From 64df5a0a1852722b1f05a03323f3db4ab4c047b0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 14 Feb 2025 19:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-02-14T19:00:20.699668+00:00 --- CVE-2020/CVE-2020-205xx/CVE-2020-20522.json | 32 +- CVE-2020/CVE-2020-209xx/CVE-2020-20915.json | 32 +- CVE-2020/CVE-2020-232xx/CVE-2020-23260.json | 32 +- CVE-2020/CVE-2020-233xx/CVE-2020-23327.json | 32 +- CVE-2020/CVE-2020-293xx/CVE-2020-29312.json | 32 +- CVE-2021/CVE-2021-282xx/CVE-2021-28235.json | 32 +- CVE-2021/CVE-2021-317xx/CVE-2021-31707.json | 32 +- CVE-2021/CVE-2021-32xx/CVE-2021-3267.json | 32 +- CVE-2021/CVE-2021-393xx/CVE-2021-39350.json | 24 +- CVE-2022/CVE-2022-482xx/CVE-2022-48223.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48224.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48225.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48228.json | 32 +- CVE-2023/CVE-2023-08xx/CVE-2023-0820.json | 34 +- CVE-2023/CVE-2023-11xx/CVE-2023-1124.json | 32 +- CVE-2023/CVE-2023-13xx/CVE-2023-1330.json | 34 +- CVE-2023/CVE-2023-270xx/CVE-2023-27089.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27091.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27734.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27759.json | 32 +- CVE-2023/CVE-2023-343xx/CVE-2023-34397.json | 43 +- CVE-2023/CVE-2023-343xx/CVE-2023-34398.json | 43 +- CVE-2023/CVE-2023-343xx/CVE-2023-34399.json | 43 +- CVE-2023/CVE-2023-344xx/CVE-2023-34400.json | 43 +- CVE-2023/CVE-2023-344xx/CVE-2023-34402.json | 39 +- CVE-2023/CVE-2023-476xx/CVE-2023-47634.json | 100 ++++- CVE-2023/CVE-2023-499xx/CVE-2023-49930.json | 90 ++++- CVE-2023/CVE-2023-506xx/CVE-2023-50658.json | 79 +++- CVE-2024/CVE-2024-134xx/CVE-2024-13493.json | 27 +- CVE-2024/CVE-2024-14xx/CVE-2024-1470.json | 61 ++- CVE-2024/CVE-2024-17xx/CVE-2024-1722.json | 71 +++- CVE-2024/CVE-2024-18xx/CVE-2024-1898.json | 69 +++- CVE-2024/CVE-2024-208xx/CVE-2024-20829.json | 63 ++- CVE-2024/CVE-2024-208xx/CVE-2024-20840.json | 109 ++++- CVE-2024/CVE-2024-208xx/CVE-2024-20841.json | 64 ++- CVE-2024/CVE-2024-217xx/CVE-2024-21724.json | 82 +++- CVE-2024/CVE-2024-21xx/CVE-2024-2127.json | 74 +++- CVE-2024/CVE-2024-25xx/CVE-2024-2517.json | 71 +++- CVE-2024/CVE-2024-261xx/CVE-2024-26131.json | 95 ++++- CVE-2024/CVE-2024-261xx/CVE-2024-26132.json | 85 +++- CVE-2024/CVE-2024-264xx/CVE-2024-26462.json | 189 ++++++++- CVE-2024/CVE-2024-32xx/CVE-2024-3220.json | 78 ++++ CVE-2024/CVE-2024-376xx/CVE-2024-37602.json | 14 +- CVE-2024/CVE-2024-469xx/CVE-2024-46922.json | 45 ++- CVE-2024/CVE-2024-469xx/CVE-2024-46923.json | 45 ++- CVE-2024/CVE-2024-511xx/CVE-2024-51122.json | 45 ++- CVE-2024/CVE-2024-511xx/CVE-2024-51123.json | 45 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51440.json | 45 ++- CVE-2024/CVE-2024-525xx/CVE-2024-52577.json | 8 +- CVE-2024/CVE-2024-561xx/CVE-2024-56180.json | 8 +- CVE-2024/CVE-2024-564xx/CVE-2024-56463.json | 56 +++ CVE-2024/CVE-2024-569xx/CVE-2024-56940.json | 45 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57000.json | 50 +-- CVE-2024/CVE-2024-576xx/CVE-2024-57601.json | 45 ++- CVE-2024/CVE-2024-576xx/CVE-2024-57604.json | 45 ++- CVE-2024/CVE-2024-576xx/CVE-2024-57605.json | 45 ++- CVE-2024/CVE-2024-577xx/CVE-2024-57790.json | 21 + CVE-2024/CVE-2024-70xx/CVE-2024-7052.json | 27 +- CVE-2024/CVE-2024-88xx/CVE-2024-8893.json | 56 +++ CVE-2025/CVE-2025-05xx/CVE-2025-0503.json | 56 +++ CVE-2025/CVE-2025-213xx/CVE-2025-21377.json | 159 +++++++- CVE-2025/CVE-2025-213xx/CVE-2025-21379.json | 56 ++- CVE-2025/CVE-2025-213xx/CVE-2025-21397.json | 53 ++- CVE-2025/CVE-2025-214xx/CVE-2025-21400.json | 54 ++- CVE-2025/CVE-2025-214xx/CVE-2025-21406.json | 159 +++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21407.json | 159 +++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21410.json | 93 ++++- CVE-2025/CVE-2025-214xx/CVE-2025-21414.json | 146 ++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21419.json | 149 ++++++- CVE-2025/CVE-2025-214xx/CVE-2025-21420.json | 144 ++++++- CVE-2025/CVE-2025-240xx/CVE-2025-24036.json | 44 +- CVE-2025/CVE-2025-252xx/CVE-2025-25204.json | 64 +++ CVE-2025/CVE-2025-252xx/CVE-2025-25206.json | 60 +++ CVE-2025/CVE-2025-252xx/CVE-2025-25295.json | 86 ++++ CVE-2025/CVE-2025-253xx/CVE-2025-25357.json | 49 ++- CVE-2025/CVE-2025-253xx/CVE-2025-25387.json | 47 ++- CVE-2025/CVE-2025-253xx/CVE-2025-25389.json | 43 +- CVE-2025/CVE-2025-258xx/CVE-2025-25898.json | 45 ++- CVE-2025/CVE-2025-259xx/CVE-2025-25988.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25990.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25991.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25992.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25993.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25994.json | 21 + CVE-2025/CVE-2025-259xx/CVE-2025-25997.json | 21 + CVE-2025/CVE-2025-261xx/CVE-2025-26156.json | 21 + CVE-2025/CVE-2025-261xx/CVE-2025-26157.json | 21 + CVE-2025/CVE-2025-261xx/CVE-2025-26158.json | 21 + CVE-2025/CVE-2025-265xx/CVE-2025-26506.json | 78 ++++ CVE-2025/CVE-2025-265xx/CVE-2025-26507.json | 78 ++++ CVE-2025/CVE-2025-265xx/CVE-2025-26508.json | 78 ++++ CVE-2025/CVE-2025-265xx/CVE-2025-26519.json | 10 +- README.md | 88 ++-- _state.csv | 419 ++++++++++---------- 94 files changed, 5026 insertions(+), 500 deletions(-) create mode 100644 CVE-2024/CVE-2024-32xx/CVE-2024-3220.json create mode 100644 CVE-2024/CVE-2024-564xx/CVE-2024-56463.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57790.json create mode 100644 CVE-2024/CVE-2024-88xx/CVE-2024-8893.json create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0503.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25204.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25206.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25295.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25988.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25990.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25991.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25992.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25993.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25994.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25997.json create mode 100644 CVE-2025/CVE-2025-261xx/CVE-2025-26156.json create mode 100644 CVE-2025/CVE-2025-261xx/CVE-2025-26157.json create mode 100644 CVE-2025/CVE-2025-261xx/CVE-2025-26158.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26506.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26507.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26508.json diff --git a/CVE-2020/CVE-2020-205xx/CVE-2020-20522.json b/CVE-2020/CVE-2020-205xx/CVE-2020-20522.json index 5f5a705837a..54cb4f34013 100644 --- a/CVE-2020/CVE-2020-205xx/CVE-2020-20522.json +++ b/CVE-2020/CVE-2020-205xx/CVE-2020-20522.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20522", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.967", - "lastModified": "2024-11-21T05:12:07.843", + "lastModified": "2025-02-14T17:15:09.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-209xx/CVE-2020-20915.json b/CVE-2020/CVE-2020-209xx/CVE-2020-20915.json index 27a7fde328c..25db458c1b3 100644 --- a/CVE-2020/CVE-2020-209xx/CVE-2020-20915.json +++ b/CVE-2020/CVE-2020-209xx/CVE-2020-20915.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20915", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.077", - "lastModified": "2024-11-21T05:12:18.663", + "lastModified": "2025-02-14T17:15:11.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json b/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json index 833f49f9fb6..4c304505515 100644 --- a/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json +++ b/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23260", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.373", - "lastModified": "2024-11-21T05:13:41.360", + "lastModified": "2025-02-14T18:15:18.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json b/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json index c7c03d83ab0..b4ec81cdf44 100644 --- a/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json +++ b/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23327", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.413", - "lastModified": "2024-11-21T05:13:45.137", + "lastModified": "2025-02-14T18:15:19.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json b/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json index 1a917086e03..e92858b2c49 100644 --- a/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json +++ b/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29312", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.457", - "lastModified": "2024-11-21T05:23:53.797", + "lastModified": "2025-02-14T18:15:19.360", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json b/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json index 8d67f2a442b..e85087fe802 100644 --- a/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json +++ b/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28235", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.507", - "lastModified": "2024-11-21T05:59:22.957", + "lastModified": "2025-02-14T18:15:19.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json index ee7d78cf3fa..c8656a8d687 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31707", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.547", - "lastModified": "2024-11-21T06:06:08.610", + "lastModified": "2025-02-14T18:15:19.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json b/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json index 70bd5a27392..52f31511521 100644 --- a/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json +++ b/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3267", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.587", - "lastModified": "2024-11-21T06:21:11.180", + "lastModified": "2025-02-14T18:15:21.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json b/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json index 38b2165556d..dd53db3ee56 100644 --- a/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json +++ b/CVE-2021/CVE-2021-393xx/CVE-2021-39350.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39350", "sourceIdentifier": "security@wordfence.com", "published": "2021-10-06T16:15:07.427", - "lastModified": "2024-11-21T06:19:22.673", + "lastModified": "2025-02-14T18:15:21.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -67,7 +87,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json index bc1503f4f80..f95d88df56c 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48223", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.187", - "lastModified": "2024-11-21T07:32:59.567", + "lastModified": "2025-02-14T18:15:22.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json index 66376e06b3b..6a5a30e8055 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48224", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.230", - "lastModified": "2024-11-21T07:32:59.707", + "lastModified": "2025-02-14T18:15:22.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json index 19e1ce94fff..5570e657d6f 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48225", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.757", - "lastModified": "2024-11-21T07:32:59.857", + "lastModified": "2025-02-14T18:15:22.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48228.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48228.json index 2a2d460aa20..71fa5ca396b 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48228.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48228.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48228", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.830", - "lastModified": "2024-11-21T07:33:00.293", + "lastModified": "2025-02-14T17:15:12.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json index eb0da3e9e6b..fc8caf659e8 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0820.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0820", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-03T15:15:18.920", - "lastModified": "2024-11-21T07:37:54.033", + "lastModified": "2025-02-14T17:15:13.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1124.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1124.json index a5a9158194e..a22a82a6fdf 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1124.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1124.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1124", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-03T15:15:18.970", - "lastModified": "2024-11-21T07:38:30.237", + "lastModified": "2025-02-14T17:15:13.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json index 9df18a15e05..a8431ecc875 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1330.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1330", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-03T15:15:19.023", - "lastModified": "2024-11-21T07:38:58.333", + "lastModified": "2025-02-14T17:15:13.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27089.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27089.json index f3c09fa96ea..9daf849a7c9 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27089.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27089.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27089", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T18:15:07.000", - "lastModified": "2024-11-21T07:52:18.070", + "lastModified": "2025-02-14T17:15:13.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.3 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.3 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json index 716d5f0868a..7324c5570e4 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27091", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T18:15:07.043", - "lastModified": "2024-11-21T07:52:18.373", + "lastModified": "2025-02-14T18:15:23.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27734.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27734.json index 5e9838892cd..981b6d0ad55 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27734.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27734.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27734", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.223", - "lastModified": "2024-11-21T07:53:24.310", + "lastModified": "2025-02-14T17:15:14.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27759.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27759.json index b6ac077e17d..3d23a90c92a 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27759.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27759.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27759", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.260", - "lastModified": "2024-11-21T07:53:26.090", + "lastModified": "2025-02-14T17:15:14.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-426" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json index 64388a5b8ab..fcadcb10c1e 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json @@ -2,16 +2,55 @@ "id": "CVE-2023-34397", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.470", - "lastModified": "2025-02-13T22:15:10.470", + "lastModified": "2025-02-14T17:15:14.477", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mercedes Benz head-unit NTG 6 contains functions to import or export profile settings over USB. During parsing you can trigger that the service will be crashed." + }, + { + "lang": "es", + "value": "La unidad principal Mercedes Benz NTG 6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Durante el an\u00e1lisis, puede provocar que el servicio se bloquee." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json index d1bf827c86a..08e975aa033 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json @@ -2,16 +2,55 @@ "id": "CVE-2023-34398", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.603", - "lastModified": "2025-02-13T22:15:10.603", + "lastModified": "2025-02-14T17:15:14.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Some values of this table are serialized archive according boost library. The boost library contains a vulnerability/null pointer dereference." + }, + { + "lang": "es", + "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Algunos valores de esta tabla son archivos serializados seg\u00fan la librer\u00eda Boost. La librer\u00eda Boost contiene una vulnerabilidad/desreferencia de puntero nulo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json index 6131d605ef3..1d8be01b2a1 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json @@ -2,16 +2,55 @@ "id": "CVE-2023-34399", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.730", - "lastModified": "2025-02-13T22:15:10.730", + "lastModified": "2025-02-14T17:15:14.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Some values of this table are serialized archive according boost library. The version of boost library contains vulnerability integer overflow." + }, + { + "lang": "es", + "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Algunos valores de esta tabla se archivan en serie seg\u00fan la librer\u00eda Boost. La versi\u00f3n de la librer\u00eda Boost contiene una vulnerabilidad de desbordamiento de enteros." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json index f68ac8f47f4..21656ded1ee 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json @@ -2,16 +2,55 @@ "id": "CVE-2023-34400", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.847", - "lastModified": "2025-02-13T22:15:10.847", + "lastModified": "2025-02-14T17:15:14.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. In case of parsing file, service try to define header inside the file and convert it to null-terminated string. If character is missed, will return null pointer." + }, + { + "lang": "es", + "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. En caso de analizar un archivo, el servicio intenta definir el encabezado dentro del archivo y lo convierte en una cadena con terminaci\u00f3n nula. Si falta alg\u00fan car\u00e1cter, devolver\u00e1 un puntero nulo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json index ca41cf9d413..2d3b3aaa3d2 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34402", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T23:15:09.337", - "lastModified": "2025-02-13T23:15:09.337", + "lastModified": "2025-02-14T17:15:15.087", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json index 805f112d3e2..729434f0017 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47634", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-29T01:41:28.370", - "lastModified": "2024-11-21T08:30:34.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:29:55.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 } ] }, @@ -49,40 +69,100 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*", + "versionStartIncluding": "0.10.0", + "versionEndExcluding": "0.26.9", + "matchCriteriaId": "C8A5D343-1E37-498D-B248-667017D2600D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*", + "versionStartIncluding": "0.27.0", + "versionEndExcluding": "0.27.5", + "matchCriteriaId": "38FDE900-4C89-45E3-821E-BF6F2A69C587" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/decidim/decidim/releases/tag/v0.26.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/releases/tag/v0.27.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/releases/tag/v0.28.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/security/advisories/GHSA-r275-j57c-7mf2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/decidim/decidim/releases/tag/v0.26.9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/releases/tag/v0.27.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/releases/tag/v0.28.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/decidim/decidim/security/advisories/GHSA-r275-j57c-7mf2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json index b5496cee855..bfac3e23b67 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49930", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:40.070", - "lastModified": "2024-11-21T08:34:01.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:22:40.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,103 @@ "value": "Se descubri\u00f3 un problema en Couchbase Server antes de la versi\u00f3n 7.2.4. Las llamadas cURL a /diag/eval no est\u00e1n suficientemente restringidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.5", + "versionEndExcluding": "7.2.4", + "matchCriteriaId": "E41023F0-1568-478D-B3F2-1360493BDF52" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://forums.couchbase.com/tags/security", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.couchbase.com/alerts/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://forums.couchbase.com/tags/security", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.couchbase.com/alerts/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json index efccb423890..2d828ecfd38 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50658", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:42:01.123", - "lastModified": "2024-11-21T08:37:07.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:23:19.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,88 @@ "value": "El componente jose2go anterior a 1.6.0 para Go permite a los atacantes provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un valor grande de p2c (tambi\u00e9n conocido como PBES2 Count)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dvsekhvalnov:jose2go:*:*:*:*:*:go:*:*", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "D9A0EDCB-6B6C-4778-B480-9234DC9CDDB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dvsekhvalnov/jose2go/compare/v1.5.0...v1.6.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dvsekhvalnov/jose2go/compare/v1.5.0...v1.6.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json index 6b8057c379d..2fa8da2a883 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13493", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-14T06:15:19.740", - "lastModified": "2025-02-14T06:15:19.740", + "lastModified": "2025-02-14T17:15:15.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Sensly Online Presence WordPress plugin through 0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/dfbdd474-92e5-422b-a185-e441a6014557/", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1470.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1470.json index 07d2553348e..0b1074b6519 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1470.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1470", "sourceIdentifier": "security@opentext.com", "published": "2024-02-29T01:43:51.340", - "lastModified": "2024-11-21T08:50:39.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:24:17.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netiq:client_login_extension:4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "AA557833-E2CA-4A2F-8BE7-6DDECFB75E78" + } + ] + } + ] } ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000026667?language=en_US", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://portal.microfocus.com/s/article/KM000026667?language=en_US", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1722.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1722.json index 85498a2dcdf..292d9d42194 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1722.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1722.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1722", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-29T01:43:54.010", - "lastModified": "2024-11-21T08:51:09.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:24:40.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-645" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:keycloak:23.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C704B9AC-0A6C-4EF1-AA3E-48A2295E9B14" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-1722", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265389", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1722", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1898.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1898.json index bf3e4bb42e7..04df749b78c 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1898.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1898", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-05T22:15:47.020", - "lastModified": "2024-11-21T08:51:33.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:27:43.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "El control de acceso inadecuado en la funci\u00f3n de notificaci\u00f3n en Devolutions Server 2023.3.14.0 y versiones anteriores permite que un usuario con pocos privilegios cambie la configuraci\u00f3n de notificaciones configurada por un administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.0", + "matchCriteriaId": "0144432E-807A-489D-BD21-7EF4E5AF163F" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20829.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20829.json index 4039128b94b..fb8172d2258 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20829.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20829", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-03-05T05:15:08.703", - "lastModified": "2024-11-21T08:53:14.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:27:10.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,72 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:internet:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BBA3BAB-572B-4A0E-9678-C727BFEA040F" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20840.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20840.json index 90ff8199130..19303233509 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20840.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20840", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-03-05T05:15:12.363", - "lastModified": "2024-11-21T08:53:15.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:27:27.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,118 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:voice_recorder:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.5.16.01", + "matchCriteriaId": "E0E061AA-A319-428F-A9B7-8D492BC35968" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:voice_recorder:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.4.51.02", + "matchCriteriaId": "702AF91C-B029-406C-B4B3-2B9649D293BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20841.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20841.json index 0e879ed1bd8..62c75397987 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20841.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20841.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20841", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-03-05T05:15:12.717", - "lastModified": "2024-11-21T08:53:15.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:27:35.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,73 @@ }, "exploitabilityScore": 2.