9569e1e9cb2dc81968e1a0812f08b0421c2c14221fa1,2024-11-21T08:42:09.573000 CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000 CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000 @@ -243446,7 +243446,7 @@ CVE-2024-0030,0,0,e4cb4beaf2582efdb0dae14bd9c06d5d49143432bc990a494f672666949d55 CVE-2024-0031,0,0,99203c2b9ece9fd57e9b530310bcac8315f6fa59156a01e4dd338e067b434a3e,2024-12-16T19:30:26.253000 CVE-2024-0032,0,0,2869a92c4ec4dc0012478b0fee11fee5d3cd82b831431d094d1665ef7a26fc62,2024-12-16T18:45:35.897000 CVE-2024-0033,0,0,63855bcf80cd318cfaf639856e9abaf8ce5c28c9ad237fd2a4251ba4dc4f0806,2024-12-16T19:08:08.163000 -CVE-2024-0034,0,1,d1d1a64659a83c8aa89bae4f928003b29a7a84a6a1254788cb1f7988009df90e,2025-03-19T18:15:19.883000 +CVE-2024-0034,0,0,d1d1a64659a83c8aa89bae4f928003b29a7a84a6a1254788cb1f7988009df90e,2025-03-19T18:15:19.883000 CVE-2024-0035,0,0,8f7e78db3211a3833a978a1f4a85563c71b64db0c3d044ea96edc4f8e2a75fad,2024-12-16T15:59:54.053000 CVE-2024-0036,0,0,f9a5e9ac00eb63f9c5368c4edb5f07dae83774a08385359f41cf881322018329,2024-12-16T15:58:38.657000 CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05c0,2024-12-03T16:15:20.440000 @@ -246509,7 +246509,7 @@ CVE-2024-12306,0,0,902fb51a4dbdd5670cb1cf5559cf247f9b3ba9c72034fe5330e7316e326e0 CVE-2024-12307,0,0,dd08ec1d0c570e2dfd8ff10541807fa47db4494718b1c9efb61df634a03bf8fd,2024-12-09T09:15:05.433000 CVE-2024-12308,0,0,18dc61b223db763764029a9b16179b85c8b28aaaa3068aedeeb7fcf5fbe0f0b4,2025-02-24T12:15:10.843000 CVE-2024-12309,0,0,16d03882c6009566e79b9c8c2443055d4427c7f1e57279e0146963b711b56a47,2024-12-13T09:15:07.810000 -CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000 +CVE-2024-1231,0,1,ec0b24e2f6aef77689d191b2d86a5b9df91438bd3cd5a6bc09a3787ba49c946e,2025-03-19T20:15:18.433000 CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 @@ -247223,7 +247223,7 @@ CVE-2024-13098,0,0,c89143d13a1d841d589b3ca2dfd254c31ffedc675416b58546c854d01b645 CVE-2024-13099,0,0,3d7d2d4b382508acd5029b696f1351eb26fd52dd579ace298c4c370c6f1e146c,2025-02-04T21:15:26.083000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 CVE-2024-13100,0,0,30ca900cb5e6fdec8dbd798099fab143225571e3bc8f4295e818fa0014f1f883,2025-01-31T17:15:12.263000 -CVE-2024-13101,0,1,b8649741908515dc3d38937525b2c4c84a468157e5caace43177fbfef1376a2d,2025-03-19T17:15:39.643000 +CVE-2024-13101,0,0,b8649741908515dc3d38937525b2c4c84a468157e5caace43177fbfef1376a2d,2025-03-19T17:15:39.643000 CVE-2024-13102,0,0,92ed304eb0adab2cc3d1a1448a602c50cc957b6451492253400925d30eddabda,2025-01-02T18:15:16.517000 CVE-2024-13103,0,0,f8ff11c917b1c6c878887a9bc93ed3b50ffbb81b1816baf12dde8356d92c8306,2025-01-02T18:15:16.747000 CVE-2024-13104,0,0,0127d4c125bf39f84f3a00abb38c610705cfb224d01769761ab4944512d74b20,2025-01-02T18:15:16.890000 @@ -249467,7 +249467,7 @@ CVE-2024-21044,0,0,ac5ea32d20924ca48be83be48bc43603a32a4902655296244b46222404859 CVE-2024-21045,0,0,9edd061105b02124bf0e5aeab59e8a21dad970c5b6425a7c91bb9db05698ccdb,2024-11-27T16:29:07.300000 CVE-2024-21046,0,0,79ccfcdb7b504f2f86fea26a1751fb57f31b935246504961d5f69037c74a8984,2024-11-21T08:53:40.920000 CVE-2024-21047,0,0,d8127bb9572c163e6be33f255435cf130b9ccec4db3b085e1557bdeda01db1ff,2024-12-06T19:56:28.687000 -CVE-2024-21048,0,1,02eedae3f738bc1e11407061abeb69741f0c43155d933968f3a546d3c9c73a54,2025-03-19T18:15:20.043000 +CVE-2024-21048,0,0,02eedae3f738bc1e11407061abeb69741f0c43155d933968f3a546d3c9c73a54,2025-03-19T18:15:20.043000 CVE-2024-21049,0,0,527cf013ef0435259f0e3c171bb16dcc79f716830d71f090203a570ef36d9741,2024-12-06T16:58:16.557000 CVE-2024-21050,0,0,507c347f24b6555f7372ba8563ab196ed92849ef866f18cba679450207fab96f,2024-12-06T16:54:42.740000 CVE-2024-21051,0,0,23f02eeb9f79fba574c025f41dadca98c0a9f0858b1a36b6f1546859b7c7bcb8,2024-12-06T16:52:07.510000 @@ -249541,7 +249541,7 @@ CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f CVE-2024-21113,0,0,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000 CVE-2024-21115,0,0,c8b5f110fee1084e3e4bbd02d3f1664b03293a1da68e5246ef4334e81776ca1c,2024-12-05T15:16:18.327000 -CVE-2024-21116,0,1,7e2c4136f878188d95cf72c55ebbee15e332a84362d7370fd65d684963fa1fc4,2025-03-19T18:15:20.193000 +CVE-2024-21116,0,0,7e2c4136f878188d95cf72c55ebbee15e332a84362d7370fd65d684963fa1fc4,2025-03-19T18:15:20.193000 CVE-2024-21117,0,0,5d43a21324183b9d6abac7bf386e13c102239eb07d87d78b640f0340e813f8d2,2024-11-21T19:15:07.527000 CVE-2024-21118,0,0,dfb174443743455639d3d519ae3e7800f4183eda1b765acea21c3bd12058d487,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 @@ -250092,7 +250092,7 @@ CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a603906 CVE-2024-21683,0,0,0138a14cab5cd983947b65c119f865cc9fa903bddca6894cfddf60a14c16ab92,2025-03-14T21:15:36.697000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 CVE-2024-21685,0,0,346bc4b5792cb2032fa2d12dece43f65235af6cb4059de4b308aa50e2caa89a3,2025-03-17T15:15:40.387000 -CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000 +CVE-2024-21686,0,1,d37e899dbd52c62190a5aa8009d323170147bb8202cb8fbd81ef61148a557602,2025-03-19T19:15:40.200000 CVE-2024-21687,0,0,8560b35c67088dcd0ed16945b654268ae56b1f595e022431d10a4b3886c70b5f,2025-03-14T16:15:28.963000 CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000 CVE-2024-21689,0,0,318beb5df841ddfc145d774eaf7f12c114c8c5e9e7cb393437b251d5da66a63f,2025-03-13T16:15:17.273000 @@ -250136,7 +250136,7 @@ CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd CVE-2024-21728,0,0,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000 CVE-2024-21729,0,0,ce8a30bafeb6b97535469464c82ba7fd23d6f7caed1d9ff1342347bbafd041de,2024-11-21T08:54:53.400000 CVE-2024-2173,0,0,bbdf3bf6336b1d782e61be6c9f3cb2e1386e6959d4a82a30c771ebd8a67897a4,2024-12-19T20:20:02.573000 -CVE-2024-21730,0,1,3fb54c28ca30ec2bd40b6d6fb2091cbe68d186fd51891abb72beb75eef450a5a,2025-03-19T17:15:39.783000 +CVE-2024-21730,0,0,3fb54c28ca30ec2bd40b6d6fb2091cbe68d186fd51891abb72beb75eef450a5a,2025-03-19T17:15:39.783000 CVE-2024-21731,0,0,5498da9c2571dd8675b69a41552ec2344ce7a7dd99f451ca8cb3acc427b2e6ef,2025-03-13T15:15:41.053000 CVE-2024-21732,0,0,d84d78afb3d7bd3a899864117012493afdbe0d959599084e232b1e639d2c57f8,2024-11-21T08:54:53.800000 CVE-2024-21733,0,0,b249e32e4b1fea27cdaefc3857897e63645934a70fada5c3e1ac5397aaca101d,2025-02-13T18:16:43.363000 @@ -250602,7 +250602,7 @@ CVE-2024-22257,0,0,1a5a0b35972b87fc52a9911fc56030783b26d8d4485f5584791104f906536 CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000 CVE-2024-22259,0,0,1d5817a8999b58be866796e36ca3e4199c3e466f70ce279e4c60007061b8260b,2025-02-13T18:16:47.843000 CVE-2024-2226,0,0,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 -CVE-2024-22260,0,1,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c1f7,2025-03-19T18:15:20.353000 +CVE-2024-22260,0,0,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c1f7,2025-03-19T18:15:20.353000 CVE-2024-22261,0,0,46d669194198080bacc4599579892d52d349bfce87a7598545a77f0180f961cd,2025-02-27T15:14:51.320000 CVE-2024-22262,0,0,c6cba0eaa82aa4b35f3e73f09e60a77ab1893f065fbc1843c84c2a7ba444c92b,2025-02-13T18:16:47.980000 CVE-2024-22263,0,0,6b57c165ae6f4f24efbe95adbce97de5c609eb29ccf1915937950705d9f78a34,2024-11-21T08:55:55.223000 @@ -250971,7 +250971,7 @@ CVE-2024-22873,0,0,78a7877b1a09ddd2537ed7cf255cc6a3a855d40547eb3276022d060327f8d CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e682,2024-11-21T08:56:44.390000 CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b492,2024-11-21T08:56:44.530000 CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000 -CVE-2024-22880,0,0,d6e5c199dcd4876280c9927dbc3d7fd5c10d84bc1f518601115d37e9996118d7,2025-03-13T14:15:22.180000 +CVE-2024-22880,0,1,881d939fda660900c2adc0624336815d8d28e91bab0ab5f4b1057987aa5c4e7f,2025-03-19T19:15:40.330000 CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b149,2025-01-21T16:53:16.990000 CVE-2024-2289,0,0,26b467ee86b0c6253460d8055adfd2a4f195f6cdb0e4f504faeeaa32f315ba81,2025-03-06T15:03:11.220000 CVE-2024-22891,0,0,02e131b40d02e30836912251adc1ff415ae3aca9fca1513bfc674a89af8ec37f,2024-11-21T08:56:44.910000 @@ -251881,7 +251881,7 @@ CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024a CVE-2024-2396,0,0,dbed9fbe2d5d7de3cce91c915e36b04dd9e5fcc632a2b0ac8bc85585689989a5,2025-02-11T02:15:34.380000 CVE-2024-23960,0,0,cff56ab82ea9e077741b7c7712db67327c7a66944d1aacabc3102eca8aa98039,2024-10-03T18:06:26.457000 CVE-2024-23961,0,0,cddb82f65f7f594870e3234d43ec53693c26d34fff040eeedd46a915ad4dd550,2024-10-03T18:06:59.083000 -CVE-2024-23962,0,0,921ddffd8666340f04c19f26d89dbec4b2433099ca756447094a81c57144370c,2025-02-18T19:15:15.260000 +CVE-2024-23962,0,1,39f12cc1b2da9806fc3c13a2f0d69f011cb18a849c90223dbe5b22e126ecd3d9,2025-03-19T19:15:40.467000 CVE-2024-23963,0,0,c914b7b115da0eefe5de1b208df8a72f7887967b62b6da98eeaf5699149af304,2025-02-18T19:15:15.363000 CVE-2024-23967,0,0,7280cb7c94ec5dda172d5df2bf80662cc9068f65953193c91dccf565d7d9da83,2024-10-03T17:37:37.907000 CVE-2024-23968,0,0,768db1ff8ec1bb6d3a46017334935f5ad3c6809c0a2ac25ad7f64651bbe28d5c,2025-01-31T20:15:31.357000 @@ -252636,7 +252636,7 @@ CVE-2024-25129,0,0,129cb5e62a828cf41338bad0dc86b6db85af7bd7b1ad698fb96182cdca890 CVE-2024-2513,0,0,d71e293f9063fdfa6d3ef80280c511be26ac917126706325049d7776bce9fc2f,2025-02-27T19:50:24.517000 CVE-2024-25130,0,0,baa3afea95e92b29c6e4fa4d98cf4bb3b6da86d93d3fd05666b5ea53e09f0713,2025-02-05T21:55:35.147000 CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000 -CVE-2024-25132,1,1,dc2b8bb67a0b7e871de6d0769403e01366bbd0e55f5e78cc19fe3e45a0a92eec,2025-03-19T18:15:20.513000 +CVE-2024-25132,0,0,dc2b8bb67a0b7e871de6d0769403e01366bbd0e55f5e78cc19fe3e45a0a92eec,2025-03-19T18:15:20.513000 CVE-2024-25133,0,0,d7cb090963281cc8402df1249c0e7d3663d7f9c77c24e16db3ae50dd71a57c55,2025-02-06T09:15:10.650000 CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000 CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 @@ -253147,7 +253147,7 @@ CVE-2024-25917,0,0,0cd9a5e3f54e99a2fbdddaa15494910cc1cd9ae49be1a604f11ea21e2776d CVE-2024-25918,0,0,ff0e88082d64b7115737275b1fe064a9a5a721e9ee09f1241f111c33635b79ee,2025-02-09T20:40:39.820000 CVE-2024-25919,0,0,d1ff273fa45d6929d7cfcb977c0c667c296e6d469e69bda056d1ddb816ab474d,2024-11-21T09:01:34.383000 CVE-2024-2592,0,0,1314e5979e922ce544e374cfd4ccc557ec63d2416b8c6bbad2cab77d20807b69,2024-11-21T09:10:04.923000 -CVE-2024-25920,0,0,a0d88b4429dd97ffd7ab35e4cd780913d5cda8da9d018eb4732879bd3ed264ba,2024-11-21T09:01:34.510000 +CVE-2024-25920,0,1,b661e671f3d29a450475d399a5d74d98db49bc8559a20666cd9a627aa02ffed0,2025-03-19T19:25:32.190000 CVE-2024-25921,0,0,1bfc8faa7e1d02c9c2f1de0126ab2889fc1bc9c5656ab66c16baddc12e4caa30,2024-11-21T09:01:34.630000 CVE-2024-25922,0,0,013cf5eee09a7251840c6fc199a103ff1a6a473ceec2bf28c66c9186ceab960d,2024-11-21T09:01:34.757000 CVE-2024-25923,0,0,113df91aa477bc92f3335e80693c330592d18784bbd85f7855e76930bd10e367,2024-11-21T09:01:34.877000 @@ -254814,7 +254814,7 @@ CVE-2024-27858,0,0,f4f73eee81b8f4dc00d57e5df8d498b16730ba77b55a009865d860dc080ce CVE-2024-27859,0,0,ad3c2f529f7d5fa089dac598157b85b745e8bbf7c9a5546b07992be4fc663cc9,2025-03-15T15:15:37.690000 CVE-2024-2786,0,0,fdc7011c4f0b705afb5fcd1f3a67915269e31c824586b5ff624ca764a8b78249,2025-01-07T18:17:10.187000 CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000 -CVE-2024-27861,0,1,b4812682f42433316ee5f1c35ea5b5ffbaa4e1f44b8b6c664a1dc704ea6d7774,2025-03-19T18:15:20.657000 +CVE-2024-27861,0,0,b4812682f42433316ee5f1c35ea5b5ffbaa4e1f44b8b6c664a1dc704ea6d7774,2025-03-19T18:15:20.657000 CVE-2024-27862,0,0,1879dd3c7b86226e41db14689055cbd9455607ed315179a7b729f6913bf91dce,2024-12-10T15:00:16.310000 CVE-2024-27863,0,0,bc20f934200c90ab71177ba452dea8ed95327208c78d45ff56560458c5cbbb31,2024-11-21T09:05:18.200000 CVE-2024-27867,0,0,9d8a031b2bac38a4828644f9e0ea14edefe724dd0e937c81c7aeb7d5722cc9e9,2024-12-10T14:42:58.173000 @@ -255333,7 +255333,7 @@ CVE-2024-28582,0,0,04799e93ceccd9cc4b3d5e6db53e76424895199be69cbe96cfb9fe2b3cd39 CVE-2024-28583,0,0,dd3c0b8d8072bd6a8dcd0e860b02c395eb40124b9c8f43138e219d628568beb0,2024-11-21T09:06:40.073000 CVE-2024-28584,0,0,48b2b30bfacc95821daf411318d5a1df0132f3fefe454b07829432d1245ec198,2024-11-21T09:06:40.357000 CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000 -CVE-2024-2859,0,0,9b68da83743c2e33a01665913e56717c8d334fd541d9c664f0d2fa6aaf74282d,2025-02-21T17:15:11.730000 +CVE-2024-2859,0,1,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000 CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000 CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000 CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 @@ -255448,7 +255448,7 @@ CVE-2024-28797,0,0,4428f4508f0394dbac9052e216972411f049f718a376c7fdf1e468f085048 CVE-2024-28798,0,0,c450a07fa3da24857d7aa196915ffacb3ccbced2399e367e632efb532039119b,2024-11-21T09:06:56.897000 