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:account:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.8.00.3", + "matchCriteriaId": "D3C0E7F2-1223-4F14-96EE-2494022A1D76" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json index 1f3cd6a5c52..485e55771af 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21724", "sourceIdentifier": "security@joomla.org", "published": "2024-02-29T01:44:03.773", - "lastModified": "2024-11-21T08:54:52.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:24:52.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "La validaci\u00f3n de entrada inadecuada para los campos de selecci\u00f3n de medios genera vulnerabilidades XSS en varias extensiones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", @@ -26,16 +49,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.0", + "versionEndExcluding": "3.10.15", + "matchCriteriaId": "7FE0CA04-2613-48B3-8CB3-E114E549F81D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.4.3", + "matchCriteriaId": "4CE95A6B-EFBA-4A53-839A-E13864511CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.3", + "matchCriteriaId": "448756BA-E10C-4587-A54B-AD8B81EEF150" + } + ] + } + ] } ], "references": [ { "url": "https://developer.joomla.org/security-centre/927-20240203-core-xss-in-media-selection-fields.html", - "source": "security@joomla.org" + "source": "security@joomla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://developer.joomla.org/security-centre/927-20240203-core-xss-in-media-selection-fields.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2127.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2127.json index e5f785ca4e7..f2b97421345 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2127.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2127.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2127", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T20:15:50.913", - "lastModified": "2024-11-21T09:09:05.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:28:36.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.4", + "matchCriteriaId": "EAA02C4F-7135-406C-8B21-6DDDAF3AB1C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045444%40pagelayer&new=3045444%40pagelayer&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98bff131-dee2-4549-9167-69dc3f8d6b9d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045444%40pagelayer&new=3045444%40pagelayer&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98bff131-dee2-4549-9167-69dc3f8d6b9d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2517.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2517.json index 61122dae03d..8a3296e1cfa 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2517.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2517", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-16T12:15:15.630", - "lastModified": "2024-11-21T09:09:55.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:00:42.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256954", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256954", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26131.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26131.json index 611b92aa949..0bcaf345d05 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26131.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26131", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-29T01:44:17.740", - "lastModified": "2024-11-21T09:01:59.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:25:08.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,40 +73,95 @@ "value": "CWE-940" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:element:element:*:*:*:*:*:android:*:*", + "versionStartIncluding": "1.4.3", + "versionEndExcluding": "1.6.12", + "matchCriteriaId": "AD8D6757-CCAD-4C76-B321-68892E7CE2A2" + } + ] + } + ] } ], "references": [ { "url": "https://element.io/blog/security-release-element-android-1-6-12", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://support.google.com/faqs/answer/9267555?hl=en", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://element.io/blog/security-release-element-android-1-6-12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://support.google.com/faqs/answer/9267555?hl=en", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26132.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26132.json index 7fa5b2e70a1..d58105c2f04 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26132.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26132", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-29T01:44:17.917", - "lastModified": "2024-11-21T09:02:00.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:25:32.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,32 +69,81 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:element:element:*:*:*:*:*:android:*:*", + "versionStartIncluding": "0.91.0", + "versionEndExcluding": "1.6.12", + "matchCriteriaId": "9117F4CD-15B9-43F8-B15C-465C20F0C849" + } + ] + } + ] } ], "references": [ { "url": "https://element.io/blog/security-release-element-android-1-6-12", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/element-hq/element-android/commit/8f9695a9a8d944cb9b92568cbd76578c51d32e07", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/element-hq/element-android/security/advisories/GHSA-8wj9-cx7h-pvm4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://element.io/blog/security-release-element-android-1-6-12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://github.com/element-hq/element-android/commit/8f9695a9a8d944cb9b92568cbd76578c51d32e07", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/element-hq/element-android/security/advisories/GHSA-8wj9-cx7h-pvm4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26462.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26462.json index a625854fd0b..32de2d26b20 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26462.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26462", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:18.857", - "lastModified": "2024-11-21T09:02:27.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-14T17:29:03.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,198 @@ "value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/kdc/ndr.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F95920FF-DDA8-4D74-9CFE-81FCD071031D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*", + "matchCriteriaId": "280AA828-6FA9-4260-8EC1-019423B966E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0012/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0012/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json new file mode 100644 index 00000000000..1565fb471c9 --- /dev/null +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-3220", + "sourceIdentifier": "cna@python.org", + "published": "2025-02-14T17:15:15.567", + "lastModified": "2025-02-14T17:15:15.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cna@python.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/CDXW34ND2LSAOYAR5N6UNONP4ZBX4D6R/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json index 7c224fc4f48..49e998f68b7 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37602", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T23:15:10.197", - "lastModified": "2025-02-13T23:15:10.197", + "lastModified": "2025-02-14T17:15:15.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json index d2dfb71a60d..8658a33d6f3 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46922", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.230", - "lastModified": "2025-02-12T22:15:39.230", - "vulnStatus": "Received", + "lastModified": "2025-02-14T18:15:23.333", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La ausencia de una verificaci\u00f3n nula conduce a una denegaci\u00f3n de servicio en amdgpu_cs_parser_bos en Xclipse Driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json index 92497b37d7d..fe37535b827 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46923", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.347", - "lastModified": "2025-02-12T22:15:39.347", - "vulnStatus": "Received", + "lastModified": "2025-02-14T18:15:23.530", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 2200, 1480 y 2400. La ausencia de una verificaci\u00f3n nula genera una denegaci\u00f3n de servicio en amdgpu_cs_ib_fill en Xclipse Driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json index 885c47aae0a..18784870297 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51122", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.603", - "lastModified": "2025-02-12T22:15:39.603", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:15.717", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 alllows a remote attacker to execute arbitrary code via the ST, L, O, OU, CN parameters." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ST, L, O, OU, CN." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51122", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json index 11302473209..6cd83e5b59b 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51123", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.717", - "lastModified": "2025-02-12T22:15:39.717", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:15.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 allows a remote attacker to obtain sensitive information via the /compose-pdf.xhtml?convid=[id] component." + }, + { + "lang": "es", + "value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json index 1ecab3fa625..24f48d81046 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51440", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.990", - "lastModified": "2025-02-12T22:15:39.990", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:16.040", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Nothing Tech Nothing OS v.2.6 allows a local attacker to escalate privileges via the NtBpfService component." + }, + { + "lang": "es", + "value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://sharedobject.blog/posts/nothing-bpf/", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json index 6878bb39f7a..eae22835748 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52577", "sourceIdentifier": "security@apache.org", "published": "2025-02-14T10:15:09.557", - "lastModified": "2025-02-14T10:15:09.557", + "lastModified": "2025-02-14T17:15:16.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +73,10 @@ { "url": "https://lists.apache.org/thread/1bst0n27m9kb3b6f6hvlghn182vqb2hh", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/14/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json index eb34d556c9c..e98f5ce5c06 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56180", "sourceIdentifier": "security@apache.org", "published": "2025-02-14T14:15:32.267", - "lastModified": "2025-02-14T14:15:32.267", + "lastModified": "2025-02-14T17:15:16.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,6 +28,10 @@ { "url": "https://lists.apache.org/thread/k9fw0t5r7t1vbx53gs8d1r8c54rhx0wd", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/14/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json new file mode 100644 index 00000000000..70189d30a34 --- /dev/null +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56463", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-14T17:15:16.420", + "lastModified": "2025-02-14T17:15:16.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183251", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json index c4518fbc955..eddef4efd70 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56940", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.643", - "lastModified": "2025-02-12T22:15:40.643", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:16.590", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the profile image upload function of LearnDash v6.7.1 allows attackers to cause a Denial of Service (DoS) via excessive file uploads." + }, + { + "lang": "es", + "value": "Un problema en la funci\u00f3n de carga de im\u00e1genes de perfil de LearnDash v6.7.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante cargas excesivas de archivos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json index 462cba74bef..3f359a924e2 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json @@ -2,55 +2,15 @@ "id": "CVE-2024-57000", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.337", - "lastModified": "2025-02-12T16:15:42.317", - "vulnStatus": "Received", + "lastModified": "2025-02-14T18:15:23.743", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-48022. Reason: This candidate is a duplicate of CVE-2023-48022. Notes: All CVE users should reference CVE-2023-48022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], - "references": [ - { - "url": "https://github.com/honysyang/Ray.git", - "source": "cve@mitre.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json index 6f12a58fc11..021019f5a97 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57601", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.747", - "lastModified": "2025-02-12T22:15:40.747", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:16.787", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to execute arbitrary code via the legal_settings parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en Alex Tselegidis EasyAppointments v.1.5.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro legal_settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://hkohi.ca/vulnerability/13", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json index dc6f7c2a33b..705f427b4e0 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57604", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:41.100", - "lastModified": "2025-02-12T22:15:41.100", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:17.003", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the token component." + }, + { + "lang": "es", + "value": "Un problema en MaysWind ezBookkeeping 0.7.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente token." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/mayswind/ezbookkeeping/issues/33", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json index e392d0e7116..a2b15e49aca 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57605", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:41.210", - "lastModified": "2025-02-12T22:15:41.210", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:17.230", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Daylight Studio Fuel CMS v.1.5.2 allows an attacker to escalate privileges via the /fuel/blocks/ and /fuel/pages components." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en Daylight Studio Fuel CMS v.1.5.2 permite a un atacante escalar privilegios a trav\u00e9s de los componentes /fuel/blocks/ y /fuel/pages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://hkohi.ca/vulnerability/3", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json new file mode 100644 index 00000000000..ecd2c33c9f0 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57790", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:18.343", + "lastModified": "2025-02-14T17:15:18.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IXON B.V. IXrouter IX2400 (Industrial Edge Gateway) v3.0 was discovered to contain hardcoded root credentials stored in the non-volatile flash memory. This vulnerability allows physically proximate attackers to gain root access via UART or SSH." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rick-cen/vulnerability-research/tree/main/CVE-2024-57790", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json index a4dde6613f6..007dfd59c04 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7052", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-14T06:15:20.350", - "lastModified": "2025-02-14T06:15:20.350", + "lastModified": "2025-02-14T17:15:18.480", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Forminator Forms WordPress plugin before 1.38.3 does not sanitise and escape some of its settings, which could allow high privilege users such as Admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4e52cab5-821c-4ca8-9024-67f716cf78fe/", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json new file mode 100644 index 00000000000..e4b4ee5b8fd --- /dev/null +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8893", + "sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "published": "2025-02-14T17:15:18.690", + "lastModified": "2025-02-14T17:15:18.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of Hard-coded Credentials vulnerability in GoodWe Technologies Co., Ltd. GW1500\u2011XS allows anyone in physical proximity to the device to fully access the web interface of the inverter via Wi\u2011Fi.This issue affects GW1500\u2011XS: 1.1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://os-s.net/publications/advisories/CVE-2024-8893.pdf", + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json new file mode 100644 index 00000000000..b4d65c86491 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0503", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2025-02-14T18:15:23.870", + "lastModified": "2025-02-14T18:15:23.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost versions 9.11.x <= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs if someone had manually marked DMs as deleted in the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21377.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21377.json index afd07c54c1c..2faa563c111 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21377.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21377.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21377", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:36.387", - "lastModified": "2025-02-11T18:15:36.387", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:40:52.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NTLM Hash Disclosure Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en la divulgaci\u00f3n de hash NTLM" } ], "metrics": { @@ -38,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.0.22631.4890", + "matchCriteriaId": "9FF62164-3C0C-4E7D-A8E3-F4095EBD35FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21379.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21379.json index 65e389b688a..23a04fc1755 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21379.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21379.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21379", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:36.590", - "lastModified": "2025-02-11T18:15:36.590", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:39:51.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DHCP Client Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de cliente DHCP" } ], "metrics": { @@ -38,19 +42,63 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "A03B8A6C-7F7D-4134-B222-7AFF82ED1B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "9FAAE0D6-5155-40CB-861D-E6D1EEF8122D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21379", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21397.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21397.json index 145254aecb5..8b211dd13ae 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21397.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21397.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21397", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:38.293", - "lastModified": "2025-02-11T18:15:38.293", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:38:29.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office" } ], "metrics": { @@ -38,19 +42,60 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*", + "matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:*:*", + "matchCriteriaId": "6ECEAB03-35FD-4E92-9F4F-5079580FE853" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21397", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21400.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21400.json index 5eb91b14e22..0d89f2a917b 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21400.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21400.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21400", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:38.483", - "lastModified": "2025-02-11T18:15:38.483", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:37:31.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft SharePoint Server" } ], "metrics": { @@ -38,19 +42,61 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionEndExcluding": "16.0.17928.20396", + "matchCriteriaId": "71150396-07B2-4D48-A1E9-3EA5E5168B15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21400", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21406.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21406.json index 4b2727968dd..41740a10095 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21406.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21406.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21406", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:38.907", - "lastModified": "2025-02-11T18:15:38.907", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:37:19.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de telefon\u00eda de Windows" } ], "metrics": { @@ -38,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21406", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21407.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21407.json index 5b938ef1cef..d35f345051f 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21407.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21407.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21407", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:39.157", - "lastModified": "2025-02-11T18:15:39.157", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:36:43.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de telefon\u00eda de Windows" } ], "metrics": { @@ -38,19 +42,166 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21407", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21410.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21410.json index e7c012fae6d..5accebd1e15 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21410.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21410.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21410", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:39.593", - "lastModified": "2025-02-11T18:15:39.593", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:35:15.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { @@ -38,19 +42,100 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21410", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21414.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21414.json index 2264d7e34b4..53c08a1cd65 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21414.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21414.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21414", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:39.787", - "lastModified": "2025-02-11T18:15:39.787", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:33:40.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Core Messaging Elevation of Privileges Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Core Messaging" } ], "metrics": { @@ -38,19 +42,153 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "073C5577-43D4-43BA-9E6F-7E28109C5709" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "49F1BB9C-CE46-45D4-AC89-37A84B5FA25A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "4E992952-39E4-4CD5-A811-6E95ED5776FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21414", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21419.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21419.json index f424e707aa5..243a836b05a 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21419.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21419.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21419", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.227", - "lastModified": "2025-02-11T18:15:40.227", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:32:53.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Setup Files Cleanup Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Limpieza de archivos de instalaci\u00f3n de Windows Vulnerabilidad de elevaci\u00f3n de privilegios" } ], "metrics": { @@ -38,19 +42,156 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21419", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21420.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21420.json index 2283768dd8f..5aaed19cae1 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21420.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21420.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21420", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.427", - "lastModified": "2025-02-11T18:15:40.427", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:36:09.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Disk Cleanup Tool Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la herramienta Liberador de espacio en disco de Windows" } ], "metrics": { @@ -38,19 +42,151 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.0.22631.4890", + "matchCriteriaId": "9FF62164-3C0C-4E7D-A8E3-F4095EBD35FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21420", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24036.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24036.json index 79ada144ba6..583882efc3d 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24036.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24036.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24036", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.643", - "lastModified": "2025-02-11T18:15:40.643", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:31:47.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft AutoUpdate (MAU)" } ], "metrics": { @@ -38,19 +42,51 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-367" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:autoupdate:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "4.77.24121924", + "matchCriteriaId": "3AE35ACB-FD1D-4D88-B86A-ABA6F3C4E52F" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24036", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json new file mode 100644 index 00000000000..945e154474e --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-25204", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-14T17:15:19.140", + "lastModified": "2025-02-14T17:15:19.