CVE-2024-28799,0,0,091d8979bf9a587a824cfb448da40491a1930bac3b102f70feeaed8f3d3a720b,2024-09-21T10:15:05.253000 CVE-2024-2880,0,0,7d49b4d9a5e82f793de321cf64632ce8167e362b26e6f6f1451c757d5343ce6e,2024-11-21T09:10:44.297000 -CVE-2024-28803,0,0,32385f9edbd895f6bf82a36ade1e2afb1116a2e6455191a35f1bc3fac6f548d5,2025-03-13T14:15:24.997000 +CVE-2024-28803,0,1,c5724aae9f2244f2ecd4d510334c5187f3df118ac57c070b4d4380f4a9d03d2f,2025-03-19T19:15:40.657000 CVE-2024-28804,0,0,ca7d013ccb22252ceaed94a64736c5c758e3ad66129ba9a9cbd50a99c1797088,2024-11-21T09:06:57.153000 CVE-2024-28805,0,0,9248a1f1e1c49722840898ba6a64e208fb032795f499e6f66986740e39d77109,2025-03-14T16:15:30.333000 CVE-2024-28806,0,0,ac3147ac7ea03da613bdfd0fdb3c4a5b96890d5e76b525d0febbcef7d2923666,2024-11-21T09:06:57.600000 @@ -255511,7 +255511,7 @@ CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca4 CVE-2024-28876,0,0,275454f6648ae48abb7dd0bb2572cfbc3374f282a0e739572d5d9f74b7aeb1a2,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,70e500b76ecc62e6234b65a66cb44bb6349214814b90198f358629164177defb,2025-03-01T02:05:56.853000 CVE-2024-28878,0,0,90956f79f168fc36d6b6bacee918ce9e058b32142fa56831e843f9bd0ad863c6,2024-11-21T09:07:05.950000 -CVE-2024-2888,0,0,541f045cc85ff4ddf39a72c6750492517dbf69009976bbb73b27f4a134973bd5,2024-11-21T09:10:45.780000 +CVE-2024-2888,0,1,4528ca4c4e9c2710456e3946bb4f009402d0915a1bfd36b4b2a3cf59ce181893,2025-03-19T19:02:10.360000 CVE-2024-28880,0,0,dce67170de98f0e8d2cb2c5e6724ba2918f4b3e757ed17b2daea09b41e6729b6,2024-11-21T09:07:06.070000 CVE-2024-28881,0,0,76f33caf69bc593b5028f013928afa615e33f660b6dfd892a36ded448eb993e4,2024-11-15T14:00:09.720000 CVE-2024-28882,0,0,d2fd90a7f9ec67efd0992204e74ccb908ee6aad42300a064f5ff2488193b111f,2024-11-21T09:07:06.380000 @@ -256226,7 +256226,7 @@ CVE-2024-29911,0,0,f25c0b2d785ce28963e6e183efa13436d6a827fc049625dbca68cd0b77dfe CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 CVE-2024-29913,0,0,4b95f6d7b2415812dbf11ebb30932ca1a187037482b34219d7dffd7469624706,2025-01-28T20:29:09.363000 CVE-2024-29914,0,0,7c5531720064523c200888ff21e4ecd129aa835bc9d9b4bbb5043cd65c102278,2024-11-21T09:08:36.433000 -CVE-2024-29915,0,0,102e298fb86162b5224bdef00b35afccefc860b69e50236c5b86acf8ef4309f0,2024-11-21T09:08:36.560000 +CVE-2024-29915,0,1,17adab2f35455547d50732653773ba6585a2ab526f44bcd561def305ac4fdcc6,2025-03-19T19:37:19.997000 CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c33d,2024-11-21T09:08:36.687000 CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a035,2024-11-21T09:08:36.923000 CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 @@ -256472,7 +256472,7 @@ CVE-2024-3016,0,0,58c170e1683a5dd60198d6e8d31a0de337246947c53fec4a9f8a4f07423100 CVE-2024-30160,0,0,0b2b9103ae0c5965fe4e466cf09bb573bca5fc26c14f8291fbdc858b9f90e62f,2024-10-25T16:30:53.613000 CVE-2024-30161,0,0,bd9c6bbca173a3185882384150ea17a790a06755ac3f6e1d556a0c7f18eaf6e3,2025-03-14T02:15:13.777000 CVE-2024-30162,0,0,1d89027fadd32d888ac91deacfb634da9306e22312414c5b33187ff9291e61a1,2024-11-21T09:11:20.300000 -CVE-2024-30163,0,1,2887459b66695d41f1e6d12551511852bcbdefc140339f61da6a07ca21c85b99,2025-03-19T17:15:39.967000 +CVE-2024-30163,0,0,2887459b66695d41f1e6d12551511852bcbdefc140339f61da6a07ca21c85b99,2025-03-19T17:15:39.967000 CVE-2024-30164,0,0,6998914e7b9a904a0ad839bc7bfbf870f6e9811a73e1e955fe85aadcbe3e160e,2024-11-21T09:11:20.680000 CVE-2024-30165,0,0,36d8b80b6275d52da8de003880254279acb2ea19b7eba966f7643a6302de347c,2024-11-21T09:11:20.927000 CVE-2024-30166,0,0,ed495d02dae5bda84eb98a18b714a97f03e0a0f04788a61cdc1482fe6447f3dc,2024-11-21T09:11:21.147000 @@ -256765,7 +256765,7 @@ CVE-2024-30450,0,0,1f22d60fd8328059f0924db0f61fc614f1b93097538d47446f87ce05f932e CVE-2024-30451,0,0,cbf2894838c88c6ce6917b56aefbe5f7fc68167adb2a8d98ed36e792547ff777,2024-11-21T09:11:57.103000 CVE-2024-30452,0,0,8ad8d0eca7b3c83f0489d284832375756cdb15bea1fa23fc3174e599751e2585,2024-11-21T09:11:57.233000 CVE-2024-30453,0,0,573d1a2f4714dc8fde1fd9c80ed44a7e78bddcba54b4583f722b600a9b0bba3f,2024-11-21T09:11:57.367000 -CVE-2024-30454,0,0,b7a68c34d480a41442b68a08e4f4a7ac39dffd5555939e36ebc114f49a4e8923,2024-11-21T09:11:57.490000 +CVE-2024-30454,0,1,02f265310fabb7b1111ba661a4c8951908d37f29b16607a3bda7815678185928,2025-03-19T19:37:29.717000 CVE-2024-30455,0,0,d77fde51c595942f053f6c0522870560b8e719764efc6a689413b67e375ff811,2025-01-31T19:59:06.177000 CVE-2024-30456,0,0,3b319bf606c266f33dce1e9365d6a96a64d0b365b070db2d43a512cff55ef7b7,2024-11-21T09:11:57.747000 CVE-2024-30457,0,0,d4f6dd1d90dcd3ba325329eaed0ecaa3d2153dd5de409c69845cc8ad41ff4514,2025-03-10T16:53:12.913000 @@ -257406,7 +257406,7 @@ CVE-2024-31311,0,0,1a44e686db557c94dba0ef9b706e10f4ecfa786c8cdc2e5becafc8a2a70a2 CVE-2024-31312,0,0,a6faac328a1918a99ef8645176673fc9899bc26b8ba45d4fcf17774fe9f22e11,2024-12-17T17:32:22.067000 CVE-2024-31313,0,0,6840820e942f960dd9d16eff2cf207a1486b1e1b12b692ce43ec775f6da9c756,2024-12-17T17:30:59.083000 CVE-2024-31314,0,0,9a4258d475ed2ce64afee04cc1284b94f7fb13317df4b1ee01a0bfb761cd3398,2024-12-17T17:28:52.817000 -CVE-2024-31315,0,1,639adec58ec499dde025b4a72b5a5457c10ed6c0bcb93aaf637944205fa5ac0e,2025-03-19T18:15:20.800000 +CVE-2024-31315,0,0,639adec58ec499dde025b4a72b5a5457c10ed6c0bcb93aaf637944205fa5ac0e,2025-03-19T18:15:20.800000 CVE-2024-31316,0,0,0de4268821e575e8e6f855e17fe54d04317b31ab33cbb0521a21f02f47373307,2024-12-17T17:21:22.277000 CVE-2024-31317,0,0,1d259e1967c4b880ec91046d40dd15b5d27db347e734b5e682f5b68a5b4d834a,2024-12-17T17:19:27.063000 CVE-2024-31318,0,0,66ac26e9e96d5ea8bae49ad2623bcf26d70cb81764bce4579be256ed20a0d687,2024-12-17T17:16:10.643000 @@ -258008,12 +258008,12 @@ CVE-2024-32135,0,0,bb472ad60ceafc8c196d75ee5dd55c4cb326fa7042c82bf43ef274ed6e6ba CVE-2024-32136,0,0,9f84115ffa8720b79560c03c1cb35df4341d773004df02eef74e13766a109195,2024-11-21T09:14:31.830000 CVE-2024-32137,0,0,3827b4422b9a7a673518e4e22d10627690791b57bfc4b56bb5770b98889cd1e6,2024-11-21T09:14:31.960000 CVE-2024-32138,0,0,a85ca8385032bb0b8967310c42d90da7476a74dd42ae3b77657a5051665a1347,2024-11-21T09:14:32.100000 -CVE-2024-32139,0,1,83dcca6dc31c1bdc2893f533769b9cf8f20465c2e705be3f0901678852c46936,2025-03-19T17:58:54.203000 +CVE-2024-32139,0,0,83dcca6dc31c1bdc2893f533769b9cf8f20465c2e705be3f0901678852c46936,2025-03-19T17:58:54.203000 CVE-2024-3214,0,0,e49117e773b743e4cfaeb7a84fec89702a5c934d3c4aceae9e7d0655bfa5aef4,2025-01-28T21:03:01.313000 CVE-2024-32140,0,0,08c8b7dac087cd4e7957c91fad7f2a62ace1c6fa7c0f736b04fb2301121d2ede,2024-11-21T09:14:32.363000 CVE-2024-32141,0,0,dcf8a0c01e6a7f5d3d6e92d0dd77ce174bd42a293c36bad371a0e0a22df2e91b,2024-11-21T09:14:32.497000 CVE-2024-32142,0,0,b217a174100db973d030d1b55e39f5014e0fb04c15ff4a976a3ab77b68a2e5aa,2024-11-21T09:14:32.630000 -CVE-2024-32143,0,1,b7a0cbfeb192e6fda4f3fdeb90f794f3bfaab77c0ccfd1f9dae5f4096e82c728,2025-03-19T18:52:15.910000 +CVE-2024-32143,0,0,b7a0cbfeb192e6fda4f3fdeb90f794f3bfaab77c0ccfd1f9dae5f4096e82c728,2025-03-19T18:52:15.910000 CVE-2024-32144,0,0,a24eb1f2f415b39fab1e80fc99fdcda2514310296ccd02d6564f265da2b078c9,2024-11-21T09:14:32.897000 CVE-2024-32145,0,0,e1af8c2d1116a05938db0b6afcbc7d6980c2b5db4beee4de8f7fa10da2b40642,2024-11-21T09:14:33.037000 CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf295611a9,2024-11-21T09:14:33.187000 @@ -258320,7 +258320,7 @@ CVE-2024-32599,0,0,85f9b65b3f6db3f4885fa3bf551795f40394244ea206141eb30d6421a2116 CVE-2024-3260,0,0,4fd56a2bc1fac8629d6f2b29f7165ccf2f1f95ef21bff0eb4b38593fd9846714,2025-02-11T02:15:34.593000 CVE-2024-32600,0,0,00e14840c904317cae2d379a6776e98f5f7d35bfbcc5b55d8fed12bb45a03e58,2024-11-21T09:15:16.433000 CVE-2024-32601,0,0,af010acaf4743111a3bc69689ed2d216bf07e925bf205d05dff921279ff747bc,2024-11-21T09:15:16.587000 -CVE-2024-32602,0,1,ab5d34c5a3302e6d93095dd4db85c9dabf034ce30403ea92f0ccd56e08f1d774,2025-03-19T18:05:39.363000 +CVE-2024-32602,0,0,ab5d34c5a3302e6d93095dd4db85c9dabf034ce30403ea92f0ccd56e08f1d774,2025-03-19T18:05:39.363000 CVE-2024-32603,0,0,80a98c3b7ad555ba0fda6a97686fef1659cc1c2d73973b0c941004d6b6d242a4,2024-11-21T09:15:16.867000 CVE-2024-32604,0,0,e7bdeb8d2e2fadada24176fa229f6cb30e87ba3862a563fc78ab541cf1354837,2024-11-21T09:15:17 CVE-2024-32605,0,0,9e58d99b4a8446a5d27ed389acdb1aeece231d89786309e2f6463f8729a7a96f,2024-11-21T09:15:17.127000 @@ -258430,7 +258430,7 @@ CVE-2024-32709,0,0,170364df701f4cffac0c24e4b0180dd45693ac6c16c177ddf9e2f2ec9f8be CVE-2024-3271,0,0,d3c8ed8802ade921ab6d07df11dc2fdfe9dbe7e3927e29bd5779b01f4432b381,2024-11-21T09:29:17.400000 CVE-2024-32710,0,0,918953eb42e296f97ebf6deebebdf8d317f11d29355b027a7213424bc79b48f2,2024-11-21T09:15:31.960000 CVE-2024-32711,0,0,1d593f0396d46e34d125a4355bbd4a25bbe1ae7a62be70a76ec52b26061654c4,2024-11-21T09:15:32.090000 -CVE-2024-32712,0,1,d42d0f9275bdb037505c345ccebd160099ddfcb64cac353487851c8c8a7750cb,2025-03-19T18:51:57.117000 +CVE-2024-32712,0,0,d42d0f9275bdb037505c345ccebd160099ddfcb64cac353487851c8c8a7750cb,2025-03-19T18:51:57.117000 CVE-2024-32713,0,0,6a05cb86c686770e6f59d4cf6c14170810d565db8528243a9ffd6ad2528cd253,2024-11-21T09:15:32.353000 CVE-2024-32714,0,0,142a6e6677f48dedc1a9b7f3ab28bf5db663131eec2124112bc6b70ae94745d4,2025-01-29T17:24:28.227000 CVE-2024-32715,0,0,304b4163975a1f0b3faebc68806d887b7dcd202ebcff1a4048659b9dc8325ad1,2024-11-21T09:15:32.650000 @@ -258532,7 +258532,7 @@ CVE-2024-32809,0,0,cdabbb959561b35cad5e3d19819317f428c1fc59b966e80ed97cabf23b942 CVE-2024-3281,0,0,2482fe63c7424f766bbe910ecda7910a8a23fd7f6f01db11424091242fd707ab,2024-11-21T09:29:18.697000 CVE-2024-32810,0,0,fc588b7101c8724c0618f39b810de8e0e0b303254edf9f0385bb55ecb8ec3be0,2024-11-21T09:15:46.253000 CVE-2024-32811,0,0,c706285286eb8cebde941a2b6b81f29430198ae0790de5a1ed4fcce515da67c2,2024-11-21T09:15:46.380000 -CVE-2024-32812,0,1,1b8a20df3ed3c12ac45410b62fa2e5ad451f7123208ade36f32e809fb873abbb,2025-03-19T18:08:22.227000 +CVE-2024-32812,0,0,1b8a20df3ed3c12ac45410b62fa2e5ad451f7123208ade36f32e809fb873abbb,2025-03-19T18:08:22.227000 CVE-2024-32813,0,0,57e2887373178192abb3ec1287227d39fe838b5cdb8fa6b345f304e6657ac619,2024-11-21T09:15:46.663000 CVE-2024-32814,0,0,6feed64fc0cb3f07d04ade0e1616542dd0ca390284296e3eb4f442de746258af,2024-11-21T09:15:46.790000 CVE-2024-32815,0,0,3dd7e605f7236cfe6c26b4682e30e70e2bab13282861ee6c13bc55785032ae62,2024-11-21T09:15:46.930000 @@ -259295,7 +259295,7 @@ CVE-2024-33877,0,0,8b1243ef0c134393a090955101488ff5279f60f5bc7848f732464fde40e97 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,6af65bc1296155ce6dcbc637906c4c848f8f160031b78a70bd743f7c6e9a6239,2024-11-21T09:17:39.790000 CVE-2024-3388,0,0,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae372,2025-01-24T16:16:18.310000 -CVE-2024-33880,0,1,825b5ab6fbac29f3c9af4fbcb088a861697801ad34dbc244a2ec5b7e38730179,2025-03-19T18:15:20.963000 +CVE-2024-33880,0,0,825b5ab6fbac29f3c9af4fbcb088a861697801ad34dbc244a2ec5b7e38730179,2025-03-19T18:15:20.963000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 CVE-2024-33891,0,0,dd477fbb1ee0bfbcfc6ef6b47357972caedec865080fe0f9a90e527403cff11a,2025-02-12T15:15:14.827000 @@ -259332,7 +259332,7 @@ CVE-2024-33924,0,0,cd91ae14d143fd3a9244e608a4fac373aeff872b53921238973d6be9b0353 CVE-2024-33925,0,0,4d5561dfa9d80b155896c7588c3e85f7c04712a0df905139b501c1e625a90fb2,2024-11-21T09:17:44.853000 CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d2440f,2024-11-21T09:17:44.957000 CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000 -CVE-2024-33928,0,1,95e8a9d8bd0baa2bf39edcebb8f9e632cd7e8fc6a3eac29a1a6ede77f7757fe6,2025-03-19T18:51:43.057000 +CVE-2024-33928,0,0,95e8a9d8bd0baa2bf39edcebb8f9e632cd7e8fc6a3eac29a1a6ede77f7757fe6,2025-03-19T18:51:43.057000 CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000 CVE-2024-3393,0,0,2cb6709dad3083b7f26d7f89585a29554c2f00b4541726289ed615daeb94da29,2025-01-14T16:02:30.133000 CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000 @@ -260105,7 +260105,7 @@ CVE-2024-34807,0,0,35bfd452213ea2b730e227fdd3fd76b5671c714b9d8689165b742c6f68f66 CVE-2024-34808,0,0,84689f32b1ce8689e5ecf7d32f667bc17dc2689dc60310c5e26541fa7ba4062c,2024-11-21T09:19:26.480000 CVE-2024-34809,0,0,27dcfb66e470cfc816fdb92de7b354028d4b7284db4e2959235ed5c3b8cd8d83,2024-11-21T09:19:26.600000 CVE-2024-3481,0,0,21441da3ee3d7342e7c1bd8558189b4ec572165ab4d93e0a1b2dd42d65b5a24a,2024-11-21T09:29:41.733000 -CVE-2024-34811,0,1,882adddb7344917499b2046cc8c91a0b1880bc5a2f247847c883852769f68a4e,2025-03-19T18:52:08.760000 +CVE-2024-34811,0,0,882adddb7344917499b2046cc8c91a0b1880bc5a2f247847c883852769f68a4e,2025-03-19T18:52:08.760000 CVE-2024-34812,0,0,7d78e169d7d75ab3c581e8d7397e7b1ac81ce93b9eb08c1119bef68e9fbf19ca,2024-11-21T09:19:26.867000 CVE-2024-34813,0,0,584847820bfe3d61f857e727c2ed893dba1c5333c3b8db21fd5d36e9ebfa09ec,2024-11-21T09:19:26.980000 