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "`gh` is GitHub\u2019s official command line tool. Starting in version 2.49.0 and prior to version 2.67.0, under certain conditions, a bug in GitHub's Artifact Attestation cli tool `gh attestation verify` causes it to return a zero exit status when no attestations are present. This behavior is incorrect: When no attestations are present, `gh attestation verify` should return a non-zero exit status code, thereby signaling verification failure. An attacker can abuse this flaw to, for example, deploy malicious artifacts in any system that uses `gh attestation verify`'s exit codes to gatekeep deployments. Users are advised to update `gh` to patched version `v2.67.0` as soon as possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-390" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cli/cli/issues/10418", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cli/cli/pull/10421", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cli/cli/security/advisories/GHSA-fgw4-v983-mgp8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json new file mode 100644 index 00000000000..5b78acff86b --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-25206", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-14T17:15:19.327", + "lastModified": "2025-02-14T17:15:19.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "eLabFTW is an open source electronic lab notebook for research labs. Prior to version 5.1.15, an incorrect input validation could allow an authenticated user to read sensitive information, including login token or other content stored in the database. This could lead to privilege escalation if cookies are enabled (default setting). Users must upgrade to eLabFTW version 5.1.15 to receive a fix. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/elabftw/elabftw/releases/tag/5.1.15", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-qffc-rfjh-77gg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json new file mode 100644 index 00000000000..585156b232c --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-25295", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-14T17:15:20.230", + "lastModified": "2025-02-14T17:15:20.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Label Studio is an open source data labeling tool. A path traversal vulnerability in Label Studio SDK versions prior to 1.0.10 allows unauthorized file access outside the intended directory structure. The flaw exists in the VOC, COCO and YOLO export functionalities. These functions invoke a `download` function on the `label-studio-sdk` python package, which fails to validate file paths when processing image references during task exports. By creating tasks with path traversal sequences in the image field, an attacker can force the application to read files from arbitrary server filesystem locations when exporting projects in any of the mentioned formats. This is authentication-required vulnerability allowing arbitrary file reads from the server filesystem. It may lead to potential exposure of sensitive information like configuration files, credentials, and confidential data. Label Studio versions before 1.16.0 specified SDK versions prior to 1.0.10 as dependencies, and the issue was confirmed in Label Studio version 1.13.2.dev0; therefore, Label Studio users should upgrade to 1.16.0 or newer to mitigate it." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HumanSignal/label-studio-sdk/commit/4a9715c6b0b619371e89c09ea8d1c86ce5c880df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-rgv9-w7jp-m23g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json index 18827ada4c2..23f457257c0 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25357", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.700", - "lastModified": "2025-02-13T16:16:49.700", - "vulnStatus": "Received", + "lastModified": "2025-02-14T18:15:24.203", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/contactus.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST del correo electr\u00f3nico." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25387.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25387.json index 453fd4f70fb..da2ad3b4de0 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25387.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25387.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25387", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T17:17:20.247", - "lastModified": "2025-02-13T17:17:20.247", + "lastModified": "2025-02-14T17:15:20.393", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/manage-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the propertytype POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/manage-propertytype.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST propertytype." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20edited.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20edited.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25389.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25389.json index e529df69f05..b4efd26afe4 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25389.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25389.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25389", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T17:17:20.427", - "lastModified": "2025-02-13T17:17:20.427", + "lastModified": "2025-02-14T17:15:20.663", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/forgot-password.php in Phpgurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/forgot-password.php en Phpgurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST contactno." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20forget.pdf", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json index 048a8f7fe28..7f6e9f5b59b 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25898", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.867", - "lastModified": "2025-02-13T16:16:49.867", - "vulnStatus": "Received", + "lastModified": "2025-02-14T17:15:20.917", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro pskSecret en /userRpm/WlanSecurityRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_1.pdf", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json new file mode 100644 index 00000000000..b8826146bfa --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25988", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.157", + "lastModified": "2025-02-14T17:15:21.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/havok89/Hoosk/issues/67", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json new file mode 100644 index 00000000000..dab1e56fe4a --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25990", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.320", + "lastModified": "2025-02-14T17:15:21.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/havok89/Hoosk/issues/69", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json new file mode 100644 index 00000000000..06d6ea1c3f2 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25991", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.477", + "lastModified": "2025-02-14T17:15:21.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/havok89/Hoosk/issues/68", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json new file mode 100644 index 00000000000..da7941850b3 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25992", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.640", + "lastModified": "2025-02-14T17:15:21.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in FeMiner wms 1.0 allows a remote attacker to obtain sensitive information via the inquire_inout_item.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FeMiner/wms/issues/19", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json new file mode 100644 index 00000000000..4e3da6e2107 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25993", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.793", + "lastModified": "2025-02-14T17:15:21.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameter \"itemid.\"" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FeMiner/wms/issues/21", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json new file mode 100644 index 00000000000..ad9a31443c8 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25994", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:21.953", + "lastModified": "2025-02-14T17:15:21.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameters date1, date2, id." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FeMiner/wms/issues/20", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json new file mode 100644 index 00000000000..f82aeeadfef --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25997", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:22.117", + "lastModified": "2025-02-14T17:15:22.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FeMiner/wms/issues/22", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json new file mode 100644 index 00000000000..81a3dbff274 --- /dev/null +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26156", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:22.273", + "lastModified": "2025-02-14T17:15:22.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json new file mode 100644 index 00000000000..3d44e81b9e7 --- /dev/null +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26157", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:22.437", + "lastModified": "2025-02-14T17:15:22.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /bpms/index.php in Source Code and Project Beauty Parlour Management System V1.1, which allows remote attackers to execute arbitrary code via the name POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/others/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json new file mode 100644 index 00000000000..684fbb0c012 --- /dev/null +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26158", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-14T17:15:22.590", + "lastModified": "2025-02-14T17:15:22.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/Kashipara/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json new file mode 100644 index 00000000000..860d5a2f914 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-26506", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2025-02-14T17:15:22.747", + "lastModified": "2025-02-14T17:15:22.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json new file mode 100644 index 00000000000..19b69971ba9 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-26507", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2025-02-14T17:15:22.863", + "lastModified": "2025-02-14T17:15:22.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json new file mode 100644 index 00000000000..2d1c4a46369 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-26508", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2025-02-14T17:15:22.983", + "lastModified": "2025-02-14T17:15:22.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11953771-11953793-16/hpsbpi04007", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json index b63ebc0d10b..545987ab908 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26519", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T04:15:09.050", - "lastModified": "2025-02-14T04:15:09.050", + "lastModified": "2025-02-14T17:15:23.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -75,6 +75,14 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/02/13/5", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/14/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 868484cad97..13e00d232ba 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-14T17:00:30.770662+00:00 +2025-02-14T19:00:20.699668+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-14T16:59:49.713000+00:00 +2025-02-14T18:15:24.203000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281408 +281429 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `21` -- [CVE-2024-52895](CVE-2024/CVE-2024-528xx/CVE-2024-52895.json) (`2025-02-14T15:15:09.210`) -- [CVE-2024-56477](CVE-2024/CVE-2024-564xx/CVE-2024-56477.json) (`2025-02-14T15:15:11.887`) -- [CVE-2024-56973](CVE-2024/CVE-2024-569xx/CVE-2024-56973.json) (`2025-02-14T16:15:34.273`) -- [CVE-2024-57725](CVE-2024/CVE-2024-577xx/CVE-2024-57725.json) (`2025-02-14T16:15:34.360`) -- [CVE-2024-57778](CVE-2024/CVE-2024-577xx/CVE-2024-57778.json) (`2025-02-14T16:15:34.453`) -- [CVE-2025-25740](CVE-2025/CVE-2025-257xx/CVE-2025-25740.json) (`2025-02-14T15:15:13.190`) -- [CVE-2025-25745](CVE-2025/CVE-2025-257xx/CVE-2025-25745.json) (`2025-02-14T16:15:37.010`) +- [CVE-2024-3220](CVE-2024/CVE-2024-32xx/CVE-2024-3220.json) (`2025-02-14T17:15:15.567`) +- [CVE-2024-56463](CVE-2024/CVE-2024-564xx/CVE-2024-56463.json) (`2025-02-14T17:15:16.420`) +- [CVE-2024-57790](CVE-2024/CVE-2024-577xx/CVE-2024-57790.json) (`2025-02-14T17:15:18.343`) +- [CVE-2024-8893](CVE-2024/CVE-2024-88xx/CVE-2024-8893.json) (`2025-02-14T17:15:18.690`) +- [CVE-2025-0503](CVE-2025/CVE-2025-05xx/CVE-2025-0503.json) (`2025-02-14T18:15:23.870`) +- [CVE-2025-25204](CVE-2025/CVE-2025-252xx/CVE-2025-25204.json) (`2025-02-14T17:15:19.140`) +- [CVE-2025-25206](CVE-2025/CVE-2025-252xx/CVE-2025-25206.json) (`2025-02-14T17:15:19.327`) +- [CVE-2025-25295](CVE-2025/CVE-2025-252xx/CVE-2025-25295.json) (`2025-02-14T17:15:20.230`) +- [CVE-2025-25988](CVE-2025/CVE-2025-259xx/CVE-2025-25988.json) (`2025-02-14T17:15:21.157`) +- [CVE-2025-25990](CVE-2025/CVE-2025-259xx/CVE-2025-25990.json) (`2025-02-14T17:15:21.320`) +- [CVE-2025-25991](CVE-2025/CVE-2025-259xx/CVE-2025-25991.json) (`2025-02-14T17:15:21.477`) +- [CVE-2025-25992](CVE-2025/CVE-2025-259xx/CVE-2025-25992.json) (`2025-02-14T17:15:21.640`) +- [CVE-2025-25993](CVE-2025/CVE-2025-259xx/CVE-2025-25993.json) (`2025-02-14T17:15:21.793`) +- [CVE-2025-25994](CVE-2025/CVE-2025-259xx/CVE-2025-25994.json) (`2025-02-14T17:15:21.953`) +- [CVE-2025-25997](CVE-2025/CVE-2025-259xx/CVE-2025-25997.json) (`2025-02-14T17:15:22.117`) +- [CVE-2025-26156](CVE-2025/CVE-2025-261xx/CVE-2025-26156.json) (`2025-02-14T17:15:22.273`) +- [CVE-2025-26157](CVE-2025/CVE-2025-261xx/CVE-2025-26157.json) (`2025-02-14T17:15:22.437`) +- [CVE-2025-26158](CVE-2025/CVE-2025-261xx/CVE-2025-26158.json) (`2025-02-14T17:15:22.590`) +- [CVE-2025-26506](CVE-2025/CVE-2025-265xx/CVE-2025-26506.json) (`2025-02-14T17:15:22.747`) +- [CVE-2025-26507](CVE-2025/CVE-2025-265xx/CVE-2025-26507.json) (`2025-02-14T17:15:22.863`) +- [CVE-2025-26508](CVE-2025/CVE-2025-265xx/CVE-2025-26508.json) (`2025-02-14T17:15:22.983`) ### CVEs modified in the last Commit -Recently modified CVEs: `121` +Recently modified CVEs: `71` -- [CVE-2024-26142](CVE-2024/CVE-2024-261xx/CVE-2024-26142.json) (`2025-02-14T16:22:23.763`) -- [CVE-2024-26144](CVE-2024/CVE-2024-261xx/CVE-2024-26144.json) (`2025-02-14T15:26:42.917`) -- [CVE-2024-26146](CVE-2024/CVE-2024-261xx/CVE-2024-26146.json) (`2025-02-14T15:51:42.200`) -- [CVE-2024-26489](CVE-2024/CVE-2024-264xx/CVE-2024-26489.json) (`2025-02-14T16:21:23.480`) -- [CVE-2024-26618](CVE-2024/CVE-2024-266xx/CVE-2024-26618.json) (`2025-02-14T16:39:08.240`) -- [CVE-2024-26620](CVE-2024/CVE-2024-266xx/CVE-2024-26620.json) (`2025-02-14T16:39:02.277`) -- [CVE-2024-26623](CVE-2024/CVE-2024-266xx/CVE-2024-26623.json) (`2025-02-14T16:40:51.387`) -- [CVE-2024-27099](CVE-2024/CVE-2024-270xx/CVE-2024-27099.json) (`2025-02-14T15:27:49.010`) -- [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2025-02-14T15:54:14.630`) -- [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2025-02-14T15:54:30.470`) -- [CVE-2024-27285](CVE-2024/CVE-2024-272xx/CVE-2024-27285.json) (`2025-02-14T15:31:24.213`) -- [CVE-2024-27948](CVE-2024/CVE-2024-279xx/CVE-2024-27948.json) (`2025-02-14T15:29:28.163`) -- [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2025-02-14T15:54:46.810`) -- [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2025-02-14T15:55:32.917`) -- [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2025-02-14T15:56:42.770`) -- [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2025-02-14T16:09:20.020`) -- [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2025-02-14T16:11:37.770`) -- [CVE-2024-54951](CVE-2024/CVE-2024-549xx/CVE-2024-54951.json) (`2025-02-14T16:15:34.060`) -- [CVE-2024-57951](CVE-2024/CVE-2024-579xx/CVE-2024-57951.json) (`2025-02-14T15:57:18.047`) -- [CVE-2024-57952](CVE-2024/CVE-2024-579xx/CVE-2024-57952.json) (`2025-02-14T15:52:04.957`) -- [CVE-2025-21694](CVE-2025/CVE-2025-216xx/CVE-2025-21694.json) (`2025-02-14T15:46:40.857`) -- [CVE-2025-21695](CVE-2025/CVE-2025-216xx/CVE-2025-21695.json) (`2025-02-14T15:44:28.450`) -- [CVE-2025-21696](CVE-2025/CVE-2025-216xx/CVE-2025-21696.json) (`2025-02-14T15:42:55.663`) -- [CVE-2025-22962](CVE-2025/CVE-2025-229xx/CVE-2025-22962.json) (`2025-02-14T16:15:34.803`) -- [CVE-2025-26791](CVE-2025/CVE-2025-267xx/CVE-2025-26791.json) (`2025-02-14T16:15:37.350`) +- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-02-14T17:15:16.040`) +- [CVE-2024-52577](CVE-2024/CVE-2024-525xx/CVE-2024-52577.json) (`2025-02-14T17:15:16.200`) +- [CVE-2024-56180](CVE-2024/CVE-2024-561xx/CVE-2024-56180.json) (`2025-02-14T17:15:16.317`) +- [CVE-2024-56940](CVE-2024/CVE-2024-569xx/CVE-2024-56940.json) (`2025-02-14T17:15:16.590`) +- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-14T18:15:23.743`) +- [CVE-2024-57601](CVE-2024/CVE-2024-576xx/CVE-2024-57601.json) (`2025-02-14T17:15:16.787`) +- [CVE-2024-57604](CVE-2024/CVE-2024-576xx/CVE-2024-57604.json) (`2025-02-14T17:15:17.003`) +- [CVE-2024-57605](CVE-2024/CVE-2024-576xx/CVE-2024-57605.json) (`2025-02-14T17:15:17.230`) +- [CVE-2024-7052](CVE-2024/CVE-2024-70xx/CVE-2024-7052.json) (`2025-02-14T17:15:18.480`) +- [CVE-2025-21377](CVE-2025/CVE-2025-213xx/CVE-2025-21377.json) (`2025-02-14T17:40:52.127`) +- [CVE-2025-21379](CVE-2025/CVE-2025-213xx/CVE-2025-21379.json) (`2025-02-14T17:39:51.510`) +- [CVE-2025-21397](CVE-2025/CVE-2025-213xx/CVE-2025-21397.json) (`2025-02-14T17:38:29.007`) +- [CVE-2025-21400](CVE-2025/CVE-2025-214xx/CVE-2025-21400.json) (`2025-02-14T17:37:31.690`) +- [CVE-2025-21406](CVE-2025/CVE-2025-214xx/CVE-2025-21406.json) (`2025-02-14T17:37:19.737`) +- [CVE-2025-21407](CVE-2025/CVE-2025-214xx/CVE-2025-21407.json) (`2025-02-14T17:36:43.997`) +- [CVE-2025-21410](CVE-2025/CVE-2025-214xx/CVE-2025-21410.json) (`2025-02-14T17:35:15.613`) +- [CVE-2025-21414](CVE-2025/CVE-2025-214xx/CVE-2025-21414.json) (`2025-02-14T17:33:40.003`) +- [CVE-2025-21419](CVE-2025/CVE-2025-214xx/CVE-2025-21419.json) (`2025-02-14T17:32:53.087`) +- [CVE-2025-21420](CVE-2025/CVE-2025-214xx/CVE-2025-21420.json) (`2025-02-14T17:36:09.683`) +- [CVE-2025-24036](CVE-2025/CVE-2025-240xx/CVE-2025-24036.json) (`2025-02-14T17:31:47.153`) +- [CVE-2025-25357](CVE-2025/CVE-2025-253xx/CVE-2025-25357.json) (`2025-02-14T18:15:24.203`) +- [CVE-2025-25387](CVE-2025/CVE-2025-253xx/CVE-2025-25387.json) (`2025-02-14T17:15:20.393`) +- [CVE-2025-25389](CVE-2025/CVE-2025-253xx/CVE-2025-25389.json) (`2025-02-14T17:15:20.663`) +- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-14T17:15:20.917`) +- [CVE-2025-26519](CVE-2025/CVE-2025-265xx/CVE-2025-26519.json) (`2025-02-14T17:15:23.090`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9f1bea1ccd6..989b87298c8 100644 --- a/_state.csv +++ b/_state.csv @@ -52515,7 +52515,7 @@ CVE-2012-0748,0,0,8b24860287d05c2ffc736847d5339259167c7b3c1abeeee856ab4668722dda CVE-2012-0751,0,0,9b024aded87c2835d5bdf0e31b23fa7cefd38dd383a8e3f13d3031fb9a4da292,2024-11-21T01:35:39.330000 CVE-2012-0752,0,0,3f2f004b8684381e4910d3db0eced38d40e9161fe859ec430eb52378fc647592,2024-11-21T01:35:39.457000 CVE-2012-0753,0,0,2d7930a04362ca51217b8cde16d5d833091b1df38bf9c5d12fbcfd4be901e94c,2024-11-21T01:35:39.607000 -CVE-2012-0754,0,1,d9bfbd6772b4eaadbf95d6b96208e70ff1085cceadf3d5bdca2fe4c48965fd77,2025-02-14T16:05:58.347000 +CVE-2012-0754,0,0,d9bfbd6772b4eaadbf95d6b96208e70ff1085cceadf3d5bdca2fe4c48965fd77,2025-02-14T16:05:58.347000 CVE-2012-0755,0,0,3a38db8ccf3f7ea2ef0d8867ba5e7e501cb50213256af17de4568aba30427d72,2024-11-21T01:35:39.860000 CVE-2012-0756,0,0,8709a82d94edc24f3e04d3d3246425ee5c8fd2d37da1a7e9275b54e250e52fc4,2024-11-21T01:35:39.993000 CVE-2012-0757,0,0,938b71f2bc1bc80473e1afa0dcf8e605fee20ac040e18ab603a7c6cd2997f93a,2024-11-21T01:35:40.130000 @@ -53673,7 +53673,7 @@ CVE-2012-2030,0,0,604191d06de6a90c94cf3d24011cf96384de9bc5245af009717ee3adeb67b3 CVE-2012-2031,0,0,1a1445fa75486e625029e630dcc8541b599d73e3f535c93242ff962317420a81,2024-11-21T01:38:19.863000 CVE-2012-2032,0,0,561af705fd2770c5455b799f65b38e327ab1f5788bdbb2026989f02819aa54ec,2024-11-21T01:38:20 CVE-2012-2033,0,0,f0505aba2d0f10bfa21f7faaa2b71a0787ea91271a9b0a4da44b079f6fed3ffb,2024-11-21T01:38:20.140000 -CVE-2012-2034,0,1,b276df56ee33960362cceed565375afee2625d7432a1ba4af2633e251625643e,2025-02-14T16:05:35.613000 +CVE-2012-2034,0,0,b276df56ee33960362cceed565375afee2625d7432a1ba4af2633e251625643e,2025-02-14T16:05:35.613000 CVE-2012-2035,0,0,8a8c72d55caee40ffc8e6c7070a5f0bd554efe6a1d05bbf12f0f434de008c7df,2024-11-21T01:38:21.520000 CVE-2012-2036,0,0,0e380d1ca39be4b44a80d334a107794df42b2601ed8e480e7b11a8f26049872a,2024-11-21T01:38:21.653000 CVE-2012-2037,0,0,3376cb5ec48213987403ebc67dd9605d946e3de4d05bbf254a442711d55aca5a,2024-11-21T01:38:21.800000 @@ -60795,7 +60795,7 @@ CVE-2013-3342,0,0,317da02ca44ee72f687131cbc668ee69aeaece777c733ec0a6a36793c0d079 CVE-2013-3343,0,0,96dc00fb54e72b44f4b6707fd4c14e8efaea6c9ab1fbfdd9a704c705948872c2,2024-11-21T01:53:26.420000 CVE-2013-3344,0,0,458bfdd962f28750620131130e663e6943d20b7a2b65c24db9629098ae7346fb,2024-11-21T01:53:26.550000 CVE-2013-3345,0,0,f35850e50050cac180e157aa952d2e1fdb6f75fa7223f33f268d733b9b475f3b,2024-11-21T01:53:26.687000 -CVE-2013-3346,0,1,a4edadbcbb7310fc6fb879e0abf347c371a5d4d13844d5a850a626d1faae2717,2025-02-14T16:00:04.780000 +CVE-2013-3346,0,0,a4edadbcbb7310fc6fb879e0abf347c371a5d4d13844d5a850a626d1faae2717,2025-02-14T16:00:04.780000 CVE-2013-3347,0,0,15ba36969ffce055ab90edecd9ba77467ac0bfe323a1da42d7a5c871fbd69ee9,2024-11-21T01:53:26.953000 CVE-2013-3348,0,0,278d9134bdc3aac191df67a37fa94d1bf457eb946ffcce29fff07bfb3de01835,2024-11-21T01:53:27.097000 CVE-2013-3349,0,0,4df9b4cab194e76ddeee6c77833b6cf62e7e8901008ed419998ca582b75e6656,2024-11-21T01:53:27.220000 @@ -72128,7 +72128,7 @@ CVE-2014-8428,0,0,b6d02e02c49a36849b94bfa2e8298b2fdce7ad8f942d2b8e3972a618f499c8 CVE-2014-8429,0,0,ba76cc0b542a1e6ef32a49b2bbf728928dbb9278d43b163f756a0f09365813e3,2024-11-21T02:19:04.347000 CVE-2014-8437,0,0,5f0759d205fb824ffc9f2a5d3bf7275a4e92b524fcf7167b84c824643fc00c2e,2024-11-21T02:19:04.490000 CVE-2014-8438,0,0,09019b643d315e20bd38630e491eef717606dc406acc6fa450a3b164168e8a6f,2024-11-21T02:19:04.613000 -CVE-2014-8439,0,1,54bb55302dfaaeb5a9839445de5aa0b46af513dd9d67a6b9a9201f65c32a9725,2025-02-14T16:04:57.187000 +CVE-2014-8439,0,0,54bb55302dfaaeb5a9839445de5aa0b46af513dd9d67a6b9a9201f65c32a9725,2025-02-14T16:04:57.187000 CVE-2014-8440,0,0,c59e2dd21f18dc4d9270faf0637afef41495fc809d000125cf23ff2f98dfbc56,2024-11-21T02:19:04.877000 CVE-2014-8441,0,0,079dd71d71eaba192d369ef5bef8c303c0b643ab5b684909fe11569d9d3d090e,2024-11-21T02:19:05.007000 CVE-2014-8442,0,0,55b5523b35d331d0247e90863527d0601ee5808be966ff34d107437f3eb1b5df,2024-11-21T02:19:05.137000 @@ -73765,9 +73765,9 @@ CVE-2015-0307,0,0,a65ed1098ff025c2c4bcadd58072f76beb976964e14f3c1bef8f075c54c113 CVE-2015-0308,0,0,66fb6aaa33515371aefd0e332532fd32bfd1b7a59d29d40893b3b7dc52edf7ce,2024-11-21T02:22:47.210000 CVE-2015-0309,0,0,b10430c9604d0e67194403ac5cf78bcd1f9cc1f8eedc9c51a65b7d27332ccc02,2024-11-21T02:22:47.360000 CVE-2015-0310,0,0,f946410fa9926a0960b1f62d9afa1598671749e12b6056dbeb90a578124f6544,2025-02-13T17:29:41.523000 -CVE-2015-0311,0,1,a4223e3c98cd1c5c9225b1aa0d6c4dd0503674fb511b9fc3cced0a95bde17e37,2025-02-14T15:59:35.193000 +CVE-2015-0311,0,0,a4223e3c98cd1c5c9225b1aa0d6c4dd0503674fb511b9fc3cced0a95bde17e37,2025-02-14T15:59:35.193000 CVE-2015-0312,0,0,83f4c3c42e755f4100a5e3b670350c469b5dec2be6cb9601117390221a3ed06f,2024-11-21T02:22:47.727000 -CVE-2015-0313,0,1,0cf9fda433d1cea0061bba6d00963487b986d0277618ee0fa9bf4dcea6659b67,2025-02-14T15:59:27.700000 +CVE-2015-0313,0,0,0cf9fda433d1cea0061bba6d00963487b986d0277618ee0fa9bf4dcea6659b67,2025-02-14T15:59:27.700000 CVE-2015-0314,0,0,8cfdbc8341fa6444aac0f621f0cd99191bed11d672f66f44aec0b40900e95a7b,2024-11-21T02:22:48 CVE-2015-0315,0,0,2a9c122d89e8278f69b82ad7ba11155f5dbeef41b37639827f1ee01a3b57f44e,2024-11-21T02:22:48.120000 CVE-2015-0316,0,0,741ccb2def53c6e62937fb3b7557670d368b8447f100b25f10a5a9246821c87a,2024-11-21T02:22:48.243000 @@ -74676,7 +74676,7 @@ CVE-2015-1126,0,0,a1309e5629cbb4f7bb90cadeb19d22e72fce7f418b9c92431678a83dd8a9a0 CVE-2015-1127,0,0,0d351ea63eacf458a3ca45b70597a50ed2adfcab9d22af4f9d6af613bd7c37ac,2024-11-21T02:24:43.977000 CVE-2015-1128,0,0,534a49e2bbe9528518d87bf4f5309b7ae8fa61e4703ae0d6eb1ec64a4df4777c,2024-11-21T02:24:44.100000 CVE-2015-1129,0,0,ff6b9491993c6de62bd2b15f4a9a4ceec249d70b626139aef55a2d770216e8b4,2024-11-21T02:24:44.243000 -CVE-2015-1130,0,1,f7d569bd2e4c7345fc5d4457f6b6b0a15a54e16ff9fc7e6570d5aa061e14f94c,2025-02-14T16:20:08.967000 +CVE-2015-1130,0,0,f7d569bd2e4c7345fc5d4457f6b6b0a15a54e16ff9fc7e6570d5aa061e14f94c,2025-02-14T16:20:08.967000 CVE-2015-1131,0,0,5432cc34a53ee2686f6105c2ce5130e536d9619c5099f74110b87229b56f4fc2,2024-11-21T02:24:44.530000 CVE-2015-1132,0,0,ca8a2e570e3436e13d269f96ac1758dc41b4258169342477c9b7996ce2c752db,2024-11-21T02:24:44.653000 CVE-2015-1133,0,0,a28880e374ef6537742b2b82fe347e7ba5ffb0e4fc7beb64a62d6b4a724a8b8a,2024-11-21T02:24:44.787000 @@ -76421,7 +76421,7 @@ CVE-2015-3039,0,0,b3adb45385dca7bfa8182146c98c04268c97e07b5011d02ad8d218b9f4e7b8 CVE-2015-3040,0,0,dab5cfec3b5aa8d98ed5fb4e3a3725663bc865631030702b4167830844d1e80a,2024-11-21T02:28:32.227000 CVE-2015-3041,0,0,2ee98df78095b084022a1bc065f163d8a47b1af021e5ff357dc81dd4100bd38d,2024-11-21T02:28:32.373000 CVE-2015-3042,0,0,ae35846dd2ea4a16341a53f543f3b9372663396c4f87756ac45fb538b1249c51,2024-11-21T02:28:32.513000 -CVE-2015-3043,0,1,064ae3f16b2054ff03151889589aa93e34186bb2489f156e1c5c8965faef3254,2025-02-14T15:59:21.340000 +CVE-2015-3043,0,0,064ae3f16b2054ff03151889589aa93e34186bb2489f156e1c5c8965faef3254,2025-02-14T15:59:21.340000 CVE-2015-3044,0,0,c59d63f75c6506a89268c03d2b6f879139ebbe54ba850872b3b78b277b23b542,2024-11-21T02:28:32.817000 CVE-2015-3045,0,0,7247b26e06c0e841aa6dc6d83e32aee805acfd8bbb1c795bb2a354636ede17c0,2023-11-07T02:25:28.660000 CVE-2015-3046,0,0,54eedb6dfca9eb314e7f8221ac00c49c3f073edc8ef01e585efa88b9286c4dcb,2024-11-21T02:28:32.983000 @@ -76491,7 +76491,7 @@ CVE-2015-3109,0,0,55f7bed559d74932631a9289c0e282b167433393c92926f0274b286505e75b CVE-2015-3110,0,0,22e4392945cb917190f32f405660a507936fb6b4a40bbd144ae1fd0f83992a7f,2024-11-21T02:28:41.457000 CVE-2015-3111,0,0,a761c11fab71d2e174ebbde91cb447c6872894176806c00295bc4835ff9fe072,2024-11-21T02:28:41.577000 CVE-2015-3112,0,0,25a1d24318eb594ae448d4394d710de254b84e4e3c112ce5714c2985b6ca2ce1,2024-11-21T02:28:41.697000 -CVE-2015-3113,0,1,da0a0e06cb0ff5ce6acda52e6a372a0071e703bd442e636660c563a5c107ea4c,2025-02-14T16:09:30.940000 +CVE-2015-3113,0,0,da0a0e06cb0ff5ce6acda52e6a372a0071e703bd442e636660c563a5c107ea4c,2025-02-14T16:09:30.940000 CVE-2015-3114,0,0,9006b707b312fffeee7e8d0a0db640014aa4411c187d10f57433ac8a3eff6f11,2024-11-21T02:28:41.950000 CVE-2015-3115,0,0,8d1838ae2145ff7fe82197e237e868573966b34ed94e2e9e95a1029f93e652b4,2024-11-21T02:28:42.080000 CVE-2015-3116,0,0,67ba34841dfcd92305138744ea439aa32be106b911249617f45dad6fba0a0ac3,2024-11-21T02:28:42.203000 @@ -78098,11 +78098,11 @@ CVE-2015-5115,0,0,ae8838cf6b150886f8107c8226f31e0999b542f6d5ffc59195e20ae10b5023 CVE-2015-5116,0,0,615a4305db86b1814660e936f986671d586172d6df2cfe9afe383ed29464fc65,2024-11-21T02:32:23.553000 CVE-2015-5117,0,0,14dc814d8ff43ca828a91cbdddc327b92e9324c3f4ce6f71b07f2768334be89c,2024-11-21T02:32:23.780000 CVE-2015-5118,0,0,62caed435546b83e9a906967d71fd37f2643128020e3f747cd3d1f7a7751c696,2024-11-21T02:32:23.920000 -CVE-2015-5119,0,1,ce1be4bfbe79e58048349f5ee76013332a7fba9de6af7120b6c3ccbb85246659,2025-02-14T16:09:21.013000 +CVE-2015-5119,0,0,ce1be4bfbe79e58048349f5ee76013332a7fba9de6af7120b6c3ccbb85246659,2025-02-14T16:09:21.013000 CVE-2015-5120,0,0,9e11b0429d7854222277e353aa8600ddbeb22fe380f9e7255065000890561770,2024-11-21T02:32:24.207000 CVE-2015-5121,0,0,c93a7fc6de982412b85563391e9041ddf77e3d28f04aba44eb4c015463a240fd,2024-11-21T02:32:24.317000 -CVE-2015-5122,0,1,180ad809fa4de0ad776f06a33cf248821a2dbbed9cc41b382c3a667a1cfa9afd,2025-02-14T16:09:11.280000 -CVE-2015-5123,0,1,ce0c4ce928eb5b7eceec0285e64981194c5b894c3378494aad933bcc37c5c6da,2025-02-14T16:06:58.290000 +CVE-2015-5122,0,0,180ad809fa4de0ad776f06a33cf248821a2dbbed9cc41b382c3a667a1cfa9afd,2025-02-14T16:09:11.280000 +CVE-2015-5123,0,0,ce0c4ce928eb5b7eceec0285e64981194c5b894c3378494aad933bcc37c5c6da,2025-02-14T16:06:58.290000 CVE-2015-5124,0,0,2c4101524d74cc893510e4e85864dd64d5eda8dbd483f222c7040999b6458e5c,2024-11-21T02:32:24.747000 CVE-2015-5125,0,0,4c9b9fedd89534b28483467417e535cf20c9e0b4683ab6d9cca7c12c789bcea3,2024-11-21T02:32:24.880000 CVE-2015-5126,0,0,5a1866006ab0338050bafd6c73f82b5a5684892c6ce77ab235a699045b048c28,2023-11-07T02:26:01.840000 @@ -80460,7 +80460,7 @@ CVE-2015-7641,0,0,10d40adddc2127ad8ba46d3d4cc4501a8479759bba4e5951e48458d06f6c95 CVE-2015-7642,0,0,66d14d7c4464ceb706d1491f113696c59382efd1f4b8232955d8f26f73fff8a8,2024-11-21T02:37:07.250000 CVE-2015-7643,0,0,22c98f3f092bcca4abafb0f3002d399885dc7135d84d10a28f2f41ced4c8f0b4,2024-11-21T02:37:07.370000 CVE-2015-7644,0,0,ca1f68b4c27f648468906579197dde35b7bcdb3e868c2cdc0140b37fe0fec040,2024-11-21T02:37:07.490000 -CVE-2015-7645,0,1,620d30554c1d8a41829e65f362d892c363d74b2e30d14ea9df67376d880336cf,2025-02-14T16:15:23.887000 +CVE-2015-7645,0,0,620d30554c1d8a41829e65f362d892c363d74b2e30d14ea9df67376d880336cf,2025-02-14T16:15:23.887000 CVE-2015-7646,0,0,53406fc00814552e11d9355d4e37495e78bc61adac02d9f25f24595de67b46ad,2023-11-07T02:27:59.680000 CVE-2015-7647,0,0,f49a5ad7c8e3fd3b8f30c94752fb3831c870a619f7ff89abf805abf38e730c8c,2024-11-21T02:37:07.797000 CVE-2015-7648,0,0,745782194fb2fc8d9b15b4b735ace7375234f1924d127e6d1a28f7a61237961c,2024-11-21T02:37:08.487000 @@ -81348,7 +81348,7 @@ CVE-2015-8647,0,0,ea72467c103ee64a81e5118290be3db7844ca0629ca684db71b71ce3fd49ed CVE-2015-8648,0,0,f4c0d7443c694b8e2d90004779d56db83546ca16b6fd562efe975963bd8f2ae0,2024-11-21T02:38:53.380000 CVE-2015-8649,0,0,14a272b22091276a126039f5517587b69e0d7843a9b5945c5f273f72cfbf499f,2024-11-21T02:38:53.523000 CVE-2015-8650,0,0,67660a6ffd36503d04e70552906d7d0b94220da1e43224ae65dc7ebc1b3ec04c,2024-11-21T02:38:53.657000 -CVE-2015-8651,0,1,317343b9e80e2cad7d444eaa8ea1951b61ec3b0db2fdc84222ead1ef7b8e5fc4,2025-02-14T16:15:12.217000 +CVE-2015-8651,0,0,317343b9e80e2cad7d444eaa8ea1951b61ec3b0db2fdc84222ead1ef7b8e5fc4,2025-02-14T16:15:12.217000 CVE-2015-8652,0,0,21fbe4e57fbdc807a6a0c2b1e927f2ab4ee3617467913fef63d4015566695bfc,2024-11-21T02:38:53.950000 CVE-2015-8653,0,0,dfed7b76d4565bce8f1fcc6e233292c7d20a45c8ba88bd03062635b0d74ac60c,2024-11-21T02:38:54.090000 CVE-2015-8654,0,0,ab078b303f20bfe8b8a8e35928947a843886bbb64e2502a588481c4b7e160969,2024-11-21T02:38:54.220000 @@ -83174,7 +83174,7 @@ CVE-2016-0980,0,0,f5c5f87eb80494a0ce6be29c6480f742518a5e77f8f19941f192c150904e69 CVE-2016-0981,0,0,70e6d1567ffb0569ccc9ec93f13b182bcc348dbbef7d76c7300e0dcf8034a098,2024-11-21T02:42:46.423000 CVE-2016-0982,0,0,b3a2f9dd630e9da8f8de36c95780a581181e13827e5cd675de6e824256cbd173,2024-11-21T02:42:46.553000 CVE-2016-0983,0,0,cb309542f23ed3543025eefab0df6c848bddba79eed0df52bd2dfe635c408514,2024-11-21T02:42:46.690000 -CVE-2016-0984,0,1,6ddbbabbb4797f429b1b0165e588856221ff403ac6fe40a495a6d1b8870b69c1,2025-02-14T16:15:05.900000 +CVE-2016-0984,0,0,6ddbbabbb4797f429b1b0165e588856221ff403ac6fe40a495a6d1b8870b69c1,2025-02-14T16:15:05.900000 CVE-2016-0985,0,0,69fd23207b2d70ef82541ff240072f612de7b8dcd9e6dcacad605f70e67a6049,2024-11-21T02:42:46.997000 CVE-2016-0986,0,0,52c05d3ba1adf782a673c4f69af097d6a6debeb51b3c4d2d20a6cc1b7b2923e2,2024-11-21T02:42:47.150000 CVE-2016-0987,0,0,35c562afe53f7b86e66dd8b520af8b3d001c3c85942988a2d909ef1c7938b882,2024-11-21T02:42:47.297000 @@ -83421,7 +83421,7 @@ CVE-2016-10096,0,0,97ff445e0d4479a576be80f3d972eef5ab80b8c51b0b4409305cfa153ff9a CVE-2016-10097,0,0,cc04d3716804c94a5a2c4fe4b33a6105c5f929e79cfc0e4403f47606e4542aa9,2024-11-21T02:43:17.813000 CVE-2016-10098,0,0,b5eb3409e285848e7fdfab1aa388e62ee9dd25d826f76fb8ce9bba54348be3f8,2024-11-21T02:43:17.957000 CVE-2016-10099,0,0,64cfc73d8db98e67db680d7c9258fc32b0d90972743f0482a62e4d42f89e686f,2024-11-21T02:43:18.103000 -CVE-2016-1010,0,1,ea4cac16e0f08c4ed6fbd45412b206f3509d8e240a357a0493ae46074a5c8774,2025-02-14T16:14:21.180000 +CVE-2016-1010,0,0,ea4cac16e0f08c4ed6fbd45412b206f3509d8e240a357a0493ae46074a5c8774,2025-02-14T16:14:21.180000 CVE-2016-10100,0,0,8a4acbab5fe4248b4b681e893f5aefbf58eb2bcfae280968bcd1b756de0aca54,2024-11-21T02:43:18.253000 CVE-2016-10101,0,0,1503451fcb8515842d1d0fc8b81b3d938da9e340138b7288af462afb8365c8e8,2024-11-21T02:43:18.390000 CVE-2016-10102,0,0,d1b6e747eb40512955803d6f753e947a4dada25477b951c2523bf56b37635a56,2024-11-21T02:43:18.547000 @@ -83517,7 +83517,7 @@ CVE-2016-10186,0,0,15758f1f8681c2cc8380dba677370f04cd254fd12c5b20664fbeedd23f072 CVE-2016-10187,0,0,c9ef2ad8ba903cc9103901cb05165c7f4b5f151ac24cfd75344afc64130357a7,2024-11-21T02:43:30.700000 CVE-2016-10188,0,0,3291a2d58cd04214ee78aae94c6869bfcc0149dd73815a7d4ed65fd2620c9aab,2024-11-21T02:43:30.850000 CVE-2016-10189,0,0,a38add0c494fbbd4e5f8138f98ba1fbb63209ad24df4732c774e73e104e8dbb5,2024-11-21T02:43:30.990000 -CVE-2016-1019,0,1,4c37fbc956dea7e4e0a0d656a22f68e4d2d7820af3831272cb0255c63a069296,2025-02-14T16:14:11.163000 +CVE-2016-1019,0,0,4c37fbc956dea7e4e0a0d656a22f68e4d2d7820af3831272cb0255c63a069296,2025-02-14T16:14:11.163000 CVE-2016-10190,0,0,9f736ff72d592266043deff0b295b82212e7b1144a98ea2ba779eb1ecd5a3902,2024-11-21T02:43:31.140000 CVE-2016-10191,0,0,c282bb724b89bf6bef3e8c6ac93276ef30f5c1b99853b91cf6dd31d0eb4da05e,2024-11-21T02:43:31.293000 CVE-2016-10192,0,0,e7716fdf5411c9fca2f6c03b9618bfa5da03788f354427582a158fc3bed28041,2024-11-21T02:43:31.453000 @@ -87369,7 +87369,7 @@ CVE-2016-4113,0,0,aee42e937048ad401b0bf28011a2c16c1e1482de4845f31579a5310f42a76a CVE-2016-4114,0,0,8a432b2e374b0800feb081f574a7d6d22147090edff6ea04e927a0bf95966b8c,2024-11-21T02:51:24.353000 CVE-2016-4115,0,0,c8614d3f2764d62264b825cdac885b6828638f3e48dbea9883e24453f08842c1,2024-11-21T02:51:24.483000 CVE-2016-4116,0,0,5eeaa33d2bca991eeb29801965da29d87468d5fc02a20cd316fe1538c10a0e3b,2024-11-21T02:51:24.597000 -CVE-2016-4117,0,1,130cc08dc844cd1efe83fd781da6c2f5ba295c47106514f577a500733eee89da,2025-02-14T16:13:09.407000 +CVE-2016-4117,0,0,130cc08dc844cd1efe83fd781da6c2f5ba295c47106514f577a500733eee89da,2025-02-14T16:13:09.407000 CVE-2016-4118,0,0,22a53398b2e803ea995706746eb29d3c59e525cb420800e40dd0459a0d0c9b03,2024-11-21T02:51:24.860000 CVE-2016-4119,0,0,51068c52eebfaa56efaaf1f30ce5bd3d341ed65f479447c89aa000f15a4a4495,2024-11-21T02:51:24.970000 CVE-2016-4120,0,0,bdacbe945ccf6a4c8f45fbd1cbdd05774c5fa0a0e5e18941695164e3630e8665,2024-11-21T02:51:25.080000 @@ -87423,7 +87423,7 @@ CVE-2016-4167,0,0,a986e88cdb8b0dfe577e3b85fd946d03acaf502108ef6ca3f5d58c26490e3f CVE-2016-4168,0,0,ba95041ae0562e96bbe921108ee98dabd10b5791e686349fc9e950c2a71b879b,2024-11-21T02:51:32.247000 CVE-2016-4169,0,0,3467042b210d44adbcd95667030c7d5be5ab7b12767a1009405d3ea8b4bf3c3d,2024-11-21T02:51:32.387000 CVE-2016-4170,0,0,eb9d2217f5f597ffe90889f63389b971411ec470ac61492975362dcddc06f736,2024-11-21T02:51:32.507000 -CVE-2016-4171,0,1,be5c73fbe9cab68bd481e19c4057c52066513d25be1bdfcc69522fa612c0be79,2025-02-14T16:12:44.170000 +CVE-2016-4171,0,0,be5c73fbe9cab68bd481e19c4057c52066513d25be1bdfcc69522fa612c0be79,2025-02-14T16:12:44.170000 CVE-2016-4172,0,0,d653d5feb21d86cfde269e706e5af2d21cedfb3d7fc60edc6d0fa2e90b28866c,2024-11-21T02:51:32.830000 CVE-2016-4173,0,0,03344291242f6e12504e926afbe9b54df9d558618ff0f9e61f5fc60d481d676f,2024-11-21T02:51:33.037000 CVE-2016-4174,0,0,eb1bb8eff59bae3347a871bd65ece68cb2eeddd03e18937b23b8a36a039e3260,2024-11-21T02:51:33.227000 @@ -90774,7 +90774,7 @@ CVE-2016-7851,0,0,86a1347ae7bb0a1ecdce6abec0a0b19406aefb57b15e1c1710946de3dc3084 CVE-2016-7852,0,0,697c546ef6d65628b909db5d7c5cefb3415f50f0fa5c28e53f65bf67dc1c79e8,2024-11-21T02:58:35.403000 CVE-2016-7853,0,0,7e03226e4a8e0223cb8826621520d31e1d1d7330f08c4aaa60a81fc7f5e4573a,2024-11-21T02:58:35.510000 CVE-2016-7854,0,0,ab6a83894af15a8a9eaba7ca273e6894aaff6cec4c08ae12e7d7025775bd3a5d,2024-11-21T02:58:35.623000 -CVE-2016-7855,0,1,dbba1e92a29de7f934cf6e59e157444244b684d027502d321d793941b1bcf637,2025-02-14T16:11:56.890000 +CVE-2016-7855,0,0,dbba1e92a29de7f934cf6e59e157444244b684d027502d321d793941b1bcf637,2025-02-14T16:11:56.890000 CVE-2016-7856,0,0,92408a4d7d23cde010da1748f0a20b75829bbd128fe77bd7d3e825691fc4f417,2024-11-21T02:58:35.860000 CVE-2016-7857,0,0,b48e0b945f4284d47b58869d43c00c55bb6a99b218da32ffc5f1000049bb8c82,2024-11-21T02:58:35.970000 CVE-2016-7858,0,0,3aec9b24904c5bbd416d0b5d04aba541c207f4067c3e4cf561a8996aba73423e,2024-11-21T02:58:36.090000 @@ -90811,7 +90811,7 @@ CVE-2016-7888,0,0,9b65ba33af06748772e47518716d265123a2b4e6198aa54b12c94ca9279f30 CVE-2016-7889,0,0,7e3f5aef7817a8ff0a8ce3ced701caed366424032d0ffda5799a7597dfd1ab88,2024-11-21T02:58:39.830000 CVE-2016-7890,0,0,9fdaa1f263b5c0923800d292a524d020dcd1eee80d8fc85cdecdc474f1b20508,2024-11-21T02:58:39.933000 CVE-2016-7891,0,0,76b5e57a211058943d5a878e01b6d009f1911d48ddde84b875d83b4b56fe9a61,2024-11-21T02:58:40.060000 -CVE-2016-7892,0,1,ab856d3e59894e375a2cb18b515dee28c6e88c9b8a8819e6f9f3cd7530657300,2025-02-14T16:10:29.947000 +CVE-2016-7892,0,0,ab856d3e59894e375a2cb18b515dee28c6e88c9b8a8819e6f9f3cd7530657300,2025-02-14T16:10:29.947000 CVE-2016-7893,0,0,68c172adaa96c29e27a95b900cfe332a55590be779e170a8d148e65071cf27d0,2023-11-07T02:35:14.113000 CVE-2016-7894,0,0,959b04cf70685680096701a392525fe8be7296711e7bf63a368c2c211fb382c8,2023-11-07T02:35:14.403000 CVE-2016-7895,0,0,daf13de1b334ac8d6974c5d7b9dfad665d5d57e8457b0c33a90349a64698e5bd,2023-11-07T02:35:14.637000 @@ -129405,7 +129405,7 @@ CVE-2019-1104,0,0,a6c17a2237a4bb93e405e7b76f46e01c16489256ef771a7870574caef5f14f CVE-2019-11040,0,0,3a67cfbb1fd75d55645c1ec6a2dc6a90f55ff38794b143ce1acd9afdce25e1d5,2024-11-21T04:20:25.590000 CVE-2019-11041,0,0,709de6764efff348efbad762951af55a9403372fbae2f329351c2fedb173e90f,2024-11-21T04:20:25.723000 CVE-2019-11042,0,0,93a5f4fed09b2a951f19e6dccb1bb7a7e35cb81ae0b642d8a2b4e9f1f7751bed,2024-11-21T04:20:25.890000 -CVE-2019-11043,0,1,b5d617e7bfa1798077541eb8d8f5d2c38a4b40473ceae167500e48653e3a1d66,2025-02-14T16:43:36.877000 +CVE-2019-11043,0,0,b5d617e7bfa1798077541eb8d8f5d2c38a4b40473ceae167500e48653e3a1d66,2025-02-14T16:43:36.877000 CVE-2019-11044,0,0,b876087ca85caf573f2a760fb02ddfe8f02173fb73b8acdfcd02166f8276b1e6,2024-11-21T04:20:26.257000 CVE-2019-11045,0,0,31b4dc2a29ca8c0b857b35b0459f94229ed5790ff0b66a6925f65032a12b57e9,2024-11-21T04:20:26.407000 CVE-2019-11046,0,0,d43b76a406c7c4cf04c9b20e309e6db46a18fdab6ba56bf65aa0c20455cab08b,2024-11-21T04:20:26.563000 @@ -152834,7 +152834,7 @@ CVE-2020-2051,0,0,54805ce0a4a88248f1cb40064f5fa6d2236512e6abbeb809a008341d1dad20 CVE-2020-20514,0,0,16a96e1a8a5355c00d06d7ce7922159b39236c9bfdbc36c6486dfc7cba8f8c06,2024-11-21T05:12:07.550000 CVE-2020-2052,0,0,19f58e2c37342386c4d77f11e3e83aa953cc95805c4fb0f389f0b70f9ce5b29e,2023-11-07T03:21:35.083000 CVE-2020-20521,0,0,c76d3d4c7877e287010162902e6d1fa1c6fcd8dc237db34c232470ecc4c2cda9,2024-11-21T05:12:07.693000 -CVE-2020-20522,0,0,298a4e15b00068ac09bd298404bd70268ca84abcd85561e44deef6a57ea6bfe2,2024-11-21T05:12:07.843000 +CVE-2020-20522,0,1,893c7351f3dc925935f7b1113c180df2e3a9e04d3640d3f24fc91116066acca2,2025-02-14T17:15:09.990000 CVE-2020-20523,0,0,283d4cbf1458936f9d7cfbe641ba02bed9372d92a187d05ce823c245f3ba6719,2024-11-21T05:12:07.993000 CVE-2020-2053,0,0,68b90c398f87ce9c583db57871e55a7cc9500eb4ab344c44c54deb1d2aa91a47,2023-11-07T03:21:35.353000 CVE-2020-2054,0,0,a4d7054489dd81a40d4863063ba5108b558b46c37f12c1058db3677462ad77a9,2023-11-07T03:21:35.687000 @@ -152945,9 +152945,9 @@ CVE-2020-20902,0,0,b8556b5bd89dd2a32c612463c4be684676d1c746af2f404665770e6f2be12 CVE-2020-20907,0,0,d0ff6204fdf4d8aa7d9dc04c6306337448e13630e96c334656478095d6a14ab1,2024-11-21T05:12:18.083000 CVE-2020-20908,0,0,3f81e0cb6445f778b889d8a5183143694632cc0ce155fc3ead0673637199110e,2024-11-21T05:12:18.237000 CVE-2020-2091,0,0,fb395166c837ff2a3e0188249c10aa7d1b01b353c64446ccae4ca3f2bfdb6f64,2024-11-21T05:24:34.853000 -CVE-2020-20913,0,1,054c51406587163101f8f9fd28530d3abfeaf6c3231b4b4ab89b5ea7f281af32,2025-02-14T16:15:30.570000 -CVE-2020-20914,0,1,6b83fb2571506706282b9cc3d36032146a741e4486a2b34177dbf950f4efd2ad,2025-02-14T16:15:31.487000 -CVE-2020-20915,0,0,4bc415e89cb67cadb51b2b795d224808fca39be0315d65fb1cca2dc9160f02a9,2024-11-21T05:12:18.663000 +CVE-2020-20913,0,0,054c51406587163101f8f9fd28530d3abfeaf6c3231b4b4ab89b5ea7f281af32,2025-02-14T16:15:30.570000 +CVE-2020-20914,0,0,6b83fb2571506706282b9cc3d36032146a741e4486a2b34177dbf950f4efd2ad,2025-02-14T16:15:31.487000 +CVE-2020-20915,0,1,a64a966835e697246980b7dd251504ce65e4b39e13dc81bc40d2c6e85a2ded3b,2025-02-14T17:15:11.087000 CVE-2020-20918,0,0,1078e9fa8db6050d3d2428579261c92d8e58571d978378a2e23536f654ebb836,2024-12-10T18:15:23.057000 CVE-2020-20919,0,0,bba0a2f1d86378858fdf8ac544bee129e70f02b3ecfcedffc9844fcb562872f0,2024-12-10T18:15:23.283000 CVE-2020-2092,0,0,04be8859f16adeac9602b8ed1b940c27ff2d57e7a02d4c2ab385a42447088ce7,2024-11-21T05:24:35.020000 @@ -153751,7 +153751,7 @@ CVE-2020-23256,0,0,3a28647b096682a62651d74f45d8245cb11dd7d2a22261e5d5a1884f41e09 CVE-2020-23257,0,0,58db84c4712c69083c7e5549cc4247538f9d8b1ff47d27c2b85116149b1b8247,2025-02-13T17:15:26.383000 CVE-2020-23258,0,0,1f38838d4737e0dd5397d959b39c571a6fd5dba0c6b25adba2ea5eb1b372b877,2025-02-13T17:15:26.553000 CVE-2020-23259,0,0,18f6083fb5f85f0a8b02adad3e95c83403f912c94b15b3bdd69c49a0f76d6ad4,2024-11-21T05:13:41.230000 -CVE-2020-23260,0,0,257e40ef14c782ea2ead205c6cedb4cc58d4748dbead231cbf68668dd2cb7f5f,2024-11-21T05:13:41.360000 +CVE-2020-23260,0,1,c8d4bcd4f6566df1a1b24a762ba4e2a3c46412f991c4f0eb7fccbb6382f4bd5b,2025-02-14T18:15:18.170000 CVE-2020-23262,0,0,fffc7685d282282eeb9ace2348e3c639140e4340826553fa80a47320d3339a9c,2024-11-21T05:13:41.493000 CVE-2020-23263,0,0,074f53a073be3c949fbf4c3478e91ec811329cbaae658e8a9a3a516888062e94,2024-11-21T05:13:41.623000 CVE-2020-23264,0,0,597e0be4544083f2a608229fe817e6dc6c5fd55e117fce86f80d984cc3647ac1,2024-11-21T05:13:41.767000 @@ -153778,7 +153778,7 @@ CVE-2020-23320,0,0,83f81c373bdad359cd1aaa4dae93e90f0904deeb9fd430dfcc77df086f7b8 CVE-2020-23321,0,0,beb4699d496203fcf22e90f379245496cb57265544359d9effb4a46070ed27b1,2024-11-21T05:13:44.707000 CVE-2020-23322,0,0,36f0928b828783213d78d02356c86043af3c894b8274bb425139ae0c00baa8ee,2024-11-21T05:13:44.850000 CVE-2020-23323,0,0,e594eccfced38cfa0be16522ec3000a4463535089b84ab095c8b2012cce62340,2024-11-21T05:13:45 -CVE-2020-23327,0,0,660f7109ed6db441f4f98454e160cfefd3b3cf0f23c4e60d4a8c9c9091114f9e,2024-11-21T05:13:45.137000 +CVE-2020-23327,0,1,0a9e2b7d9ee42ea0059487c9bd484263081b7916c959fa99efd830ea2abea200,2025-02-14T18:15:19.153000 CVE-2020-23330,0,0,50915e7010b3b8fde9cb0505791b18a5dc62c0f8f39345ebcd2f2732caa9483f,2024-11-21T05:13:45.270000 CVE-2020-23331,0,0,3d192e77bcdfacce4206a166857b86127cc000a3d88422a6c5db031360fd529f,2024-11-21T05:13:45.410000 CVE-2020-23332,0,0,804a8823028762d0232f75fa1da0df49d5c1b4393f73ca47e4a2d34cd4d2685d,2024-11-21T05:13:45.547000 @@ -154949,7 +154949,7 @@ CVE-2020-2550,0,0,11df22576a2023cce4820fb0d3a7b879862cc9415278389fb2a2dec86bc3d9 CVE-2020-25502,0,0,79f4833da264656ca5f9c31a45ac3aa5db44c1805c29ab01341c4568ccddcd3a,2024-11-21T05:18:04.333000 CVE-2020-25506,0,0,2e400fc66bdfc8b5a5e5a812d6e51a86a8a9985818bb06cd562373a9592ad0b0,2025-02-07T17:15:20.857000 CVE-2020-25507,0,0,b71dcd1b5d328289189972c61ced68277c02c871ae1e7b6f29a78e94b3fc21e7,2024-11-21T05:18:04.740000 -CVE-2020-2551,0,1,f8b2d2ac377c7c351009663ba5ce721ea8e31e8bc74ec5c248a030d1dccf0766,2025-02-14T16:47:28.167000 +CVE-2020-2551,0,0,f8b2d2ac377c7c351009663ba5ce721ea8e31e8bc74ec5c248a030d1dccf0766,2025-02-14T16:47:28.167000 CVE-2020-25514,0,0,863040d2771b3184dcb6c46f51976c64eb5e56018f9e2ca7b49ba687358790fc,2024-11-21T05:18:04.937000 CVE-2020-25515,0,0,25b5448e678154c92763e684efd025a1055feb9f7f2951b6161a52af8a41dcc0,2024-11-21T05:18:05.120000 CVE-2020-25516,0,0,4faa3fdd83ed519265f570560a6650437db49e9d40755c77f1df8706a1ab8ad1,2024-11-21T05:18:05.290000 @@ -154959,7 +154959,7 @@ CVE-2020-25533,0,0,d0dc165d30a6ad36cd348bb4ae4f57a131e3d771839327327d8226fafdb57 CVE-2020-25537,0,0,7f7ed1398fb1fa1992f1a96d0256af9011847a58ad6c28ae169a5f6ff2b45d46,2024-11-21T05:18:05.667000 CVE-2020-25538,0,0,7ae25b4a0ea59106e9705d8d7f20c994fe2a045e31dc3e4a9dc1e8a75842ac59,2024-11-21T05:18:05.843000 CVE-2020-25540,0,0,48d58942216c3cf699170c74a7d74d2d48d21276bb97bcf5823429205e975a27,2024-11-21T05:18:06.023000 -CVE-2020-2555,0,1,1712a69faea8dcd9c83a46c5b49ad3332d684926b096f7e7cd0262fe2d5308cb,2025-02-14T16:47:18.113000 +CVE-2020-2555,0,0,1712a69faea8dcd9c83a46c5b49ad3332d684926b096f7e7cd0262fe2d5308cb,2025-02-14T16:47:18.113000 CVE-2020-25557,0,0,db74714eaea316d8816ffbc38e1880abe418d1fe08ea6667e3868da08d50cdbc,2024-11-21T05:18:06.203000 CVE-2020-25559,0,0,d080c900b11775ce97b28356a3ce56fc648650a2f0df9ebb161e7aa9ca6d6d7b,2024-11-21T05:18:06.440000 CVE-2020-2556,0,0,040a74cb9a8d2878a02cd362ccfabf0a1676098fcf2f537dfb920ace291bfd27,2024-11-21T05:25:31.813000 @@ -157572,7 +157572,7 @@ CVE-2020-29303,0,0,9324a1109a4405f778ed00a25caf94537859c7c4361b894b1a4aff9a99573 CVE-2020-29304,0,0,2067a6abd921b719f93b9166624f69a5658e87a70c7826d713edb7fd35c05d12,2024-11-21T05:23:53.477000 CVE-2020-2931,0,0,0dd9ebfa857cb1b9a8530d553862231a165f43150caaade4bb33e191c7f5d3cd,2024-11-21T05:26:39.737000 CVE-2020-29311,0,0,e63971687a01d5b4bd876cbaa4125f86a3b8cea330c7607a9d1e1c74c97ce807,2024-11-21T05:23:53.633000 -CVE-2020-29312,0,0,563925db0d2e40ed1ec04adbe9ca2bce0a891523d9ab1cbdb80e3c80aea65c23,2024-11-21T05:23:53.797000 +CVE-2020-29312,0,1,f76199c633e09daaa6aad6e015297aff65fb5ef60fcc9de8c6a0bb052f03b7b0,2025-02-14T18:15:19.360000 CVE-2020-29315,0,0,a274b8b84fe4c0f0f33e93388bb3a7917118a77417f3f7d9686b5dafaff00b00,2024-11-21T05:23:53.957000 CVE-2020-2932,0,0,9efbe13439e5d7cebef915d73895a77d9d0bf0545932b8aded18c5143eb63f6e,2024-11-21T05:26:39.897000 CVE-2020-29321,0,0,2b48dc81db593f39d27fd8985dfb88cbc8e5641e59c15fd7daddbc2e93f3e130,2024-11-21T05:23:54.107000 @@ -170003,7 +170003,7 @@ CVE-2021-23863,0,0,7cab24b62cc405661313ee52a5419f9758b316b480f3fa8a4d9016abd7471 CVE-2021-2387,0,0,3ef7805132832f556edb8ca0c9a605b1d6b24180284aaae8ff5e840e4a7e7337,2024-11-21T06:03:01.187000 CVE-2021-23872,0,0,3f15fbffe1f81e630a8d367c7469f8f559412d732c32bbf24f9cc2517c17dff8,2024-11-21T05:51:58.747000 CVE-2021-23873,0,0,f0072ab66e1ff0621f73540b2a45492f2134a83635c95cbd1197b11a01f542ae,2024-11-21T05:51:58.877000 -CVE-2021-23874,0,1,05e4bd1e88a45f71f75e7669654eb02c9719c9d221ce37dc9e4a46679b507384,2025-02-14T16:44:51.907000 +CVE-2021-23874,0,0,05e4bd1e88a45f71f75e7669654eb02c9719c9d221ce37dc9e4a46679b507384,2025-02-14T16:44:51.907000 CVE-2021-23876,0,0,d5e4c1edd58a4c32d72b602f0b62a6f27e289328279a30b51deb852044caf655,2024-11-21T05:51:59.127000 CVE-2021-23877,0,0,f94ef9a6d0c8d7990879b8840321ce77901ff726488ae01244cc88e7a563577c,2024-11-21T05:51:59.253000 CVE-2021-23878,0,0,edd02450da62ee24a3957597728900940e0c32d98672e10cb2c6ed914bc7a745,2024-11-21T05:51:59.373000 @@ -171454,7 +171454,7 @@ CVE-2021-25333,0,0,ff227d70ef7701a972f13b45743cc5032a2c978c28d4d17f7814cbefeb4b9 CVE-2021-25334,0,0,8e07428a640abcb6ab6a1c87055b633cf6d17a9151dc267ca38578370d39bbea,2024-11-21T05:54:46.640000 CVE-2021-25335,0,0,0501a8207b9ff2a2d78d56a9424c789338c55faa0bcd731c0338f7fbdb4c381e,2024-11-21T05:54:46.780000 CVE-2021-25336,0,0,91042dcb36af6b400a2e8b7724d5e552330ffec188912859eb81a74c6e877dd9,2024-11-21T05:54:46.930000 -CVE-2021-25337,0,1,b9ed10a981b086dc0f3163debb2ad0fa51d92bf3d3c0005f2076767d9594af3c,2025-02-14T16:41:48.767000 +CVE-2021-25337,0,0,b9ed10a981b086dc0f3163debb2ad0fa51d92bf3d3c0005f2076767d9594af3c,2025-02-14T16:41:48.767000 CVE-2021-25338,0,0,b165dd7513539c225c676aabcf63b0767941d90c4709a5a9eeb2f48b6233bf40,2024-11-21T05:54:47.223000 CVE-2021-25339,0,0,fe8ddab0ba0922dc1a5d5a941912ee62eb075a532fbcb7a0525876ad5c07dab0,2024-11-21T05:54:47.363000 CVE-2021-25340,0,0,0ef72aef161589759adb87bfdb1b8c6851061769962610c20cfcc46936a528b8,2024-11-21T05:54:47.513000 @@ -171486,10 +171486,10 @@ CVE-2021-25365,0,0,9b87d94b51331d354a46e8d0f67b271d5d42e3b04263738fc9dcfcca1f6b7 CVE-2021-25366,0,0,853557c2fbe145456f792f7f838128626abd9d26ef1a48df74d8f7e91cc6781e,2024-11-21T05:54:50.877000 CVE-2021-25367,0,0,a84c357fa634a4373a4029022692c85c00a9221a5cde6671bf68130b5b7ab6e7,2024-11-21T05:54:50.997000 CVE-2021-25368,0,0,0dfbc6ab769a490cc7d15f83ab51612ca01194161b8c816e32094a387f0d70fb,2024-11-21T05:54:51.120000 -CVE-2021-25369,0,1,9c160eec472774e02919e2d015863f7d2045983a25ae0493da419844c4e78b05,2025-02-14T16:41:01.283000 -CVE-2021-25370,0,1,576a34971e4853c73bec9f82a3401b9cf472ac0e7ad60013e35e010d444c084b,2025-02-14T16:38:52.837000 -CVE-2021-25371,0,1,cd36243402114a76b0107855a0eb9d497c1dc5caefebda409c80f959b30505c5,2025-02-14T16:34:04.747000 -CVE-2021-25372,0,1,86b160ccdc74bcf91622d135840239b25ec685420344c323894c12be814dd35d,2025-02-14T16:33:12.887000 +CVE-2021-25369,0,0,9c160eec472774e02919e2d015863f7d2045983a25ae0493da419844c4e78b05,2025-02-14T16:41:01.283000 +CVE-2021-25370,0,0,576a34971e4853c73bec9f82a3401b9cf472ac0e7ad60013e35e010d444c084b,2025-02-14T16:38:52.837000 +CVE-2021-25371,0,0,cd36243402114a76b0107855a0eb9d497c1dc5caefebda409c80f959b30505c5,2025-02-14T16:34:04.747000 +CVE-2021-25372,0,0,86b160ccdc74bcf91622d135840239b25ec685420344c323894c12be814dd35d,2025-02-14T16:33:12.887000 CVE-2021-25373,0,0,0a636ecdedd0783a78eca93525dcf8717e34e387e54b85c60e2fab9bb7cf0508,2024-11-21T05:54:51.813000 CVE-2021-25374,0,0,65ad7d1eadffea6940323e5c331dcff73a75039b9158891dbbb1e4577314f995,2024-11-21T05:54:51.950000 CVE-2021-25375,0,0,90558dfbc44732b1ac0c216ec51bedbb094fe28f1b4d8534c8df62022d9f123b,2024-11-21T05:54:52.073000 @@ -171511,8 +171511,8 @@ CVE-2021-25390,0,0,934fbe271d9b6862ee3299f6a30053b15716765b85aa5c4f35112b39cab7e CVE-2021-25391,0,0,eea31be5dafe1f78e1ec6c285b2f78359324b20f33fafe005405cd2ac0141358,2024-11-21T05:54:53.997000 CVE-2021-25392,0,0,674d01c9003170398759654b8e03fde72addb0f08d264037d0fc0812f2644bf0,2024-11-21T05:54:54.110000 CVE-2021-25393,0,0,ef26c87ef62accbfd72dedb4783d26a499f13f8f982c2f284442acc6ed2dfd1a,2024-11-21T05:54:54.223000 -CVE-2021-25394,0,1,faffeb95d377244bc122843ec1e95efa42c7c8d76f3b34b2d7dc7f7a86a0366a,2025-02-14T16:32:02.387000 -CVE-2021-25395,0,1,0c4842e82b8a65f8bf62d1b48b258e7e8f0d1b0d61d26a3696485bfa2d4dfbe0,2025-02-14T16:31:44.910000 +CVE-2021-25394,0,0,faffeb95d377244bc122843ec1e95efa42c7c8d76f3b34b2d7dc7f7a86a0366a,2025-02-14T16:32:02.387000 +CVE-2021-25395,0,0,0c4842e82b8a65f8bf62d1b48b258e7e8f0d1b0d61d26a3696485bfa2d4dfbe0,2025-02-14T16:31:44.910000 CVE-2021-25396,0,0,51f385108d71bdae281bee27fff65f97fa79524f15b700924d0d41699a97d860,2024-11-21T05:54:54.583000 CVE-2021-25397,0,0,65d9a492add2f902d60d6765befe97c744015f3e0462d42b2a60d7d5bd1c8fc5,2024-11-21T05:54:54.700000 CVE-2021-25398,0,0,1e400e367f3ec532b51fcd8cadf7d54ead0dfcb40d6c6fde1bc632c52d343da9,2024-11-21T05:54:54.820000 @@ -171604,9 +171604,9 @@ CVE-2021-25483,0,0,0737838fe84cd60f064a8c73117ad476db3e7a150481fa492b67b5a7240c2 CVE-2021-25484,0,0,ab26280706c59307234f1805de698f0d68447842863ee399b31973738f0293b8,2024-11-21T05:55:05.163000 CVE-2021-25485,0,0,0f82cd78fbc66d7680a06deec842bb74b91aef2101e8095da0f38e165ef5be7f,2024-11-21T05:55:05.290000 CVE-2021-25486,0,0,d95e6cf091db0775f5cdf82c155b115bf0765bb1c182cdae97c3428036ab8a35,2024-11-21T05:55:05.420000 -CVE-2021-25487,0,1,7ffa8f7704e5a77df3d9af2d9a9f4035b50315724af78b942081f1b452a0e05c,2025-02-14T16:29:53.617000 +CVE-2021-25487,0,0,7ffa8f7704e5a77df3d9af2d9a9f4035b50315724af78b942081f1b452a0e05c,2025-02-14T16:29:53.617000 CVE-2021-25488,0,0,48b06202aa1f175a2e5367a92a79487ce957f71e864052bc52cde5b13c951626,2024-11-21T05:55:05.667000 -CVE-2021-25489,0,1,47c73252f56f3cba1e8993095725a98fd1f856cf42e8e61d616671d50c245f85,2025-02-14T16:28:02.917000 +CVE-2021-25489,0,0,47c73252f56f3cba1e8993095725a98fd1f856cf42e8e61d616671d50c245f85,2025-02-14T16:28:02.917000 CVE-2021-25490,0,0,6a4212b9084545e64567bbff36bd923e4de996abd929024e0bfa2ae6d4895ccf,2024-11-21T05:55:05.910000 CVE-2021-25491,0,0,0d5c53cc556b2b2a69ac6b8cbea89a5a4a51c8cc8bc032dd3027a2c02cddf012,2024-11-21T05:55:06.047000 CVE-2021-25492,0,0,b639a68d34c27eefe14552713c7ee1a27963979c6aad71ce5cde46dc1b0434a4,2024-11-21T05:55:06.163000 @@ -173365,7 +173365,7 @@ CVE-2021-28211,0,0,ff828dfa313b5633328b79a14614e30ee0c99e76171542b9736c21b43aef5 CVE-2021-28213,0,0,c55f79d4f6b6118720fed6f3d872fa5f8eb22142522249a95caa231015f9311c,2024-11-21T05:59:22.620000 CVE-2021-28216,0,0,ade6611edae65c0073869cbcc09cc1d4710d2a98840bf644994e49c750390edc,2024-11-21T05:59:22.720000 CVE-2021-28233,0,0,65948d93221bced88226f7ec8a34b1647ad8a53c68daf804a458ee07682cef82,2024-11-21T05:59:22.823000 -CVE-2021-28235,0,0,afc21d3e11d28953a7e93c278242d7c56f9a267d518558de6bbb8a8a2cfc1954,2024-11-21T05:59:22.957000 +CVE-2021-28235,0,1,da45f67538dc20009310a206b96a240e124118f7bc3e8af4aa75eb3f534dd927,2025-02-14T18:15:19.620000 CVE-2021-28236,0,0,edec8cfc622a0716141d3d606b288cc1030900e3265685ba319002c064a43a22,2024-11-21T05:59:23.120000 CVE-2021-28237,0,0,c36445855bb0b48b90cff9779a46e91e1e9519216d73871a2e764f6d293985bc,2024-11-21T05:59:23.273000 CVE-2021-28242,0,0,e614b752349c5f0351c3c554092835b7579208b9ac3898d83f2bb48160cdeca1,2024-11-21T05:59:23.413000 @@ -175041,7 +175041,7 @@ CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257 CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000 CVE-2021-30661,0,0,0441a5ee2f1c64ac124688d9a4989971589017aaa8f192870617e176c24a7fb5,2025-01-29T18:15:40.407000 CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000 -CVE-2021-30663,0,1,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000 +CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000 CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000 CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000 CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000 @@ -175964,7 +175964,7 @@ CVE-2021-31698,0,0,18879fc156700073c7a073cbd0e6053679215f66065703a6e52fa6870e235 CVE-2021-31701,0,0,3b7fc844e3574f68535b41bcf1a4ff96d11dda31f6d6f71deffcd2f477a5a422,2024-11-21T06:06:08.213000 CVE-2021-31702,0,0,3b51184e31b3cd07b45d3f25cbc2d8ea9a00bd6683da84dcd5221c9151503465,2024-11-21T06:06:08.350000 CVE-2021-31703,0,0,22adff2322527385489568250286f2b7a48e2986f4721e744c9306658835a696,2024-11-21T06:06:08.477000 -CVE-2021-31707,0,0,4ac69013a139718f6a47768bd20045426db734044bad07dcafd943566dfd2277,2024-11-21T06:06:08.610000 +CVE-2021-31707,0,1,ad6eb0c193ea2c2589b6306593e903ef669490a1a189e9dec40a3ec2b317cb50,2025-02-14T18:15:19.870000 CVE-2021-31711,0,0,5836dc98e69840056d02b3b4b9ab892963f019edd8fd880f83716d65b4cbdefc,2025-01-29T15:15:10.630000 CVE-2021-31712,0,0,37e669b62610110cdd762e83824512920f41fcca6caba3fdc2f22fcab37a94c5,2024-11-21T06:06:08.890000 CVE-2021-31718,0,0,580996eb0d7c77f0e6e30fc28e4dee664cbfaa246540e61ec25791a23ceb3fa6,2024-11-21T06:06:09.030000 @@ -176586,7 +176586,7 @@ CVE-2021-32666,0,0,4c4f2af3e07d949d9f533b85801d6e54199dec3fadaa68fd8814ba1855b0c CVE-2021-32667,0,0,ef8541c06111d0bab98474eb5da3a8d7c3249aea97b723721aa826691e6bfab3,2024-11-21T06:07:29.533000 CVE-2021-32668,0,0,cf45e88602f8ac16d709848fc98217e07394a7c2e681df75e2b57f6e07141e7e,2024-11-21T06:07:29.667000 CVE-2021-32669,0,0,6af6bbf82599d5bd79e690444ce63875cb3125ad4d7b429668cb5dd4f0b214a2,2024-11-21T06:07:29.780000 -CVE-2021-3267,0,0,9d6ba2eb77fb22484cbd1f5c90fb438dbaf52e6b3b3cf990449e6b03e09cf7b2,2024-11-21T06:21:11.180000 +CVE-2021-3267,0,1,37ff17b5c88113a0cb8222837b73bfdc153ad54341dc117b62e0298925a9cedd,2025-02-14T18:15:21.857000 CVE-2021-32670,0,0,c059ca373c2cc10c4107a6b57718cf70bb59bfbc65dc5e45b104b4683317eea2,2024-11-21T06:07:29.883000 CVE-2021-32671,0,0,16b7de915e14c7e140e7cec4c3b8300c375eefe72f58528c9b3daf7ac04b945b,2024-11-21T06:07:29.993000 CVE-2021-32672,0,0,b1c8790ab38b9bc6d33ba4274ffcfe26f77aa9fc819cf60ded82ce58f171a013,2024-11-21T06:07:30.103000 @@ -178696,7 +178696,7 @@ CVE-2021-35243,0,0,f6e97a719b22d8b1b5509dc672bfe534a30a7e93e43464a0d23f11e875a35 CVE-2021-35244,0,0,a11d724e80e60cb0aec16b18f9e65093c9f62ad10fba4dff337deeda01c174d8,2024-11-21T06:12:08.437000 CVE-2021-35245,0,0,28fae334fe2b2b2875f3315b0861d1b3a737e6e1c90f8c7ddd4fa8c8b4028ac9,2024-11-21T06:12:08.580000 CVE-2021-35246,0,0,bce8eefe84fe51706c647d4376f29e654126e555f648debc43a12be1f91dc991,2024-11-21T06:12:08.733000 -CVE-2021-35247,0,1,fa09d522032acca0917229cfbd149e530440b18d96038facd168b4a61c3d5230,2025-02-14T16:44:08.310000 +CVE-2021-35247,0,0,fa09d522032acca0917229cfbd149e530440b18d96038facd168b4a61c3d5230,2025-02-14T16:44:08.310000 CVE-2021-35248,0,0,24d8347dddc660399d71f24358434751dcfc3af4481649621a23e7ae54c1e7d1,2024-11-21T06:12:09.023000 CVE-2021-35249,0,0,e362d82bb1d2155b5c3e2292d0dab2b4685376ab3a8cea64ee33f6854d2cae13,2024-11-21T06:12:09.170000 CVE-2021-3525,0,0,9c77e60fc50560dbbd3fb19ddf79f8fe9f393693c1eeb6c7e40b0a1b51ba25e5,2023-11-07T03:38:04.430000 @@ -181702,7 +181702,7 @@ CVE-2021-39347,0,0,5468fd860dd7490f663e10bc0ad875bc4e8eaaa9be98c6383350a9b891658 CVE-2021-39348,0,0,db93490a1fabb68e4e4f5cbe0087d18e47231b4d98698ed4a4575ae7222a5c47,2024-11-21T06:19:22.320000 CVE-2021-39349,0,0,982bab62e7774800bb1c7bc07fd0dfa2a41528fde6977f3ad1f0c025c9fdb128,2024-11-21T06:19:22.497000 CVE-2021-3935,0,0,24779041c549f8c8fb30676a5359d9da6ab04dccda5884dcb8a6ff5f0c00ba57,2024-11-21T06:22:48.790000 -CVE-2021-39350,0,0,1dc75e06b4fdad90c7944049fd0ea5d77aec18d211c9d5c33855c64f01844c64,2024-11-21T06:19:22.673000 +CVE-2021-39350,0,1,0da2f9891f30ed7ce0f456e4248dfcce705dbcfe021729ba4277f02a6870f140,2025-02-14T18:15:21.170000 CVE-2021-39351,0,0,3440c6bb9dca061fb1ad2ff327136a1d1047db98453181f63b3af7ad89ef7646,2024-11-21T06:19:22.940000 CVE-2021-39352,0,0,4f13ba96fa7bf1728bde171a0f1e750471bd05e2677d519362bfac83c5711060,2024-11-21T06:19:23.133000 CVE-2021-39353,0,0,c156ade851feb2820d7117cca47b728523953d439c0b5e9ee40b2a4a107eb1a1,2024-11-21T06:19:23.307000 @@ -184735,7 +184735,7 @@ CVE-2021-4334,0,0,72152454498bc700f241bb907d29e60a462e9365ecc4f5c7651b849c517d9a CVE-2021-4335,0,0,09097caaff3926158e7866f15414bc3611ceb898c0d4f4588c22f62237753af6,2024-11-21T06:37:26.793000 CVE-2021-43350,0,0,ad4cef3713ac2e538f3d9307e4e0f78d8c85a84f2529f016d5629a8bae389689,2024-11-21T06:29:07.007000 CVE-2021-43351,0,0,d20e5efd445e3a114c7d08e2d6162152c0fb1335624275254ef1f6c404c27dec,2025-02-13T17:15:33.340000 -CVE-2021-43353,0,1,73ad11451e705d28cd0ea0c0883c37cc6dc262faf3e0fcea73e0732b18df2e75,2025-02-14T16:07:28.230000 +CVE-2021-43353,0,0,73ad11451e705d28cd0ea0c0883c37cc6dc262faf3e0fcea73e0732b18df2e75,2025-02-14T16:07:28.230000 CVE-2021-43355,0,0,bf7355e8f081bfa580d6bce404b83dedb9e73618ac66533f1c390e9466c49d38,2024-11-21T06:29:07.330000 CVE-2021-43358,0,0,9e85ffdc032b7f898f882022743c813a5fcf36b26f0a615cfcc619b837df9741,2024-11-21T06:29:07.480000 CVE-2021-43359,0,0,876e77c8b7bb508dba83be786af60a72677057ae51f748820632b7bb0110f904,2024-11-21T06:29:07.600000 @@ -187338,11 +187338,11 @@ CVE-2021-47099,0,0,579f63a4674bb58b236e9da9fe1139af2ccf46e1503966a974004c88b3f1a CVE-2021-47100,0,0,8194feacb46324f3e5be3ab5253c95460b417d0a4e05733f9cd9aa9a457524d1,2025-02-03T13:51:24.110000 CVE-2021-47101,0,0,de8fca709e54b370dde0ccee459a8070abf3ddba20b482ec049ee46d239f5948,2025-02-03T14:02:18.480000 CVE-2021-47102,0,0,51ab38dcd50653d138cea85167c1b1f45f8dddd08a89af56dd795d8c8fdaac70,2025-02-14T14:54:40.247000 -CVE-2021-47103,0,1,d2cecd0cc08020e43c9233e57ab810ff03e400a8ddc81001a7aff71b8a381e91,2025-02-14T15:03:01.997000 +CVE-2021-47103,0,0,d2cecd0cc08020e43c9233e57ab810ff03e400a8ddc81001a7aff71b8a381e91,2025-02-14T15:03:01.997000 CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e1962f,2025-01-07T17:32:24.537000 -CVE-2021-47105,0,1,6c2e1e087ef8084e592aef079392544772701e88eb5da4c918983c4e61d3cc5d,2025-02-14T15:16:27.180000 +CVE-2021-47105,0,0,6c2e1e087ef8084e592aef079392544772701e88eb5da4c918983c4e61d3cc5d,2025-02-14T15:16:27.180000 CVE-2021-47106,0,0,36872d996acf50e93b5beb0c0e62bad3a44984c6d13b840a64e985a80d23d84e,2025-01-14T17:26:11.537000 -CVE-2021-47107,0,1,6baa66a4a489c4baf75a24eff36b122896511cb47e8ac7b563b62629a78034f6,2025-02-14T15:22:22.510000 +CVE-2021-47107,0,0,6baa66a4a489c4baf75a24eff36b122896511cb47e8ac7b563b62629a78034f6,2025-02-14T15:22:22.510000 CVE-2021-47108,0,0,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000 CVE-2021-47109,0,0,d0d4755876ffc6bcaecd2654bbd49d22799ea5ef8fd867c14e00689af63486ed,2024-11-21T06:35:24.957000 CVE-2021-47110,0,0,50cf5c09f89aeaf543ffa132567ade0b5308efed772ea95eb1751760f1f935bc,2024-11-21T06:35:25.077000 @@ -192355,7 +192355,7 @@ CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9 CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000 CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000 CVE-2022-22674,0,0,2adab5b1b423052bbeca74c613db0c7648ffe6c484635ebce9da5a50cd09c001,2025-01-29T17:15:16.737000 -CVE-2022-22675,0,1,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000 +CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000 CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000 CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000 CVE-2022-22679,0,0,4a69ee0e3ac816e3bdec0a7cdd3e0ce5981180ce6ec4900c1ceb73fc1f259fc6,2025-01-14T19:29:55.853000 @@ -196457,7 +196457,7 @@ CVE-2022-27511,0,0,cb04bf6f0e1312fd7a3f1184859a4d953fac2677863cded2d42947c51151e CVE-2022-27512,0,0,d3a873ab20a97ab0a70f04d50540a4ea8297f064322449f47c72bcecf6e17e1a,2024-11-21T06:55:52.267000 CVE-2022-27513,0,0,aea0c7b378e9412ff6e32b7c3e960482f2f395b8bfb1c43e16a03427b1ac74ea,2024-11-21T06:55:52.367000 CVE-2022-27516,0,0,eaa8f97850c9709982d7b6c45381465e8693673e66bbeb61aed74463257bda6a,2024-11-21T06:55:52.480000 -CVE-2022-27518,0,1,5e1f7acf4bbe7de746154076d801b9adbe3a2b2f3d2c20863a5e61b12d8c07e7,2025-02-14T16:45:23.363000 +CVE-2022-27518,0,0,5e1f7acf4bbe7de746154076d801b9adbe3a2b2f3d2c20863a5e61b12d8c07e7,2025-02-14T16:45:23.363000 CVE-2022-2752,0,0,eab05ea2bef4dfd1180a5df7ef3a6207a5719e7a36922bb9ff71e5f103b99ed1,2024-11-21T07:01:38.377000 CVE-2022-27523,0,0,fd88b9278a30c0a13a1a219a3846a6c7b2cd6edde465f27e9c6eb9e545be8cb9,2024-11-21T06:55:52.713000 CVE-2022-27524,0,0,b4f95477778157f5d529e4c761a182caf6831db08682aa888146e31fa83f0470,2024-11-21T06:55:52.823000 @@ -208626,7 +208626,7 @@ CVE-2022-42823,0,0,2706d6d702a162619e5c8c87a113083e113e2f3e61e1cb73de615fb73185b CVE-2022-42824,0,0,d5e685830c1a3c445ce4db0fcabb13d68cfc3c757166d52c61f443ffd19f26f8,2024-11-21T07:25:25.203000 CVE-2022-42825,0,0,5dc9e23b067062d81271ac617f8021956edc3bcba1071ec1aae0b7e0f379647d,2024-11-21T07:25:25.357000 CVE-2022-42826,0,0,92c4ff3890b8ea9adec9d54118fed5a0b345e84992b64cbd5aede5e0795d2144,2024-11-21T07:25:25.490000 -CVE-2022-42827,0,1,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000 +CVE-2022-42827,0,0,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000 CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000 CVE-2022-42829,0,0,60b7d93b772d03e8943ccdbb49b71d351a7499a5bf19d49948ac08d4b6c96b4c,2024-11-21T07:25:25.853000 CVE-2022-4283,0,0,7fc62bdf0195a91399c279623762a438ac8ad3fb55bb1c5f4a208e8fbedf4810,2024-11-21T07:34:56.373000 @@ -211898,7 +211898,7 @@ CVE-2022-47436,0,0,6e5106253c2aa94f6b46b4dda2ba214ba81908c7fc258977997dbb5fda640 CVE-2022-47437,0,0,3a4ae5fe1d9d6d8c3961620f7ed9b4287e7526c775a74cedcfb46f5903e6973b,2024-11-21T07:31:57.500000 CVE-2022-47438,0,0,b3fb4df19dac870a4613aa0ca4af6d161c5f63381ecfab1bd8472a62d1504412,2024-11-21T07:31:57.627000 CVE-2022-47439,0,0,1beea611b0d2d61134a2c1363f83a60c2d88b84b626f7271b176f1cf179ba0c8,2024-11-21T07:31:57.757000 -CVE-2022-4744,0,1,6d53d2caf1098c8e815d22d208f062339d8dcc32deac9eb2d78adb4cd0c200ff,2025-02-14T16:15:32.120000 +CVE-2022-4744,0,0,6d53d2caf1098c8e815d22d208f062339d8dcc32deac9eb2d78adb4cd0c200ff,2025-02-14T16:15:32.120000 CVE-2022-47440,0,0,7bfe0fa1ee11b6f697f687b6815fecc215a6289fe3d64d224159ef8839474f24,2024-11-21T07:31:57.873000 CVE-2022-47441,0,0,ab6a88a99f7917dd338b288a115dd2cc717b28b56c08ed4ba194a40aa1de40d2,2024-11-21T07:31:57.997000 CVE-2022-47442,0,0,b2bab568ca44efb41c7847489e9fa499a3f991cf2c94ffbc917188ac15ee6a28,2024-11-21T07:31:58.117000 @@ -212324,12 +212324,12 @@ CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bd CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000 CVE-2022-48221,0,0,e232e59ba0cd20bf6c005d06a45b36104abcb33181d532af807e9266804a61cd,2024-11-21T07:32:59.250000 CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c35c,2024-11-21T07:32:59.403000 -CVE-2022-48223,0,0,1a1b8d147489a3c3fa5c81528f9e431f114304a422558985b701d70f8184d20d,2024-11-21T07:32:59.567000 -CVE-2022-48224,0,0,ee88c8665f12e05560c7526b3c91f6382c5a60e0b726f261a3d980bf7ada1b7a,2024-11-21T07:32:59.707000 -CVE-2022-48225,0,0,a6ae54d41691aeae705047c9c3cf015025166454e1c3fadfea923075e53d65cc,2024-11-21T07:32:59.857000 +CVE-2022-48223,0,1,27d6b67daff3b23e83f3b18569807a955e5a339f08da09cf3478a30845e757f3,2025-02-14T18:15:22.503000 +CVE-2022-48224,0,1,94b36feb3339eccc317c82f96017e292429a84f2f92b12839aa24a95d48e2890,2025-02-14T18:15:22.703000 +CVE-2022-48225,0,1,70a21bc233df7974e16705f02ad67bbb6b9de8ee1683ad1cefccc4ef0a022d21,2025-02-14T18:15:22.903000 CVE-2022-48226,0,0,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000 CVE-2022-48227,0,0,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000 -CVE-2022-48228,0,0,1728bc5020e9d5ce083789f95266fe6819a7c18f8e1fdc2ca823020c212eae33,2024-11-21T07:33:00.293000 +CVE-2022-48228,0,1,e450ba11de27b02775ab6aaff3059b429ddbf2bdeda640fed595f3d8a8f6a0f9,2025-02-14T17:15:12.873000 CVE-2022-4823,0,0,e7fc5fb9db54eb08d7bdb32316cd03ccc89eddab098ff51ef8ef039a2942405f,2024-11-21T07:36:00.993000 CVE-2022-48230,0,0,e6db329d7865ba3b22f42e4c81ac2be3c151cb8eaf5834575e98ae1fd4a66d36,2024-11-21T07:33:00.437000 CVE-2022-48231,0,0,26f128061ebcc525a2f8b96097ae9bb9c0299076a1ca7053c51862c027a80a26,2025-01-28T22:15:13.080000 @@ -212652,7 +212652,7 @@ CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9 CVE-2022-48614,0,0,5f17c1e0236a3ecb038686458e6d2ae2f0a38e6befabfcc40fabc0484a8bc406,2024-11-21T07:33:36.300000 CVE-2022-48615,0,0,a2d3f96ac3bfcd9e903ceef7f2de4ada3274161ca2b9f6a4519464a6be0e6aa7,2024-11-21T07:33:36.450000 CVE-2022-48616,0,0,8d4f1e489de29041e735dfd21302720627a6ca753dd668e0c1a59241fa9e87d0,2024-11-21T07:33:36.577000 -CVE-2022-48618,0,1,de34ff3ddea313accfbbe411a01db06c948b304c4d3b83cf4b319c3e5e33aa26,2025-02-14T16:20:50.207000 +CVE-2022-48618,0,0,de34ff3ddea313accfbbe411a01db06c948b304c4d3b83cf4b319c3e5e33aa26,2025-02-14T16:20:50.207000 CVE-2022-48619,0,0,f430858d69110262595d406cd59141f3129992f61f2999c2d0d7c3d7ff52a7cd,2024-11-21T07:33:36.937000 CVE-2022-4862,0,0,be69f043a9d2fc07d2bd44e10e599677353fe08d4b473ec2a857caa22c42f526,2024-11-21T07:36:05.530000 CVE-2022-48620,0,0,3a0147023a2ce808093311def3d214b6bfe6456b70abb680e638fd93230ae406,2024-11-21T07:33:37.200000 @@ -212664,7 +212664,7 @@ CVE-2022-48625,0,0,ad1548e03625a1597bed096d4ae7617552f2279c80077db9d95ac7c5db9b1 CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000 CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42ac12,2024-11-21T07:33:38.493000 CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000 -CVE-2022-48629,0,1,8dc9651dec90ba27f16ecc9756ef659eb59364be16f98fb06b092297768e5e32,2025-02-14T15:31:56.023000 +CVE-2022-48629,0,0,8dc9651dec90ba27f16ecc9756ef659eb59364be16f98fb06b092297768e5e32,2025-02-14T15:31:56.023000 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 CVE-2022-48630,0,0,c1c0b149824310772dd2a34eccec1464745f453029fe1e494c66edf69e66a0b2,2025-02-03T14:09:55.317000 CVE-2022-48631,0,0,07cfa709b2311dbd1149137d694e3cc56dbf7ee50a39f3e8764d7c810d0b445c,2024-11-21T07:33:39.040000 @@ -213660,7 +213660,7 @@ CVE-2023-0492,0,0,9a42b95385a6a697457a253f3876b4596a6ab1ce2819f8e960b2526ffa8d64 CVE-2023-0493,0,0,4112b37c84480c3e817b15aba44244f27f093695299d80f2ccbb4dc5be272ce9,2024-11-21T07:37:17.177000 CVE-2023-0494,0,0,c083092600de4ca351a525eede5bc72809fab04cd036ce7bb33c9ae445308d61,2024-11-21T07:37:17.293000 CVE-2023-0495,0,0,42e3e269fd43fef4c85f3d8efb43f1676eb73a2998c0038556ec35d9df8d9ea4,2024-11-21T07:37:17.437000 -CVE-2023-0496,0,1,76dfc339b37fc8f39bdd911715fe72ab4603e4fe8a10357be39ba3c4482e300a,2025-02-14T16:15:32.377000 +CVE-2023-0496,0,0,76dfc339b37fc8f39bdd911715fe72ab4603e4fe8a10357be39ba3c4482e300a,2025-02-14T16:15:32.377000 CVE-2023-0497,0,0,60487cc13983df9ea1a2d5a704f12a258915d999bbd0a3c673377072ca11c4d0,2024-11-21T07:37:17.637000 CVE-2023-0498,0,0,b7886f1a846cff621926a1aea74a90e3ef5ba141538b1390dabc670454886ae5,2024-11-21T07:37:17.740000 CVE-2023-0499,0,0,91294ffbd02e40603b2ecddcb2eaf6b20ff170eab656029edf87cc433010d8d1,2024-11-21T07:37:17.840000 @@ -213971,7 +213971,7 @@ CVE-2023-0816,0,0,e4897db916c1856b36a6495c9f4308e532dbeaa05a846ba1ef2a7f207fca65 CVE-2023-0817,0,0,19b88c03dbbb11694a2a5d6892221e73558412e74cc65f442728217321504daa,2024-11-21T07:37:53.680000 CVE-2023-0818,0,0,17a4bed7d899b6c667dddebd31ece5866f5498c113e77d90353dd4d976d7ae0e,2024-11-21T07:37:53.803000 CVE-2023-0819,0,0,732cb5cdec515d38806a8ab32b5c4ec21ded9689a423fb53549ef120c8ab0ee2,2024-11-21T07:37:53.920000 -CVE-2023-0820,0,0,ee284eca5c7a07b0f27a869c224dedb7e27fc9709e576bfc89a20cd2c1e35f5b,2024-11-21T07:37:54.033000 +CVE-2023-0820,0,1,d4e8d556c9c4891d11d2e9dd0b76f7122ec65b0a7125ae6387c29cc3f91a00e9,2025-02-14T17:15:13.047000 CVE-2023-0821,0,0,3455e0344ee316a578072bfc5494a2d380b578da04125bf3eb637c3dcc080349,2024-11-21T07:37:54.133000 CVE-2023-0822,0,0,196b4e1cc22b3dfa2c5e0827d76689fe74fb8064a6cbb080ac682f63d17b3a1e,2024-11-21T07:37:54.250000 CVE-2023-0823,0,0,c34702ee841582a3626b614f2cb62dd08957654aa8afe31ae377a280c6ee431b,2024-11-21T07:37:54.370000 @@ -214260,7 +214260,7 @@ CVE-2023-1119,0,0,cc2e7848f4d29e726fad3dba5c2b07a98b7a4d33850c96eb155893535adcd1 CVE-2023-1120,0,0,b313dc3a37aa554347f5bad885aec86ca9d52dfd80518ca96552c7365884d6a2,2025-02-11T22:15:25.103000 CVE-2023-1121,0,0,089d782a82e821909cb68a4ebfe7835a0ca6c200e710aad3891a42c602a8efcc,2025-02-11T22:15:25.260000 CVE-2023-1122,0,0,d5eb3d5c6081ccb951c254d33499c5dc70074c5f7c8aa018ec657773c9a3ccc6,2025-02-11T16:15:31.030000 -CVE-2023-1124,0,0,00a114e1345472243e7f63bff578020925d0b4230677958280b633a7b72a33a8,2024-11-21T07:38:30.237000 +CVE-2023-1124,0,1,8228b71663b15ef2c6ac57a575e3448c49256cd9b482a225d72c027730abd49a,2025-02-14T17:15:13.237000 CVE-2023-1125,0,0,0bc566bbdb62dcad8091c8081ce75445a49f94a8b4e6e6d4048f5cf9a816327b,2025-01-30T15:15:12.337000 CVE-2023-1126,0,0,9fc9b888208d8d827307e6e3ebe5c44643190473be44a4c9eb36634780a04309,2025-02-04T18:15:32.510000 CVE-2023-1127,0,0,8168835cb911ea2b9760c462e21a4895b18aacd80959a479a7ceb803bce4449c,2024-11-21T07:38:30.587000 @@ -214459,7 +214459,7 @@ CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb5 CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67dfb,2024-11-21T07:38:55.873000 CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000 CVE-2023-1329,0,0,b2e4f3215159542e7296a14fbcf5e79cb24a4fa75367f2e3939929920f0d53cb,2024-12-31T20:15:24.907000 -CVE-2023-1330,0,0,fb998c6d385739d0cc045d945db5b6cca250d4f0081b84310e4edeed4d48c72a,2024-11-21T07:38:58.333000 +CVE-2023-1330,0,1,1c627cce91a07640ba8073d7e1c4b56e86c09f12215e8f5019a829f2c4eff067,2025-02-14T17:15:13.420000 CVE-2023-1331,0,0,36b5c87712eaba3344dc889bc56b8b5bc41125024364b7bd747ba9f6fc579fa0,2025-02-06T17:15:15.157000 CVE-2023-1333,0,0,d4bafa576022a40fef05d50099c0360fe7172c3408ea7356a3dd933190cf0139,2024-11-21T07:38:58.590000 CVE-2023-1334,0,0,0a23b2e499766fa6ce028552a491e4f8fabba83e78938389658beff7b6f52b68,2024-11-21T07:38:58.720000 @@ -214519,7 +214519,7 @@ CVE-2023-1389,0,0,8f89074c1a8c711e2bea4af4fa5338deb195b223e2e7cd99c3f8e764bed12e CVE-2023-1390,0,0,7331f03e3563907490d577cc29d15ce6567f80dbbe2b65c66cec2bf6df79abee,2024-11-21T07:39:05.540000 CVE-2023-1391,0,0,dd784b997154ae9f5feebc422fa4117056b904bb755b97ad2709765998f29aae,2024-11-21T07:39:05.680000 CVE-2023-1392,0,0,cde70ca055d8e11ec46365f3d51bb4ad97c60b1b0f1dc3f20fa372e18083459c,2024-11-21T07:39:05.823000 -CVE-2023-1393,0,1,be2c946b6cdd4d6f2b54c32d2af7944414fe959eabb85e81cc8e50121ca5aebf,2025-02-14T16:15:32.567000 +CVE-2023-1393,0,0,be2c946b6cdd4d6f2b54c32d2af7944414fe959eabb85e81cc8e50121ca5aebf,2025-02-14T16:15:32.567000 CVE-2023-1394,0,0,b87bc0f8a98027d7e4ef1c1f09ba2e5adf719937573fec54b546ada2e2a14fcd,2024-11-21T07:39:06.110000 CVE-2023-1395,0,0,ed4ed114d7aab678019663f03fb80f0e2481cd2541cf962d1a3f177411989811,2024-11-21T07:39:06.257000 CVE-2023-1396,0,0,ed0787e0caaad7b4ba137ef84ee4e5251a5084676f7892204686309f5841d8be,2024-11-21T07:39:06.390000 @@ -214777,7 +214777,7 @@ CVE-2023-1666,0,0,0a6bd042bfce50ece02839147998ce826930595674c07380fe99c25993f1ec CVE-2023-1667,0,0,007039c95c2a66e283c8829a0e671b3f5d75acb867d7db6331aefe56e15ddde2,2024-11-21T07:39:39.170000 CVE-2023-1668,0,0,7026e054ee0e1ffc09cab5612ac02a2a9656fa9a506d74dfdcbe04798943fef0,2024-11-21T07:39:39.313000 CVE-2023-1669,0,0,5311d150809ab6943484d0b3367f043531bf3f82c64bcbd57f3439c66b969218,2025-01-30T15:15:13.580000 -CVE-2023-1670,0,1,036a79bd1e5e5ce29e819a7d98dd0bbdf0d99c9869840f7b8d347933ed996d04,2025-02-14T16:15:32.807000 +CVE-2023-1670,0,0,036a79bd1e5e5ce29e819a7d98dd0bbdf0d99c9869840f7b8d347933ed996d04,2025-02-14T16:15:32.807000 CVE-2023-1671,0,0,ffd3253ede7b7e2fd00316e35b2d726f31e096e4810fa25700d5c280f05a32d0,2025-01-28T22:15:13.780000 CVE-2023-1672,0,0,2db498d952eda584270e55192f274b101001777d9a798432e84a793434073e3a,2024-11-21T07:39:39.810000 CVE-2023-1673,0,0,99969e71813952466a7fd54f2261c2e54244633ad230fcdc31ec71fb6752c49d,2024-08-20T18:15:07.140000 @@ -220281,9 +220281,9 @@ CVE-2023-26112,0,0,ca3318453a5a7976f1c04dfb59326cfc6cf9d7d5298decf39a9aec06a65b4 CVE-2023-26113,0,0,06877511e2cc6bc44a83f319880c7a1f3a7440c37b239acc930562be29d6672b,2024-11-21T07:50:48.090000 CVE-2023-26114,0,0,a98acd6d9958ca28cc5826be742772be258004cdd0bc194956a3a30b9cadb363,2024-11-21T07:50:48.217000 CVE-2023-26115,0,0,60042812025b1ce8df10a7d365a091a770a710575fd61891989787b6346922f7,2025-02-13T17:16:11.457000 -CVE-2023-26116,0,1,baf1d1eba377c75745e326a15617113f6f98c216b80f7258418a57d41ee00618,2025-02-14T16:15:33.003000 -CVE-2023-26117,0,1,733852817ce430778650b261dbdbe3a7cce4ed2dc5c6b80c08b70a792f909933,2025-02-14T16:15:33.197000 -CVE-2023-26118,0,1,d7282444c8dc8aa57c9cf59ad987339dbb22b903c0212137914f04f8116b29a1,2025-02-14T16:15:33.347000 +CVE-2023-26116,0,0,baf1d1eba377c75745e326a15617113f6f98c216b80f7258418a57d41ee00618,2025-02-14T16:15:33.003000 +CVE-2023-26117,0,0,733852817ce430778650b261dbdbe3a7cce4ed2dc5c6b80c08b70a792f909933,2025-02-14T16:15:33.197000 +CVE-2023-26118,0,0,d7282444c8dc8aa57c9cf59ad987339dbb22b903c0212137914f04f8116b29a1,2025-02-14T16:15:33.347000 CVE-2023-26119,0,0,f93a334e0160c827052e0af69b00f60534e9df865ca4c7bec961bb316d4460b4,2024-11-21T07:50:48.910000 CVE-2023-2612,0,0,57e09250cbbb5f9fdf97ab03b7cbb5b9b8b3fc17d712b76efa77b7020561473c,2024-11-21T07:58:55.937000 CVE-2023-26120,0,0,578da5eb0a19c2362572385c76f15c9cb03dc2a25b05a3b56c0c381b4cbbe795,2025-02-07T21:15:11.380000 @@ -220957,10 +220957,10 @@ CVE-2023-27083,0,0,f52240e94afb722f2a0c557f9dfb89c9e41d5209858d5fe1be554d2aa3a26 CVE-2023-27084,0,0,51fa935312ba7697cbfc9f718a0e6e8ce4c1cb436f9a6c625e6f130cae980cc1,2024-11-21T07:52:17.603000 CVE-2023-27087,0,0,62062eb54281a98680e3ca37472d8d8504959fb8cc251235c57f6fbe0712b15d,2024-11-21T07:52:17.770000 CVE-2023-27088,0,0,02388a593b99babc1f18f212d3a41091d176beb534c47dbe7068491745b34256,2024-11-21T07:52:17.920000 -CVE-2023-27089,0,0,a75d6ec4a19b11f39de9acb9868bc2c6fab6e5c8f3eed5d4b5445d496a9989eb,2024-11-21T07:52:18.070000 +CVE-2023-27089,0,1,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000 CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08 CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 -CVE-2023-27091,0,0,d4ba304ffb75eea3be25d80217867e80c75976fcd193953ba519ec18469bb160,2024-11-21T07:52:18.373000 +CVE-2023-27091,0,1,f86a2899fcddbc2f1a0075b1ce6fe65ae6b87d6707bab315e9b6e4deab518756,2025-02-14T18:15:23.107000 CVE-2023-27092,0,0,cf3f3f0aaada06ef1105abffb2ded8a829e5905a1e5298bb29b9a9ff84578a52,2025-02-06T16:15:34.183000 CVE-2023-27093,0,0,75ab2d12a6e9a95bb315b505a78454ddc548197730f843a655ef303062aa9b5e,2024-11-21T07:52:18.680000 CVE-2023-27094,0,0,efe71e92652676c9e8d5adcd8c0958e6d181e1ab904060580293934e81cb5b9f,2024-11-21T07:52:18.833000 @@ -221345,7 +221345,7 @@ CVE-2023-27532,0,0,6197657f54029169c51ead71db1e6e827ed06db04f0056bfbee40be032c0d CVE-2023-27533,0,0,4454110a1b2f4b69eb0494f7d72ff64548b9621981ce044c5c229000994a20ec,2024-11-21T07:53:06.787000 CVE-2023-27534,0,0,89bb3378a6d88f9b6e7db9854c050ad3fe776e1519d432e0012c35b7535689e5,2024-11-21T07:53:06.953000 CVE-2023-27535,0,0,c2b4abc030cb6f06518e4e055ad1676e5925ae5eca610f01961ce82bf7c34b3b,2024-11-21T07:53:07.093000 -CVE-2023-27536,0,1,a4af848d0162c4b13eea291be876c794190c2536ede151eed1a7d9ce0469f7dd,2025-02-14T16:15:33.497000 +CVE-2023-27536,0,0,a4af848d0162c4b13eea291be876c794190c2536ede151eed1a7d9ce0469f7dd,2025-02-14T16:15:33.497000 CVE-2023-27537,0,0,26116245d5d8e954b6679b002b6cf07b10f8de81bf04eccd9a74edc79eae29ab,2024-11-21T07:53:07.407000 CVE-2023-27538,0,0,ea16ad7cd9b8585d2cdc0b52344854924f577fe779142b677c99cf89474d171b,2024-11-21T07:53:07.540000 CVE-2023-27539,0,0,79c56876ceb58bbd6b856aaea0384a545d7c13f924cf40b93447a0213977b7c7,2025-01-09T22:15:26.340000 @@ -221486,7 +221486,7 @@ CVE-2023-27729,0,0,7c31b222e84fc45a91ce56ab304b7ee08f217b5898423a6f251ed647b0b72 CVE-2023-2773,0,0,7873dd9f74ed847c32c6f25a2b1ebc492d8ca86ced180ebe78f8b36faa6bda9b,2024-11-21T07:59:15.893000 CVE-2023-27730,0,0,c2d514200981ef741f314869d376e098eba05128ef93a150340ce4fe1b36472f,2025-02-11T22:15:26.463000 CVE-2023-27733,0,0,384025e35fc12373e2b3d4230ff964fe5ec331e83aaaff69635a84e8c28228a4,2025-02-06T16:15:34.587000 -CVE-2023-27734,0,0,01154d8f72fba72ec3cf035fcc1ec3110c93353017e97e9a346b3ac49683ca1e,2024-11-21T07:53:24.310000 +CVE-2023-27734,0,1,3a552b392beddd385ac6e89bc0793be5f771f4f565040d0038d87f88d16fbc9d,2025-02-14T17:15:14.047000 CVE-2023-27739,0,0,4fc8206e922185a194198a67cfda3f0948f74d71cd7be3a4e7cb7cbd8a0dbd45,2024-11-21T07:53:24.487000 CVE-2023-2774,0,0,4242333111818d6e1455249017304bc7c955142266fc9f7abc16cde77a827466,2024-11-21T07:59:16.013000 CVE-2023-27742,0,0,eeb27542dab77347037e915d0acb31ea4e530885c1520240f103f129488f701c,2025-01-23T18:15:27.437000 @@ -221501,7 +221501,7 @@ CVE-2023-27752,0,0,6adf0a84e3fe66f88124773064d313db8b29054b4f97804e56c422189369d CVE-2023-27754,0,0,5c9c1de0660f6854dbe180fc8816d6fb3e3001aab2ebf71bb2533728b259f95c,2024-11-21T07:53:25.660000 CVE-2023-27755,0,0,030e4e29a08e32cec80a06cfd9ceed9e6a484ac94095525885308529b6a5215a,2025-02-06T16:15:34.790000 CVE-2023-27757,0,0,2b1c31a8bd90f1ac9fd058810f197194db7cc21789aa13aeb9c645b2425f2f86,2024-11-21T07:53:25.947000 -CVE-2023-27759,0,0,a5a7499505e5eb10085796c47747c10374553b53ecdd40ee382826bcf99fd9ef,2024-11-21T07:53:26.090000 +CVE-2023-27759,0,1,7a267de726e4dc42036281eaebf1377a0fe10a0efc081203dc822a1bff303e31,2025-02-14T17:15:14.240000 CVE-2023-2776,0,0,c43d162098572ad524d5e0e996e016c6aa5164a6c37cb6f3692cd2e35bfd14fd,2024-11-21T07:59:16.263000 CVE-2023-27760,0,0,e030fbde06c94af855dcd532801f471acbc0186148872501268b8b74ad215be1,2025-02-13T22:15:09.083000 CVE-2023-27761,0,0,270ebc6bed1d0454b51818bf8db299057a6af687838cbabc83082626fa67dde3,2025-02-13T22:15:09.283000 @@ -221917,8 +221917,8 @@ CVE-2023-28200,0,0,90b2364c847846eba81dfb147336286e8c7916c6be1729687f3a054ae63f6 CVE-2023-28201,0,0,25cf76f2308bb8f683911400d2c731cacdbb3e4887ef863ecd6141f6625d6707,2025-01-29T19:15:16.087000 CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000 CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 -CVE-2023-28204,0,1,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000 -CVE-2023-28205,0,1,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000 +CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000 +CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000 CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 @@ -225246,12 +225246,12 @@ CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000 CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 -CVE-2023-32434,0,1,42596ff5ae4fb139b2acc3abf53f450f1caad6bae0433eed7bb706d063a58cc4,2025-02-14T16:21:23.733000 +CVE-2023-32434,0,0,42596ff5ae4fb139b2acc3abf53f450f1caad6bae0433eed7bb706d063a58cc4,2025-02-14T16:21:23.733000 CVE-2023-32435,0,0,daf2b1c2b3ed078f49d50583ccdcb859cdc35675e5eea44b5471538e85b4b8ce,2024-12-20T17:49:17.260000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 -CVE-2023-32439,0,1,4baacf283b9d79b87bcfecc58fdaabdd57ac28650a66e62768f1631928746797,2025-02-14T16:21:08.937000 +CVE-2023-32439,0,0,4baacf283b9d79b87bcfecc58fdaabdd57ac28650a66e62768f1631928746797,2025-02-14T16:21:08.937000 CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000 CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000 CVE-2023-32442,0,0,98f289f358fe3d399579852388e283e7e5fc6845dcb9c9c6f3e95590d3822789,2024-11-21T08:03:21.610000 @@ -226727,7 +226727,7 @@ CVE-2023-34194,0,0,b7871e681e01ec42198e77eda731a4939d1c785c4b2346293df4e2f9dcc0e CVE-2023-34195,0,0,1ba4f9585565b817e14ad2c1e757fdd42c04587c2c99d95ce7977396ce5dfaa6,2024-11-21T08:06:45.087000 CVE-2023-34196,0,0,a311bb6b34b10f626f5dcd298cfb368186f926ffdec6465e9b3b1cd3b576ebe4,2024-11-21T08:06:45.250000 CVE-2023-34197,0,0,06522ccd17c735fc1f7dfe41abd8c6678d1c90460e8a9d4cbd4d910b5b59309b,2024-11-21T08:06:45.420000 -CVE-2023-34198,0,1,3d73ada84600a7dc180d9c148f17fd320d6d8acaa440b420f81b48e3a8270d67,2025-02-14T15:51:57.213000 +CVE-2023-34198,0,0,3d73ada84600a7dc180d9c148f17fd320d6d8acaa440b420f81b48e3a8270d67,2025-02-14T15:51:57.213000 CVE-2023-3420,0,0,6ea269c36b7ff3348314077c461927d7b2a3a9711b5078ded39d2317dafb529d,2024-11-21T08:17:13.613000 