CVE-2024-34814,0,0,5592c28bc61ee507ca9c95f71fb8edbe8b60ab4e32dc3d21230914ce0f5e8326,2024-11-21T09:19:27.107000 @@ -260444,7 +260444,7 @@ CVE-2024-3535,0,0,649dd877d7d025579d42786bdba5275bd9be84be9753f0dd0cd80e8b7797dc CVE-2024-35350,0,0,f889e2c3fed313b8150382cefa800ceeea5dc815f4a9ae9824d239b1582c7b02,2024-11-21T09:20:10.960000 CVE-2024-35351,0,0,bde59efda0afce63332a3f7ad7de11196b04e01924e97473d42284237b875306,2024-11-21T09:20:11.173000 CVE-2024-35352,0,0,d19de455a95a7f45e66d22a2f2a112338a5373f2c45a9ab8bf495ea5b584aae6,2024-11-21T09:20:11.390000 -CVE-2024-35353,0,0,aa25e06866408e12c761bcd61e1f272ee62b19350d59d398ee4cba7d9290954a,2024-11-21T09:20:11.600000 +CVE-2024-35353,0,1,860c76a29287cb2b68bcede5a1eaf39c4735b9a63d6f30d1f8669841b7d04902,2025-03-19T19:15:40.930000 CVE-2024-35354,0,0,a3dbd2071e62b96a9ba5ce0e8deba16e3d0dc732dd9d3f1e9b0c9a4119782a13,2024-11-21T09:20:11.800000 CVE-2024-35355,0,0,0a617613c4ad41494cfb9a8bb3f96fc3650bc50eab575e98ef63d44fa49e2df7,2024-11-21T09:20:12.027000 CVE-2024-35356,0,0,64ba8e6b7b045946b8d6d3723ec2261e321802782b33e16be80520922e8bf9a1,2024-11-21T09:20:12.280000 @@ -263025,7 +263025,7 @@ CVE-2024-38460,0,0,374e0ec07571a43ea832c0e59646ab48ce6e1f1e503e95c35316b9e53d7a7 CVE-2024-38461,0,0,78c97e597d8e82b771c12404c1710c09325a77b878d5733473a75786136ec909,2024-11-21T09:25:58.163000 CVE-2024-38462,0,0,b488562b6e1e3080d85ed256a57dff6b8f4c4d3e9b77930531ac1876a124f779,2024-11-21T09:25:58.743000 CVE-2024-38465,0,0,0553ae590a5045c4a00ee690a5e30cab743003f2e2b850eae680f2615b0c9011,2025-03-14T01:15:39.683000 -CVE-2024-38466,0,0,c2628e96404aac95bd4dcfd9c2f2c153a326a8af210e1e93dd5f3ea7c76cf17b,2024-11-21T09:25:59.697000 +CVE-2024-38466,0,1,faf3d6c769d8d86583d648f5284021456d7899dd934ac364cd0e325b75bf8ed5,2025-03-19T20:15:18.590000 CVE-2024-38467,0,0,caf9acd7cc458a3d14ff8cb7e6429702effcc0ca3533a6066e1ff41ba88e568b,2024-11-21T09:26:00 CVE-2024-38468,0,0,f9c8ba626246015283ec95ee672d5890382c7cb042b08d04e6efb4886ecbd5fe,2024-11-21T09:26:00.370000 CVE-2024-38469,0,0,709e5cc6e5aa933183c1136a6638ff0b784482a2d42a0ee2e4cc71f144247f6b,2024-11-21T09:26:00.630000 @@ -263546,7 +263546,7 @@ CVE-2024-39119,0,0,ebe81bbdd4e86ccd3d28f2f7b95af1cda12584cb666eedaab03a8551e9500 CVE-2024-3912,0,0,fabd976a440994ac496ea45d2f56e7bd6af4672ef144fc30e8f8567bb4dbeee8,2024-11-21T09:30:41.027000 CVE-2024-39123,0,0,df037916196eb4fa6dea6502dbfb61fe614ae1cc7141b2e1bbb1a4ab03425f78,2024-11-21T09:27:12.653000 CVE-2024-39124,0,0,b89a6ad01be86442200dfda8e2d9f478ea1466944e9cfcad7239db5ce8bf749e,2024-11-21T09:27:12.863000 -CVE-2024-39125,0,1,57c9492a281c3f0343626ea4f499aaeec97b06fd70109718aede51734c1a630a,2025-03-19T18:15:21.150000 +CVE-2024-39125,0,0,57c9492a281c3f0343626ea4f499aaeec97b06fd70109718aede51734c1a630a,2025-03-19T18:15:21.150000 CVE-2024-39126,0,0,3e00a13d9ec0ad716808d0c796783b1d298b8407ef8fec7bd467b2bb174689fb,2025-03-13T14:15:28.767000 CVE-2024-39129,0,0,19eb1dee58afa6c2767224231ffaf92ccdb5b37e3b078ec5f75eeb24861f8743,2024-12-06T21:15:07.637000 CVE-2024-3913,0,0,3c39a97f2a23817f5f07256146450bb9bcd789a6d6dfbbfd042d028223df0681,2025-01-29T06:15:30.670000 @@ -264070,7 +264070,7 @@ CVE-2024-39726,0,0,84f4bd0f0e66fd1792095fdf470f4f3cbdbdc235abdd5805255bdd32721e7 CVE-2024-39727,0,0,c691980721e509e7f95918f482d6883a5f5ab54ba79b6c92b81f5474954464b2,2025-01-10T20:15:39.980000 CVE-2024-39728,0,0,419d6522507eb930af7ae6835142d3dcdf46166050b6817f37759954abce17b8,2024-11-21T09:28:18.217000 CVE-2024-39729,0,0,17ef6112215ce540557fe392c3c226b8e791e3105e6cb641f6eb9b3c8bbe26c4,2024-11-21T09:28:18.363000 -CVE-2024-3973,0,1,e2665891f1972228ef2df1de995ce99702fdb05ae0efffc3055d340087f5329e,2025-03-19T18:15:21.347000 +CVE-2024-3973,0,0,e2665891f1972228ef2df1de995ce99702fdb05ae0efffc3055d340087f5329e,2025-03-19T18:15:21.347000 CVE-2024-39731,0,0,1dcd7e56903a6949d01ed06ff2f1995b0ec86eafa7e21275042e3bc78aafd782,2024-11-21T09:28:18.503000 CVE-2024-39732,0,0,d47257c5e25e2f487ad9ff54180377826d9652929ba89210e27aaba3b80c6fc9,2024-11-21T09:28:18.637000 CVE-2024-39733,0,0,89054bd3b8e3268793590efb1f1adb1c644ea819b1a2bcb7541f24d025582226,2024-11-21T09:28:18.790000 @@ -264260,7 +264260,7 @@ CVE-2024-39932,0,0,282170ce1ca21b505d17ffc04e0e845c894faac94992866872f4152c73c27 CVE-2024-39933,0,0,0e9b13327bf4c22aeb807fab822dbb13b923cf669db95f9f5ad35237bc7b1fc9,2024-11-21T09:28:36.400000 CVE-2024-39934,0,0,a040eeb58db8dc357074257c6548a542573771e14e58a5691af92614e3e7c903,2024-11-21T09:28:36.553000 CVE-2024-39935,0,0,20eb5709834fe3f6799e0bb92d1add201d649bc3b4e0f310eed715777bbe31c5,2024-11-21T09:28:36.707000 -CVE-2024-39936,0,0,7cc05799fad54717d1ea9ab51b599841e252159a2830c99abe786e51cf64bc77,2024-11-21T09:28:36.910000 +CVE-2024-39936,0,1,e821e5a3bdb05b6dde9222f704eae2d36ecf741fc03b3f00768268ab9a5c894f,2025-03-19T20:15:18.770000 CVE-2024-39937,0,0,ae9ab5f050d906a5961bb72c56c15cedac541bb0393283d03c6542795d50285a,2024-11-21T09:28:37.077000 CVE-2024-3994,0,0,7ba880059a180fa773780c21c98bdb38159c861d778abee114a2eda89bb5f8e1,2025-01-15T18:36:21.003000 CVE-2024-39943,0,0,e5431389e4d2307b8204f37d169268294ec0b86f0f4886437657221b2334d1b1,2024-11-21T09:28:37.253000 @@ -264638,7 +264638,7 @@ CVE-2024-40782,0,0,1681e3f74f0e893eb28a0176ca8743b201333cb23d7238959dbfcc2f2ea45 CVE-2024-40783,0,0,b214e53e5695093f1a97e3bda561eeb0d78bba15f089cc9486490e141f4469d2,2024-12-10T14:36:32.047000 CVE-2024-40784,0,0,163f98169172e076780659d81b973d997e54b79510cfd19f94fd025c964a8a5c,2025-03-19T15:15:48.293000 CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fce13,2024-11-21T09:31:37.503000 -CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000 +CVE-2024-40786,0,1,cdc8c1c130604e0389c48a61ff9d7a9a1befb69f6799190a5a8f2ddb410e90f1,2025-03-19T20:15:18.927000 CVE-2024-40787,0,0,ff74f1131bab9fe9382a9a7c925dfc41da9f84275eff94b172d96b4b7683c6dd,2025-03-13T19:15:45.973000 CVE-2024-40788,0,0,74fefda30f0aab4e09f30ade87f11c85de3de9a6b1f0932eeb0d9ad4ea247f18,2024-11-21T09:31:37.927000 CVE-2024-40789,0,0,5a1885ade6f38c7b1421a592f3c0fe5196df044653ca548723a01f9980a37f3a,2025-03-18T14:15:39.473000 @@ -264707,7 +264707,7 @@ CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a8 CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000 CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21020,2024-09-24T15:41:22.803000 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 -CVE-2024-40852,0,1,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000 +CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 CVE-2024-40854,0,0,e98dab3f3cdbcfc8e79448e579c2cd0ac129ec15112de4872eb183095b123a3a,2025-03-14T13:46:57.020000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 @@ -264960,7 +264960,7 @@ CVE-2024-41095,0,0,a4a292866e3068d2f57a8254661b1866731b922f2dd7e200baf567ba1f054 CVE-2024-41096,0,0,8fd4c9d4ed264f2885567b62f2a34922ebfa56dcdd0edc053176d3013a5b2964,2024-11-21T09:32:14.257000 CVE-2024-41097,0,0,da1adf0b3a12bf0132b0aa72e2097d79037ba33782764c156f4094087589b6d9,2024-11-21T09:32:14.393000 CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb6634064fd,2024-11-21T09:32:14.563000 -CVE-2024-41107,0,0,302eac7888c9ff531fea3d713232f282d23a92c95feb7fd379cd4d8102d6ba01,2025-02-21T17:15:12.663000 +CVE-2024-41107,0,1,a93abd184a4a2e5ef9685f6e0dd1470a51a39ccdd8cca44cd0b0a2ac3c2dc133,2025-03-19T19:15:41.073000 CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000 CVE-2024-4111,0,0,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000 @@ -265153,7 +265153,7 @@ CVE-2024-41438,0,0,3c4849370a7ae986a8fc2dc41278fe26a6563e2397b116c7e80eb07d3632c CVE-2024-41439,0,0,4a057fb4cd0d4bbf1499d510ad879729f6e1fb2b8c5cd6390ca151c9f88e8edc,2024-11-21T09:32:39.667000 CVE-2024-4144,0,0,2ffabfa4dc42e0278ebb4f1c4ecc7cfeaa3d6715b4be778cadd5beab492f6519,2024-11-21T09:42:16.350000 CVE-2024-41440,0,0,61dd6b34b9b9bf3b692333959e045bfede8ca7310363d216536c02189f3f32d0,2024-11-21T09:32:39.910000 -CVE-2024-41443,0,1,75f68ff6f33bfe9c9435f0f4b9991dc3c2f62f97b8dab02bf0fa8ea45b75a85d,2025-03-19T18:15:21.627000 +CVE-2024-41443,0,0,75f68ff6f33bfe9c9435f0f4b9991dc3c2f62f97b8dab02bf0fa8ea45b75a85d,2025-03-19T18:15:21.627000 CVE-2024-41444,0,0,40dc2a2ff5c1d7d012984e5f8e458529a422a415ff1fc824c0d056c0835c5ec3,2024-09-05T18:36:39.773000 CVE-2024-41445,0,0,39f65e85a8026950b749bd33850514ea1abf27c7d809b4b0d704f4057a44f5ed,2024-10-01T19:03:27.197000 CVE-2024-4145,0,0,bf30081aa256f27ec5ec45b8e903ae674bd8ea9a8556cad62f5df9c1c025c206,2024-11-21T09:42:16.447000 @@ -265219,7 +265219,7 @@ CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5b CVE-2024-41595,0,0,44455fcc40d68fa8f45347482b1d2168aab0c68de0853c639a8e56e911020245,2024-10-04T13:50:43.727000 CVE-2024-41596,0,0,dc3f2084e5038ea900afa6eff38a3c06bba61537da6fb1551f36d7de90e75c33,2024-10-04T13:50:43.727000 CVE-2024-41597,0,0,8bc3478a40fad9fe08a5b14f99fcfb65827e68ea30f05fc2a19957f05a35e7ba,2024-11-21T09:32:49.140000 -CVE-2024-41599,0,1,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000 +CVE-2024-41599,0,0,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000 CVE-2024-4160,0,0,261aaed8c544b2603d79ad449c754e734059b7c4711ffc5fb87ffa60d39b9fde,2025-03-11T17:36:27.910000 CVE-2024-41600,0,0,ce877fc02fce0f8726d8c027786c8b031fb6af6855d69b77809d4baa0014f48d,2025-03-18T21:15:29.290000 CVE-2024-41601,0,0,31744d4c39cfa7fb165df560aed071d55bd755724431c10b83f542e5dc6f6710,2025-03-13T15:15:46.800000 @@ -266622,7 +266622,7 @@ CVE-2024-43328,0,0,715732940a0a4d4f0de5c056fabcedb526205c6a803c49eb3a86a6f5d5c87 CVE-2024-43329,0,0,6571774f6c8fd88f0784ff8e7d9379cdf66afc8a05fddf684b6376b6fec0ffc6,2024-09-17T19:59:39.933000 CVE-2024-4333,0,0,a6d205ba44ee948927cff870ebfc2f44376bba94d7e4b38fca4189220fb96013,2025-02-04T16:23:41.580000 CVE-2024-43330,0,0,de1e029e710a50a8fdcf88e35914bcd709af0e53818ad280b1212ae996b49ab1,2024-09-17T19:53:40.987000 -CVE-2024-43331,0,1,dc80f09f27c8298c5b61115b014613f6fccd8e6eb8f20e163102b90c375c7206,2025-03-19T18:52:24.573000 +CVE-2024-43331,0,0,dc80f09f27c8298c5b61115b014613f6fccd8e6eb8f20e163102b90c375c7206,2025-03-19T18:52:24.573000 CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000 CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000 CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000 @@ -267039,7 +267039,7 @@ CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65 CVE-2024-43763,0,0,3de4617186aced8f7b3d48e3a710fa14a6fbbe2a4553f4d993ab1ba76d0b7f88,2025-03-17T17:15:29.567000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 CVE-2024-43765,0,0,e4250b40f4dc95af7fc01ebf26e3930da768b2af1b961aea947f144984b764a8,2025-03-18T14:15:39.920000 -CVE-2024-43767,0,0,ea82ffa7edbe86b0487005b635a9495ff275642644aff14bb80ea65b81b8feec,2025-02-18T22:15:11.020000 +CVE-2024-43767,0,1,64de20f28e5a836a7849b27ab77f05405bcd3699ccca62ba5c5ec60180c7a44b,2025-03-19T19:15:41.263000 CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 CVE-2024-43769,0,0,2589038c48c31a391cd992614c4f3cec964d236c9a07eb46302073ef1c3a63da,2025-03-13T15:15:47.617000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 @@ -267273,7 +267273,7 @@ CVE-2024-43980,0,0,38cff8fad22f548993867b2a34979c97f748fc454cf1ec8469969cc4aafdd CVE-2024-43981,0,0,149f7c0df031c66ffe9eb383b9d0158cf6af072534c3e4e4ce862aff4073db50,2024-11-08T21:10:35.093000 CVE-2024-43982,0,0,bf6178861ad98b98ffdcd5288376583212890782d89da1cbac27c286f03aeb67,2024-11-08T21:11:11.747000 CVE-2024-43983,0,0,964361a960b10f60f361219123c1c7e25d2a245e60c52ff9a7ef2d0262bd7a9c,2024-09-25T14:11:22.450000 -CVE-2024-43984,0,1,25998b48dbeb9f7e2c1a9ed5cf5183dcaa785dc791c564b22a79c376312e3eeb,2025-03-19T17:13:49.970000 +CVE-2024-43984,0,0,25998b48dbeb9f7e2c1a9ed5cf5183dcaa785dc791c564b22a79c376312e3eeb,2025-03-19T17:13:49.970000 CVE-2024-43985,0,0,f13a84c56ae01192cdf5506e89e0d9a2df7f801fd1391e74e0667132f9d3de8b,2024-09-24T19:33:16.910000 CVE-2024-43986,0,0,9cde2290e443f99b4e6d3d02e29a56a6e3f00448aa6423a4e53958d9425e074c,2024-10-04T13:22:56.253000 CVE-2024-43987,0,0,7e1894972e500e67d2cbb462582eff330f8d5373d9c5f8da83a513a5d5922fed,2024-09-25T14:08:22.987000 @@ -267415,7 +267415,7 @@ CVE-2024-44131,0,0,e72768239a302bf12add304835bf798472cba43ba251df49c563d86e855e9 CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d15a,2024-12-12T15:07:13.493000 CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000 -CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000 +CVE-2024-44135,0,1,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000 CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 @@ -267438,7 +267438,7 @@ CVE-2024-44158,0,0,b83338efa1c45b1d14963bb1d8b46ea32fb4a56b49ef9e4752492fbf88ba1 CVE-2024-44159,0,0,ae1a667e57a7f41e73433b5200005b67ba763c43f6fe70a17271f33a865e460c,2024-11-01T21:35:03.753000 CVE-2024-44160,0,0,4ff4c9652eeba781bfa403e15d759019e41f655fc29a59fa199896e9622f115d,2024-12-11T03:09:08.383000 CVE-2024-44161,0,0,48eb913426a69c1221270e7b42baee7785f4d051c39a8ab8c74ac3ad5519cdd2,2024-09-26T13:56:51.110000 -CVE-2024-44162,0,0,dac5ce4dad032a17dea7add86fb82bd2680958df75063f67cd95360f7cd7d074,2024-09-29T00:16:28.033000 +CVE-2024-44162,0,1,4d57887daf08f0b47cea08b2a5b1f996c9289de79b6f1bc46a03b46cbc7a61cd,2025-03-19T19:15:41.543000 CVE-2024-44163,0,0,b11ff9bfaacef3de236b259efcada3e758c24cb28be88df65fb9b95fed8c870c,2025-03-18T21:15:29.770000 CVE-2024-44164,0,0,e86a35c7ad8719784b673b9acc97e8ed193d204bc8ddd64044edeafa59794d96,2024-09-26T13:54:46.297000 CVE-2024-44165,0,0,caa8bf62c1972985301ea3656aa469a7620ff2e793499fcfc471e211c6369bdd,2024-09-26T13:53:09.203000 @@ -267465,7 +267465,7 @@ CVE-2024-44184,0,0,447a47e4658127a2837b0479ea9a5d05984bdae7b57e0cba1d6a39eb69a9e CVE-2024-44185,0,0,e79c7c7c64fe69058030fb9e5019d8c77d80d8475cec6554b7ce51ad3262c5d4,2024-11-04T22:35:07.400000 CVE-2024-44186,0,0,392de0580a14e3e218314ef51754f84b54483972473fe53d8e1475ceb7c4c930,2025-03-18T19:15:44.663000 CVE-2024-44187,0,0,6e307fae7f39341ae1e3d2145100bc4c0d967c8f95d1fbcf9237dd6646d09b54,2025-03-14T16:15:35.167000 -CVE-2024-44188,0,1,c70aa5200da54f754e88ebc2cbc2c6f4e995f53dadcd5abadab8f9e669730efa,2025-03-19T17:15:40.147000 +CVE-2024-44188,0,0,c70aa5200da54f754e88ebc2cbc2c6f4e995f53dadcd5abadab8f9e669730efa,2025-03-19T17:15:40.147000 CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd86d1,2024-09-24T18:33:02.477000 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-44190,0,0,205b49df09d63d183c3d70f284647d3e21912a1bd3a11fb939aa6205e52e83f2,2025-03-17T16:15:22.937000 @@ -267623,7 +267623,7 @@ CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512 CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000 CVE-2024-4444,0,0,39fa2450f325301ad817fc86319bbebd1813f8dd3cf2b80a01c74cecff95e276,2025-01-14T21:40:27.670000 CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000 -CVE-2024-44449,0,1,1985e93aa88a69f3f3f311a8ad3e625589bcbe80957844a66e158cfef4d8022b,2025-03-19T18:15:22.013000 +CVE-2024-44449,0,0,1985e93aa88a69f3f3f311a8ad3e625589bcbe80957844a66e158cfef4d8022b,2025-03-19T18:15:22.013000 CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000 CVE-2024-44450,0,0,e2b00db1a138b66c9c880a204501c6260391eb5150f3adddaf21310d31badd17,2025-01-07T19:15:32.417000 CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000 @@ -267685,7 +267685,7 @@ CVE-2024-44678,0,0,7c6040aac76a55faa1753224a581817a4c40d04b0f0585acd275b3cb0ea8d CVE-2024-4468,0,0,1383fb38e9227b7082c0937002dbe6ccafb8a608544c11ad11010665c5c95871,2024-11-21T09:42:53.103000 CVE-2024-44682,0,0,6c8edb929241222c775226e0e9a579a93723389a504b040c56912570abf6fded,2025-03-14T16:15:35.357000 CVE-2024-44683,0,0,4f09b1238998a5a3d9b77f763fcdfbbc3350d7daebe8a7400a76e3f1196f7f9f,2024-09-04T16:41:01.467000 -CVE-2024-44684,0,1,993ae56718f2602383d46438a4826fa4c2e8ba4fc03f56daf6dd7fce72b440c1,2025-03-19T18:15:22.233000 +CVE-2024-44684,0,0,993ae56718f2602383d46438a4826fa4c2e8ba4fc03f56daf6dd7fce72b440c1,2025-03-19T18:15:22.233000 CVE-2024-44685,0,0,138e5ccb6a247889566b2c8e876848883dccce9dffed61342cd752922384a187,2024-09-13T19:35:14.350000 CVE-2024-4469,0,0,ebd7571b8f63bf30b73793e0af1ba0c52c4215ad276ed86dd2014f9f3ecb5d25,2025-03-18T15:15:56.493000 CVE-2024-4470,0,0,95a96de7675987e789a46492efc5acc2246ba00fc92f0fc9109c8e99235cd5aa,2025-01-07T17:39:05.017000 @@ -267766,7 +267766,7 @@ CVE-2024-44856,0,0,93c53dc8759cdffd08a4bcb1502c758eaf006cc5e92793bfbf195659c6e1d CVE-2024-44859,0,0,1ff4ad5ad4cddcdb1302209b9b28986e26870e16476fd6e01c9d6790959f1487,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,d95d6336818009c9b70dd65fb3d4752504bdb5c2630eed2945b4771d79bd5905,2024-11-21T09:42:55.490000 CVE-2024-44860,0,0,b57c8bd2bd66e030d28d8223c6a00765fe3018482e70feea4ac82ddd9af0ff85,2024-09-30T12:46:20.237000 -CVE-2024-44866,0,0,8bc150348c57318486f7224701e4806edc491356a0a49e8c8c136a8cf329e2fd,2025-03-17T19:15:22.453000 +CVE-2024-44866,0,1,0f75ac01b8775d62351888fde797530d6ed1a7212df971644fb29e01334a9842,2025-03-19T19:15:41.687000 CVE-2024-44867,0,0,f5d45d88391395d71e76aa49c459541c9963ac5c266a28059f210ceda5eda773,2024-09-10T15:50:57.713000 CVE-2024-4487,0,0,9e7d3d9cfce25ad3009d26e2ff9fe758616dee3c6fa7b79983ceb94fefc683d9,2025-01-28T02:58:09.330000 CVE-2024-44871,0,0,f7450cb7162fbb80e972f4166a2fd50d83297a4b352d52f86453cd2036c9456f,2024-09-13T15:28:21.260000 @@ -268843,7 +268843,7 @@ CVE-2024-4655,0,0,b564acac714555762a0ba415fc30688b7f3d2d29406dc5c7d88a108801940d CVE-2024-46550,0,0,7714b038558adc8556b3e97cf01fb2a7a3717fd7d9563139dc21cff71d160032,2025-03-17T19:15:22.587000 CVE-2024-46551,0,0,612df87ce6e0e5608e0dd96fa0d4ecdea5cb5f53b6c8db8fa2cd7f784a1943a3,2025-03-13T20:15:22.987000 CVE-2024-46552,0,0,ef38b41fc7ad89ecb5f9b76e50035628f92ed73a67d682e797587b550bf0ca38,2025-03-17T20:15:13.237000 -CVE-2024-46553,0,1,9ca77927c365f1406c404ba91b00dd0fe05c0f16f318dfa226bdeb9f4311a836,2025-03-19T18:15:22.473000 +CVE-2024-46553,0,0,9ca77927c365f1406c404ba91b00dd0fe05c0f16f318dfa226bdeb9f4311a836,2025-03-19T18:15:22.473000 CVE-2024-46554,0,0,67b5c55fe41114fd5d67ee8445c655ce9975bed857a1819262e4e7132dde8a90,2025-03-13T20:15:23.180000 CVE-2024-46555,0,0,93e25c9ff9d57ba2124171f562fb12c7a0e1eaa20175ee56b11074f938aaa1b0,2025-03-18T15:15:54.673000 CVE-2024-46556,0,0,74978fe720028839f26da81b38d6431324fa14c53d9892958a73460e49514d10,2025-03-18T15:15:54.877000 @@ -268852,7 +268852,7 @@ CVE-2024-46558,0,0,63c8689b0724626ea8e1d96d6ebf7f581b99cd7f49611e9ebf4a85d11a7f0 CVE-2024-46559,0,0,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f553,2025-03-18T17:15:43.193000 CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000 CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000 -CVE-2024-46561,0,1,025985b87f1d0c04558715cda6a26f26e1ad0c8c8f2c73c5ce192c42070ee214,2025-03-19T18:15:22.667000 +CVE-2024-46561,0,0,025985b87f1d0c04558715cda6a26f26e1ad0c8c8f2c73c5ce192c42070ee214,2025-03-19T18:15:22.667000 CVE-2024-46564,0,0,e60856fed0c5c52ec0575c0a0cf7d21f60315a4cf6ad706c961eaee2c7364f69,2025-03-19T14:15:37.093000 CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000 CVE-2024-46566,0,0,a645300cad5cbc9678845ef13387d0ff84f678de8f2f73f755a1a4420c48c73c,2025-03-18T21:15:30.230000 @@ -269664,7 +269664,7 @@ CVE-2024-47483,0,0,f01599a6880bac8eacea8814fc1f580c96bada992530caa76be5bdf38bc08 CVE-2024-47484,0,0,9e78e9e2fd497ad51356aeff482c1eaa9f027f06e02cba4ff6a7fc58802f11bd,2025-02-04T16:11:14.310000 CVE-2024-47485,0,0,1dda82a2985d3af9279de3ceece1d31e2d301a66b0e674d32615fffaa7a57933,2025-03-13T16:15:23.620000 CVE-2024-47486,0,0,11c85a54d50f12674a3e89ce62118833d5229db3e4f2a7f96a7483d93e1bd5a5,2024-11-21T15:15:31.407000 -CVE-2024-47487,0,1,05812d09c2189d5e1cf7e96247323122c2a2e2b7f12da23f87c5db33786305d7,2025-03-19T18:15:22.890000 +CVE-2024-47487,0,0,05812d09c2189d5e1cf7e96247323122c2a2e2b7f12da23f87c5db33786305d7,2025-03-19T18:15:22.890000 CVE-2024-47489,0,0,585130ffd36b389091dd3850811751890f16679cdffbb69636d536eab299401a,2024-11-21T09:39:49.923000 CVE-2024-4749,0,0,e7184fb35b43a6eb2964605920a548694036d8f247248c6e4fc25e93fc0a61d2,2024-11-21T09:43:30.940000 CVE-2024-47490,0,0,9fabc181d3dfb56cba73e5e4a7065086bdb45e881f4a01d4ec796eee8915d6e8,2024-10-15T12:58:51.050000 @@ -269977,7 +269977,7 @@ CVE-2024-47797,0,0,1db7c191d78a0c4eb63d4cdd8fe193396dc3e7794237bd9d846daea68af0e CVE-2024-47799,0,0,c3938335baae6d700a63faf82e2306985214819a9aa9e9a31818efb7cbeda4db,2024-11-12T13:55:21.227000 CVE-2024-4780,0,0,d587053157d7c17d807fe8569feada4a245f1bae752836389b387fd0d926bac1,2024-11-21T09:43:35.980000 CVE-2024-47801,0,0,dac0e559de40e0ab757093889b85f92d1111bfea796edfc319f64b1e4dfabee3,2024-11-05T19:34:53.927000 -CVE-2024-47803,0,1,a27a07eaa23e5fc382ed7cbda8d3b9aa4ea515aa773e039049e875e9e0db9180,2025-03-19T18:15:23.033000 +CVE-2024-47803,0,0,a27a07eaa23e5fc382ed7cbda8d3b9aa4ea515aa773e039049e875e9e0db9180,2025-03-19T18:15:23.033000 CVE-2024-47804,0,0,86160a4649cb12cd1bc9cfd487657b746f7686a13cac52431db95ba1dd43cae9,2025-03-14T16:15:36.243000 CVE-2024-47805,0,0,2c9df135cc0a759ab939279443879b7721e777a30cc53d64986fe46c1ce9bc12,2025-03-14T15:15:43.840000 CVE-2024-47806,0,0,a9d6e69f147db55a9010517fe181b09bdf0c723cafc8fe156a8def4f62dbfd52,2024-10-04T13:50:43.727000 @@ -270340,7 +270340,7 @@ CVE-2024-48424,0,0,9375606a1385c09668a8d2d1f5401d048515fbfd22cd289e15fe454c4a078 CVE-2024-48425,0,0,e76f599f374f33c20c74bfcd6e8302eb09e83f2739633f465d68d77fe419098b,2024-10-28T19:35:28.823000 CVE-2024-48426,0,0,9862ce50e810be26c212adfb2d34d1f753dd739eaebf9faa703386bfc087258d,2024-10-29T20:35:31.967000 CVE-2024-48427,0,0,f5bc199ef1ea0736820435167bda31ad1018743e2ba5f1a061cbeb83f0e27129,2024-10-31T00:07:25.997000 -CVE-2024-48428,0,0,3999a544d6d3b123f5f0ac715c3cee1ed4413353903e27b952b8de4f04b7eb0c,2024-11-14T23:15:02.760000 +CVE-2024-48428,0,1,bb407217c76a1ecdc5d79ef9c90964560c50b9ab959aec047d066b6b5c9d80d1,2025-03-19T19:15:41.880000 CVE-2024-4843,0,0,ab4c156f128fe3fe416fc0717346ee6d615b90d03e9efcaa2552afd2fa026c1b,2024-11-21T09:43:43.173000 CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc017,2024-11-21T09:43:43.280000 CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000 @@ -270485,7 +270485,7 @@ CVE-2024-48788,0,0,8b8214a71f356be931cff2267f2702ed7740182cbb0eb5f3d3efd807a79c2 CVE-2024-48789,0,0,67cfce7daeaffa58ebeccb4737bd5b5552cbc794635a12c93461c29c61a25e83,2025-03-19T14:15:37.263000 CVE-2024-4879,0,0,7c395d6e4031631ba9ee91c0f43da9eb3fc030b6d50ab41e344463ed9baa2ff0,2024-11-27T19:07:32.497000 CVE-2024-48790,0,0,927501c5af40d914a6b115eaf64ce905b5d2c59b8ad73c575fddb443d1f4656e,2024-10-16T19:35:13.893000 -CVE-2024-48791,0,0,9bb2b832e1e23b3a96788cb485be5297b76b1fc9e62778e7aade734bd9ca825d,2024-10-15T15:35:19.917000 +CVE-2024-48791,0,1,3e8310d77d8e0fb2843ddad721bcf9b0c97c4bfcc3d8dd8072d5b7a187c8a25b,2025-03-19T19:15:42.043000 CVE-2024-48792,0,0,7eb7e7d9d289475567b0c2eb512aff10710adc71a224f16ae1888a8687ae3aef,2024-10-15T15:35:20.183000 CVE-2024-48793,0,0,97846c2e5e56b4320041e4d3f7be4e1306322ab716eced33f7edbf4788efa3e2,2024-10-15T21:35:34.713000 CVE-2024-48795,0,0,b0afe2c02fcb2a18d785a0b6f938a024e1e6eeb9be02321bd2ffc6a9ee473cf4,2024-10-16T20:35:16.150000 @@ -272132,7 +272132,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e CVE-2024-50653,0,0,89bac720c13ed581e551243dcceec428dea469c5232302aa9e202134372a9622,2025-03-13T16:15:24.190000 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 -CVE-2024-50656,0,1,f0a8a495a13d600435eacdcf0244ff9923ebaa5af09d757b30ef2869e7ea9da5,2025-03-19T18:15:23.200000 +CVE-2024-50656,0,0,f0a8a495a13d600435eacdcf0244ff9923ebaa5af09d757b30ef2869e7ea9da5,2025-03-19T18:15:23.200000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000 CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 @@ -272487,6 +272487,7 @@ CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c CVE-2024-51450,0,0,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7fa31,2025-02-06T01:15:09.420000 CVE-2024-51456,0,0,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000 CVE-2024-51457,0,0,0ecbf506964ce26877e8439aa4a3160d1450f6ed502906387cfebb224c3433bb,2025-02-18T20:15:21.160000 +CVE-2024-51459,1,1,056ec9b2802ed357c7d9624a0b51b2238d6d95ec819a7b332ad11a9f44b3fa5e,2025-03-19T19:15:42.180000 CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310af,2025-02-11T02:15:35.307000 CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000 CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000 @@ -273969,7 +273970,7 @@ CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615 CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000 CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 -CVE-2024-53310,0,0,f0b739adf0c8009e62a81f924e7e1874dc0c63630728d316ba18d360b795a331,2025-02-13T23:15:10.493000 +CVE-2024-53310,0,1,650954166a64cfbc691ec143d0093cc0b35022c8a22132d1b83a1acc6793ab35,2025-03-19T19:15:42.327000 CVE-2024-53311,0,0,8f5841c7dffb9ca28cfefdf2eedaaee69ce28db0ed73e9710b22159abf02b290,2025-03-17T19:15:23.657000 CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 @@ -274000,7 +274001,7 @@ CVE-2024-53387,0,0,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d CVE-2024-53388,0,0,74c76ad7bc6f5ea963364a19f441da609f31d2dad038836a2072f637e7a0b0a6,2025-03-04T17:15:13.217000 CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000 -CVE-2024-53406,0,0,c624f8af03d6a5ce556b1ec12c7887c3118442d147e0bc616388847dd512b711,2025-03-13T17:15:33.410000 +CVE-2024-53406,0,1,3fb871bddc11bec1fbc4e4aafe61f3951d93d754c512f0b121c5a99a01bc098a,2025-03-19T19:15:42.463000 CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000 CVE-2024-53408,0,0,1aab9be4aaf2573b8ac1b0fb3d37a28e2e7437d63a980cdaed7de900ff3950a1,2025-02-28T15:15:12.317000 CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000 @@ -274372,11 +274373,11 @@ CVE-2024-53963,0,0,051446204e52ba5a494312330ee7e3ab35674dc0b04bf6faecd732baa765e CVE-2024-53964,0,0,8b957f9c6ca1dec43d35dad3b6547f3c315ba420617d586a20a9f871b1db47a0,2025-02-11T16:05:17.890000 CVE-2024-53965,0,0,fe5265ed578fcf02d9c7551665c4d02d94d57b5c2a197155d2f383c80e4623ad,2025-02-11T16:05:25.927000 CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85133,2025-02-11T16:05:33.017000 -CVE-2024-53967,1,1,0f27299d1b6990e0588d00c47802c74f1c05c9fc3d426732b99dabfb0d3ecb16,2025-03-19T17:15:40.313000 -CVE-2024-53968,1,1,36e2eb458756c67d7c91ad12390073b7ca79cca91dc3abd047d8542f9343a188,2025-03-19T17:15:40.467000 -CVE-2024-53969,1,1,b9669cffe75504cfa195a6b9b8def5b487aec15ae03d4cef4388d534a39b2a22,2025-03-19T17:15:40.610000 +CVE-2024-53967,0,0,0f27299d1b6990e0588d00c47802c74f1c05c9fc3d426732b99dabfb0d3ecb16,2025-03-19T17:15:40.313000 +CVE-2024-53968,0,0,36e2eb458756c67d7c91ad12390073b7ca79cca91dc3abd047d8542f9343a188,2025-03-19T17:15:40.467000 +CVE-2024-53969,0,0,b9669cffe75504cfa195a6b9b8def5b487aec15ae03d4cef4388d534a39b2a22,2025-03-19T17:15:40.610000 CVE-2024-5397,0,0,89774c511a239a1ed95cd17067521dedc3be39934156206fe435c9bb8361b89b,2025-02-10T16:20:41.830000 -CVE-2024-53970,1,1,4466abde46aaefc8a15af2daf8e0c0b7bdf0fbb372a1e177634d5829c8dcb058,2025-03-19T17:15:40.750000 +CVE-2024-53970,0,0,4466abde46aaefc8a15af2daf8e0c0b7bdf0fbb372a1e177634d5829c8dcb058,2025-03-19T17:15:40.750000 CVE-2024-53974,0,0,52052a572e52b9dbc089a516bde1b3fe92dc22cc036b47b932527a527df79bc8,2025-03-04T14:04:30.393000 CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 @@ -274898,7 +274899,7 @@ CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 -CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000 +CVE-2024-54550,0,1,cb5f640e320b73770998ee626c9b44b663537cf2c840485556eb8cd618714818,2025-03-19T19:15:42.697000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-54558,0,0,5ac301749f87e1d3960fbebfb3c34982814f4259ef8fa0d089d15ee8bbcc1d6c,2025-03-11T03:15:37.937000 CVE-2024-54559,0,0,37e75bea7b3ee91eea79397c87bec87d97e56a87e7906c1b4677bddb4f30e077,2025-03-17T20:15:13.540000 @@ -274914,7 +274915,7 @@ CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f6 CVE-2024-5463,0,0,b6938a7bc0dd14d7de9af9497d907f1cc169944022bc8ee196fd85130fb8d8c3,2025-03-04T18:43:31.607000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 -CVE-2024-54658,0,1,2ae5e1e473d9853fb3d9a8ce3b95078d5f42520f037bb2207ff10526f7c0240a,2025-03-19T18:15:23.533000 +CVE-2024-54658,0,0,2ae5e1e473d9853fb3d9a8ce3b95078d5f42520f037bb2207ff10526f7c0240a,2025-03-19T18:15:23.533000 CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000 CVE-2024-54660,0,0,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000 CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000 @@ -275054,7 +275055,7 @@ CVE-2024-55057,0,0,6bdd7233f34597333b8bf9ff5f55092af57a57f3a85df508bb51d73344d65 CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0fbb5,2024-12-18T16:15:14.400000 CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 -CVE-2024-55060,0,0,4f027e4c63c04e57c156f781bee144a488d1e9666bd0523809fd0e6d7cf73e9d,2025-03-13T21:15:42.507000 +CVE-2024-55060,0,1,4048f1192456f842242dc77cf8bffb1d255a4e15611329017f6eba962db7418c,2025-03-19T19:15:42.840000 CVE-2024-55062,0,0,3123150d46b761ada11b83c374a54e9242d8e139ac058a4ffae965af3a17f30c,2025-02-11T22:15:28.900000 CVE-2024-55064,0,0,088143f1ded2daad73a31f25a95e921c348f1bcec4a79ee901bbd23bad5378a0,2025-03-05T18:50:13.373000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 @@ -275093,14 +275094,14 @@ CVE-2024-55193,0,0,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000 CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030b31,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 -CVE-2024-55198,0,0,6d990d1557fa9a6179d22500cee167e1f5bea7bcf308f7d1a231d7379bc159fa,2025-03-13T15:15:49.460000 +CVE-2024-55198,0,1,e78c31178ce6a27d940e04b63b4762000992e958f6d34945ab80dd6f70f35167,2025-03-19T19:15:42.970000 CVE-2024-55199,0,0,9dbaedf3926a39070909e5e303310645f833671fab2b674351cde48dbd521f5b,2025-03-10T18:15:29.757000 CVE-2024-5520,0,0,8fcb2ddf2ff565f827018ad6562981783bf7c2ed765230410b3a58b786f8c00e,2025-03-04T17:09:25.197000 CVE-2024-5521,0,0,a060fd899459987f806f413df1ba4b5e042251fb32ef73074e1b7a6228dcbf53,2025-03-04T17:09:21.817000 CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000 CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000 -CVE-2024-55215,0,0,344113e5dfac54c1e89cb8f2633b1d036af8ccdb1b500159e290dea41187b616,2025-02-18T19:15:18.970000 +CVE-2024-55215,0,1,28c22e6d3edfcb9a1cea1e057b36ee493cb7f1575817fbf4b3ca7c7b7c39e350,2025-03-19T19:15:43.100000 CVE-2024-55218,0,0,975f95aadd728c60a4527fcf8a0550d504208f5abb7909e62e4e8433964174c8,2025-01-08T14:15:26.803000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c49f,2025-01-10T18:15:24.053000 @@ -275199,7 +275200,7 @@ CVE-2024-55548,0,0,60ec3cfbffa02335f07d92ff09758467617c9784164eac84c7091a0b78c95 CVE-2024-55549,0,0,e40a4c580768b58c769dfa4be1cd90fded892afed66fc33fbb18edf2d01cebbf,2025-03-14T02:15:15.333000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000 -CVE-2024-55551,0,0,d05413b76fecbece613f7fd256c99c60af75cf161dd1a411dbd915fd8153a063,2025-03-19T14:15:37.733000 +CVE-2024-55551,0,1,a3113159075f5450f669189b6d3a45d99638fce2063df78d56aeb97b5ec33197,2025-03-19T19:15:43.240000 CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000 @@ -275544,7 +275545,7 @@ CVE-2024-56219,0,0,111ee0aa60dfc03b87b138abd07aff5bd18d963ddfd77b54963c6b0ae85d6 CVE-2024-5622,0,0,4d5d6fa5852e45b2ef08dc08331619e7ff16ef7cb1b3ebb2aa64c30bd6f09305,2024-09-13T20:21:38.610000 CVE-2024-56220,0,0,eac61147a3de9ac7f7a3250c1d4a1878f5174cd12126b16dad145f167b13a491,2024-12-31T10:15:10.403000 CVE-2024-56221,0,0,fdf47273b779d54b522059e7a09503abe8e1e1a786ba390437404d5e71d1c8ce,2024-12-31T11:15:07.937000 -CVE-2024-56222,0,1,8ef3bb1d64ab4c48d4a8c13da9c0159c74a98725c53fe3cf9413b193b8a088e4,2025-03-19T17:45:39.500000 +CVE-2024-56222,0,0,8ef3bb1d64ab4c48d4a8c13da9c0159c74a98725c53fe3cf9413b193b8a088e4,2025-03-19T17:45:39.500000 CVE-2024-56223,0,0,cf7b20f3d20067df73affdcf9ec9590890a2805e825d483671787f5cda604665,2024-12-31T11:15:08.090000 CVE-2024-56224,0,0,c33122241f6fdaccb34e9d12df45ea9fac34e8317b626d4fa6f4c067498b02a2,2024-12-31T11:15:08.240000 CVE-2024-56225,0,0,40091d74d14c982c8866fdd5fce093ca1508ef3a99151cd13ff67965be3d0025,2025-03-06T19:24:01.640000 @@ -275566,7 +275567,7 @@ CVE-2024-56239,0,0,eb7b99095de53b02fa1ddeb92606d3e486791ab63547fbbb2869d72a26ded CVE-2024-5624,0,0,7bc12abb179b539940fac22cca045f9bc4c0689994d18c755384fec3d67432f5,2024-09-13T20:23:28.787000 CVE-2024-56240,0,0,2f3595646a9526cafd8aed7838899b6313b40174661aa315c2f812bdb3f86d69,2025-01-02T12:15:25.380000 CVE-2024-56241,0,0,ada5fe1cd54c60428aee92685b548a640b301f2bbe0dba944954fd361d4e1123,2025-01-02T12:15:25.510000 -CVE-2024-56242,0,0,61315ea4de88ef49b739c1a43f546893a9b51ecde14471d7b7453027df4a5766,2025-01-02T12:15:25.640000 +CVE-2024-56242,0,1,a9cea515478216bed578c2832805d16f738e9b97e07cb24b1c48cc44296a991b,2025-03-19T19:52:59.910000 CVE-2024-56243,0,0,b22509b4ecb6dc07b13dc389602c92ed22db0566344754735db06a30bffaaa22,2025-01-02T12:15:25.773000 CVE-2024-56244,0,0,bb9f172c7da0ce2074a015ae2121ca81dc0e8748ca851fe9e741c578ecc66210,2025-01-02T12:15:25.900000 CVE-2024-56245,0,0,e3c8f0cdba6ef6bd4f29335a00ee73f4c415b4bfa97ce82c4550131e7c03b1b5,2025-01-02T12:15:26.033000 @@ -276181,7 +276182,8 @@ CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51 CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000 CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000 CVE-2024-5706,0,0,f09a3fc0306ab86b2dee756b4e00346daa3fb01dc12c33d9d6fa100062bc19ae,2025-02-19T23:15:10.960000 -CVE-2024-57062,0,0,395842371987a36c14d0c6623c0eb5d381423ed94b590a11f394e5c9f3b82252,2025-03-13T16:15:25.773000 +CVE-2024-57061,1,1,6b8efb887257eafcca80a028fa3b852d2df17e767ffe04829136b61230179a48,2025-03-19T19:15:43.377000 +CVE-2024-57062,0,1,aaf3f6fcf85cee4484da89f60841088e9c6b7754f7b46bf086090fbd566dd396,2025-03-19T19:15:43.523000 CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 CVE-2024-57064,0,0,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000 CVE-2024-57065,0,0,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000 @@ -276199,7 +276201,7 @@ CVE-2024-57078,0,0,8a97c0044f9389b0d62cf913697a59c2df3cf0e5be07cc788ae566056503f CVE-2024-57079,0,0,950d58a6bff7b558f423fbf38d4e4d4f7ac928a0c2a69dc9c158ca5f36660e9a,2025-03-18T21:15:31.540000 CVE-2024-5708,0,0,277198536a944775deb4cab7421e27d09aeec44244d8a7c393c8c0d82d0875be,2025-03-11T17:28:36.350000 CVE-2024-57080,0,0,ed4464ba7930048d62a3426c26c5515301e6750f4a9c17de192f847c86cb0b80,2025-02-06T17:15:19.933000 -CVE-2024-57081,0,0,e5538b4430076c7a9a0b171f687994ba9875abfe26c27caa7e074dfeaf041a22,2025-02-18T19:15:21.140000 +CVE-2024-57081,0,1,c5739c97e1b2c277d19e10adea0e9ee3108f879aff403a774fc0612111bd1d0f,2025-03-19T19:15:43.663000 CVE-2024-57082,0,0,e4f71ce57a79c34c72f0ce234fbf504f73bfa623a35d6784e5d6f316dc7db45f,2025-02-18T20:15:22.483000 CVE-2024-57084,0,0,184ce2bdca2221f2a823d18b34616bf9939630c2fe93ea49ee84bec6316efcf3,2025-02-07T16:15:37.847000 CVE-2024-57085,0,0,634cffae63828436ad94c08214f44949e421dc94322a29aafeb5b2dc9ced2d4d,2025-03-13T20:15:24.300000 @@ -276215,12 +276217,12 @@ CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000 CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 -CVE-2024-57151,0,0,c0231ac6df708597ace7706e7bbe89083c25cac95fa4fa2056fa2c4c0c9a51d7,2025-03-18T21:15:31.663000 +CVE-2024-57151,0,1,fc994eb96c123f1b6280c265aa543775d191fa6b4172d89aaa618daf2a88b5ed,2025-03-19T19:15:43.790000 CVE-2024-57159,0,0,3faa9b36a72056ed0de234550b823c928aabb660836be443f2d509165eec936c,2025-03-13T14:15:33.960000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000 CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000 -CVE-2024-57162,0,1,79e24dffe7851bcfd9827869f5652e6d77ee031791e5ec2a345921729ca54563,2025-03-19T18:15:23.717000 +CVE-2024-57162,0,0,79e24dffe7851bcfd9827869f5652e6d77ee031791e5ec2a345921729ca54563,2025-03-19T18:15:23.717000 CVE-2024-57169,0,0,17414b28a0256898c0c215c25432730c0d9ec182a0ec85c72f79f802a7b2bc50,2025-03-18T16:15:25.013000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-57170,0,0,0e3b06089dabeca0972faad116cfb8f14a23fde54f5e46bcaf55e43033ce9516,2025-03-18T16:15:25.180000 @@ -277159,7 +277161,7 @@ CVE-2024-6215,0,0,c3226e4ae52db5e1a00e08455007b87e266ddd51484315ee97bbbc0d3aa4c0 CVE-2024-6216,0,0,fe63ac8c08dc7c7a50d1f2d2682f00837d8e62cb05f2700b923dab6bde355e39,2024-11-21T09:49:12.853000 CVE-2024-6217,0,0,d7a25d891a32c01eb03608110ec71d674fc778ccab4e2776478b012b8d23eab7,2024-11-21T09:49:13.003000 CVE-2024-6218,0,0,c495f93c1042d60e5195165cf2f4425b53125b9201b3e350fd6564fb9ea9c432,2024-11-21T09:49:13.163000 -CVE-2024-6219,0,1,f8a521fdefcdd367fce29f646c92e38a35d4bf35e22b03768001b6d1d0d92fb7,2025-03-19T17:15:40.890000 +CVE-2024-6219,0,0,f8a521fdefcdd367fce29f646c92e38a35d4bf35e22b03768001b6d1d0d92fb7,2025-03-19T17:15:40.890000 CVE-2024-6220,0,0,8e683246f9b33d076ea6a824c200dc2b52e4b2f5bd084b40857710b807c55dd5,2024-11-21T09:49:13.327000 CVE-2024-6221,0,0,5ee4ae01c30ef5560d70ace7ddaef4bb44859c98d51a23ceab005d2b72942700,2024-08-20T19:37:23.077000 CVE-2024-6222,0,0,424ef285158aabe58fbc093849c14a6fa8d665baaee1894c60fc2b5eb673f09f,2024-11-21T09:49:13.597000 @@ -277182,7 +277184,7 @@ CVE-2024-6240,0,0,1f625e1a9e44b77bf02ec68628e1795da1f467bdecf48d5f76386782663570 CVE-2024-6241,0,0,cc42195d2d99b7322c7ac64e7584bebc5ab0d4e4056c6db4049e5ac50d7034f1,2024-11-21T09:49:15.887000 CVE-2024-6242,0,0,a9236a9c70a164e8a3d4daa21ea7d83953d1428759701d79df2f27f9828040b6,2024-08-01T16:45:25.400000 CVE-2024-6243,0,0,8400b2962ae15d191dca49178aebc19b40d13016a9851b16059cd04754b262af,2024-11-21T09:49:16.137000 -CVE-2024-6244,0,0,c53c661d8e56d0225d05b788026a66718393af00daabe42ac6cd18c472799a8d,2024-11-21T09:49:16.333000 +CVE-2024-6244,0,1,7497d8f54d4a0214ec8c99e6b96c0c045f343b49b5b3a509865717ac537c0523,2025-03-19T20:15:19.200000 CVE-2024-6245,0,0,1398ac73cec1aaee18622890963a44361cf25beed77e1e3aa917fb61342df36a,2024-11-07T16:15:17.847000 CVE-2024-6246,0,0,ed6f829c53f738955a5230c2d751323578609360c46a7c7a0425e040c58aceb3,2024-11-22T20:15:11.547000 CVE-2024-6247,0,0,8402a77aea0d1c63426b28b33a9e4e5184f7b683a452f9dac73af2afc5b24097,2024-11-22T20:15:11.663000 @@ -278432,6 +278434,7 @@ CVE-2024-7627,0,0,7a27d6248993c2a650c62eed80c2a5e47d8cc6211f5d1a0602c8ccc0f987de CVE-2024-7628,0,0,4bd4e14d76545c2e8bcfc51a6645f197df19cd176fabd50da5276351688734f0,2024-08-15T13:01:10.150000 CVE-2024-7629,0,0,7bc9d72619eba9ce5af5b25ffde36344f5d4d93091888459c631aca72d1ccb16,2024-09-27T17:32:43.853000 CVE-2024-7630,0,0,4630bc731f8dbceb03acb36ac721f9e36af7dcf6e0bb86831f258bb953081d25,2025-01-29T16:22:28.413000 +CVE-2024-7631,1,1,2f4a31088d73405e16ca3b1211069ef345531c2eb1689710f00b8dbd5b84ebc7,2025-03-19T19:15:43.920000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7634,0,0,9b8472a4dda61f7827b7a222cf080455407bf3efeba2b75e5f35e3ad1e1acc31,2025-01-24T16:14:16.497000 CVE-2024-7635,0,0,5837448a5c16ee304269e4c635a20f3ee84b360cc66819ef81011f6058908553,2024-08-15T18:12:33.270000 @@ -278738,7 +278741,7 @@ CVE-2024-7970,0,0,65dd451c1edbcdd226d9027f456b77e1785aa0fa20bde4ad16184c696d224a CVE-2024-7971,0,0,ecec74ddb7af4878aefac4ef21f57409da40ad73713e53a29ce6aa1c32ec2d54,2025-01-03T19:39:45.157000 CVE-2024-7972,0,0,e046834a8c6cd3f2b72f3d7f61eb5f863b641d5ca124b733b481256c6229b63a,2024-08-26T15:11:35.017000 CVE-2024-7973,0,0,15d0c9d63211801347ebed9db5c78827e841609bd1672901b17ef57d9247996c,2024-10-24T20:35:14.967000 -CVE-2024-7974,0,1,f62a5c19628ca3ddd2cb5898c02cd3047937283a064556d9f219d615f263ecba,2025-03-19T17:15:41.057000 +CVE-2024-7974,0,0,f62a5c19628ca3ddd2cb5898c02cd3047937283a064556d9f219d615f263ecba,2025-03-19T17:15:41.057000 CVE-2024-7975,0,0,055936e7aeea914b52e6502ecd53d9c27a5b4cf88fa8ea27e08333af36045523,2024-08-22T17:40:09.223000 CVE-2024-7976,0,0,0f921215d2ecc28484cbe0351cc037c4717959565086f31335f8a4dff06a4ac0,2024-10-30T16:35:30.723000 CVE-2024-7977,0,0,35a9dbf4c2d02f0326d13a2bfe3bf0f6e46cd82216dc71cf6302a1b270105b73,2024-08-22T20:35:28.140000 @@ -279084,7 +279087,7 @@ CVE-2024-8388,0,0,c108c175f583476d52335dda686a07821c6672b4557b6fdd57696948952181 CVE-2024-8389,0,0,bab840fab64390c2642d98bd745e3cf248daf4c4b4e297c77ab2881a9258f51a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,9e058589e05e55d802bdff333afcda5dfabe222fda0890669adfa048b8c1553d,2024-09-12T16:44:01.247000 CVE-2024-8392,0,0,caa35dfaa13ca6c8848228402eb1fa602b7508d122bb6d4c521b1783ee5cf907,2024-10-28T13:58:09.230000 -CVE-2024-8394,0,1,d6877f06ff2cccc7da33801c5abf661f725fbb6e213e362adc46bfdaa6593ada,2025-03-19T18:15:23.957000 +CVE-2024-8394,0,0,d6877f06ff2cccc7da33801c5abf661f725fbb6e213e362adc46bfdaa6593ada,2025-03-19T18:15:23.957000 CVE-2024-8395,0,0,0d7d9d0388f11fa128ccc1c5d66a15805267e102ba65bdd6292b7ba67fb001e7,2024-09-19T17:53:45.753000 CVE-2024-8399,0,0,d49b773b84cb3f3bbb99cba57284bd25c604a07c8803ae1bb29354f0a32f2fb4,2025-03-19T16:15:29.910000 CVE-2024-8401,0,0,f90d13186aea7c5f448158e87f10f4a712d23f15b92b686ebe5841b2d896af90,2025-01-28T17:15:25.467000 @@ -279947,7 +279950,7 @@ CVE-2024-9399,0,0,d8e406ee1beab284cfa9cbeb45a0d2c953df97248a1bc9b6aef82180ed3da0 CVE-2024-9400,0,0,4e0eb218b5de55a15a4a85f62e9e541831946bea4c202524d5661f5eb345d7e0,2024-10-04T13:51:25.567000 CVE-2024-9401,0,0,96a7de06dd58c9c71f25b07ec603b05ba47f7dd964cd736693ec4ab35f2b79cc,2024-10-04T13:51:25.567000 CVE-2024-9402,0,0,63b01a6aa3f666e567eb1543fc626efc5699e53df1a2e8aefcfc7ec04c0a715c,2024-10-04T13:51:25.567000 -CVE-2024-9403,0,1,2789ecc39928d9f0673acd74b29bccbd75916415c64484280cd56fe59a46d92a,2025-03-19T18:15:24.137000 +CVE-2024-9403,0,0,2789ecc39928d9f0673acd74b29bccbd75916415c64484280cd56fe59a46d92a,2025-03-19T18:15:24.137000 CVE-2024-9404,0,0,42e12aecb183ff5b0d234b3c0b09beb73cd7c6fba91a9497a94d650a56c0c77d,2025-02-20T02:15:38.303000 CVE-2024-9405,0,0,8642cd3daffd984afd6c8d211f16ccc5e756252d3a00aefbed32c81bc22b44d9,2024-10-04T13:51:25.567000 CVE-2024-9407,0,0,c3bb216c57e02389fdc038abc31ad60ae236af3d0e61fe20fe1466db79b4cb67,2024-12-20T13:15:22.430000 @@ -280682,7 +280685,7 @@ CVE-2025-0426,0,0,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d26882 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee011658,2025-01-17T18:15:30.920000 -CVE-2025-0431,1,1,16f091319bccafb5c999a0265b1102fd8c13bbccb9d192a0766cfcc5a79771c9,2025-03-19T17:15:41.217000 +CVE-2025-0431,0,0,16f091319bccafb5c999a0265b1102fd8c13bbccb9d192a0766cfcc5a79771c9,2025-03-19T17:15:41.217000 CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000 CVE-2025-0433,0,0,8176875a60ba9233cb301d8a0e9b4f4b8bcfe49da3dc80cfb0257115d68714b5,2025-03-04T20:38:54.387000 CVE-2025-0434,0,0,865677e7d723396f8f162183763a82d312d1d17bfef7ef19d82b8b00574da547,2025-03-14T16:15:39.610000 @@ -280694,7 +280697,7 @@ CVE-2025-0439,0,0,101658db461148311c4db52613ef0d8a033b47ac11db7b69a0cae87e2b2f57 CVE-2025-0440,0,0,bab5646fe57be32b81759b8d43c7715137b5a3dd2925726f076ac6ff1f169843,2025-03-18T21:15:32.617000 CVE-2025-0441,0,0,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000 CVE-2025-0442,0,0,b67a5ab0a614c9dcc349e6c0e7630de1fb2af7af324e655577d77f7fa5f9a38f,2025-03-14T18:15:31.303000 -CVE-2025-0443,0,0,4e2be3496f444fcf7458a1d47d1d7961d812a34674fe69fb29e935339a7b951e,2025-02-18T21:15:25.007000 +CVE-2025-0443,0,1,1c12e337dcd70248f9855587510cef5c758f6b380d7c66c9f8bf888012a95d02,2025-03-19T19:15:44.070000 CVE-2025-0444,0,0,b57406504b58c76909f2c14a128c362cf7e0f5ed01cd46bcebd537920650043d,2025-02-07T22:15:13.807000 CVE-2025-0445,0,0,757acb8a0cefc693cbaf9e83fdad6cd24630be0355ff9a4060422c2852425aa3,2025-02-07T22:15:13.980000 CVE-2025-0446,0,0,fa18d3e516501e304df9d785a2dd2f8e211e5095ae3d05bc045a0067edb62028,2025-03-14T17:15:50.033000 @@ -280780,7 +280783,7 @@ CVE-2025-0541,0,0,185bfc59de787ff6a7aed59304dec973fe8c904f3f2e9dfa433a1fdef3b0c7 CVE-2025-0542,0,0,6313331796a87cfd429c6887ebdeb1b0129ce5eba24c6840f8a5db7fe9415456,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,eff0a1055b76d4ca2905d4fafa8d1e8eefdbdc8138e12e68c5bbcea714737ab9,2025-01-25T17:15:21.720000 CVE-2025-0545,0,0,63c3b9042492b87a07e49abf13646d4f678ce0fc03e014fc20736bc03bb30cd9,2025-02-24T14:15:10.910000 -CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 +CVE-2025-0554,0,1,b9f97d18cd5694830c0392455ff8a7f24b64272156981af299edd549a4c44708,2025-03-19T19:53:31.407000 CVE-2025-0555,0,0,1a035c114015b9124bd390d55587956f10a732d5c9825d872183b2ec25413844,2025-03-07T21:43:32.720000 CVE-2025-0556,0,0,2e939f9c46df46e943acd27c5231aa3ec1bc692b51067d4f0d8c17d23ee23f89,2025-02-20T20:41:40.723000 CVE-2025-0557,0,0,a4d2397bb9974138a91f8206bbe00f4a1c6824d0efb01426f3cbba3778440e81,2025-01-18T09:15:07.710000 @@ -280982,7 +280985,7 @@ CVE-2025-0848,0,0,b2983417dab12b73eeb6ac12c4c0f1ecd898908d07bf740357ad739f137d6e CVE-2025-0849,0,0,c1571bb2b5b492c6f92204c6e608b11f867312e7feddc38eeea3bee1b20e34e6,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,62423acde853af0a12a4aec10e4529f32bf957e75f81daf2b9cb54a67a3c55a5,2025-01-29T22:15:30.463000 CVE-2025-0858,0,0,f891231954c92d22a87eae2f502f820f9d12773d9f7834eea219f8626f292204,2025-02-05T15:15:21.580000 -CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692e5,2025-02-06T10:15:08.340000 +CVE-2025-0859,0,1,4ad706790e5c9cbaaf00aa7448e6f70ee52c07e55810102d12d232e6543ec576,2025-03-19T20:35:32.317000 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000 @@ -281322,7 +281325,7 @@ CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddeba CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000 CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000 CVE-2025-1382,0,0,f394f1bf08f0724fd105e399ff64ae7d15c16e18835cf062e0212ba4779b9249,2025-03-10T14:15:24.567000 -CVE-2025-1383,0,0,f8842bc24ae6552e0e5c3417569be9e02119dcd0684f586d9a7f75c89957c609,2025-03-06T12:15:35.937000 +CVE-2025-1383,0,1,c9fb1a308be655ba73427b329ae1663f0ab56dcb4706e7cabab9a87230c6ae97,2025-03-19T20:47:28.020000 CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 @@ -281483,7 +281486,7 @@ CVE-2025-1651,0,0,c99ca01377170f5c9541b02667011cc3a7ee57e0e1e7516450856aa1e1995f CVE-2025-1652,0,0,f835e56346c3eacae124a3aed63e8326d753a2096beaca2c2cf614cd8ee44be1,2025-03-13T17:15:36.297000 CVE-2025-1653,0,0,76ca55c599eca136fb151ca7aece6eb51650f0a58e9305931234e54cad201f50,2025-03-15T03:15:34.457000 CVE-2025-1657,0,0,7d79f8b791c0f2257e6d09bfa912263a9045eb980bab54893052c9506209266c,2025-03-15T03:15:34.600000 -CVE-2025-1661,0,0,d5854f96f90e254253aa5d5ec3c027686d0144cae3255b86212082f3262a5ed5,2025-03-11T04:15:24.803000 +CVE-2025-1661,0,1,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000 CVE-2025-1662,0,0,4d88e09766d153da5fff83292fa1e9ea6e796edc079e2400a97b207b99761342,2025-03-06T15:30:52.347000 CVE-2025-1664,0,0,19bf990dd5c89c9cde04289487f1cebce350ee23136c2d614a3c8b0434b455bc,2025-03-11T21:25:56.700000 CVE-2025-1666,0,0,578bd41069680734171dab8b0d965c7a5d9feef84ecb4800477ec06c1e88653d,2025-03-06T12:15:36.117000 @@ -281823,7 +281826,7 @@ CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787ad CVE-2025-20633,0,0,6bb11c096882f0fa2e53be93f073398b5914dda7109516b88148255d86708332,2025-03-18T19:15:47.673000 CVE-2025-20634,0,0,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 -CVE-2025-20636,0,1,298c9dc463cd7330839c9906223b03377c99ae7574b1e4b33a000546923497bf,2025-03-19T18:15:24.400000 +CVE-2025-20636,0,0,298c9dc463cd7330839c9906223b03377c99ae7574b1e4b33a000546923497bf,2025-03-19T18:15:24.400000 CVE-2025-20637,0,0,c98f77253202c98cc20372cd8c54d3277c2b4473b3f20cbc97ddd00be7dce7b1,2025-03-17T15:15:43.697000 CVE-2025-20638,0,0,08f8240b8781ba529172281ed593ac6a74928a95932c1e6e64c0bd0033c3a922,2025-02-03T19:40:23.927000 CVE-2025-20639,0,0,17768a082d000d8edbb8d765dc2ec03f9c211008cd739454854e21355c649809,2025-02-04T15:24:00.723000 @@ -283014,8 +283017,8 @@ CVE-2025-22754,0,0,c0a20ff0dc7d11a65b9241a7172e5329fe4a137b477ec9e87a12160d75b63 CVE-2025-22755,0,0,8f6b0a04551af49856a2271381efe0b139629609cf6cdbb88a9b44d66b8939d8,2025-01-15T16:15:38.417000 CVE-2025-22757,0,0,6197acf602bccdf00a03302b1d0523abd3875be7c7ec6c910c8f36163a871733,2025-03-11T19:13:03.890000 CVE-2025-22758,0,0,75af2175b66bedd5905c80abd56322cb37a48c8bc3ca46887b18b8750dd877d0,2025-01-15T16:15:38.577000 -CVE-2025-22759,0,1,77760c4ed3f5449fdbbb45ef65edfe36106f7235aac3256431dc0a201d4060ec,2025-03-19T17:53:18.300000 -CVE-2025-22760,0,1,04b6e2b6792d2486fecb7e6362a58d4552ad5aa69590f5bec511bceb47cf468f,2025-03-19T17:52:06.277000 +CVE-2025-22759,0,0,77760c4ed3f5449fdbbb45ef65edfe36106f7235aac3256431dc0a201d4060ec,2025-03-19T17:53:18.300000 +CVE-2025-22760,0,0,04b6e2b6792d2486fecb7e6362a58d4552ad5aa69590f5bec511bceb47cf468f,2025-03-19T17:52:06.277000 CVE-2025-22761,0,0,1f457b8943bcdd333039377fe4c764bd2dfdb88365d9eefe6cccfdb7a18f652c,2025-01-15T16:15:39.053000 CVE-2025-22762,0,0,9c306109b16ba65d05e7076b45fa1179d0a359bb35d83cde3f7d3c02ff96f6bc,2025-01-15T16:15:39.227000 CVE-2025-22763,0,0,947af1deb8d9cae5ca079e909cf29879fdb4e7f4a385aecbc64b3952727ab4d4,2025-01-21T14:15:12.900000 @@ -283101,7 +283104,7 @@ CVE-2025-2290,0,0,11af56ff6285a5f3028ad838da5752bac7bb9a41af222f693267b4ccc9e5ae CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000 CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000 CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000 -CVE-2025-22907,0,0,3a94ab79d0b7e991deb67fcbc5f10e96b44a925be432fa5554733ec72d5d70f2,2025-02-18T21:15:27.480000 +CVE-2025-22907,0,1,20b58859c8117d6948f4881a8512703bc1a347c501765ebfad2b82b119c89bb4,2025-03-19T19:15:44.263000 CVE-2025-22912,0,0,bc13de059e2dac442bfb981cb719957ca16fc9db7927c792711a8a050a6d3b57,2025-02-18T21:15:27.630000 CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e974,2025-02-18T21:15:27.790000 CVE-2025-22916,0,0,894d45082057205ae80e6263e604aa99aac9da87f2527da37d587ece072246ff,2025-03-19T15:15:53.807000 @@ -283961,7 +283964,7 @@ CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231da CVE-2025-24099,0,0,9ac733c66f981521044d55991b68403f81f4b4ece5888bc69708355b0385700d,2025-01-30T22:15:10.160000 CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 -CVE-2025-24102,0,1,b5cfc7b1838de2f08624eed5825f5af665597fa426821ba937adbf9a4e3c8fa2,2025-03-19T18:15:24.580000 +CVE-2025-24102,0,0,b5cfc7b1838de2f08624eed5825f5af665597fa426821ba937adbf9a4e3c8fa2,2025-03-19T18:15:24.580000 CVE-2025-24103,0,0,9d77a1391acd11970f5b83f9a3163a0cc44f6475e53e33ea770a58444256625e,2025-03-18T15:15:59.120000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000 @@ -283979,7 +283982,7 @@ CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aa CVE-2025-24121,0,0,3147f918c1f3d7a66c464fe94f2778628efbf774801d0ad4400d3a98a4740b5a,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,63629b839b402edeef408de5ba24f2cb0ef35ef076785a337d7d7055ccc840b7,2025-03-04T15:16:52.190000 CVE-2025-24123,0,0,f151d1ba886f1980de255ffb27f17311f839ac035993761299fd7f3578a77b9e,2025-03-18T15:15:59.307000 -CVE-2025-24124,0,1,37f80ea9270e99050922f68bc9b12227b3498b69e58621eb42abc546fb697492,2025-03-19T18:15:24.787000 +CVE-2025-24124,0,0,37f80ea9270e99050922f68bc9b12227b3498b69e58621eb42abc546fb697492,2025-03-19T18:15:24.787000 CVE-2025-24126,0,0,93626dca5a2efcd9402a6fa0ef63a8a1935cafd987992c392cd02dfb12247155,2025-03-17T16:15:25.117000 CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 CVE-2025-24128,0,0,b692dd6c3705d2f67ed46ab7eedb7af0c180ec823dc1f4569da7249148d6fcf7,2025-01-31T22:15:13.607000 @@ -284115,7 +284118,7 @@ CVE-2025-24459,0,0,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87 