CVE-2023-34203,0,0,e988bada7468b71fbe163cb5a901bb9bfbd5b566185ac2ec1475990a3d8e82a2,2024-11-21T08:06:45.743000 CVE-2023-34204,0,0,2085d92ee4fa7325f459c75c9c90144feb8346c815d714333aad450d91c8c154,2025-01-10T21:15:12.553000 @@ -226934,13 +226934,13 @@ CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608 CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c6740d0,2024-11-21T08:07:09.990000 CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000 CVE-2023-34396,0,0,cabb805a02df64f428d581ac19cc4a5993ad0b37fa13e2c2b635c0e2751edd5c,2025-02-13T17:16:36.117000 -CVE-2023-34397,0,0,249577ceb91ef7e113cb65f6b19506db3856bc2ebed7264fcfc2f88129aee8f5,2025-02-13T22:15:10.470000 -CVE-2023-34398,0,0,1f12e56c45fe1c1220e96832c656b1bd5fc51e1632b5dc21f1555c6214ea9f7c,2025-02-13T22:15:10.603000 -CVE-2023-34399,0,0,0c3b36247c736bcfd69a9407b89938ceed0202f9e093f20c1d489d20cb170fd4,2025-02-13T22:15:10.730000 +CVE-2023-34397,0,1,4dcb8c2f369cf6aa81bd143703a384a84f3d6f06ad9e452a9092b78a02889c55,2025-02-14T17:15:14.477000 +CVE-2023-34398,0,1,43fbc9995447dbf36a12b91e5c513cc66c11c4f52a06af32faf20f92f6039908,2025-02-14T17:15:14.640000 +CVE-2023-34399,0,1,5ca9c79d07a0eed86009de7626ef80e829d5712f066e69ff7cf9281ee1a9a9db,2025-02-14T17:15:14.790000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 -CVE-2023-34400,0,0,c5be95075437fd5867697c3f2c6ea06de62d25c541de8b0de4525dbe7442c060,2025-02-13T22:15:10.847000 +CVE-2023-34400,0,1,5a074108ed168764e3b4bd70fc729486e7e989f41a27084470ea99d1344149a0,2025-02-14T17:15:14.933000 CVE-2023-34401,0,0,a56ec84af0fc63a7e1b026ee8045ffc0b54afd7dbac33da84057cec72673c587,2025-02-13T23:15:08.867000 -CVE-2023-34402,0,0,192b4617fe538192127cae04e62c627e8669702950b4404c454130dab6128709,2025-02-13T23:15:09.337000 +CVE-2023-34402,0,1,82c91e85de59b1ff4e9705d15acb6fb7c7c7ea6990ff661965d27cd67ea6faf3,2025-02-14T17:15:15.087000 CVE-2023-34403,0,0,eb0dca1a5f6454558c31d75b6ed692ae490c22c970720bd85806096597d47c16,2025-02-13T23:15:09.440000 CVE-2023-34404,0,0,335287281ac129a1025cb1021db0841bd6f7c8376ff5d231f9f4540744b0246e,2025-02-13T23:15:09.553000 CVE-2023-34406,0,0,36bc16e478a055fb4fedf2e4d8547169137b2607058a49615980dca05a514b16,2025-02-13T23:15:09.633000 @@ -229065,7 +229065,7 @@ CVE-2023-37446,0,0,be821897afaefff3511ddbe99c1766d2aa99608bc19be9be22c2a6416daa5 CVE-2023-37447,0,0,15bd69699d2b2992e93ae4e14ad90f556204e72caa0bee115e5bfe633e0f527b,2024-11-21T08:11:43.753000 CVE-2023-37448,0,0,68bcc01a6fac47e3f732bd1cef7dc5013483e1f033183d8d9f34d5dcbd19793a,2024-11-21T08:11:43.893000 CVE-2023-3745,0,0,9144ad8cbe174bc79191569e1be593f42fa833e4e8289a4912c02fef5b3192ba,2024-11-21T08:17:58.043000 -CVE-2023-37450,0,1,1957b18921e5dcfb3f7ab45c81026f696f7b802f917f32b3c46d8c71c446c703,2025-02-14T16:21:00.223000 +CVE-2023-37450,0,0,1957b18921e5dcfb3f7ab45c81026f696f7b802f917f32b3c46d8c71c446c703,2025-02-14T16:21:00.223000 CVE-2023-37453,0,0,688beea879fba5f45b055ba0ddbbc6400f31db0bf5103255d2b19ec2de0ca61e,2024-11-21T08:11:44.167000 CVE-2023-37454,0,0,2f6e432da2269381eae5b8211281992618e37122fa5a7abc27d22a1db1174552,2024-11-21T08:11:44.337000 CVE-2023-37455,0,0,c6a24bb6c4f50c17800628cdf4a4ece5759bfe34b2075c554fcb668f4e286189,2024-11-21T08:11:44.510000 @@ -229852,7 +229852,7 @@ CVE-2023-38369,0,0,20343162d9fbe7902fadaef9efe17c5051b8d190ce29e8425fee989b8cd2e CVE-2023-3837,0,0,1c8c650f050e84921fdaead1c4c5a1a0df598520d6482451fefe73e36028db65,2024-11-21T08:18:11.033000 CVE-2023-38370,0,0,b7ccb5176facdb451d7554ba4ec01435eb4dc56150e26b9ced868b14dfd98ff7,2024-11-21T08:13:26.007000 CVE-2023-38371,0,0,1446675c3b5181c2d309304841fe901df9e5420c29dd2a9222b911c219848746,2024-11-21T08:13:26.153000 -CVE-2023-38372,0,1,b03c2a85ddb8f23ed4f41c6b5b26671338b8e2d7d3c899f3b7a31b308b6a7a41,2025-02-14T15:52:09.427000 +CVE-2023-38372,0,0,b03c2a85ddb8f23ed4f41c6b5b26671338b8e2d7d3c899f3b7a31b308b6a7a41,2025-02-14T15:52:09.427000 CVE-2023-38378,0,0,09878116cd50966203add5abb56815392a3f0061ea3f67418c3364bebcf9b250,2024-11-21T08:13:26.420000 CVE-2023-38379,0,0,b8e53ed20a0871cce6cc5886ac5103c03bbf4e697b33c09bcbbc0850ab732eb3,2024-11-21T08:13:26.590000 CVE-2023-3838,0,0,8ae6540484781f1c79bdd0a31d0b198d67d3d71d1042fc002dbee173e2bb813c,2024-11-21T08:18:11.180000 @@ -232126,7 +232126,7 @@ CVE-2023-41161,0,0,307d8c4bbd9a441112b4eb2bded0f94d6858f6c9ff5752c38173bb7b5da11 CVE-2023-41162,0,0,cc9a6c121b802573a6849604732627c885c7e95ceebf82c8f61fbe134e5667d9,2024-11-21T08:20:42.123000 CVE-2023-41163,0,0,8dafab982452c309eaf5cb96bceda70e31c682e5c3a67dd80f3f21be80610a3d,2024-11-21T08:20:42.290000 CVE-2023-41164,0,0,7472210de273c0c8c72277fc5803b87265c1ebe2e6da5b5479f67abdc0fc6971,2024-11-21T08:20:42.437000 -CVE-2023-41165,0,1,43276d7df98c699f4c491bcba7fd174526f1ebdf7b6826c475ccfa3f3c726e0f,2025-02-14T15:52:28.190000 +CVE-2023-41165,0,0,43276d7df98c699f4c491bcba7fd174526f1ebdf7b6826c475ccfa3f3c726e0f,2025-02-14T15:52:28.190000 CVE-2023-41166,0,0,29af2fadfeb4b27f2c42b4a6cdf53fd1ac4792501c09b4089cf3127cd8bcdb93,2024-11-21T08:20:42.740000 CVE-2023-41167,0,0,485abecf1737fac19186f2b4af091bd856710beac88e6660bf07b08bec93d7e3,2024-11-21T08:20:42.890000 CVE-2023-41168,0,0,e252b3fbd759e16bb84f468827cc234b53e26428d134892dfbf0149589bf1085,2024-11-21T08:20:43.037000 @@ -235410,7 +235410,7 @@ CVE-2023-4587,0,0,3a9fe164cb2df923f2f50272c67b53445a791eb4750e6133681ea24bca3943 CVE-2023-45871,0,0,7f1cf52edaf736e630906e07c1df7e046f3c28b685a63c5dd8f00a31bab17c2f,2024-11-21T08:27:31.720000 CVE-2023-45872,0,0,4d24e71e460fe608650758386049867baf8ea95f6f98c472e7539440ca6d03ea,2024-11-12T21:35:13.113000 CVE-2023-45873,0,0,026c2bb393889c1cec762f096fdc905b0d0bd0f37c60e4bd68f52732c02e9b97,2024-11-21T08:27:32.103000 -CVE-2023-45874,0,1,713d852ab2fc30e9c98fd917f35b3b19ed7ceae245c4e89f843204a7f9400428,2025-02-14T15:52:18.750000 +CVE-2023-45874,0,0,713d852ab2fc30e9c98fd917f35b3b19ed7ceae245c4e89f843204a7f9400428,2025-02-14T15:52:18.750000 CVE-2023-45875,0,0,ebbc8792c74192c3ca1116cf3a0dce87fd3248ca98ef5bb38b34c4e9ce057add,2024-11-21T08:27:32.460000 CVE-2023-45878,0,0,9226b6c139f5d4fc59bd866d727a14b0289a871957f279deb52bb1157f73904d,2025-01-08T17:15:14.387000 CVE-2023-45879,0,0,274b1b1ac86ebf8f8b0e6f21f75f6462c42f834b218289ad7758f16bb852e0a4,2024-11-21T08:27:32.800000 @@ -236734,7 +236734,7 @@ CVE-2023-4763,0,0,c12fc325809eb1fa0e25ce3fe57f886e3a8c3eca068cc421101774c60f70c1 CVE-2023-47630,0,0,8b928875fae0998d97a8e6c96cacf3a596a8814e10723e995789b00897c40736,2024-11-21T08:30:34.003000 CVE-2023-47631,0,0,98389b62eadbaa1a996e61411aed8f515a4c88af2b505aba3f094376debecb6f,2024-11-21T08:30:34.130000 CVE-2023-47633,0,0,cd7b8e8e5f43218d34bc9d543ce1bc7d60ecb2f05e4a7141da55877dae048d63,2024-11-21T08:30:34.263000 -CVE-2023-47634,0,0,fc3a17ed2a20ca50780c27f93eac8e846b5bff0cdb5a32d51e1859a0d9d0410a,2024-11-21T08:30:34.400000 +CVE-2023-47634,0,1,4336948cecdf76bc3d8498b35a59fd8edb82342a39a80f817d48ffd3a2f35478,2025-02-14T17:29:55.400000 CVE-2023-47635,0,0,7333de09ab3fd2ca44d686d58adc57c6480b6d3c7d020a8750b0277bb0b40f62,2024-12-16T21:28:47.970000 CVE-2023-47636,0,0,6aa2ccab8ffea2a137282b65340b7d7ea26cc0f05896154692a2d77b8c507b01,2024-11-21T08:30:34.697000 CVE-2023-47637,0,0,4a42b6de46072da446f9342bdebb85449fee6bbee8169614de57996c73f91863,2024-11-21T08:30:34.847000 @@ -238483,7 +238483,7 @@ CVE-2023-49926,0,0,80d36f300825a86641a4f98f95b0630a84bc990833a0aa412a21dcbe2b60d CVE-2023-49927,0,0,82081beee4061cffd34ef78d24cb99766202a0680d9634397ead28fc1aa5791e,2024-11-21T08:34:01.090000 CVE-2023-49928,0,0,82ea9a4a554f64be0f803001236700d4005765edb3e3d68735cc84f142a81ad7,2024-11-21T08:34:01.323000 CVE-2023-4993,0,0,e5c430012213b9825781e760c6627345c173270597fd8a35599826800c33c336,2025-01-23T16:56:18.263000 -CVE-2023-49930,0,0,f8954034376f6216b38a96176e859c032e442b76c18680fe544fc7df94874fd5,2024-11-21T08:34:01.560000 +CVE-2023-49930,0,1,05e2908441d7b47ae178efb792d2fa170ffb0164078aacb5db9c2735fd21c0a4,2025-02-14T17:22:40.723000 CVE-2023-49931,0,0,5fd905284e515d1bb698d21351509ba27d9bd785e8f44faeef421143c061603d,2024-11-21T08:34:01.703000 CVE-2023-49932,0,0,c369ed9f4cc22499baed875ad8c28e093319b2af5a0da69518ea1c5dbe54cfcd,2024-11-21T08:34:01.910000 CVE-2023-49933,0,0,380576266da2660051c830dfdffd8713d801d89840f9f0651766c2f04622739d,2024-11-21T08:34:02.130000 @@ -238896,7 +238896,7 @@ CVE-2023-50630,0,0,bd52131f29d316253bd2d1b9a2deaee26a083b188d944d289053f84a5b4b5 CVE-2023-50639,0,0,03297125d78f38daaf7c0196d08dfd470a6a791503a996682011d62638ce1b3a,2024-11-21T08:37:07.163000 CVE-2023-50643,0,0,cc00cae8660f5c20f31a1093794aa899031aa9748a4455a1b7cb595c24cb9459,2024-11-21T08:37:07.320000 CVE-2023-50651,0,0,6cd6c0b7192717a37d0df02b5ed1d66fff579c03c9d138f5ed4f3eae3f9a5f5e,2024-11-21T08:37:07.490000 -CVE-2023-50658,0,0,271f5144f7976348aaa30bd21ab3391dcc9301b345ac47a5d9b99e55b3c439ad,2024-11-21T08:37:07.667000 +CVE-2023-50658,0,1,c92512a20999d7407c8304f5036f6d05cc8dcfebc839dcc3d2db58122486a5ac,2025-02-14T17:23:19.307000 CVE-2023-50671,0,0,8d9bac08f508e00fca763688579686289c21939edf6a27019691dba16f2a55ba,2024-11-21T08:37:07.797000 CVE-2023-50677,0,0,392686843dbdd703f28f05544dc85f72a7dfe3f91ee3318c42ab781a3f1f8e35,2024-11-21T08:37:07.957000 CVE-2023-5068,0,0,f31f81a8d8289b079de591725ad4b2996ecf4a7f02d49036adf0d22c9708692e,2024-11-21T08:41:00.223000 @@ -240227,15 +240227,15 @@ CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c CVE-2023-52485,0,0,c2b5d4c1676355db8fd79448f87f50421c07ae088ffc2e3215882f350721667a,2025-01-09T20:20:59.593000 CVE-2023-52486,0,0,36fb86ce2fa070216104a0e3f87917534cae84780a01dd1845c951c870d7a1e2,2025-01-14T15:01:47.313000 CVE-2023-52487,0,0,de51440deae5dacc8c190c40f2337dde434f7fd0e2594ff02b6d5684b990366e,2024-12-12T17:31:37.627000 -CVE-2023-52488,0,1,e70418106963f9d80e2c3ea92bf1d2ac9578d1da297a85ca723dbc9a8bf758b7,2025-02-14T16:40:56.950000 -CVE-2023-52489,0,1,c5788fea0d34ec1718c9b87947d8508d8c4df89ffa3cc63dae0cf9ae064728ef,2025-02-14T16:41:06 +CVE-2023-52488,0,0,e70418106963f9d80e2c3ea92bf1d2ac9578d1da297a85ca723dbc9a8bf758b7,2025-02-14T16:40:56.950000 +CVE-2023-52489,0,0,c5788fea0d34ec1718c9b87947d8508d8c4df89ffa3cc63dae0cf9ae064728ef,2025-02-14T16:41:06 CVE-2023-5249,0,0,66795859b94115699a1a33c2c476e77d83b1313b38a4d4dd71029c0ce4694430,2024-11-21T08:41:22.310000 CVE-2023-52490,0,0,ac0645c6d93b992f3c60098d66e2a3b8bd3e99c282442be872cc6bbd165e3480,2025-01-07T15:44:33.343000 CVE-2023-52491,0,0,033c3717ec0e3c1ff278f67e39cabcd6c9f75e93df8df5930180e00b807e6f9f,2024-12-12T17:32:00.693000 CVE-2023-52492,0,0,633066263ed0b651947b542854e436bd97416b7d5443fb71ca249df44c30da50,2024-11-21T08:39:53.663000 CVE-2023-52493,0,0,226a91067fa9e733403ac59e421c8bf19e75585ed93a94075b47dc216a3235f1,2024-12-12T15:57:46.703000 -CVE-2023-52494,0,1,b6da525d0dd89e6e639105d328e499bef6b8e5bd820d5654178b266b65c780b5,2025-02-14T16:41:13.837000 -CVE-2023-52495,0,1,20867b9697f122459d47382d8b5b2419e2a239fc21def7b74a41a26bc6e6086b,2025-02-14T16:39:14.523000 +CVE-2023-52494,0,0,b6da525d0dd89e6e639105d328e499bef6b8e5bd820d5654178b266b65c780b5,2025-02-14T16:41:13.837000 +CVE-2023-52495,0,0,20867b9697f122459d47382d8b5b2419e2a239fc21def7b74a41a26bc6e6086b,2025-02-14T16:39:14.523000 CVE-2023-52496,0,0,1ceff2e059153d5a5937cc8a150530bebb0b9a38b1ee039de0fbd3b5f63c655e,2024-03-08T11:15:06.913000 CVE-2023-52497,0,0,94fd6b58b926a91cb8098bc30bfcace92de1e085d39a09a073793b0edb7aec8e,2025-01-09T20:20:02.167000 CVE-2023-52498,0,0,065e116d7373a70de6fabe612c4006ae940715deb24209d18d3d1d28ec7bcbda,2024-12-12T17:32:20.050000 @@ -240335,20 +240335,20 @@ CVE-2023-52582,0,0,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09 CVE-2023-52583,0,0,e46a4554888ecc302b9234bbffc66d09b6f50262b0a49874d8de91ef5fc33ea2,2025-02-03T14:18:13.147000 CVE-2023-52584,0,0,5a522db273229117adff319e88be80a572f8d8a3e6725b090908b5d18b4058f9,2024-11-21T08:40:07.433000 CVE-2023-52585,0,0,db7e2649e543632d88de0ba5f9f4eb76dfbd693c00750d96eb1fd47af92129fb,2024-11-21T08:40:07.623000 -CVE-2023-52586,0,1,0e31fefddfa6cc9819a0b5237657637b905b999bb6f4adec9eaf8f05d6b97d4f,2025-02-14T15:38:51.950000 -CVE-2023-52587,0,1,a06eb57b7da675aa9dc9ce37f0c4017460361775934c5645eb47473bc02af9b4,2025-02-14T16:39:59.647000 -CVE-2023-52588,0,1,de2987c2a0db1ee433ae361044a81fc03e7790c584c62c8fb59ceb61c9f5277a,2025-02-14T16:40:14.407000 -CVE-2023-52589,0,1,8bc9ff0d51878fbf7bfbb76f898dbefe770a0496c080438b4dd90587220aac4a,2025-02-14T16:40:27.767000 +CVE-2023-52586,0,0,0e31fefddfa6cc9819a0b5237657637b905b999bb6f4adec9eaf8f05d6b97d4f,2025-02-14T15:38:51.950000 +CVE-2023-52587,0,0,a06eb57b7da675aa9dc9ce37f0c4017460361775934c5645eb47473bc02af9b4,2025-02-14T16:39:59.647000 +CVE-2023-52588,0,0,de2987c2a0db1ee433ae361044a81fc03e7790c584c62c8fb59ceb61c9f5277a,2025-02-14T16:40:14.407000 +CVE-2023-52589,0,0,8bc9ff0d51878fbf7bfbb76f898dbefe770a0496c080438b4dd90587220aac4a,2025-02-14T16:40:27.767000 CVE-2023-5259,0,0,359d77b0c66848c06ba3f79082fef579825dab870bc56c6c97a8b396cfba91ce,2024-11-21T08:41:23.707000 -CVE-2023-52590,0,1,8180f4c1a8061fbb06673c85d3f20f296920505967cdcadc57b866221696e1ef,2025-02-14T16:40:22.487000 +CVE-2023-52590,0,0,8180f4c1a8061fbb06673c85d3f20f296920505967cdcadc57b866221696e1ef,2025-02-14T16:40:22.487000 CVE-2023-52591,0,0,5b3ba09e138e43bdb80e7a88f7e8a2263d0a528dec6f3a3199291121c36ab338,2024-11-21T08:40:08.380000 CVE-2023-52592,0,0,2972113b78c3bedeee76c4302d0d0920ffb662508532cc97659ead96609b949c,2024-03-07T21:15:07.620000 CVE-2023-52593,0,0,e7491abe9400ffa4ccc4a79606bd9e8491ecd3d48f4da01ec8348f4efc880a92,2024-12-12T15:10:28.187000 CVE-2023-52594,0,0,3a97e4a84070b19e8f410b7b8c5fce8a3ab39fb6a3ef1641f8181d192dbc8e0f,2024-12-12T15:10:16.743000 CVE-2023-52595,0,0,73f8021e4bf3c0c2aed212c0a09cdcc0084035bca5ab76dc3485d5d344852c9d,2024-12-12T15:10:00.760000 -CVE-2023-52596,0,1,aeb201ec9caf398ca7318f3f590a87dde48c9fcd84c9d09ccde6a5dd241252fb,2025-02-14T16:40:33.420000 +CVE-2023-52596,0,0,aeb201ec9caf398ca7318f3f590a87dde48c9fcd84c9d09ccde6a5dd241252fb,2025-02-14T16:40:33.420000 CVE-2023-52597,0,0,33b1672264bed0d959f7bb16d678f7240d295f9a8151fcc958e452fc359aa886,2024-11-21T08:40:09.077000 -CVE-2023-52598,0,1,77257482d17a2d268eda6af7d17037f7168bf7b4a0246b5da66177feed3d540e,2025-02-14T16:40:38.513000 +CVE-2023-52598,0,0,77257482d17a2d268eda6af7d17037f7168bf7b4a0246b5da66177feed3d540e,2025-02-14T16:40:38.513000 CVE-2023-52599,0,0,6025de9f311b852eadf5c9741b92901e46a6198aee60750c7b0133ebf1112ceb,2024-12-12T17:36:12.120000 CVE-2023-5260,0,0,8f453413a8ef1d6416baa0317988bd65a7bd5408645cc2112c132066e2cb77ac,2024-11-21T08:41:23.840000 CVE-2023-52600,0,0,8c41e98878691fd6290a9998697d39e781062d3f7b907b3d7a1bd56414424792,2024-12-12T17:36:42.047000 @@ -240357,7 +240357,7 @@ CVE-2023-52602,0,0,7010dcb79ea9b909f9438de65f5b0a6e5f06449f965774da1c5e399e47b9e CVE-2023-52603,0,0,867a844e723fe5b54354e4d731ac7760002a4639a4c956fc86c7653a446b4418,2024-12-12T17:36:56.997000 CVE-2023-52604,0,0,d3768eb99149abb0c430a9ae732cc7c120fea39dc5e64d8f412363128a357f65,2024-12-12T17:49:20.820000 CVE-2023-52605,0,0,eef3cf44ce41a02a3399eb957485c8288751166988c05159972483b6e58d98c9,2024-03-18T15:15:41.097000 -CVE-2023-52606,0,1,e71801b4f5a4981b2569467690ce52413eb8f37a0337e3baa8643032e9366860,2025-02-14T16:40:45.753000 +CVE-2023-52606,0,0,e71801b4f5a4981b2569467690ce52413eb8f37a0337e3baa8643032e9366860,2025-02-14T16:40:45.753000 CVE-2023-52607,0,0,4022b2f965be96edd122082d59ec69486998f3198a0825ca9c95b3fe6070d1de,2024-11-21T08:40:11.080000 CVE-2023-52608,0,0,8d8274f95b6b76ea39ab65c2500b708c9a4357c7b07146a11151a5afa62828df,2024-11-21T08:40:11.287000 CVE-2023-52609,0,0,68b6c722db826f8d3e573655c486ba16421d86e9e7c0510f6dc3171cefc3eb34,2024-11-21T08:40:11.410000 @@ -241023,7 +241023,7 @@ CVE-2023-5612,0,0,07d0fd9a01002c02d5049608faf1e176194fafe91daa7d393bb2813eaacb89 CVE-2023-5613,0,0,5c296e92ec08c076f024fb1be87a24997c51c32836e3ceadabd7db4f93d8403e,2024-11-21T08:42:07.397000 CVE-2023-5614,0,0,df3c7aef14595e231847df4cbf9f65fbb272aa8124fbcb08193c413d34988a90,2024-11-21T08:42:07.520000 CVE-2023-5615,0,0,56f89aa31fa6edba415dfec96afddd04047544455cab84c6571e893daa26c567,2024-11-21T08:42:07.633000 -CVE-2023-5617,0,1,730cedd938375b817937d4e4574096bafbca4b272c62ac316091c801825e7a02,2025-02-14T15:31:44.250000 +CVE-2023-5617,0,0,730cedd938375b817937d4e4574096bafbca4b272c62ac316091c801825e7a02,2025-02-14T15:31:44.250000 CVE-2023-5618,0,0,111e22e7e80976f8f05c5cdfd526ea0caa1da19bd88e1d9d6d161392d3bb7b6a,2024-11-21T08:42:07.863000 CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5bc4,2024-01-04T20:15:25.230000 CVE-2023-5620,0,0,752aef37b6df3d50eef88702586baf5e6183f6cc181eba156e301a0748f4587a,2024-11-21T08:42:08.003000 @@ -242386,7 +242386,7 @@ CVE-2023-7110,0,0,14583bc1bd9f5a8dbc154c9fb0ec73f8fb71cce0d967477b31517f49881390 CVE-2023-7111,0,0,a33b4be9ffbdb6ed8eeda812537c5423b8e5951b71ca46913b28fa67327226d6,2024-11-21T08:45:18.263000 CVE-2023-7113,0,0,004a025cc94f72ca8a19a6563fdb7725226125bab40a6718298151f3267e9436,2024-11-21T08:45:18.417000 CVE-2023-7114,0,0,2640d172638387611a09d6ec848cfec09deb88727bd563499eff25ee13ff5f0d,2024-11-21T08:45:18.560000 -CVE-2023-7115,0,1,3cc9bbd239e1fd3b16bcb781a1ba4b866cc22f4b279b080e6658b2b989596566,2025-02-14T16:22:36.653000 +CVE-2023-7115,0,0,3cc9bbd239e1fd3b16bcb781a1ba4b866cc22f4b279b080e6658b2b989596566,2025-02-14T16:22:36.653000 CVE-2023-7116,0,0,44a555ff97b4aa24d4fbfa8bca5be847156c5781515147826a91561191258df8,2024-11-21T08:45:18.800000 CVE-2023-7123,0,0,7c84b6f5ec5b82c7c34d44d86064f05315efa082aad5342015882acedc9b5063,2024-11-21T08:45:18.943000 CVE-2023-7124,0,0,66abf63f32a3e48229ab433964a16179b1e237a50b40a5cd19a9e81c6d2c3723,2024-11-21T08:45:19.080000 @@ -246549,7 +246549,7 @@ CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b8 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13490,0,0,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000 CVE-2024-13492,0,0,b366a1d0934eccf698617fb1fc1f766d6bf66d42fc2eb6cd7208ba290ff487ca,2025-02-07T16:15:36.123000 -CVE-2024-13493,0,0,43f2714c2b78bb494654d68bcc6f4a261a1b9cd5d544969b6af161cdf4b641c6,2025-02-14T06:15:19.740000 +CVE-2024-13493,0,1,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 @@ -246790,7 +246790,7 @@ CVE-2024-1466,0,0,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000 CVE-2024-1468,0,0,1a6087b1a8165e54c53a2dc7362f46b2d8ce53c1621b4eb211a7e9dc375a85dc,2025-02-05T18:12:24.317000 CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000 -CVE-2024-1470,0,0,7fbc3997b14889f04a413aad381b5ee840f81f028dc4b1f9ac7d928721b7d32d,2024-11-21T08:50:39.117000 +CVE-2024-1470,0,1,8f3d9e30e6356f6f03333fcffbe645c7bf7c4fc576142a7e721ae6cb68df2804,2025-02-14T17:24:17.347000 CVE-2024-1471,0,0,777aec2b62d8d0522847f5c8ad1ffb32c1bdfef2816c32249a594f8d812bf3ca,2024-11-21T08:50:39.250000 CVE-2024-1472,0,0,ab066533e70b0a6734b255d20c58040c7a7145c2e0266c588417ee1e92d4ab1d,2024-11-21T08:50:39.400000 CVE-2024-1473,0,0,aafc4208b64207c289fb7fa79e92b69d4c317656d7d161979bf4ff87a330e78e,2024-11-21T08:50:39.520000 @@ -247019,7 +247019,7 @@ CVE-2024-1718,0,0,70746d52697ce738d10ef4d93f461374c829b5e4c0cdb84c66e02ad2902381 CVE-2024-1719,0,0,73bf9f1a16f7575e2471aa27820d10e8604b848eb3d389879ede5bf7e1298e40,2024-11-21T08:51:09.497000 CVE-2024-1720,0,0,ffaa3e4706968a22cde548a2c01de699ce397eccc11d936af06b490c297ae578,2025-01-21T16:55:34.067000 CVE-2024-1721,0,0,5992d34ee3d1107fd80c63bbec0b1ac913a676e5242bf5be6bf42da226e0e2b8,2024-11-21T08:51:09.737000 -CVE-2024-1722,0,0,62639d7c28f7763733142b00483f0341a98aa36ed70562990c6b1c5ac542c742,2024-11-21T08:51:09.870000 +CVE-2024-1722,0,1,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000 CVE-2024-1723,0,0,11d3a45a60abd75514c9d5b662d454bbccfffc4644e8e6300f550c3165594abc,2024-11-21T08:51:09.993000 CVE-2024-1724,0,0,b6939c282714eb0a778dca5ac11d48814e19c1fa2e871297c9ec9803570c2103,2024-11-21T08:51:10.117000 CVE-2024-1725,0,0,89bb0cde0d54eebd135824ba7c6a8a694f36b81bce992a7be08e7883a75418ef,2024-11-21T08:51:10.290000 @@ -247190,7 +247190,7 @@ CVE-2024-1894,0,0,5f7debca258de63a030f43b257eea3885330ce9bec9f619efd4d0e0a45be4e CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000 CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000 CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000 -CVE-2024-1898,0,0,df4569290047ddaac8150c6cb06f413d4a3171d5a8bfff553407a0020dd889e2,2024-11-21T08:51:33.203000 +CVE-2024-1898,0,1,b19bfab82f6c45a893de7742ccd42a95b6307ccf43932d1ac3b72090d22df3c6,2025-02-14T17:27:43.750000 CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece812,2024-11-21T08:51:33.317000 CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000 CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000 @@ -247953,7 +247953,7 @@ CVE-2024-20825,0,0,2d8d22d50ce27e5c021c930786b897c31a6f5233ad14fec9b0728af68af5d CVE-2024-20826,0,0,dd3309ae36315916d4fb098a243e21c64a97f2b3df91d2bd0279a44ab3e09231,2024-11-21T08:53:13.673000 CVE-2024-20827,0,0,2fad9aa801751cbd9272a358ca3a8fef31d95871b90612d77038d28b8c7dd186,2024-11-21T08:53:13.807000 CVE-2024-20828,0,0,a06eeec6ed2ef4a45d90639c8197277320037d7ad8d35e2685aa6f589cbae593,2024-11-21T08:53:13.940000 -CVE-2024-20829,0,0,1fd0071ccdc712598b44cbb8ef4429394f2a2f3dc500ad8d2dee41697ba18d2c,2024-11-21T08:53:14.077000 +CVE-2024-20829,0,1,e48f01ea14b9a5de94b2fd9a3ab619f1218c1ee47c798dfd7f671650b7d01a21,2025-02-14T17:27:10.980000 CVE-2024-2083,0,0,ab3add8d7b42cc3aa5c063cff24819cb0848493468f40b6cbbf95e711ffed8d8,2024-11-21T09:09:00.493000 CVE-2024-20830,0,0,fe8ad49bb37fe3de8d58a3b2722b5f1443971622c5a26987922fedcb5d0916d8,2025-02-10T22:06:08.713000 CVE-2024-20831,0,0,92f6170cc02d36453482b6249df6a2dea09ff6f83417dfb1e2d2606c6a883f9b,2025-02-10T22:07:20.783000 @@ -247966,8 +247966,8 @@ CVE-2024-20837,0,0,1ea011c20c86433e1c029228a453e044085a95c2512bef655a258579d60b7 CVE-2024-20838,0,0,193a829a6abad700065cea67ae6d6da4eeca804ff07b3f78a7faeb13b32a7f01,2024-12-23T16:32:27.623000 CVE-2024-20839,0,0,0dad1e579794cb822858fc7ebd1b2881483c934995edeb7d585b194dfae8079d,2024-12-23T16:33:22.507000 CVE-2024-2084,0,0,84be56f3117849cd0550ae8ef2dfc84e39601b1de1af7c967911547c2487dddc,2025-01-28T19:27:44.577000 -CVE-2024-20840,0,0,207567d3518e4e0e6d1c96900c417915f9a3790743557a4f0f1dce6cd2f27677,2024-11-21T08:53:15.390000 -CVE-2024-20841,0,0,4053c739c188c4b176a35a8fa2e16319a04cc752f349d61c40ff8d8ac8883c65,2024-11-21T08:53:15.503000 +CVE-2024-20840,0,1,71b8fa9e48537585ba834f40725acccbe675ea3db5ff5f4dd88a952077b86cd5,2025-02-14T17:27:27.583000 +CVE-2024-20841,0,1,75b12536e2195c9b5043a779ca14c52263b5fe798fbcb21cde48a860317de618,2025-02-14T17:27:35.187000 CVE-2024-20842,0,0,f8d2a399189e3d2c8f04a5050cc6ffeea2c59295114e8b87723d003d05e42590,2025-02-07T16:51:47.317000 CVE-2024-20843,0,0,f629bb14e797ef064fd363b60c30845ea139de76ed1517d671144be0c95cb2e8,2025-02-07T16:51:23.763000 CVE-2024-20844,0,0,0ee29dd677a5a18064c680a66788bb7854a10ddae6e7da9b6e39bdbbb6985f57,2025-02-07T17:52:20.117000 @@ -248412,7 +248412,7 @@ CVE-2024-21266,0,0,19fd861ddb3e32de66f1065c568d4d5964c9b16fe2e07e02fa425c69d8b01 CVE-2024-21267,0,0,7eea708da65a3e2be1b9a34228f113be674d5ff7b5b6cb0eb3c12adc0387a2ca,2024-10-21T15:50:27.217000 CVE-2024-21268,0,0,59824019f7fafb4cf82c4bdcb551a79d349c98e708c84a5f718b71b680a65203,2024-10-21T15:56:01.437000 CVE-2024-21269,0,0,0eb4e498b5669f99646026662b569e999b52dc6ee964e047bd447173d3bbb8b9,2024-10-21T15:56:49.217000 -CVE-2024-2127,0,0,e31baa3fdcddb9d07505a68aaede7c541d4a08d0ee485c3c36359716b9d5058f,2024-11-21T09:09:05.233000 +CVE-2024-2127,0,1,7c89983462cd831708055e6c0374a65873e9e8508390929b04c1f4a1fbc80261,2025-02-14T17:28:36.937000 CVE-2024-21270,0,0,cab29bb44b800026508d7741c9df72e0695db01bf16fd06bafd0462b6cd092f1,2024-10-21T15:57:11.543000 CVE-2024-21271,0,0,9eac94e94e1f52ea867740fcacae928244271472696cddbef5309f4dd02ad7b3,2024-10-21T15:57:44.370000 CVE-2024-21272,0,0,d600863fee9159a98859ebf6c4615da075d48eb653c582f05561f79db48589d6,2024-10-21T16:14:28.780000 @@ -248848,7 +248848,7 @@ CVE-2024-21720,0,0,fb67e72ba582adcc0c5e5d3a9e98cab75db5f6134d2b15bd6a10b63688338 CVE-2024-21721,0,0,6410e381c95c472dc089a2773dc0abc68f1f222dbf9d3db9afe0135917afba85,2025-01-01T00:15:37.987000 CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d39652bb,2024-11-21T08:54:52.290000 CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000 -CVE-2024-21724,0,0,71ab50eedb3eaae0cf010b41547c1ab496cb8a61984051a476dd3c8a05ae25c7,2024-11-21T08:54:52.573000 +CVE-2024-21724,0,1,6bdb2572da490900c4e7fbfeb0ed627aeb6ea812d8bb609f7e848cc10f6a5438,2025-02-14T17:24:52.837000 CVE-2024-21725,0,0,102bc48d163faec6cc11fa8ada828cb863fe99c32c41e6fe5250a9d25bfe5aa9,2024-11-21T08:54:52.683000 CVE-2024-21726,0,0,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000 CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd484,2024-11-21T08:54:53.040000 @@ -248868,7 +248868,7 @@ CVE-2024-21739,0,0,a767b72dbaaa468383aa0d842982507df81705ac1d7b9fc79ef75c00370d2 CVE-2024-2174,0,0,1639798d3140a1526a332e4ebeff85ffaa782031676081a19cc466fd379e911b,2024-12-19T20:24:09.830000 CVE-2024-21740,0,0,c263acb4f70afcf85adb368d178c0f9af2925cb47dd67daee476711cafcaed6a,2024-11-21T08:54:55.030000 CVE-2024-21741,0,0,2dea72aa9ed8592dfbc7150ad838d02436877b538bc14dda95705309fee700a6,2024-11-21T08:54:55.247000 -CVE-2024-21742,0,1,ac2dee63856a93ddf7f4e139857b8974aa63adb4799ded088bdc75b1783b849a,2025-02-14T15:27:18.527000 +CVE-2024-21742,0,0,ac2dee63856a93ddf7f4e139857b8974aa63adb4799ded088bdc75b1783b849a,2025-02-14T15:27:18.527000 CVE-2024-21743,0,0,ff439b5a8bf9c2dfd1680f9ed2b9643e228f1fd1702f9c5fa980e6772e4ea7ee,2024-09-20T12:30:51.220000 CVE-2024-21744,0,0,3f7ac1529e2054c1f2bca5677f69c53375f2a9e2d7547b3c796cc184b8249fe9,2024-11-21T08:54:55.667000 CVE-2024-21745,0,0,d5592a068985b9fee47b1c30d3824b8b25fe21b1c4a2ea02729a391f34a465f9,2024-11-21T08:54:55.790000 @@ -248923,7 +248923,7 @@ CVE-2024-21794,0,0,92971ba58a617e12e33592f56f344312a9fd834a6ca2a60f4701773e2e2bf CVE-2024-21795,0,0,0cf62542ad13823d253d28db853b32066a59b39319c41f148f62f088b4d724cf,2025-01-21T18:35:09.313000 CVE-2024-21796,0,0,a3d18246346af019828932648e58a2336dc09f4c30761ed2232852bfa32bd446,2024-11-21T08:55:01.280000 CVE-2024-21797,0,0,3b4ffffcfab8523cbe706a47825f025c845bc84ecfaa20f6d6686ea2ad88d572,2025-01-14T16:15:28.327000 -CVE-2024-21798,0,1,e751286191d9be059b40f17dbbec87b59025aa767fbbb2596392a20b9b29fb33,2025-02-14T15:32:23.757000 +CVE-2024-21798,0,0,e751286191d9be059b40f17dbbec87b59025aa767fbbb2596392a20b9b29fb33,2025-02-14T15:32:23.757000 CVE-2024-21799,0,0,15906d985cb5ed1d7fccea8b16ef3741436370664b5830f39616cb04a191e031,2024-11-15T14:00:09.720000 CVE-2024-2180,0,0,b0ddbddaee48d18516d8a257bcbf4491e4e7da2666636df6bb4eea526dd6362d,2025-01-23T19:21:38.040000 CVE-2024-21801,0,0,a8c56141177a7c46a240198629bbb40acbee9f30928445abc53b9c9d5a4f89b4,2024-08-14T17:49:14.177000 @@ -250547,7 +250547,7 @@ CVE-2024-23907,0,0,6a4f51a32e49fc5e92dec6c55358350ee80dfc671e1fe667a9ddb254fe8ba CVE-2024-23908,0,0,c0766c8541c0cd5631c768ee77722a9a3ea6c08ba06c850770939c86e896f3cc,2024-09-12T18:43:53.363000 CVE-2024-23909,0,0,2c0e5e1ab78a5343246a7351ea46a1a4a3e6e777abf631032a1a6a88e7ab4ed4,2024-09-06T20:33:05.670000 CVE-2024-2391,0,0,9d39f8769fc4eafab47852b5c96351a38060f61eabfaafa849b8cab0f7105047,2024-11-21T09:09:39.147000 -CVE-2024-23910,0,1,3a07daf6eb848dcf47346cae2b5473aca2b62de91d0a2c6d0b94d5d373a4cc2e,2025-02-14T15:32:35.843000 +CVE-2024-23910,0,0,3a07daf6eb848dcf47346cae2b5473aca2b62de91d0a2c6d0b94d5d373a4cc2e,2025-02-14T15:32:35.843000 CVE-2024-23911,0,0,383c01133e386e5b2258194a846ca2cc25aae76b1a1832cd8eb128c0e83a3761,2024-11-21T08:58:41.573000 CVE-2024-23912,0,0,453c92999873c8631416a203ce3d10a10d3fcf10d83029048f6ae9a3947a0896,2024-11-21T08:58:41.760000 CVE-2024-23913,0,0,7b815c6fe70aac33bbbb4732fc9ec4cfe9c8ccd4a73ddde98d464dfd2e19232b,2024-11-21T08:58:41.910000 @@ -250666,7 +250666,7 @@ CVE-2024-24097,0,0,401527f02a7343f3bdbcf297a1060f82ed7e18ba10784960e883fda54d9ff CVE-2024-24098,0,0,8e13363e4e09e1493a5d55427f95804d39c8799860c1a5cf7a571b32d79dd472,2025-01-21T15:07:45.900000 CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482b76,2024-11-21T08:58:55.073000 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 -CVE-2024-24100,0,1,db7d10f5d64a8259083619861ebb4b9faf84331b0fb973cf3e1a2b34b1e4e44c,2025-02-14T16:22:01.353000 +CVE-2024-24100,0,0,db7d10f5d64a8259083619861ebb4b9faf84331b0fb973cf3e1a2b34b1e4e44c,2025-02-14T16:22:01.353000 CVE-2024-24101,0,0,563312b74900c09422642fc4bafe8c2840bea986472e646f74632b6726180976,2025-01-22T17:36:07.860000 CVE-2024-24105,0,0,255c139eabd3d6721f6c2c8b3ad56b8ba1f8f667587ce82d0155af0ac2d90fa5,2024-11-21T08:58:55.537000 CVE-2024-2411,0,0,1ef427180695e8f2f033c0a9c912e02b74e8c07efafab60f0f0a1a5c9f962074,2025-02-13T17:01:09.280000 @@ -251339,7 +251339,7 @@ CVE-2024-25122,0,0,0d4b687cde9a38df906c86391666f0b29f4d2796c700eb9b7c8cb9dc2117f CVE-2024-25123,0,0,09b1752c0cc8c7a156320b66506d56e15cca738cb7f79fdd05f1bf7a0fc0fc13,2025-01-09T14:30:38.743000 CVE-2024-25124,0,0,cfdc97bb095940c5dcd3ac9588254046763105ec39ffb22fa53d09cc3682338f,2025-02-05T22:03:51.013000 CVE-2024-25125,0,0,39178cd5a498f06bbe4bd2c31b6f23d9d8de55a51dbff5c874cc1a2c2f758015,2024-11-21T09:00:18.497000 -CVE-2024-25126,0,1,2221e6ec1ee69ccd33f869f0ffd9eacc33ca2bf5a97bf8d4705cf907d42b307c,2025-02-14T15:51:19.243000 +CVE-2024-25126,0,0,2221e6ec1ee69ccd33f869f0ffd9eacc33ca2bf5a97bf8d4705cf907d42b307c,2025-02-14T15:51:19.243000 CVE-2024-25128,0,0,2ad7110c12acfdd5d947ad6b1e56d039b61066bd86b0b8efef03d00b8c05bc70,2024-11-21T09:00:18.777000 CVE-2024-25129,0,0,129cb5e62a828cf41338bad0dc86b6db85af7bd7b1ad698fb96182cdca890b1e,2025-02-05T21:59:18.317000 CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000 @@ -251376,29 +251376,29 @@ CVE-2024-25165,0,0,7c7f47e7bc83c48f0b6b83f12869667aa2deb29ed4294425f3ed1cea3197a CVE-2024-25166,0,0,d65d60bade9b69cb76854592f67ba61d52edf8bca7037b9f05c53ea22da07c20,2024-11-21T09:00:22.937000 CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0d07,2024-11-21T09:00:23.153000 CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000 -CVE-2024-25169,0,1,1c0927662531653b80f8cd06b953262b296407845793d051f642562224503c05,2025-02-14T15:28:57.580000 -CVE-2024-2517,0,0,3f0effd7a35785414368b150de045e436f41a9d29b0056d80525bbdc0c95292c,2024-11-21T09:09:55.400000 +CVE-2024-25169,0,0,1c0927662531653b80f8cd06b953262b296407845793d051f642562224503c05,2025-02-14T15:28:57.580000 +CVE-2024-2517,0,1,0c333b6b4a23ac604213a8d430d331ca9016ae28e4972b330986d8648c557279,2025-02-14T17:00:42.847000 CVE-2024-25170,0,0,23dbd37358488ac2f003f0a0cd30c12d0a85da7c6a070b5ec965db9866449c6d,2024-11-21T09:00:23.747000 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 -CVE-2024-2518,0,1,d0953942b21efe5ff18a98c3a2ef534cd7f79c2a0b0aa745916501022df8c786,2025-02-14T16:59:49.713000 +CVE-2024-2518,0,0,d0953942b21efe5ff18a98c3a2ef534cd7f79c2a0b0aa745916501022df8c786,2025-02-14T16:59:49.713000 CVE-2024-25180,0,0,3719a6961cdbe4ef5c255aebcbd63ab7e5dd9b392de053d89cb9c14f65403636,2024-11-21T09:00:24.200000 CVE-2024-25187,0,0,e6ea206ce3cb7e537109adc61d6002bbd3264a3245b68d2f966bb5270c5f8cfd,2024-11-21T09:00:24.440000 CVE-2024-25189,0,0,509ea081e277357b278ee949dac27256cde1e5cd64a689b5f46c4a4823913802,2024-11-21T09:00:24.657000 -CVE-2024-2519,0,1,a3593dcfa0fd825300f84f3feb151a01cdae66d6d7ed6d021444b5ec2825221e,2025-02-14T16:59:14.683000 +CVE-2024-2519,0,0,a3593dcfa0fd825300f84f3feb151a01cdae66d6d7ed6d021444b5ec2825221e,2025-02-14T16:59:14.683000 CVE-2024-25190,0,0,b1ba4d33a756c63f1888b43396a47998407e09c652481bc438cf266fbee6871e,2024-11-21T09:00:24.893000 CVE-2024-25191,0,0,314aed509f3191d16fdc0714124000be5f9b4554282780b5871ffe5a9b3bc2d6,2024-11-21T09:00:25.147000 CVE-2024-25196,0,0,89f14f740e05b51c960032735abae2c51c21045929374f43b490fc32e24d1d35,2024-11-21T09:00:25.320000 CVE-2024-25197,0,0,15f18e6537e7ac7f36738740d45ea627d04790a78bbda96177a623b2056be7fa,2024-11-21T09:00:26.083000 CVE-2024-25198,0,0,827ae244da24732320bfa0f636d80f84374a510e85bdc58b522963d66921b7e1,2024-11-21T09:00:26.313000 CVE-2024-25199,0,0,ad6d422b03f5197a81172277e0ed51b916837574262b2e703736ab15479d94eb,2024-11-21T09:00:26.520000 -CVE-2024-2520,0,1,e5651418a53d129d8756c867597bc20213bd2033b29bb66ede089a0b32bab619,2025-02-14T16:58:24.160000 +CVE-2024-2520,0,0,e5651418a53d129d8756c867597bc20213bd2033b29bb66ede089a0b32bab619,2025-02-14T16:58:24.160000 CVE-2024-25200,0,0,f94283d2410aa26fadd328d3ccd3b9473e1f3e96c686f07f1afaa65948cafef5,2024-11-21T09:00:26.753000 CVE-2024-25201,0,0,5d3fb0ea9b11e6f0b6d65fa16cdae99f3b0365b3063b7f44eaf4cd0da3c817d7,2024-11-21T09:00:26.897000 CVE-2024-25202,0,0,b2e4cb445b5b857d39ca39e8a5ae390a9ad383fe588114e244b9e5d0f9442f3c,2024-11-21T09:00:27.043000 CVE-2024-25207,0,0,4e0b61429ca694019848930ef37234217b44dbca06bc7c79bdd7431ff066f2fe,2024-11-21T09:00:27.260000 CVE-2024-25208,0,0,c39e329d70ba29f8ec5052d1fd023c4741a77df923bca1c5fe3fcd980dbffe56,2024-11-21T09:00:27.413000 CVE-2024-25209,0,0,668d817860bdf8d60b71de3c4389a71562bd169134a0313f4a2a97e07608f5b8,2024-11-21T09:00:27.647000 -CVE-2024-2521,0,1,6a7c911003ffc04902b1e39b3eb2fe6247e05a0377b8235c416e7c1edca68508,2025-02-14T16:57:37.303000 +CVE-2024-2521,0,0,6a7c911003ffc04902b1e39b3eb2fe6247e05a0377b8235c416e7c1edca68508,2025-02-14T16:57:37.303000 CVE-2024-25210,0,0,864e4d662071b15761c23313a8ff50884ea7e6ef39c7121e6d4b449357586574,2024-11-21T09:00:27.807000 CVE-2024-25211,0,0,2d23ec76c92a3385785dd00f036ad745bb61da310c93c8780743d5e348893834,2024-11-21T09:00:27.957000 CVE-2024-25212,0,0,986510db7e3d26aaa2a8b25307307de9a84e12bba0a192ca8f80166a1b36c196,2024-11-21T09:00:28.103000 @@ -251409,7 +251409,7 @@ CVE-2024-25216,0,0,8ed12bfde6407baca5ebf53ce55f5422cf9b6b72e2f1c0707ca87c552a7f2 CVE-2024-25217,0,0,b5d6f4406e2e8f302ccaa6881ed26a01095b61facbc477c9197df30226994159,2024-11-21T09:00:29.037000 CVE-2024-25218,0,0,ad3eac228dd730318860b6b46335f32a239d268c7583a6d9b7dffcc3a223e818,2024-11-21T09:00:29.193000 CVE-2024-25219,0,0,982e2de4884163c62cd591e4f77c8faf1d13e0f4dd836cf69795446aac29103d,2024-11-21T09:00:29.347000 -CVE-2024-2522,0,1,546bae7e4b55a6e549e5ff128840ac945121d1e1a38d4ead1be6cf1e031a2ea3,2025-02-14T16:56:41.570000 +CVE-2024-2522,0,0,546bae7e4b55a6e549e5ff128840ac945121d1e1a38d4ead1be6cf1e031a2ea3,2025-02-14T16:56:41.570000 CVE-2024-25220,0,0,76e01cc8b3eaf6c33a47c02a41c01ea8226b6d8321a39aa520631f9dbee01a8d,2024-11-21T09:00:29.573000 CVE-2024-25221,0,0,3f4e4c46766122ccdb17d99e34cdea6dc00ed94b8207e342ee8c52280ee34d2a,2024-11-21T09:00:29.723000 CVE-2024-25222,0,0,004b72a4b152daa7d619e32be9d2585e1dce3890a51491e5adaced5be7c77bcc,2024-11-21T09:00:29.897000 @@ -251419,11 +251419,11 @@ CVE-2024-25225,0,0,fa3f0a9746172ec72928144f73e3bc96fd4ae6bdeaa1ea2e092201b400d63 CVE-2024-25226,0,0,61507129829112c9ca147876d8ef7a76eefacf655e65566512dc97486c33b6f2,2024-11-21T09:00:30.627000 CVE-2024-25227,0,0,16b073802d3fc8b93b926c8f5c058b8c88e26270131230484aed954a3eea7233,2025-01-23T19:23:11.717000 CVE-2024-25228,0,0,3f8b8b90a475931a022fce6ad96b33e0d7743a1b36b24664692106a8d55dfa6b,2024-11-21T09:00:30.977000 -CVE-2024-2523,0,1,64ffb1ee13cecf1fe5d58eddcd99e34843f184937b3a4a074291701fa4996359,2025-02-14T16:53:12.380000 +CVE-2024-2523,0,0,64ffb1ee13cecf1fe5d58eddcd99e34843f184937b3a4a074291701fa4996359,2025-02-14T16:53:12.380000 CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1a07,2024-11-21T09:00:31.193000 CVE-2024-2524,0,0,6f9563611770eaf74cbd654fb70e346ae094dcd9f1b5e7576a2f4a96999510fc,2024-11-21T09:09:56.390000 CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000 -CVE-2024-25248,0,1,81a8ad990dc45e329a2a406fa2e8862ab2f5c3673d256130877de386ab70b693,2025-02-14T16:22:09.803000 +CVE-2024-25248,0,0,81a8ad990dc45e329a2a406fa2e8862ab2f5c3673d256130877de386ab70b693,2025-02-14T16:22:09.803000 CVE-2024-25249,0,0,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000 CVE-2024-2525,0,0,f8856386120b0b0e2a9a9905b06df8076256bd6ec85ecd75f598d7df4c9f1e7c,2024-11-21T09:09:56.523000 CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000 @@ -251524,13 +251524,13 @@ CVE-2024-25419,0,0,0e128f33df21535f449be46dc9bade46013bc2f619bc5f23ee057c3157254 CVE-2024-2542,0,0,a409579e71ca378ad0056a446bab05ce49a36d33f41bc7e5036155f84affc83b,2024-11-21T09:09:58.610000 CVE-2024-25420,0,0,e7efd1ed23ca746b8704e9c9ed47bae8368187f076c5294cba2da51c48b1f7b0,2024-11-21T09:00:46.937000 CVE-2024-25421,0,0,4aaa4c906586deeb67dc43ed5331c3d0f3499a1d45ec23efb878770db6ed62f1,2024-11-21T09:00:47.180000 -CVE-2024-25422,0,1,9df224cee5c73a7df73f9ac56a9b3271c481ae811b4a91ce17eee9b9b71feac7,2025-02-14T15:32:48.860000 +CVE-2024-25422,0,0,9df224cee5c73a7df73f9ac56a9b3271c481ae811b4a91ce17eee9b9b71feac7,2025-02-14T15:32:48.860000 CVE-2024-25423,0,0,94ea816a321c84c96a2ebe547c547d669f3866b10bc313b7f77b960fe74089b8,2024-11-21T09:00:47.563000 CVE-2024-25428,0,0,22a547278095b4eb8bf134210b7be8d293871bec4b1bd2f6683fc4f7d51a5b7a,2024-11-21T09:00:47.787000 CVE-2024-2543,0,0,ccf6eabe332a490974ff591a3e766c8f7df32a51f19058b6ddbefb9a5c069197,2025-02-05T17:11:54.403000 CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000 CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000 -CVE-2024-25435,0,1,ffd6ea695301c706aa6aaeae767f55f3015b17dd1a5a656ab28edf92accf1629,2025-02-14T15:30:26.980000 +CVE-2024-25435,0,0,ffd6ea695301c706aa6aaeae767f55f3015b17dd1a5a656ab28edf92accf1629,2025-02-14T15:30:26.980000 CVE-2024-25436,0,0,4140a5bb36df4fc94ad92dad2a731fafbfa4d373f7749856dabd0879f363f6a1,2025-01-16T18:49:12.043000 CVE-2024-25438,0,0,86e139445bf89c384de05db05f02e7c27a28ea183fdbe47a130e69a2b5316727,2024-11-21T09:00:48.710000 CVE-2024-2544,0,0,4c55e28a99e5d3958db647c23010a7cf4949f9b06a6faeb1f138458b6ed494cf,2024-11-21T09:09:58.883000 @@ -251776,8 +251776,8 @@ CVE-2024-25770,0,0,398f17523c9506a877868692f911a4e483227a4dd1226854f612f5460a815 CVE-2024-2578,0,0,dcf3a8c7eaa2ed6078005c88780e68cc6d17ce19d2e3cc6e2a9c1f77cd939559,2024-11-21T09:10:03.243000 CVE-2024-2579,0,0,f36838f8c9e0fe4fa638d23b3b6348547666dfbb79b14e037d8d241191eb52f7,2024-11-21T09:10:03.367000 CVE-2024-2580,0,0,28dc04cdcd8a37a4f01b4220f97c43186b9a68bbfe5d38f46d7e32d79cbb9642,2024-11-21T09:10:03.493000 -CVE-2024-25801,0,1,a75fab55acab503a9f6f30d44dda9636bcdf5dd2cdd02f519b93f24efaf595b4,2025-02-14T16:21:13.950000 -CVE-2024-25802,0,1,efbcc597ddce5bb06614ed107ca9d9ca2ae4e54150d84786e469843363f274f7,2025-02-14T16:21:44.727000 +CVE-2024-25801,0,0,a75fab55acab503a9f6f30d44dda9636bcdf5dd2cdd02f519b93f24efaf595b4,2025-02-14T16:21:13.950000 +CVE-2024-25802,0,0,efbcc597ddce5bb06614ed107ca9d9ca2ae4e54150d84786e469843363f274f7,2025-02-14T16:21:44.727000 CVE-2024-25807,0,0,878f62a4098025b1352876641763ce23a3a9fc00f16f84d372a72055d263d901,2024-11-21T09:01:22.093000 CVE-2024-25808,0,0,e7107e502af714fde13b5314ac17bedd5501104f8976aca532b23b042cd471f6,2024-11-21T09:01:22.323000 CVE-2024-2581,0,0,524e7162ba8902ffd159f0321288102d68de4ec5f9b57785f939855fe6891543,2025-01-22T17:50:55.987000 @@ -252072,8 +252072,8 @@ CVE-2024-26128,0,0,6ec59e3a008feca6738de761b3be3df5c35466eb2f92117550b0e2c3bfd06 CVE-2024-26129,0,0,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000 CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b17,2024-11-21T09:10:07.777000 CVE-2024-26130,0,0,d2289bd646eda44f581e47154baf5cf63bfced80dc9fc24f10e157885b4c4048,2025-02-05T22:09:20.427000 -CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af4029a,2024-11-21T09:01:59.880000 -CVE-2024-26132,0,0,276f956129ff17889c7494d0dab8cf40bce32133285459c625bfc72a90dade70,2024-11-21T09:02:00.017000 +CVE-2024-26131,0,1,7d5cd7ce213f5d8bf166cfea3cf2f5d16b81306c41d06f9a6ba344404308eadd,2025-02-14T17:25:08.840000 +CVE-2024-26132,0,1,0bcb164dd65c041d33f7ce76187d052cc24ee4faa12b76af777a7afad30ea542,2025-02-14T17:25:32.967000 CVE-2024-26133,0,0,d338ce6cfe6ec438f546291f4ca2f1c9a9cde1d97a1f5b31f82e5c4463815840,2025-02-04T15:07:56.017000 CVE-2024-26134,0,0,4b0383f16deb8444e0ffe32a9ced439fcf2df8e070f9714cd8b9bac5583f2c2d,2025-01-02T14:18:48.553000 CVE-2024-26135,0,0,779dc441638c260d7cf5f634019d9991826fae60fddcfb8bc24dadacfd0496f8,2025-01-16T19:24:58.253000 @@ -252082,12 +252082,12 @@ CVE-2024-26138,0,0,ad1e2f5a757d5236547f9e70c18c2f29052289168edb71d6bdded4c04438d CVE-2024-26139,0,0,ffc8a35c7d6ef55a8d6cab5ce0546eacb4822ef0570208b878cfcfdc9f776772,2024-11-21T09:02:00.783000 CVE-2024-2614,0,0,b00a87acbc95689e00286fc1a4b0d328229e70350e77275226d6ea24ff076f72,2024-11-21T09:10:07.963000 CVE-2024-26140,0,0,b5e7f99e5a4d8213a1409f3c950c4fb9af81d65c17390d14f8c63986dc314927,2025-02-05T22:34:32.020000 -CVE-2024-26141,0,1,546915a82db51496e3bc4d15d7dd1152723e7428381fe360bbf0eb7789f80fc9,2025-02-14T15:33:08.527000 -CVE-2024-26142,0,1,3de120422cdfd093d613bb27c2fd503cd0126a171bbba136aeee06608c3fb782,2025-02-14T16:22:23.763000 +CVE-2024-26141,0,0,546915a82db51496e3bc4d15d7dd1152723e7428381fe360bbf0eb7789f80fc9,2025-02-14T15:33:08.527000 +CVE-2024-26142,0,0,3de120422cdfd093d613bb27c2fd503cd0126a171bbba136aeee06608c3fb782,2025-02-14T16:22:23.763000 CVE-2024-26143,0,0,03dde9ad65026ca4443844fc9c9df778e64a1f2360d90cdeecac720b3a2ebc2b,2025-02-13T17:13:21.617000 -CVE-2024-26144,0,1,ca548baf66332dd18619db9d8e8600aece677bcb5cfa2b1d7228f949217e1119,2025-02-14T15:26:42.917000 +CVE-2024-26144,0,0,ca548baf66332dd18619db9d8e8600aece677bcb5cfa2b1d7228f949217e1119,2025-02-14T15:26:42.917000 CVE-2024-26145,0,0,61c3cb158f89c3a0c2a6d2cbe9b0586d16a400f0aa5c128d0c7ba7feb5215157,2025-02-05T22:04:56.303000 -CVE-2024-26146,0,1,8c8da0c848478ff35a028ee4cdb7f6e2af51c189105102491e1a9fd5041ce35d,2025-02-14T15:51:42.200000 +CVE-2024-26146,0,0,8c8da0c848478ff35a028ee4cdb7f6e2af51c189105102491e1a9fd5041ce35d,2025-02-14T15:51:42.200000 CVE-2024-26147,0,0,b1698ff9ded5764b7b1e4894dc0839ae17e3f87e890d24e083b22b38e1acfb2e,2025-01-09T14:40:25.983000 CVE-2024-26148,0,0,5f6743f4560852e58cd041a0c7e0bf20e4e23b0f7b34c3e896f2e7330f07dfcb,2025-02-05T22:02:41.717000 CVE-2024-26149,0,0,509040b71e933c4c83efda97eedbb5927f70f30be145577cb1eb2d0c4d223bbf,2025-01-16T19:31:59.750000 @@ -252300,7 +252300,7 @@ CVE-2024-26455,0,0,b602a39340aa0a08d22bea95d20335091929597e145ac5852ed224ca96f28 CVE-2024-26458,0,0,a84cafdaaeb4711178a2af3a2fb066cefb77307207efb491034cc325fa3b809d,2024-12-06T21:15:06.280000 CVE-2024-2646,0,0,151ae367ea355c28dc7616a7c62a3d01bd09810a6ddedafdaea0609aace977ef,2025-01-30T15:34:41.863000 CVE-2024-26461,0,0,88cfb89c75caa3fbb98958498da2cadb2df05ab5f4cd5d1d1f54ba1cb18b653a,2024-11-21T09:02:26.477000 -CVE-2024-26462,0,0,59061cbd0e0ef528389a9179ee133da7a4327898f7c01148c16af923d1832991,2024-11-21T09:02:27.010000 +CVE-2024-26462,0,1,ecd4997afe005d8f86f6657bc9ff556c192e575df089103243c20adf721e146c,2025-02-14T17:29:03.303000 CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000 CVE-2024-26465,0,0,3591a92f355c50b3bf7853c8951cb4d89bdd2f61f2693c9355aeb21e12a53c32,2024-11-25T19:15:08.960000 CVE-2024-26466,0,0,78f9ec7f09b86ede70fc7b526d3c62b52dfe5c663a6c507cd560a4b345d888d2,2024-11-21T09:02:27.303000 @@ -252319,7 +252319,7 @@ CVE-2024-26481,0,0,27cd2dd704778bc0c175f0416f8065c950331ff365164eeacdcc041662290 CVE-2024-26482,0,0,d5197da6409ecd6e992ef12cae051a9fa963c093a6102783a8853c0f5a5a7603,2024-11-21T09:02:29.480000 CVE-2024-26483,0,0,c59a993a5964f48545747ef2268eb7fa595ac26729264347074806473fe6b6f5,2024-11-21T09:02:29.690000 CVE-2024-26484,0,0,64a21bd08323ab7879d0b6b9b7d5f94dfd1a274690483cc7221c08a4f0e267ba,2024-11-21T09:02:29.907000 -CVE-2024-26489,0,1,d1b7482afa56946b5875e1c0d75473b46ec08dbdb4461b810b240e87b3a318cb,2025-02-14T16:21:23.480000 +CVE-2024-26489,0,0,d1b7482afa56946b5875e1c0d75473b46ec08dbdb4461b810b240e87b3a318cb,2025-02-14T16:21:23.480000 CVE-2024-2649,0,0,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5a1,2025-01-30T14:35:30.467000 CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae4de,2024-11-21T09:02:30.263000 CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000 @@ -252393,13 +252393,13 @@ CVE-2024-26614,0,0,0d3a18efff41b0340a14dfe609b6c42ba756a13870796a7e0a49cc7dcbd6b CVE-2024-26615,0,0,e6f1e8c106472e5a3f2e5ac50a49c8919c92dc941c2694e5acb1a444b24a84fb,2024-12-12T15:31:02.167000 CVE-2024-26616,0,0,d3c13b186980b14f4d8626d0c527f78394756d9c40071b7da5f1973da6f3004e,2024-12-12T15:31:18.293000 CVE-2024-26617,0,0,111cb4359671b535aadd933a1100c9999bd2632f9a23d4dc9bf642a8974880ee,2024-12-12T15:34:40.053000 -CVE-2024-26618,0,1,a80b13ee649b058637d6ffef128a7acfc5580b1c36598352177076ccb4a0ab46,2025-02-14T16:39:08.240000 +CVE-2024-26618,0,0,a80b13ee649b058637d6ffef128a7acfc5580b1c36598352177076ccb4a0ab46,2025-02-14T16:39:08.240000 CVE-2024-26619,0,0,47ef9d76f9826a5a5e8ba4e9250a722df14dc33a348ae160fc1d23110278689d,2024-12-12T15:19:41.967000 CVE-2024-2662,0,0,79384514bfde3bd465b4cc5289df066ce38c1ea93a5494ac05df965badcbeea7,2025-01-30T16:12:13.900000 -CVE-2024-26620,0,1,f01bedb645d01449f26e67fd4f522e0990a5aaeba1fdafc604684c7a27c7b74c,2025-02-14T16:39:02.277000 +CVE-2024-26620,0,0,f01bedb645d01449f26e67fd4f522e0990a5aaeba1fdafc604684c7a27c7b74c,2025-02-14T16:39:02.277000 CVE-2024-26621,0,0,2cef5f3b9034b09be05aedbba02c8c8e6662a458df7f1f7360f9cc5779521c1d,2025-01-16T17:11:37.050000 CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000 -CVE-2024-26623,0,1,bcba2776d4e285d610ad0560b099dbc47bb61b6676fa082af0bfd352a60b8c5b,2025-02-14T16:40:51.387000 +CVE-2024-26623,0,0,bcba2776d4e285d610ad0560b099dbc47bb61b6676fa082af0bfd352a60b8c5b,2025-02-14T16:40:51.387000 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 CVE-2024-26625,0,0,4ef7613269bfa498d42e416f035cc6661e69596240803b3ec29e423a2773965c,2025-01-07T20:17:40.503000 CVE-2024-26626,0,0,c637241eede756972b018a0fcc06f149dac17cabb0f560373fa5e5595e3e8ad3,2024-12-12T17:26:08.137000 @@ -252920,7 +252920,7 @@ CVE-2024-27095,0,0,78a1555294ea358b8152550a2082da91e49d92b932991be797dbd3c604913 CVE-2024-27096,0,0,ff3b6eeb112a372181ce06d11a8e55e4a7fd78dae9c02ff45f77b3fada3d7dd8,2025-01-02T15:54:08.883000 CVE-2024-27097,0,0,12f7ebf3c69c8c0e390f0596810b8aefa8439e2d4d1a100d87a70332e32769e7,2025-01-23T21:22:17.240000 CVE-2024-27098,0,0,1499d8142df4344f103b85f95cc2fa30ec1684770d1db46e09f4809fb5d9d86f,2025-01-02T15:53:19.737000 -CVE-2024-27099,0,1,56b63903ec71797153f6fe42b767e3af3c0b6d9a033f14601ac00da3b7fb9118,2025-02-14T15:27:49.010000 +CVE-2024-27099,0,0,56b63903ec71797153f6fe42b767e3af3c0b6d9a033f14601ac00da3b7fb9118,2025-02-14T15:27:49.010000 CVE-2024-2710,0,0,001269c32b1f0eb15da92a265d34f54cbf493f381bf937b59ddbde30025a682a,2024-12-12T17:30:23.267000 CVE-2024-27100,0,0,8508ad18190a019203604be481303560b90631fee2ced04d03ca66167b3e3a17,2024-11-21T09:03:51.563000 CVE-2024-27101,0,0,742992fa71b398a15715e3e520dbe09c308c4ac568b904be7d12d66735db88b8,2024-11-21T09:03:51.683000 @@ -253014,7 +253014,7 @@ CVE-2024-27187,0,0,0dc9e51a6ca3f52150fb21e09ca86bd8b992a3d999fcfe948147eedaf1db6 CVE-2024-27188,0,0,653e51cffcf48aae05ef34580c8b5687a22a4f6fa27435eb10884b261903827c,2024-11-21T09:04:03.573000 CVE-2024-27189,0,0,551d13cb365616ebdee4f74a566821b948c441eeb1c301e69b2e8c823403aa69,2024-11-21T09:04:03.707000 CVE-2024-2719,0,0,bdfefcc9868ff423f0989f6432fefff58744bc4da397f90dd49e4a1b2efadf28,2024-11-21T09:10:22.120000 -CVE-2024-27190,0,1,4dd7b45e54db536c4c1ac27098c3a62ae0ef3aa3e6cecd975e6330cc3209a18f,2025-02-14T15:54:14.630000 +CVE-2024-27190,0,0,4dd7b45e54db536c4c1ac27098c3a62ae0ef3aa3e6cecd975e6330cc3209a18f,2025-02-14T15:54:14.630000 CVE-2024-27191,0,0,7e1a337757b8aff8d2dc69e1e28fb2265d47c37e53b8f0b5f2b0f8fde7334696,2024-11-21T09:04:03.993000 CVE-2024-27192,0,0,767670ef275580ce021e633de9a65889e976bf6dca5c2f5778f38bc12d297187,2024-11-21T09:04:04.123000 CVE-2024-27193,0,0,f07656366dc531df102a1404f6e00426e458de4576b2777141c911593e2bcd50,2024-11-21T09:04:04.250000 @@ -253090,7 +253090,7 @@ CVE-2024-2727,0,0,2dee61faac028e2733757e135f6a6c2d9e9cd5dd69c05078e33394419bac06 CVE-2024-27270,0,0,54ba2c12ac2b208b283b3485434ba442565d1321f86146b753258ad980afdf25,2024-11-21T09:04:13.080000 CVE-2024-27273,0,0,1e870f69a6eba4fe402f69b8b2086b21dbadf40baccbcf7a5482142f0a1f5afc,2024-11-21T09:04:13.197000 CVE-2024-27275,0,0,fe661a9e941d5dafabb7909ae7d62cd1b965cde9d21e932e51d238ab5bff32e2,2024-11-21T09:04:13.333000 -CVE-2024-27277,0,1,904a77a3c7015f2f6c511c853241ff243f6c05fe3641e8abd7aa5faad6cd9814,2025-02-14T15:54:30.470000 +CVE-2024-27277,0,0,904a77a3c7015f2f6c511c853241ff243f6c05fe3641e8abd7aa5faad6cd9814,2025-02-14T15:54:30.470000 CVE-2024-27278,0,0,d3ca23afe02a30be9f2b0298f1f654598aab8a7f8c4b308d9cd3eb3e2e4ce186,2025-01-15T16:40:43.290000 CVE-2024-27279,0,0,2d3d7dd871db2cbdbdc0d6c10f8d45f33a221fe31b23722773b8a6123271fecc,2024-11-21T09:04:13.747000 CVE-2024-2728,0,0,78314d1a0308ae66597a6d5dd009fc9afe759b71bf3e636947fe55e3d0dd5e82,2024-11-21T09:10:23.257000 @@ -253099,7 +253099,7 @@ CVE-2024-27281,0,0,d383e6f541b75ca8d9096291235e4e39f3f9d48c11ddad4839c449bf05965 CVE-2024-27282,0,0,b2272ae791c34757815fd46d0dfded59649eab56363a235e3d7732ed8a04f1c1,2024-11-21T09:04:14.410000 CVE-2024-27283,0,0,7096d1dda11cbf42b75c6182fa8aa0730c3a43a8a6ec1a8550c433219717cea2,2024-11-21T09:04:14.640000 CVE-2024-27284,0,0,41c1fcd2dc95d9ab3ec0c9a993c37821c9854cff1fe79ad6abdc37cd109201aa,2024-11-21T09:04:14.790000 -CVE-2024-27285,0,1,e049b06346ffade5c855b2fc9e20ce888120bf028f6e803d83be691a0ddcfac4,2025-02-14T15:31:24.213000 +CVE-2024-27285,0,0,e049b06346ffade5c855b2fc9e20ce888120bf028f6e803d83be691a0ddcfac4,2025-02-14T15:31:24.213000 CVE-2024-27286,0,0,c4de97868bb6a654d0fa5acc598ac00ef5dd4f178555435086c3091bc587e544,2024-11-21T09:04:15.060000 CVE-2024-27287,0,0,f2fd248a4feebac4ac60dc4427b4d9edf4ea725f02f3e4ce218bc12e9067c074,2024-11-21T09:04:15.180000 CVE-2024-27288,0,0,7de6e555c26c6e349dcbc347eddea7ef685ed8a79e541515e8d36f47b067506e,2025-02-11T17:51:17.633000 @@ -253598,7 +253598,7 @@ CVE-2024-27944,0,0,05ab27b23cd4c65e6018640103ddc19702d299728eb220c6782a117a1187b CVE-2024-27945,0,0,94dc03c5788951b945f52561612580dbf6389fd2990ae0ab8d0bbe20a70c318a,2025-02-06T18:14:57.147000 CVE-2024-27946,0,0,66f384ac73b5b0b78bf2b244d51655e2f723913f54e6237bebd67311ea34e9ec,2025-02-06T18:14:26.713000 CVE-2024-27947,0,0,3037bcb4c0e3535d9bac491e457cd5f8cda27629d0af16e036379bf52f9162dc,2025-02-06T18:13:55.330000 -CVE-2024-27948,0,1,2c14c4c011eec626570b595fc6f8c8418395d653e5c846e697c3b84200136da6,2025-02-14T15:29:28.163000 +CVE-2024-27948,0,0,2c14c4c011eec626570b595fc6f8c8418395d653e5c846e697c3b84200136da6,2025-02-14T15:29:28.163000 CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9ebffb,2024-11-21T09:05:29.090000 CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000 CVE-2024-27950,0,0,53da77641072875e4be7a331920e4e65f0eff4f0d2cd1d57778fc38818e7c955,2024-11-21T09:05:29.223000 @@ -253607,17 +253607,17 @@ CVE-2024-27952,0,0,152aafc7d17b7e8cab9dfd456b787843c1e9f4c6af329fe59ca504ee7f7ee CVE-2024-27953,0,0,c5d16c193543fca46282ab3c8cd23ba2c5868bd65b0e219f002c47b9928a9bbd,2024-11-21T09:05:29.663000 CVE-2024-27954,0,0,868051cf140aca79ae18199226f95ebe38588b4710d77e4adca2895e0f6050b2,2024-11-21T09:05:29.807000 CVE-2024-27955,0,0,68f1b654e856ea89e2c3920d06b20f4b15b70ed46da32e67660258ac4409cc1b,2024-11-21T09:05:29.957000 -CVE-2024-27956,0,1,5f7c522e54cc183f07e307bbcc5b53d49dbc65761e89d366db3002d9ea2e4434,2025-02-14T15:54:46.810000 +CVE-2024-27956,0,0,5f7c522e54cc183f07e307bbcc5b53d49dbc65761e89d366db3002d9ea2e4434,2025-02-14T15:54:46.810000 CVE-2024-27957,0,0,8087f4946b612e75e08bbfc79d37874f72ef3fef79bacd5e952c661efd9338b7,2024-11-21T09:05:30.227000 CVE-2024-27958,0,0,5ef20bc85b97cb3f31f301fe7e1fb8775fb3c7ffd603df16eb3e0a52f7da0de3,2024-11-21T09:05:30.370000 CVE-2024-27959,0,0,1a5f961d1f8d89aba278a5ee813492bb5309541c3ae3d017d31e75b258484c21,2024-11-21T09:05:30.503000 CVE-2024-2796,0,0,e2a32531e96cb265c07a5c5ca5e912514862118dd712aaa3f7dc72113df4e633,2024-11-21T09:10:32.253000 CVE-2024-27960,0,0,389a9f04741a3176a8ba6a64a3504d4ee4d199b950def57cb545ec071e716f8f,2024-11-21T09:05:30.650000 CVE-2024-27961,0,0,7ea04752c9962c36b7ae52ce023fa02e66f586ada73fb12a792ee4c7be3fa0f8,2024-11-21T09:05:30.790000 -CVE-2024-27962,0,1,8ea3e9601eeeab82ab8a594242f62442648bcb131b2964fa63c5593cb7925e1d,2025-02-14T15:55:32.917000 -CVE-2024-27963,0,1,49b1300b9a459f2df90485afeab27e8f9d918066a63bbee72e844caaf4653ead,2025-02-14T15:56:42.770000 -CVE-2024-27964,0,1,11feb0eff51be6d5bf138e56cd63895a7a9646857c0283aa3865b6f9034aeaf4,2025-02-14T16:09:20.020000 -CVE-2024-27965,0,1,2d244ff6fd1c194297462f40fba425872468024190f32347a34b89b5ec11a128,2025-02-14T16:11:37.770000 +CVE-2024-27962,0,0,8ea3e9601eeeab82ab8a594242f62442648bcb131b2964fa63c5593cb7925e1d,2025-02-14T15:55:32.917000 +CVE-2024-27963,0,0,49b1300b9a459f2df90485afeab27e8f9d918066a63bbee72e844caaf4653ead,2025-02-14T15:56:42.770000 +CVE-2024-27964,0,0,11feb0eff51be6d5bf138e56cd63895a7a9646857c0283aa3865b6f9034aeaf4,2025-02-14T16:09:20.020000 +CVE-2024-27965,0,0,2d244ff6fd1c194297462f40fba425872468024190f32347a34b89b5ec11a128,2025-02-14T16:11:37.770000 CVE-2024-27966,0,0,986bc0e47f8c1c0f4ed2c9a6fb07f0506a233d36678f2a967592d44ed4ed5c77,2024-11-21T09:05:31.503000 CVE-2024-27967,0,0,e56b52e9e5ea4f14ee58c30c908937b7bb0140e9f50cdd47a5ea303d5cdbe917,2024-11-21T09:05:31.653000 CVE-2024-27968,0,0,15c65a67f6e3f535b3fd3256542bee4865b046c0bf20a9c8d77b1f5116d23acb,2025-02-12T19:06:01.943000 @@ -256722,6 +256722,7 @@ CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec4484 CVE-2024-3217,0,0,568131edae431aad089ca604dd56a8e6db1af2d40a05045878243eef38ec2407,2024-11-21T09:29:10.137000 CVE-2024-3218,0,0,81581ac92c0291d6ed71dd9b38de9b17941e2f3f078e37375ed0e3bad56cd497,2024-11-21T09:29:10.287000 CVE-2024-3219,0,0,613f24a90b9d07df734e813c77dec022a198bc783ddf69b77ff7279e0db84b10,2025-01-31T20:15:31.547000 +CVE-2024-3220,1,1,b75598d3045f7c183d6a5cf0b1c5ca25c9ae94ca18e295e7264b212086807dc7,2025-02-14T17:15:15.567000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,82de9fd2512155ee1b039d671013d0c708a38fc533bf235bc5023a60a9960005,2024-11-21T09:14:35.290000 CVE-2024-3221,0,0,37c469ccfcd488c2405edea3944c4cece27262f26ce3acd8ae4229b31da0296c,2024-11-21T09:29:10.600000 @@ -260993,7 +260994,7 @@ CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 CVE-2024-37600,0,0,b79a51c094f0a6fed9f65e54b9a39c093b563e53c9ad91e82bfd0b19e4aafe5f,2025-02-13T23:15:10 CVE-2024-37601,0,0,aec0cb3ba1cbe8af2217e7a003790bea0a3bc0a521a72f99614a77c683ba988e,2025-02-13T23:15:10.113000 -CVE-2024-37602,0,0,ec442a35e466f5fd5257edca5d419584b6ca1840882c802195e64121f0957b75,2025-02-13T23:15:10.197000 +CVE-2024-37602,0,1,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000 CVE-2024-37603,0,0,5e87b65dd6dc773292958ca8ecc777b9991649642bca0fdd87232f42b10c39f3,2025-02-13T23:15:10.313000 CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000 CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000 @@ -267771,8 +267772,8 @@ CVE-2024-46919,0,0,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b5538 CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000 