CVE-2025-24460,0,0,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000 CVE-2025-24461,0,0,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000 CVE-2025-24470,0,0,b97a6fef4b5505dee945d637a8774d8a3a426e3a9c38ffd15f57405368d61eb7,2025-02-11T17:15:34.730000 -CVE-2025-24472,0,0,641ea3edd7e8143f53e28350922db1d41ad10babf1ffbfe914be7a323461b20d,2025-03-19T01:00:02.197000 +CVE-2025-24472,0,1,bac82d2a21f5dff3b7ad8a78ff23b02d31ddfa4ab12b18070695818a2b25387f,2025-03-19T20:21:38.197000 CVE-2025-24478,0,0,0083a83ce8a7467bd79ed623e875ec78bf3adca87990be9aea0e893fa7d8e9bc,2025-01-28T19:15:14.777000 CVE-2025-24479,0,0,d732ba51a4f6efc84c8321c89024e480fd7d3b488cb555f37500d77679d00e07,2025-01-28T19:15:14.910000 CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d532,2025-01-28T19:15:15.033000 @@ -284206,7 +284209,7 @@ CVE-2025-24601,0,0,1f08f295b583a5d8d6691cce4a3ea4195e1b448345edaa32e311901741ea8 CVE-2025-24602,0,0,6e96037c6898077533e4c11cb93df991664c267e5d0f05eef396ec8e21c55146,2025-02-04T15:15:23.320000 CVE-2025-24603,0,0,f7ad495dbd8281a5e335280fe84127fec449c788dbd01e8d715d5c27c3312f13,2025-01-27T15:15:14.437000 CVE-2025-24604,0,0,73d28ae8aca0ad80ef56204fc54c189cbd66bca569b11b6383e33cf145ba296a,2025-01-24T18:15:36.823000 -CVE-2025-24605,0,0,156c85bb5b8cd4c9d5a7110da95451fffdd7a49848eced512b14222e347dfa4f,2025-02-03T15:15:26.473000 +CVE-2025-24605,0,1,0fcf98e5923435e5a5a721fef0036629243dacca34f88c6b9bc14cd40bace2d4,2025-03-19T19:53:58.787000 CVE-2025-24606,0,0,24d6e6f0194a93c382ab34fd85c4f746c792431243a7ead856055961cdd091fc,2025-01-27T15:15:14.587000 CVE-2025-24607,0,0,2be57b2d7b1edb6665427c84200429f60ea8553ee3237bcd1a58a82441875ac5,2025-02-14T13:15:49.083000 CVE-2025-24608,0,0,0e48e7db8a46b4ff94fef4a0c781d80fd6e887d0ff20c179b1a0da2adcbb41db,2025-01-31T09:15:10.767000 @@ -284347,6 +284350,7 @@ CVE-2025-24754,0,0,df5b30a971ad3afa753fa5100ea4ce4a8eeffe0cded00f62df24aa224b182 CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35fed,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,00090c21b036cb18f500635475c1d0d07432c00656603d0706e690db1dac0d4c,2025-01-24T18:15:49.307000 CVE-2025-24758,0,0,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023627,2025-03-03T14:15:49.300000 +CVE-2025-2476,1,1,4dc2151eae90e0a250051332db2685de02c92bd83e1bf6ab30b2bfb0752f03c6,2025-03-19T19:15:50.447000 CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000 CVE-2025-24782,0,0,af9ecca69a7798f1791f8ea745715a1fa04b7e4b7e61894decc6a3bec98145b6,2025-03-10T18:30:35.687000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 @@ -284675,9 +284679,10 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6 CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 +CVE-2025-2536,1,1,04c08698776e4d289505a904f947a430f9e270d9991b98d930f5b5fd1dfed96f,2025-03-19T19:15:50.560000 CVE-2025-25361,0,0,9f115844287b15ce6dc125807b19b8e446ec3f37878f01ccb8db0422e8bb780e,2025-03-07T20:15:37.673000 CVE-2025-25362,0,0,c8d9b00ad653f3fefb15ba0fdb75a1597ea822f23192e332e875ad1563a7f537,2025-03-06T15:15:17.277000 -CVE-2025-25363,0,0,ad044341ee196ddb915520942a57ba9374740342f32fd3188132a84a5f3cc3dd,2025-03-13T18:15:50.733000 +CVE-2025-25363,0,1,2ff7284dab4cf6e7dac449878bc4c3befcaefea48f9623fa86a7928dded159ae,2025-03-19T19:15:44.390000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000 CVE-2025-25382,0,0,88d0c9aebff390fe6125675f7fda1114ad4b4dbbaf723b80d3bea82edb3ec348,2025-03-10T16:15:13.393000 @@ -284728,17 +284733,17 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 -CVE-2025-25565,0,0,724ef0ede05f2eb885c3a56a15ce087223e787330adfadf68a9ca1c8f4286de6,2025-03-12T16:15:22.660000 +CVE-2025-25565,0,1,aed7dd17dbf28583bae9e4477af32eb7841693da51bacd50a0f71fb7dd9a526b,2025-03-19T19:15:44.520000 CVE-2025-25566,0,0,5d534d6b0fe1f7902c1dc640fde2534ed23638ce1e46237376fc281c161dcaba,2025-03-12T18:15:25.943000 -CVE-2025-25567,0,0,1a4bd950383b3325e775420b0643b083021178d77feb4623d8cc3f383d0db70c,2025-03-12T16:15:22.840000 -CVE-2025-25568,0,0,4038dfb91217e4a1d34e8cd3d8c2fcfbe0b21f6d6d3aa6263682d4e3e26c8ab5,2025-03-12T16:15:22.930000 +CVE-2025-25567,0,1,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4ac5,2025-03-19T19:15:44.653000 +CVE-2025-25568,0,1,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 -CVE-2025-25580,0,0,c58c32d03d8ad1894c1c56e4d8dd24f4cc4915241c92e407bc5cc7606fecb841,2025-03-18T15:16:00.123000 -CVE-2025-25582,0,0,8edb7611fa3596d630b74ec88ccf1c3bb1034d2cb2ff5ec0d1272f82fca1b313,2025-03-18T16:15:26.900000 -CVE-2025-25585,0,0,80747c75020719441b1494270118cfe6daf65227a3f1c61a488d53873199d3e2,2025-03-18T15:16:00.253000 -CVE-2025-25586,0,0,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afacbc6,2025-03-18T16:15:27.047000 -CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000 -CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000 +CVE-2025-25580,0,1,941c7d6e375f6e8f2e78c34c089b4cbbef58efa7cd40d265b4e4698250537356,2025-03-19T19:15:44.917000 +CVE-2025-25582,0,1,6699522d6c3e7f389a44bd31516f417c7bcd0ddceffa4e13690c9b15efbe69b0,2025-03-19T19:15:45.050000 +CVE-2025-25585,0,1,573ca9b6326340613c6ef4b27171ab8d588aa9c625787305695c256190789ece,2025-03-19T19:15:45.203000 +CVE-2025-25586,0,1,c33ba402d4ccec19791c05a75a4cf66593afcde78c55289f536f7b57b0c3a14f,2025-03-19T19:15:45.367000 +CVE-2025-25589,0,1,db2cbcd9ef8b4d6f442ce18504bacac10ff9f5ff74a0cf15c2c95c6e0ff7ef92,2025-03-19T19:15:45.507000 +CVE-2025-25590,0,1,7c3efbf2f50b88f03f88579e0882d18fb340d7bca90d23567c9e4638c4d3e2a0,2025-03-19T19:15:45.640000 CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000 CVE-2025-25598,0,0,ea8ff451786059144f97b5402e36a3bbb5df978993f22c0b25b2578aad85418d,2025-03-19T14:15:39.140000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 @@ -284753,11 +284758,11 @@ CVE-2025-25617,0,0,3f661497fa69da30bb91f642820b6cfcf05fca2c3dd7a67bf0915aa5050b4 CVE-2025-25618,0,0,a59200cf6979207293eab61a55518c85ddded4cce5635d0bc8c4d629e263afcb,2025-03-17T18:15:21.450000 CVE-2025-25620,0,0,2998f203d004ba2c3686a85bfd6e4a9c803d92001b76576bf7ced9c40410ee3c,2025-03-10T19:15:40.393000 CVE-2025-25621,0,0,fd8b30a620164f595d91d88f9a3c3e8c5abdc4c1cc2dd62089ef1c763915878e,2025-03-17T18:15:21.593000 -CVE-2025-25625,0,0,d0155325b3e459f1d8704dd617d4f9fd34a2eb2597101ec145da6343d3d2458a,2025-03-18T17:15:46.357000 +CVE-2025-25625,0,1,e0547341df4ce936716abc6a4864109b198cd9c3ef7a0c0ef8ebe81a78ba256c,2025-03-19T19:15:45.777000 CVE-2025-25632,0,0,1ceebf9a7f4f0a07c0d7243ce1a1b61926f60bcdd3649b2e6df48cfbf3246b4c,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,7d5efbb3a02c594499ed06a9a27e13e1f935c77ecfc5e148d76deae63172e1dc,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 -CVE-2025-25650,0,0,bc81be186fb1b1138274a7b0f25683ea7be82f0c7d43e36d08f29a90b0da799f,2025-03-17T15:15:44.293000 +CVE-2025-25650,0,1,70ecf06880b4929e5c513a2918fa826b8f349cb5d8c6a838be654946b1198891,2025-03-19T19:15:45.910000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6bbb,2025-03-17T15:10:12.850000 CVE-2025-25664,0,0,1da9718d556db2a8964602e6e91c5c694bfb0281423a38648b821b59368a1401,2025-03-17T15:19:50.133000 @@ -284770,7 +284775,7 @@ CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b23 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 CVE-2025-25680,0,0,032c5ba180f9f4ef6bb171b4a3afdc647690e7ec56acd786fae07483cba1e1a6,2025-03-11T16:15:17.413000 CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000 -CVE-2025-25684,0,0,aeb3d417e38e96d627c32140b20e8099c9d6b1874a1804858f21e65106179591,2025-03-17T17:15:39.463000 +CVE-2025-25684,0,1,6c29cf12266115f378c2eab71023ec7b3d1e8a558115bc82826fa1eb3930a6c6,2025-03-19T20:15:19.383000 CVE-2025-25685,0,0,c5ef925786cc6cefc3aa215e20f124b666b7fe25d1fdbe5125956805beb74f11,2025-03-17T17:15:39.597000 CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000 CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000 @@ -284823,9 +284828,9 @@ CVE-2025-25818,0,0,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b87 CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000 CVE-2025-25825,0,0,44662eb5095fccda4e3c5daeb8867cc0b42f8cea49e95654318106019a993ae4,2025-03-06T21:15:15.300000 CVE-2025-25827,0,0,592a10fc3f850156d30f40a9c171cd33687dda2306b5a1e50f6dc9f481441aeb,2025-03-06T21:15:15.460000 -CVE-2025-25871,0,0,a7774bf4083b2bdaef1f6188c2e694f4b615d3d75ee96f37d48092f76a1ff008,2025-03-14T16:15:40.767000 -CVE-2025-25872,0,0,2b7895959c68c268231a23cf5666e891e3d417b47e3a69883a4df13fad9855df,2025-03-14T16:15:40.870000 -CVE-2025-25873,0,0,007385a85427b17af0b590a14c905b13d87ad89d4f7c90c87776cfa2d8fc9f5d,2025-03-14T16:15:40.980000 +CVE-2025-25871,0,1,0a82550b1d2d046f647e980d017fc2255def0d1bb38591c44cc31261bf72a0fd,2025-03-19T19:15:46.047000 +CVE-2025-25872,0,1,94078d2bd826a6811b0bd64297d9316043894a3c21473da0f437fe938c52bee5,2025-03-19T19:15:46.183000 +CVE-2025-25873,0,1,cfb7b21732e4080fcce9657ef4f7d2ec4fd7a47bb7c173bb454c2896c1004daa,2025-03-19T19:15:46.320000 CVE-2025-25875,0,0,d17e40afd54e48d5365a5f2bab4bee39fd6bdc2f1f68fc63da8ad834461f4c71,2025-03-17T19:15:26.187000 CVE-2025-25876,0,0,d77c2fa10362bc9dd100b62b7ad153188c5cd57a94d71ada9a4a7709c348227a,2025-02-24T17:15:14.100000 CVE-2025-25877,0,0,cbbd9a25effae93d05c2350c64bc2702c068ac85babd14136f90d01e007b5425,2025-02-21T22:15:12.977000 @@ -284869,7 +284874,7 @@ CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8 CVE-2025-25967,0,0,700f5caa5263261596a95c104b462b862248107c444d44d28a17b5f52a4ae3d9,2025-03-06T12:25:50.837000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000 -CVE-2025-25975,0,0,c1428cf091db342b87da12334392302e812a2cd65cc7cd910efee2b378538c17,2025-03-12T19:15:40.147000 +CVE-2025-25975,0,1,fba11b901c1c9aef11602541907f74e12eb7ebd496b5f2f78cd74b7a4d97f446,2025-03-19T19:15:46.453000 CVE-2025-25977,0,0,f0525c0b29aacd716e9920bff57d9abd85d24e34d1ebfed927f192babc4ec906,2025-03-12T19:15:40.270000 CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,8b2b3adef615c73806983235252325f570b2dccda1b7c0643592bd465b468928,2025-02-18T15:15:18.790000 @@ -284880,11 +284885,11 @@ CVE-2025-25994,0,0,cccb462c2ecf63933df5564d2f480d0a7d6adea1623b13ee3338f624c6c3d CVE-2025-25997,0,0,2cb35e75e95bc0e389e09288c71cb51533b99c383d5232ec08ec0067eaf77620,2025-02-18T15:15:19.063000 CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127fa8e,2025-02-21T21:15:24.470000 CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922eccf1,2025-02-21T17:15:14.680000 -CVE-2025-26042,0,0,50acdfefe2ce2948d972af6214ca01f4b8c9188e96d847dd854c1a942f8c834c,2025-03-17T19:15:26.587000 +CVE-2025-26042,0,1,4af190d569d9f7d05a671711faed009a4675142002092e2a6e3e9afdca2f0910,2025-03-19T19:15:46.587000 CVE-2025-26047,0,0,e5f969b85e25d20e576d529c079698dda076726cc7fa9835a0c501d496a29bb3,2025-03-06T21:15:15.623000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 CVE-2025-26091,0,0,0a53a3c2cb2d2c7caf4bc303bc2b91dad9caaf8869a6ee9842c32b5a6487c809,2025-03-04T17:15:18.243000 -CVE-2025-26125,0,0,cb9f0af9314bc1a0135cd4d22a929194b4fbf294ee118f6d776e246fc6d4047f,2025-03-17T18:15:21.763000 +CVE-2025-26125,0,1,d6bd5a75d4951f78a82236509754d95560a7f3fd72400cb1098121ae3778b2f5,2025-03-19T19:15:46.717000 CVE-2025-26127,0,0,f0bbdd88ca25844410b8ed9592279ac8eda69e5d3712a1dfd40b529f1190e71e,2025-03-17T18:15:21.860000 CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000 CVE-2025-26137,0,0,236b4ab26ac447c6a5392e5c527b71bba3c1763ac59ec6eb68366a508f6c82e3,2025-03-18T17:15:46.503000 @@ -284892,7 +284897,7 @@ CVE-2025-26138,0,0,67958587ce71674f791466aa1788d0155b47ffeef2106fd0688fbeeb275e6 CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 -CVE-2025-26163,0,0,0c2f8d2a474615c1b43f782637819e8eadf9e0fe7ea211d9c2eaec5d0feafbf4,2025-03-14T03:15:44.333000 +CVE-2025-26163,0,1,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000 CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000 CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 @@ -284903,7 +284908,7 @@ CVE-2025-26205,0,0,63ed32d242f54d965851d14b37db546b9e668c5b81ac02938c74583c42eba CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000 CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000 CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000 -CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000 +CVE-2025-26260,0,1,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000 CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000 CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 @@ -285080,7 +285085,7 @@ CVE-2025-26661,0,0,6b07aa7e41ed32b21c57e51684aeb9e36856ccd243be242f1a25b61ed08c5 CVE-2025-26695,0,0,e239201bb929150b03ad07ffb8d312f400377d1f1cfc7d0e42902c7137896acf,2025-03-12T19:15:40.450000 CVE-2025-26696,0,0,c788dec0a12ae5bdd6b81aed962f6239947be4d264a5b176d5302dfebc47d49c,2025-03-11T20:15:17.523000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 -CVE-2025-26699,0,0,e88af5cce40368f723e525bfe75ade49611d14fa54ea6a0ae28e1d64f24ae73d,2025-03-06T19:15:27.683000 +CVE-2025-26699,0,1,3d07dd4adaf6ec2081703756468d2a6a16a920644c974700ce9ab8caf4058eba,2025-03-19T20:15:19.543000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000 CVE-2025-26702,0,0,1839f93bfb7ace4325903035b3bb74add19b6f08607cfe0196f58c5d53bcb05c,2025-03-19T14:08:01.357000 @@ -285114,7 +285119,7 @@ CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a3 CVE-2025-26772,0,0,7fcb2162c8ef6e85c30313d0e929056e0a77e9637a8e6b42c78b16bbf02599e0,2025-02-17T12:15:28.980000 CVE-2025-26773,0,0,d49de72c13c2b86c2a31c05293d547eb9b0be3797bd82de8c3f9ffd6b4c04d67,2025-02-17T12:15:29.123000 CVE-2025-26774,0,0,526dfe51d520753de4e60d175888e5d8ca8738aa723fd20bff017fe643f4fb4b,2025-02-22T16:15:32.060000 -CVE-2025-26775,0,0,ef0ec4280283625511a235c270bf85235955b179ceb1ce058027118d136e87d6,2025-02-17T12:15:29.260000 +CVE-2025-26775,0,1,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c0462c,2025-03-19T20:39:46.850000 CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000 CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000 @@ -285220,7 +285225,7 @@ CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 -CVE-2025-27018,0,0,d7627439ac8580cafcc1645cd89dec4f1a559b653f534e48b600c01afeaf0c77,2025-03-19T09:15:14.457000 +CVE-2025-27018,0,1,b063bc9114ab5af4cf2b62624bbe702fd682350596de13fccc6c8bb0270d2e7b,2025-03-19T19:15:47.170000 CVE-2025-27080,0,0,dcd914ae09375ce77795feef8ad95fb4f30b82b0d28355bee32f7c0de8eb15be,2025-03-18T20:15:26.300000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 @@ -285383,6 +285388,7 @@ CVE-2025-27411,0,0,0a8c61754ca17a315a8d6c0a67146f15c92b522c31bf75cc818698eafa246 CVE-2025-27412,0,0,d9bbfd830ce3a327538dfaf425c1c45f17af21af968a5c50b137821ea628ebef,2025-03-05T16:15:40.457000 CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000 CVE-2025-27414,0,0,929fb75122881174d77a5f272353ca474f8f31f3e2150b8f4eb15693c5e1bce0,2025-02-28T21:15:27.957000 +CVE-2025-27415,1,1,c81570b54d96dce5d3917e113308b5d9a094a919c573fb1f75807cd3c8916c39,2025-03-19T19:15:47.257000 CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193dd23,2025-03-01T01:15:28.857000 CVE-2025-27417,0,0,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000 CVE-2025-27418,0,0,41f3eb54bc8960a9271d089bac74e54194694ac4af5959c0bca02edfdd330c78,2025-03-04T17:15:19.967000 @@ -285502,6 +285508,8 @@ CVE-2025-27683,0,0,4b627b025d0617cee159fbfef38ddc5f2b647b4b19c44649113efa07335c1 CVE-2025-27684,0,0,6cd030dc35cdde6abe4a85046a48e3fc802484220653099edea978c9a09f7bf9,2025-03-05T21:15:23.197000 CVE-2025-27685,0,0,78f1b0d4b3939d525b8aa8d6b40be5796a932b588a65f5386a00362208fe87e0,2025-03-05T21:15:23.337000 CVE-2025-27688,0,0,11dc0ae1619b9a08bc2158bdd1119a1c755120b8a951d60785c3d6514433eccb,2025-03-18T16:15:27.980000 +CVE-2025-27704,1,1,f9978afe52d0f998968ff2df11e15650beea97a7f0a1c59228c7ac9079a3302c,2025-03-19T19:15:47.390000 +CVE-2025-27705,1,1,a8d52de4e1129f3339f6c7b60b54f64fbd4b5c5c3ceba19569b311f955ac6c0b,2025-03-19T20:15:19.727000 CVE-2025-27760,0,0,0fe214e27ee00978be2b2db20453752d3c587e2a097907bcd7b6f52eec4fd67b,2025-03-17T23:15:17.740000 CVE-2025-27761,0,0,ccacd385546f9e849c6762c7104b07eacb4ee137232b68db7722ae4c039dd182,2025-03-17T23:15:17.807000 CVE-2025-27762,0,0,2807d546b38a9bbaac57f4b35c24d7978c6bb44d3e22ed6d6636bd10822c6fbe,2025-03-17T23:15:17.863000 @@ -285538,8 +285546,8 @@ CVE-2025-27924,0,0,4840c809271edb4af189b2d2219c4305e2093cdd10afd54a1be0c296547a8 CVE-2025-27925,0,0,20d248e60598e5f95d1fae0ce2e564e286fc723b6dc1ad95ef277e933ed7ce47,2025-03-10T23:15:35.473000 CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a4d9,2025-03-10T23:15:35.670000 CVE-2025-28010,0,0,6260ea576a8c0d7bd0a38d2f3c79cf58da9a7c5443332c696e69e06a75d63ce4,2025-03-19T15:15:54.430000 -CVE-2025-28011,0,0,2a370ee125823dd49484207db37abe8d21873504d43764feea8f4c2dabc113d2,2025-03-13T17:15:37.530000 -CVE-2025-28015,0,0,0603e9cbef2e5ee55344938ebfb39b43a9cec4a734d3544a5d237aff3bf7420a,2025-03-13T16:15:27.810000 +CVE-2025-28011,0,1,904ac06066433043222ace0eb3e8530f1f0d607436509b286714603b0a427d36,2025-03-19T19:15:47.517000 +CVE-2025-28015,0,1,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9631,2025-03-19T19:15:47.650000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 CVE-2025-28857,0,0,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000 CVE-2025-28859,0,0,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000 @@ -285603,30 +285611,30 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 -CVE-2025-29030,0,0,4e09801817ed179e27143f656acce8aa3f03e44623f58d515baa1e0baf8fde36,2025-03-17T19:52:00.090000 -CVE-2025-29031,0,0,fffc4c63de36e7f69f93e3c2f9c023f73b867ee2b0df20fdce411a824c8e33c2,2025-03-17T19:51:38.883000 -CVE-2025-29032,0,0,0b6eab7e8f78d0b67802c042eb5a6a44e3fd4c503122d47536d1c3e4c08abc2b,2025-03-14T14:15:18.623000 -CVE-2025-29118,1,1,d6a29907d79d656a09e4a25840684266d867ce6ac2a4da8c55ee76648c5add87,2025-03-19T17:15:41.377000 +CVE-2025-29030,0,1,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 +CVE-2025-29031,0,1,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 +CVE-2025-29032,0,1,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 +CVE-2025-29118,0,1,544cc61f27b329117a892d08f384d5737c3e9c8a3738f1368db354f799c3eaf0,2025-03-19T19:15:48.220000 CVE-2025-29137,0,0,cbd4afe024e773191ca618bea56802cabb25e18eaeb2755e5d4f4b139f9e66c5,2025-03-19T16:15:31.677000 CVE-2025-29357,0,0,ddd0f218f7f0a63a4864093fc2a3ded7f064b1382e370d0ee41cc0a1c1a3ddb4,2025-03-19T15:15:54.690000 -CVE-2025-29358,0,0,870e09978f912987e7518e96d71567b7d0b711f059cada5fefe23b0c2e378fc9,2025-03-13T14:15:36.407000 -CVE-2025-29359,0,0,4d3acde8205fc1dd44fb77017e3ddc36b2cb96c5d8bde99316b429bfaf332777,2025-03-13T14:15:36.547000 -CVE-2025-29360,0,0,ad0ce0bbf2ff9e9dee79ff6740f69c8e45b712e72385d243e1915818bd90371c,2025-03-13T14:15:36.690000 -CVE-2025-29361,0,0,f97c17609d8a54efffc5b9bcc16280c90967185a224c58f5ff7992462beedff1,2025-03-13T14:15:36.833000 -CVE-2025-29362,0,0,b0002241c38b9fd8924fd439b714c8d0d42beed2858a22d42914af89b44f1918,2025-03-13T14:15:36.963000 -CVE-2025-29363,0,0,f9f2d4e1697cf40d141144744a1181470f54bcbb4a0aab81c85f777b9df3c614,2025-03-13T14:15:37.103000 -CVE-2025-29384,0,0,12f43c90d56195a4bb888abdf17411ace75cbd9f7305c6bd3093c8e6c3ec60e0,2025-03-17T19:51:31.257000 -CVE-2025-29385,0,0,7c5804feac3a56d1f04b0349046fa7e84961a186794660c332d30ee947dbb702,2025-03-17T19:51:23.683000 -CVE-2025-29386,0,0,e9771dae7728e837148f2c3a0c32f2da2bb94a36abd8bf3d55b0138e69896c47,2025-03-17T19:51:15.270000 +CVE-2025-29358,0,1,a8d36a5564152d109431aa78a5e6e1517012072c02c933f71eaf5428f38f12d6,2025-03-19T19:15:48.350000 +CVE-2025-29359,0,1,eb4d89bfed21500a3b4ef12a77f1e825f418222c50327ada53f234cba0318903,2025-03-19T19:15:48.480000 +CVE-2025-29360,0,1,f8a6ca0985ec602246e881c960a31e88cb08079943a56a3547ba5e000481fd9d,2025-03-19T19:15:48.610000 +CVE-2025-29361,0,1,27d915eca6bcd4ec80bce2ac92c2233e7dd1b12e52180146a2d7e1e3e4046e93,2025-03-19T19:15:48.743000 +CVE-2025-29362,0,1,e3894f326bdb09b22a6e588759df3b71ec9ffc1be51512bc5fd6d8a9e160071f,2025-03-19T19:15:48.877000 +CVE-2025-29363,0,1,4b6f1dc12e15aef8ff8acf8bc7a91924c61085ef72674a4c95823fc8b06052ef,2025-03-19T19:15:49.003000 +CVE-2025-29384,0,1,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec951,2025-03-19T19:15:49.133000 +CVE-2025-29385,0,1,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000 +CVE-2025-29386,0,1,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 CVE-2025-29401,0,0,5960fa825f3ca9babeed4b3834be7738456577242f6a1e28c67620bf622471fd,2025-03-19T16:15:31.827000 -CVE-2025-29405,1,1,fe87ba3559a626f9cb62a0383e381e92834e0d9af30d4f1789fb23bdf2157dae,2025-03-19T18:15:25.023000 -CVE-2025-29425,0,0,87a28f5f3cb0368100239b1107d69eb9b12e82b16435277aa5cd7892e9282f06,2025-03-17T19:15:26.957000 -CVE-2025-29426,0,0,09d1a99f7aa9d2e75e6a9d2554c03c552501c41d4bc427f23e7d0bcf8992812d,2025-03-17T21:15:14.190000 -CVE-2025-29427,0,0,987d8bd4a327fa972b2e877e9a8e6665199567b8b8331d056bc83c8812a05eeb,2025-03-17T19:15:27.067000 +CVE-2025-29405,0,1,2b1de6e84d9d8c71b0d66c8d66f707c8051e16cad3e287b6a763e4cd0c6ad79e,2025-03-19T19:15:49.567000 +CVE-2025-29425,0,1,093ec6e3d630ec63e64b9d502b6c3ce157d67185098d8bf640788edb6f541730,2025-03-19T19:15:49.697000 +CVE-2025-29426,0,1,ca5c399697b63e00d85ae3ac02bfa32554e49d24d7b16bfb13e68f3f5d9d962d,2025-03-19T19:15:49.830000 +CVE-2025-29427,0,1,4503f6be6491e147faa0bce916d074b949bff04ef067cf46ffc8e368d2ec7c2d,2025-03-19T19:15:49.970000 CVE-2025-29429,0,0,44860897b3803242e714435e6c68ab72f284208abcf5930a420f494f7998c0ee,2025-03-18T16:15:28.153000 -CVE-2025-29430,0,0,bffb766891a9958401673e5e52420902a2d5b7f853afc668408ab63da29a7d5b,2025-03-17T18:15:22.113000 -CVE-2025-29431,0,0,15372a748c46899c4000126cd17db1d84bd0c1697a7641eb5ef5e122561bcffc,2025-03-17T17:15:40.177000 +CVE-2025-29430,0,1,71188acfa3e7222e06af1f1824f6825f8d880dade7d69326728c4191a7b0e7df,2025-03-19T19:15:50.097000 +CVE-2025-29431,0,1,47151913b548259f917bcd0db2f1d8eea50b5b5b8a5e164ddf3215645de92dc2,2025-03-19T19:15:50.223000 CVE-2025-29768,0,0,2c8b2b435d3188ce40a9bc76756d1a1ddd7e3bfd7fd71f925a16c5ca51d2a16d,2025-03-13T17:15:37.623000 CVE-2025-29770,0,0,7243cba4272962301d271ce297e5daa4f021c70c7eb9ab8b7ce5dc08b83a9775,2025-03-19T16:15:31.977000 CVE-2025-29771,0,0,d7427448e24cf214e8acff3a77203a156e592f9550031370a20b568475a5e9cf,2025-03-14T19:15:48.847000 @@ -285652,17 +285660,17 @@ CVE-2025-29910,0,0,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e7 CVE-2025-29911,0,0,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000 CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000 -CVE-2025-29924,1,1,4962b82cdbaea32cb51e6414f50a71a40e0bb738db92eed1e6fb748975d3d79c,2025-03-19T18:15:25.147000 -CVE-2025-29925,1,1,dc31d8146bac212f7aebd2c1f59f34cd2b2b97fe431bfc42f08d00ba8a944143,2025-03-19T18:15:25.300000 -CVE-2025-29926,1,1,8edcd57d277a505ecc1c9860fe5fd2d32f5076eda269137302dad9127b412d53,2025-03-19T18:15:25.770000 +CVE-2025-29924,0,1,144c6a2660455b1f253f9aadb201339714009ce79d893f84962fb363a05053af,2025-03-19T20:15:19.873000 +CVE-2025-29925,0,1,44742be734caa9caef9b9aaba97eddda2c35d6797d9ecbe54f4e1154adb27dd3,2025-03-19T20:15:19.987000 +CVE-2025-29926,0,0,8edcd57d277a505ecc1c9860fe5fd2d32f5076eda269137302dad9127b412d53,2025-03-19T18:15:25.770000 CVE-2025-29930,0,0,043c0e785a0aabbc6bfcf85120363cc130dd1f21008fcd0b8d28454bb9969779,2025-03-18T19:15:51.340000 CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000 CVE-2025-29995,0,0,1eda4649249475136c84dfa6531f2cd362c980551d78393b70706d408af51d69,2025-03-13T12:15:13.830000 CVE-2025-29996,0,0,5a028c0824c2542a10ce116c608912fe4301f96b5ba2d38f7cdf305f3c1269bc,2025-03-13T12:15:13.980000 CVE-2025-29997,0,0,c91a3ed6edd1bd6100eee0c75a281e2a7672ecbd486c58c8341dc417d8ca6a68,2025-03-13T12:15:14.127000 CVE-2025-29998,0,0,f3a82be3b9ce90965eef31dd3d04a06fbca5fc5f31b02ac26305664f3f7de5cb,2025-03-13T12:15:14.277000 -CVE-2025-30022,0,0,2bbf4fa055fd725723d405bb131a4cfd34b9f8909da4fc3e54c5f19c6cbb00ed,2025-03-14T03:15:45.257000 -CVE-2025-30066,0,0,78630075a1877126cba2bacd11288a8c7e25a9d9bcc408e5a6b55555ffd37d76,2025-03-19T01:00:02.197000 +CVE-2025-30022,0,1,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000 +CVE-2025-30066,0,1,d0ec5ca188a502c071dba03c99037aa67fe44fc39e82dcbaaf37ad881d781f8b,2025-03-19T20:26:04.510000 CVE-2025-30074,0,0,5d0dfb842ba5d24afb134fe0eb5f7e2e10f0c5619590d2c6aaa9483b4a17999a,2025-03-16T03:15:39.117000 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 @@ -285691,8 +285699,9 @@ CVE-2025-30144,0,0,eadbdc190742f7a93e3538055970f46f2818fd65dee99f9e0a20462306980 CVE-2025-30152,0,0,5a7eab66783fd2d319bafd0f1c673478aad943e2df1f75b7abb21544f6f08103,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,484948c7f744290e7a02287419922c094482e0689385c16ab8c140184f1e1282,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f6cc7091f847e815931af88c72ad16add8c0de970642a951328dd4efe9bf626d,2025-03-19T16:15:33.780000 -CVE-2025-30196,0,0,35cab9530f934af68cffc848dae1913bd5d7693605d8e26ccc1c1dc7ddfdad7a,2025-03-19T16:15:33.950000 +CVE-2025-30196,0,1,537f7952f6d3af6aefbbf4efaf23170a83a6fde6ef7f3e4f5c50b3449896a436,2025-03-19T19:15:50.980000 CVE-2025-30197,0,0,a82f323b63a4db12d5fa6c176bc294c5b0c209c57d5589e96e23573743d6643e,2025-03-19T16:15:34.060000 CVE-2025-30234,0,0,2b5c58b261698db3654a8d87fafd123300be7c95ea66a06456456707d9ebfedd,2025-03-19T05:15:41.353000 CVE-2025-30235,0,0,67c8acffd5b66a75e16bf136f5ec71938e7a203b09767896d1c5918e4b7c4166,2025-03-19T06:15:16.043000 CVE-2025-30236,0,0,f7e2d88c169654d0773448256afe181965f2a68264511db7f8bbd914eb958bf0,2025-03-19T07:15:34.313000 +CVE-2025-30258,1,1,b2050ad0522ca8186c25aaf6c75c9bc41a04ea2774b98c396ece174b26ef1552,2025-03-19T20:15:20.140000