CVE-2024-46920,0,0,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000 CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fccc6,2025-01-31T17:15:14.113000 -CVE-2024-46922,0,0,f69f2297d529d2b758fdb61e6273f295a373427aaba7a2f2ea5a1c7ae6851bd9,2025-02-12T22:15:39.230000 -CVE-2024-46923,0,0,2a9e2d94401a8d69abb9d9f5cec13b8f32b474e93a8a89ce79b66b047f736647,2025-02-12T22:15:39.347000 +CVE-2024-46922,0,1,0db250dfd19dfe37da4185ebb6d290fa2abaff010b5068a2738e5acc385da6af,2025-02-14T18:15:23.333000 +CVE-2024-46923,0,1,3a59ad0039ba7c267b4e114b38669f99fe253633f0356c8066ed36eb577328c9,2025-02-14T18:15:23.530000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 @@ -270880,8 +270881,8 @@ CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b72 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,6fa0879d8573b55bb699ffd9db2627c7afd75bd2e7d239fd0cceb3b05bf24bd3,2024-11-21T09:46:59.737000 -CVE-2024-51122,0,0,8d7f8714f5f85a246af00bc880fa54ecb528503d494829283ffde699ad9da742,2025-02-12T22:15:39.603000 -CVE-2024-51123,0,0,ba78b170d31e1ee4ef7b69406ccf5942b77cd20acd802d7a760653500df989af,2025-02-12T22:15:39.717000 +CVE-2024-51122,0,1,6c9b22b8911d323c91a32d64ca8efa7d1a8d2870f15af95874f0b3741ba03b8e,2025-02-14T17:15:15.717000 +CVE-2024-51123,0,1,c975e22d2104518d5b485ea2ad5dd2a84432d1324edcf323508cb95e028b96b5,2025-02-14T17:15:15.880000 CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000 CVE-2024-5113,0,0,5f0d1848862cdf1df7ede964c3b4216fbb57f9b94204859b6a8da2ada96fab98,2024-11-21T09:46:59.870000 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 @@ -271005,7 +271006,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 -CVE-2024-51440,0,0,c2a2db3bb34753f13b3578d79d926ef057dc249b8113a292988169a272cf5d07,2025-02-12T22:15:39.990000 +CVE-2024-51440,0,1,791aca99f0e4fa3be44b578d371a5bd0856e20a6890653e6d757068785da4020,2025-02-14T17:15:16.040000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,026f2f79f883da59dbffb9dacf2ddcce01313f0fb97ba3b8dc804a5b33e0dd57,2025-02-10T13:57:18.723000 @@ -271909,7 +271910,7 @@ CVE-2024-52571,0,0,77a9159855cd62fa01f047f9112fd0953f87a29ce60ac61f24d8893b5a240 CVE-2024-52572,0,0,6376707757e7137e4ed57cb6aa915c75f77a0c9d8f5dcf819a13dd807d60e570,2024-12-10T14:30:46.097000 CVE-2024-52573,0,0,9b0b6e6543aa62aa5974779f944f035fd69c656fc6d7016b22eedb4bc991f5cb,2024-12-10T14:30:46.227000 CVE-2024-52574,0,0,d8df409b977762d84a83d9a80a80d32c1ddc712a3a86833baf305ddb75a990a9,2024-12-10T14:30:46.367000 -CVE-2024-52577,0,0,33fca88357fa2aabcdfe2b713b797245700ab3a028f90fd81cbca4052b90d80b,2025-02-14T10:15:09.557000 +CVE-2024-52577,0,1,cb4249700ea409806fe0645db62257c6192d23add30e1fa2245a66d509fb3211,2025-02-14T17:15:16.200000 CVE-2024-52579,0,0,d378de938891f71e4fc556c9415102b9e08c8e29cf41254f78470db78534fb63,2024-12-18T20:15:23.383000 CVE-2024-5258,0,0,53374e7ddf7cf7e465eb57d73b1205feee2ef084995ee89434e5eccc31b66e53,2024-12-13T17:09:56.883000 CVE-2024-52581,0,0,eebf748bb1f77ebde863c93ef3f2148c2ec8f59bbc22dcc86790ce8d59decaaf,2024-11-25T14:15:07.077000 @@ -272084,7 +272085,7 @@ CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e CVE-2024-52891,0,0,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127010,2025-01-07T12:15:25.010000 CVE-2024-52892,0,0,51b120f05ecc561fc57785048af19814a6f54136bb2b0442dcfc94ac1c7528d7,2025-02-06T20:15:39.763000 CVE-2024-52893,0,0,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 -CVE-2024-52895,1,1,7f4a5ce15883b62a7aa1b544cdc19f80b65ed4bfb8b25711977644f659f94848,2025-02-14T15:15:09.210000 +CVE-2024-52895,0,0,7f4a5ce15883b62a7aa1b544cdc19f80b65ed4bfb8b25711977644f659f94848,2025-02-14T15:15:09.210000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000 CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000 @@ -273421,7 +273422,7 @@ CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b67 CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 -CVE-2024-54951,0,1,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000 +CVE-2024-54951,0,0,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000 CVE-2024-54954,0,0,250bc145ec3f51ab356a556d3d29ab0cef21c9b82ddd8fae33865ef33a929590,2025-02-10T18:15:29.663000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 @@ -273877,7 +273878,7 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 -CVE-2024-56180,0,0,b943ea9ac18eae81e541024eae60f52715b3ea65908fff6a514e8333f1d23b3f,2025-02-14T14:15:32.267000 +CVE-2024-56180,0,1,859a0a214e880c431d953ea42b93fc75dbc38729b9f116959536aa113f3fa28e,2025-02-14T17:15:16.317000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56197,0,0,4632d5e45b087fa49b33344dbbc8320feb12c67835a43623389cf108d1856ef1,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 @@ -274092,12 +274093,13 @@ CVE-2024-56454,0,0,9fe32f3b9015db86e1a4a24c1fea9536d34d315a1d0f17a6f977857204a2b CVE-2024-56455,0,0,db2c9c4d4290b1bfc3ae388650ee55637dbba19ea1aad42dbe4095f066ac1885,2025-01-13T21:49:20.337000 CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d499,2025-01-13T21:49:26.503000 CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 +CVE-2024-56463,1,1,27cc10ac00b18d337ecb9af82de18e317e29ab38f779b71c11d36e7b3b65920e,2025-02-14T17:15:16.420000 CVE-2024-56467,0,0,0e97a4a5265bbd7255518e121a1e18bf2ca6ad42df9cea99b9d152f96bc13bb9,2025-02-06T21:15:21.600000 CVE-2024-56470,0,0,ac7fe5deb1912e1f7152ea1243f737adbd1bdd50d580b0117deddf92ad654d20,2025-02-05T23:15:09.707000 CVE-2024-56471,0,0,2645dbc79a9d3c52828807159e2c2a82f0a0970b230000e9b5230ed2f60688d3,2025-02-05T23:15:09.860000 CVE-2024-56472,0,0,e15762c5079dea6e6225e08a85b40a4a9c0b267bccd52e8548e093166c94a8ae,2025-02-05T23:15:10.007000 CVE-2024-56473,0,0,af8fefb91c24b56b2416c301d8ba2fc9a8baa58478021f1b63fe5eb7afccaaa3,2025-02-05T23:15:10.153000 -CVE-2024-56477,1,1,ce1aefc7a0166760d03634da05dcc562842beecbab4a5b636c9a146472fac741,2025-02-14T15:15:11.887000 +CVE-2024-56477,0,0,ce1aefc7a0166760d03634da05dcc562842beecbab4a5b636c9a146472fac741,2025-02-14T15:15:11.887000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000 @@ -274440,7 +274442,7 @@ CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff CVE-2024-56938,0,0,7311c2aa230afa98196c4cf1e8d469773d784c7a92ffc9973a7861855471227d,2025-02-12T22:15:40.430000 CVE-2024-56939,0,0,4d68514f0e3e704b5c70a499eb5e3de186858e58c8f7d02e572fa5c557ed24a9,2025-02-12T22:15:40.530000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56940,0,0,8602579e6e56defe6b3a07a307af514bc55d8d2f2cfde3bac72c0d4aa150905d,2025-02-12T22:15:40.643000 +CVE-2024-56940,0,1,44a1d8c1d716ff369e2a45c01874d84654c74e94571972176e6d770bdb40eed3,2025-02-14T17:15:16.590000 CVE-2024-56946,0,0,af9e881d063c5daf5a15e5df8041bc60d2da62760d3b549c99ac43411158444d,2025-02-03T20:15:33.743000 CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 @@ -274467,14 +274469,14 @@ CVE-2024-56969,0,0,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f04 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 -CVE-2024-56973,1,1,5dc6b709501a4f789c92c376bf9657ee53fef4631e2d7164cbd8c35411ff351f,2025-02-14T16:15:34.273000 +CVE-2024-56973,0,0,5dc6b709501a4f789c92c376bf9657ee53fef4631e2d7164cbd8c35411ff351f,2025-02-14T16:15:34.273000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6f0c,2025-02-04T16:15:39.010000 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 -CVE-2024-57000,0,0,22ae1adeeb8dde49b9cab48884a03b2d82548286eed8225c13790358889d77d6,2025-02-12T16:15:42.317000 +CVE-2024-57000,0,1,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000 CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 @@ -274688,11 +274690,11 @@ CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e CVE-2024-57598,0,0,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 CVE-2024-57599,0,0,3650e5d13310a5a98241782486c3741155577b25d34fc344734cf7f8392b2a8d,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 -CVE-2024-57601,0,0,287d52f462f4d565a43b772b5c56e83f4d59c2d7882d31265995dc0663c14bc1,2025-02-12T22:15:40.747000 +CVE-2024-57601,0,1,225d456013d678778684db06cb161f7f5c515f35ff78e3b517f00f5aea3bb837,2025-02-14T17:15:16.787000 CVE-2024-57602,0,0,d53d2cf1c3fe8bff2fe33eb66efb3a4f78f0dd54e65783449a2283dd476a8227,2025-02-12T22:15:40.867000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 -CVE-2024-57604,0,0,381be4592f3ea4a61ef133bff82feb8ada92edf1d76f04aee5a146b95025d403,2025-02-12T22:15:41.100000 -CVE-2024-57605,0,0,0d06ad77815fc03ce7f03efee24d3945693fd74ddc7697904d3d95c90ef79dda,2025-02-12T22:15:41.210000 +CVE-2024-57604,0,1,812052693403195ae32632155ab1a6e433d42d109209f6d9c0707dbaee159068,2025-02-14T17:15:17.003000 +CVE-2024-57605,0,1,3602350f2d72f258fdf223214f07e17bb8aee6c913748b67a0da0958b6965164,2025-02-14T17:15:17.230000 CVE-2024-57606,0,0,9480535946f02c15350aecd5bbd6e6ae6034246858257c08d866403ff66c1f1b,2025-02-08T03:15:12.010000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -274785,7 +274787,7 @@ CVE-2024-57721,0,0,2848dad2c2b609041733157af3749bc2705ed04a630325793e55f87a8c15a CVE-2024-57722,0,0,cc12b04f9055359b9f59d1fb9351a1dc5f896d626ba1ab2353434d622e66c018,2025-01-23T15:15:12.610000 CVE-2024-57723,0,0,8dfe124ae30760a599d5a92653aea7bf25ab7fabdd29029a0d6962e3146e832c,2025-01-23T15:15:12.820000 CVE-2024-57724,0,0,80b6486449089b1abee894f99cbdee8ef8e8a7c83dc4631c3181139e769eeda6,2025-01-23T15:15:13.020000 -CVE-2024-57725,1,1,740cefa3e10b74cad0b71e29659bea48465684e31055f9fd21ed78a9ed8e6551,2025-02-14T16:15:34.360000 +CVE-2024-57725,0,0,740cefa3e10b74cad0b71e29659bea48465684e31055f9fd21ed78a9ed8e6551,2025-02-14T16:15:34.360000 CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000 CVE-2024-57727,0,0,e4677a15ae16ec0ebae3eb2021b05fa3f0029b408f389dd592fbd8ecc2109cf2,2025-02-14T02:00:02.377000 CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000 @@ -274813,12 +274815,13 @@ CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485 CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000 CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 CVE-2024-57777,0,0,e81fdc551542b79f75c8f99f496223d9b803cf79f3ada1cc2529ab07650b1016,2025-02-11T22:15:29.680000 -CVE-2024-57778,1,1,561f9adcd76c1cc316a13851991fdce83ce492a8007a0be9e7b163fb3eea4f69,2025-02-14T16:15:34.453000 +CVE-2024-57778,0,0,561f9adcd76c1cc316a13851991fdce83ce492a8007a0be9e7b163fb3eea4f69,2025-02-14T16:15:34.453000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 +CVE-2024-57790,1,1,0217612903ad6c9366e535fb5355778cfb9d3c77f32f2f4a38735f90a312eec3,2025-02-14T17:15:18.343000 CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000 @@ -274937,8 +274940,8 @@ CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000 CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000 CVE-2024-57950,0,0,97b43429de158865b5b0286f6bf81d91a6114b665bd3df28d16fd4e130eec8f0,2025-02-10T16:15:37.913000 -CVE-2024-57951,0,1,f76b42abdfb86704a9c0f0688028e52627d4292026dcbe9e66fcb6fdcc25a743,2025-02-14T15:57:18.047000 -CVE-2024-57952,0,1,4a13802904b48d770e3732d2a4be26769b2ca0854368681c7bafc9fb5cc58fc2,2025-02-14T15:52:04.957000 +CVE-2024-57951,0,0,f76b42abdfb86704a9c0f0688028e52627d4292026dcbe9e66fcb6fdcc25a743,2025-02-14T15:57:18.047000 +CVE-2024-57952,0,0,4a13802904b48d770e3732d2a4be26769b2ca0854368681c7bafc9fb5cc58fc2,2025-02-14T15:52:04.957000 CVE-2024-57954,0,0,91758d48648129248ea9805d5372fb353727b8abbefe2abe7e8495cf9dc66f5f,2025-02-06T13:15:39.467000 CVE-2024-57955,0,0,c9d2b1ffe54f7f5776391ee1ea15de6075933d1092f6712e436603a1d67aa02c,2025-02-06T13:15:39.590000 CVE-2024-57956,0,0,48560cb5ca493c2bb63e0d975b9dbbbb9d769306dd7be72806e60e0facf4e8fd,2025-02-06T13:15:39.723000 @@ -276087,7 +276090,7 @@ CVE-2024-7048,0,0,f97f3592e9a62156744d6e051c2a46f407bbff37b6d74b038dcb4f6ca33e3e CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cabd9,2024-10-17T14:22:44.653000 CVE-2024-7050,0,0,e7e264104cea78047b76892b2fd1d390f9cbe010098741cea3997c4dcffc5e50,2024-11-21T09:50:48.257000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 -CVE-2024-7052,0,0,1f434523bd2abb1a4f04a2bc7ea5914aaf4882e3a35a765c40593bc3b64cfc20,2025-02-14T06:15:20.350000 +CVE-2024-7052,0,1,2f19299fb0a6d30f56189ed607ffe72d821bc893218df170535442262ee0e75f,2025-02-14T17:15:18.480000 CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,eda6ef490df5a6117a32915d1ec352603ee024f358dd3007691ca0ac4a1981c5,2024-08-06T16:30:24.547000 CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000 @@ -277688,6 +277691,7 @@ CVE-2024-8889,0,0,cdec4457205670f8c1fce8d5ec4f28e385f385cd4c6bff224f6758703eef56 CVE-2024-8890,0,0,14ace7d92a0cb039c8f83b8b1d2fcde984c649b2d52acb27da4aae93ecfd88d9,2024-10-01T15:46:33.750000 CVE-2024-8891,0,0,dcfee199776fcf2a67ab9eccaa232b7ee6a39a3f93a7b26e93cad40b2c76b3f6,2024-09-26T18:50:56.827000 CVE-2024-8892,0,0,2bc42170fdadb33e24d097620e456d4331ea0e177116b9a61aed31427fea67b3,2024-10-07T17:10:26.673000 +CVE-2024-8893,1,1,dd591037df50a8ce1355b3cc78b2310ffa2f9c8d99617f0bc81e02d549f5c858,2025-02-14T17:15:18.690000 CVE-2024-8894,0,0,2afcf79da1ae860d0dea9bd3bcd6b3bd6c1b1aa1ddaa7801de097bd759b666b2,2024-12-04T12:15:20.763000 CVE-2024-8896,0,0,15db3dca334d16efce2b5cc93aa60cd50f1976bd9a02ff816eabd5e356b493e7,2024-11-01T16:27:16.693000 CVE-2024-8897,0,0,0fdfc9f71cfefedb0c7a5c55250fccd8899f2bafda1fe770d540ced5f92374b3,2024-09-25T19:49:02.493000 @@ -278858,6 +278862,7 @@ CVE-2025-0499,0,0,42871b7d04896bad08e4e2a0f52be498a4b936aaa56513408d624ca2987d2d CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 +CVE-2025-0503,1,1,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000 CVE-2025-0506,0,0,4a6852805f36f30ad94ceceb0f4a0d31ff4937d2fd2fd233631287ffb7576ed3,2025-02-12T15:15:15.613000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,5c3664ffdd7f56763bb1b43873c2b214da02799f3bd4d544bc23e17ac3c97665,2025-02-04T20:15:49.763000 @@ -279543,9 +279548,9 @@ CVE-2025-21373,0,0,03c6df1ed1296ff00bda73b29a73a70d88e5343798916142764a5992e49fb CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000 CVE-2025-21375,0,0,d2ce3bda3a812b4670fa200ce28df08f33c6caa5149ed00ccb1a1934fedf5756,2025-02-11T18:15:35.947000 CVE-2025-21376,0,0,72fb0261d9dc3c6575ee00f5528bb48512c9d865220612ddf90b246a5104801c,2025-02-11T18:15:36.167000 -CVE-2025-21377,0,0,b642a59bf60b0d76cd70b4273b64869ada26087e2a4447bd3cf13306ac754779,2025-02-11T18:15:36.387000 +CVE-2025-21377,0,1,f263670feaf2f0af19a32be3eb2437e5c8f30daf73c37789631918d6b9d79d16,2025-02-14T17:40:52.127000 CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000 -CVE-2025-21379,0,0,dcf8fc43906f7bf6df072f3a5848bef7bf0397ddd19ca08b7c90294b4a43b6f6,2025-02-11T18:15:36.590000 +CVE-2025-21379,0,1,7ec8aede7c8424716a30381f57c5c6c2e0103505fb7149b55274dedfc8d7261c,2025-02-14T17:39:51.510000 CVE-2025-21380,0,0,e643fd8c94c7b45625a0b2a2c6180cbad608f386b8797cac9a8273096b1f65ed,2025-02-05T19:29:52.457000 CVE-2025-21381,0,0,e49c09663686043be847f977dabf9b6965b23793e33ce52ea7defaabc50f252f,2025-02-11T18:15:36.773000 CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 @@ -279561,26 +279566,26 @@ CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8c CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 -CVE-2025-21397,0,0,9ecb0c7d039fe2e63559eaf6ac83dc079616dbd9f0eb6678515bdbfd41ab0c31,2025-02-11T18:15:38.293000 +CVE-2025-21397,0,1,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 -CVE-2025-21400,0,0,9148012217da2acacd349e8961893cd2430baa039bda4458d9a5cd4939c44890,2025-02-11T18:15:38.483000 +CVE-2025-21400,0,1,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 -CVE-2025-21406,0,0,c332d6c7a21aa83fda35b8dd67c69fd56c445d3331250a2368ac6b7420a07551,2025-02-11T18:15:38.907000 -CVE-2025-21407,0,0,c86c46a06f59a8ef3d0c58fe3354fdc4a214cb732d20b4d77580f4cafdd2b5eb,2025-02-11T18:15:39.157000 +CVE-2025-21406,0,1,6c291d888693effc4c704398bf9fe1ea90097879dc039825d7dbe20016f09a5f,2025-02-14T17:37:19.737000 +CVE-2025-21407,0,1,75fede06292d95a8c42cb27cc3f5b2257526d05517ed0aab3f9eb96bcb3fd2e6,2025-02-14T17:36:43.997000 CVE-2025-21408,0,0,dde39692a9cd7bcc03498eac1e13d6927330f107e7077667a1cb2769fa60a687,2025-02-11T19:36:51.360000 CVE-2025-21409,0,0,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000 -CVE-2025-21410,0,0,436493afdee54b694e4d2cf93579d77f5bf8701f8fb1d9d5d43612c8b7d401b6,2025-02-11T18:15:39.593000 +CVE-2025-21410,0,1,7143363598b411415057911e839e3e2734d5d4dab59fd90f8ec466c0580653af,2025-02-14T17:35:15.613000 CVE-2025-21411,0,0,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000 CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000 -CVE-2025-21414,0,0,3e2427e2ed7c2a71e7ca3cdd20bff3b54a00c32904d4ae8308a39097ff4a1289,2025-02-11T18:15:39.787000 +CVE-2025-21414,0,1,78de689a7b7f833d5ecc59d3a75db99e46664e6266390ecb5c2f7a8aceafc19f,2025-02-14T17:33:40.003000 CVE-2025-21415,0,0,a73e69cb370d0dac47b98a4826a11694e5572b74f5784ab533acee4e37f95f59,2025-02-07T14:11:24.557000 CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000 CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000 -CVE-2025-21419,0,0,8d4a4ce1854ce64d5e9a1632a620dc74ee76e1214f2cab758271d527d93a2f57,2025-02-11T18:15:40.227000 -CVE-2025-21420,0,0,4b5efeb1f002453a12ea1479627a151320581653d00a87f90e1240101e9780c2,2025-02-11T18:15:40.427000 +CVE-2025-21419,0,1,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 +CVE-2025-21420,0,1,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-21490,0,0,98aae49df09722e484f2181974271fc107b3101ab3dbd9cc9dd1ca3416b2ddf5,2025-01-23T20:15:31.750000 CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000 @@ -279754,9 +279759,9 @@ CVE-2025-21690,0,0,409184d515a8ba278a78e3182a62947193916d8738de3b3f3b5bc8e7c7527 CVE-2025-21691,0,0,7b442008fae99134657976bf7535055e277309d3aaae2c6d48207dd41283a97d,2025-02-10T16:15:38.660000 CVE-2025-21692,0,0,1555d9a0f484c79fb0521445824e128614c8ef002d6f5d06ed98703295d0b013,2025-02-10T16:15:38.763000 CVE-2025-21693,0,0,7a6b4aca501bc98d818a39748ab53f772cb8c2c6c63fb05bf7b85e749e32488e,2025-02-10T18:15:35.367000 -CVE-2025-21694,0,1,4d66a5057f1d2e8907f5e975a4f0fe5e549c1e634550338b1bfb73de2ad5699c,2025-02-14T15:46:40.857000 -CVE-2025-21695,0,1,4438167eeca6bd858c177d9ae492872f06b6184828f1c921782c8da088e8c482,2025-02-14T15:44:28.450000 -CVE-2025-21696,0,1,1975fb41b3a7a51147bd9e4268307cc5da44b8ee25ffeb96d8fe52b1da77a048,2025-02-14T15:42:55.663000 +CVE-2025-21694,0,0,4d66a5057f1d2e8907f5e975a4f0fe5e549c1e634550338b1bfb73de2ad5699c,2025-02-14T15:46:40.857000 +CVE-2025-21695,0,0,4438167eeca6bd858c177d9ae492872f06b6184828f1c921782c8da088e8c482,2025-02-14T15:44:28.450000 +CVE-2025-21696,0,0,1975fb41b3a7a51147bd9e4268307cc5da44b8ee25ffeb96d8fe52b1da77a048,2025-02-14T15:42:55.663000 CVE-2025-21697,0,0,a47524e2be039422746187d433904ec2c7edd2dfdfd45557e9bc03e82a52aef3,2025-02-14T14:13:39.943000 CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1314,2025-02-13T16:16:48.690000 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 @@ -280168,7 +280173,7 @@ CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0 CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000 CVE-2025-22960,0,0,909fd4543561b179cf19e362db8b8b06eacc11dd2ff530093e36ef46d4e67f11,2025-02-13T23:15:10.960000 CVE-2025-22961,0,0,977c2fe378865dcb0b1e64b0c10fc2188b8a7bb82cfb2af8a0d422ceddc01711,2025-02-13T23:15:11.047000 -CVE-2025-22962,0,1,edfa6947f0850e24eb9cdf90af6759e9e22a516ea9c64433cee19e5c5eaec8ee,2025-02-14T16:15:34.803000 +CVE-2025-22962,0,0,edfa6947f0850e24eb9cdf90af6759e9e22a516ea9c64433cee19e5c5eaec8ee,2025-02-14T16:15:34.803000 CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 @@ -280750,7 +280755,7 @@ CVE-2025-24031,0,0,bdd88efb43225a0aa37131fbb1aadfb6a5c49be655c92779f82ebfaee15ee CVE-2025-24032,0,0,dda62e5756df304171fa34002718f4838312b9f6c7aadfe598f5ccb84d1164a5,2025-02-10T16:15:39.153000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 -CVE-2025-24036,0,0,15ad188bb58aa04b431e8d01ec444279573309fce4394cbf4f0e281b3ab24bfd,2025-02-11T18:15:40.643000 +CVE-2025-24036,0,1,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 CVE-2025-24039,0,0,d84a6be52ea21ec5f6c453675ceb31a83a6cfad7f11cd2b92aef28a67b8c0730,2025-02-11T18:15:40.927000 CVE-2025-24042,0,0,3b9cb2f33310ff2d28bfb80ebb5f313fc59c2c80920d4229599868839f8bde0f,2025-02-11T18:15:41.117000 CVE-2025-24085,0,0,f7bcfbaa1ee9096d902e4f6dc6ef822d9cf28d4da7694ddbc06842049b1b433d,2025-01-30T02:00:02.057000 @@ -281283,7 +281288,9 @@ CVE-2025-25200,0,0,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1b CVE-2025-25201,0,0,ede8016b22c20a5da1c3168daf6048debc3bf82c814cff603e6090c3dcc1680e,2025-02-12T19:15:21.570000 CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000 CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 +CVE-2025-25204,1,1,08e898f00cdd4836e5416642a3da9e96b59613851a80bcbfd14158c90e610a8f,2025-02-14T17:15:19.140000 CVE-2025-25205,0,0,e11d363a7c34c04aeb358dd5ff34494ef66003966c6cc6b33481bd348b2d737c,2025-02-12T19:15:21.717000 +CVE-2025-25206,1,1,e9846eb9edb5a629adfeda97812105c1d9509aaf2c4838d333e92f590466aefc,2025-02-14T17:15:19.327000 CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 @@ -281292,6 +281299,7 @@ CVE-2025-25281,0,0,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24c CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 CVE-2025-25286,0,0,d02a516e334a3f6a031f551547a6cf5db3f84dd4e0c98c8429bacf5acc75be44,2025-02-13T01:15:25.280000 CVE-2025-25287,0,0,990f1bef848f5cb0ec832e1dc9fa9d35b18b0435a224d0f576726f1fa2e52a18,2025-02-13T16:16:49.187000 +CVE-2025-25295,1,1,9304b327aa84ad0a6b5813eb481063f58dfc11525062cc326fa01528a59388c3,2025-02-14T17:15:20.230000 CVE-2025-25343,0,0,165ee3c898301f2db8f607c24a899fe7668a5762e7942c4695c7dfe0dda59857,2025-02-12T19:15:22.003000 CVE-2025-25349,0,0,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 CVE-2025-25351,0,0,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 @@ -281299,10 +281307,10 @@ CVE-2025-25352,0,0,0a546ec8595618261c2d9d5baed99aac6a9434902e0e6a95e789a0df9f156 CVE-2025-25354,0,0,644c1f98db76bacefce7599642a5c3bce587228541e0b2d536f4988e565aa4b8,2025-02-13T16:16:49.433000 CVE-2025-25355,0,0,7383ecd6a63ae93c3a2852d9a1bc8a4693048a41adab182a133fca7cf58c38f6,2025-02-13T16:16:49.530000 CVE-2025-25356,0,0,324aaf2b373472c6b8c90b598e39e2d5df9087de40c444f18bb49c7851e462ae,2025-02-13T16:16:49.613000 -CVE-2025-25357,0,0,6f531e76829770dc77637d426fbb2113a6e29ec9bb7f3b2911778249f6c2d925,2025-02-13T16:16:49.700000 -CVE-2025-25387,0,0,c8b34cd0f2e9d22bfc64b1fbf8870526f1f3484a656c158d1d7a643b60e5d353,2025-02-13T17:17:20.247000 +CVE-2025-25357,0,1,a4b960306dc0c56b46bb46282a3ae540c99735db6f07c341b1dd3f69b943cd4a,2025-02-14T18:15:24.203000 +CVE-2025-25387,0,1,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,5876192d19265a89356e9ca3f40fe8fc17b662577ecd7d99d37f22efaaf88049,2025-02-13T20:15:49.730000 -CVE-2025-25389,0,0,4df10f2f2df1e2b397d76579240fc8c86e94be7c9d6fc56ae049af1e8d0441a5,2025-02-13T17:17:20.427000 +CVE-2025-25389,0,1,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000 CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000 CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000 @@ -281312,18 +281320,28 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 CVE-2025-25530,0,0,b297970422a9009f3519f09d12d391c8a089497e9f856b7f5a138869935d03dd,2025-02-11T20:15:39.327000 -CVE-2025-25740,1,1,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 +CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,22c247f082a192b17144b46680a5eeb4753c15967349cf8359d498374cba430c,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,7436abbf9896837a8de9002dbff5d07a1a7a57435c6244cea579f542c949c30d,2025-02-12T17:15:24.150000 CVE-2025-25743,0,0,b33e96b73fe5d43e977fc05d5d723c6f65971127b3785cb42153a064e7d1dfa8,2025-02-12T17:15:24.270000 CVE-2025-25744,0,0,628a606d8113015dc92f83451c33b7ec9f2d546fbac6214e1a09b8ec06580c92,2025-02-12T17:15:24.390000 -CVE-2025-25745,1,1,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 +CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,c4b5e6feeed888e613a77cde223f386a53a94e2f5f7e2eda511c12e6c183117d,2025-02-12T17:15:24.500000 CVE-2025-25897,0,0,2ea1460474639a1fdf3df677fc835c28578c1be17f5c3694f6f8c8d08e5b7f8a,2025-02-13T16:16:49.790000 -CVE-2025-25898,0,0,b3914930aee254a710f3c68cefa5259839e273a33b904b296d78b9d90c089482,2025-02-13T16:16:49.867000 +CVE-2025-25898,0,1,ce3f5d0179ed4ddc6d491c3be6fbda7289ce3638f8b82677f1620f1da2e7683b,2025-02-14T17:15:20.917000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,a0ccc8806ccf3a3c8c76a012f89ca9bd9b6e8f621ab07786472d57d1b5f5925d,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,7c00c4f6a65482a8973906804aa663453cc2407407b6bc523ef9411ad464c9cf,2025-02-13T16:16:50.180000 +CVE-2025-25988,1,1,81fed67c768a8ff0efbc49e209315d815f0157f3d5ba6a5d2078a025125e3aed,2025-02-14T17:15:21.157000 +CVE-2025-25990,1,1,25fd122449f3f40ab198d6c14e92c02ee172b4e7bd4f4381949b4c12b3192f75,2025-02-14T17:15:21.320000 +CVE-2025-25991,1,1,a65028fe0b207d2aef1bbcde075128939a6477f3b5e34c0215dd741f8641656f,2025-02-14T17:15:21.477000 +CVE-2025-25992,1,1,572805f29a6ab45aa41285787d33c56ef10b51a506812591e12006dd10ddceed,2025-02-14T17:15:21.640000 +CVE-2025-25993,1,1,2ee1cd6ed469ffcde3b5d276ecb088106ce59f9ff5891fab42c5959a0868e7ac,2025-02-14T17:15:21.793000 +CVE-2025-25994,1,1,1565371c65658f3e497326866a0bcd27848662e10b1d4f38698b738bf7b4228d,2025-02-14T17:15:21.953000 +CVE-2025-25997,1,1,ab53683ebc80c29cd940c7cea8cd2422bcc849cfeb7ac9ecda86f318b3dd524d,2025-02-14T17:15:22.117000 +CVE-2025-26156,1,1,129839c27bcfa819b0e8b602b804afb4ad8151c112f0db2746f0dfce06702a88,2025-02-14T17:15:22.273000 +CVE-2025-26157,1,1,a78a0288224cad2776ea08cea634c70beaf793bb84435a9c0b56ab56de4fab49,2025-02-14T17:15:22.437000 +CVE-2025-26158,1,1,1eff08f59781f214911124e42d357ed2ec4e47c4853fe477053ef51b54be7ad4,2025-02-14T17:15:22.590000 CVE-2025-26339,0,0,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 @@ -281375,8 +281393,11 @@ CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000 CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000 CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000 +CVE-2025-26506,1,1,06472821ebfcd7953c4c4368f236121ddb39bc67c09573db59220c6ef53504c7,2025-02-14T17:15:22.747000 +CVE-2025-26507,1,1,f323176124706f913b7e946f1930ef7686233000e26002e9c7f40f4fceb7a9e3,2025-02-14T17:15:22.863000 +CVE-2025-26508,1,1,5016b90acce97ba3621833356645f05da34419daa8434a6376c336274d22232b,2025-02-14T17:15:22.983000 CVE-2025-26511,0,0,f60d5b8ed6462b3636b1bec6d86421fa2447443d87dddccbff41a72a635be633,2025-02-14T00:15:07.667000 -CVE-2025-26519,0,0,90c5229d2339d524d33b2707fd9962bc23a7008488910f54bd2629286aab7f08,2025-02-14T04:15:09.050000 +CVE-2025-26519,0,1,b3fc9666a20002fa3306682f9ea04074909562cf70276b34a90b9ad244b51ded,2025-02-14T17:15:23.090000 CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000 CVE-2025-26522,0,0,d432a083d9fe16f2710db5ccca016a9c6993d2707a88672ed6bf48ef8fe32b59,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,167d4e5eb341df307a978429e54308c2f66bd92279a3ab3ead55f5415ee1e0de,2025-02-14T12:15:29.723000 @@ -281406,4 +281427,4 @@ CVE-2025-26580,0,0,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455e CVE-2025-26582,0,0,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000 CVE-2025-26788,0,0,64332a85fdb9912d1b73ed075990a903c9543c33a30078e66d3be5a1bd8bc2eb,2025-02-14T08:15:31.183000 CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000 -CVE-2025-26791,0,1,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000 +CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000